78 results (0,21592 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Your Essential Guide to Quantitative Hedge Fund Investing

Introduction to Number Theory

Mind Brain Quantum AI and the Multiverse

Geospatial Health Data Modeling and Visualization with R-INLA and Shiny

Geospatial Health Data Modeling and Visualization with R-INLA and Shiny

Geospatial health data are essential to inform public health and policy. These data can be used to quantify disease burden understand geographic and temporal patterns identify risk factors and measure inequalities. Geospatial Health Data: Modeling and Visualization with R-INLA and Shiny describes spatial and spatio-temporal statistical methods and visualization techniques to analyze georeferenced health data in R. The book covers the following topics: Manipulating and transforming point areal and raster data Bayesian hierarchical models for disease mapping using areal and geostatistical data Fitting and interpreting spatial and spatio-temporal models with the integrated nested Laplace approximation (INLA) and the stochastic partial differential equation (SPDE) approaches Creating interactive and static visualizations such as disease maps and time plots Reproducible R Markdown reports interactive dashboards and Shiny web applications that facilitate the communication of insights to collaborators and policymakers. The book features fully reproducible examples of several disease and environmental applications using real-world data such as malaria in The Gambia cancer in Scotland and USA and air pollution in Spain. Examples in the book focus on health applications but the approaches covered are also applicable to other fields that use georeferenced data including epidemiology ecology demography or criminology. The book provides clear descriptions of the R code for data importing manipulation modelling and visualization as well as the interpretation of the results. This ensures contents are fully reproducible and accessible for students researchers and practitioners. | Geospatial Health Data Modeling and Visualization with R-INLA and Shiny

GBP 84.99
1

Discrete and Continuous Fourier Transforms Analysis Applications and Fast Algorithms

Discrete and Continuous Fourier Transforms Analysis Applications and Fast Algorithms

Long employed in electrical engineering the discrete Fourier transform (DFT) is now applied in a range of fields through the use of digital computers and fast Fourier transform (FFT) algorithms. But to correctly interpret DFT results it is essential to understand the core and tools of Fourier analysis. Discrete and Continuous Fourier Transforms: Analysis Applications and Fast Algorithms presents the fundamentals of Fourier analysis and their deployment in signal processing using DFT and FFT algorithms. This accessible self-contained book provides meaningful interpretations of essential formulas in the context of applications building a solid foundation for the application of Fourier analysis in the many diverging and continuously evolving areas in digital signal processing enterprises. It comprehensively covers the DFT of windowed sequences various discrete convolution algorithms and their applications in digital filtering and filters and many FFT algorithms unified under the frameworks of mixed-radix FFTs and prime factor FFTs. A large number of graphical illustrations and worked examples help explain the concepts and relationships from the very beginning of the text. Requiring no prior knowledge of Fourier analysis or signal processing this book supplies the basis for using FFT algorithms to compute the DFT in a variety of application areas. | Discrete and Continuous Fourier Transforms Analysis Applications and Fast Algorithms

GBP 56.99
1

Introduction to Linear Algebra

Discrete Event Simulation for Health Technology Assessment

Discrete Event Simulation for Health Technology Assessment

Discover How to Apply DES to Problems Encountered in HTADiscrete event simulation (DES) has traditionally been used in the engineering and operations research fields. The use of DES to inform decisions about health technologies is still in its infancy. Written by specialists at the forefront of this area Discrete Event Simulation for Health Technology Assessment is the first book to make all the central concepts of DES relevant for health technology assessment (HTA). Accessible to beginners the book requires no prerequisites and describes the concepts with as little jargon as possible. The book first covers the essential concepts and their implementation. It next provides a fully worked out example using both a widely available spreadsheet program (Microsoft Excel) and a popular specialized simulation package (Arena). It then presents approaches to analyze the simulations including the treatment of uncertainty; tackles the development of the required equations; explains the techniques to verify that the models are as efficient as possible; and explores the indispensable topic of validation. The book also covers a variety of non-essential yet handy topics such as the animation of a simulation and extensions of DES and incorporates a real case study involving screening strategies for breast cancer surveillance. This book guides you in leveraging DES in your assessments of health technologies. After reading the chapters in sequence you will be able to construct a realistic model designed to help in the assessment of a new health technology.

GBP 44.99
1

Introduction to Financial Derivatives with Python

Python for Bioinformatics

Trustworthy Cyber-Physical Systems Engineering

Trustworthy Cyber-Physical Systems Engineering

From the ForewordGetting CPS dependability right is essential to forming a solid foundation for a world that increasingly depends on such systems. This book represents the cutting edge of what we know about rigorous ways to ensure that our CPS designs are trustworthy. I recommend it to anyone who wants to get a deep look at these concepts that will form a cornerstone for future CPS designs. Phil Koopman Carnegie Mellon University Pittsburgh Pennsylvania USATrustworthy Cyber-Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Topics in this book cover questions such asWhat does having a trustworthy CPS actually mean for something as pervasive as a global-scale CPS?How does CPS trustworthiness map onto existing knowledge and where do we need to know more?How can we mathematically prove timeliness correctness and other essential properties for systems that may be adaptive and even self-healing?How can we better represent the physical reality underlying real-world numeric quantities in the computing system?How can we establish reason about and ensure trust between CPS components that are designed installed maintained and operated by different organizations and which may never have really been intended to work together? Featuring contributions from leading international experts the book contains sixteen self-contained chapters that analyze the challenges in developing trustworthy CPS and identify important issues in developing engineering methods for CPS. The book addresses various issues contributing to trustworthiness complemented by contributions on TCSP roadmapping taxonomy and standardization as well as experience in deploying advanced system engineering methods in industry. Specific approaches to ensuring trustworthiness namely proof and refinement are covered as well as engineering methods for dealing with hybrid aspects.

GBP 44.99
1

Design and Analysis of Ecological Experiments

Essentials of Probability Theory for Statisticians

Cloud Security Attacks Techniques Tools and Challenges

Cloud Security Attacks Techniques Tools and Challenges

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks Techniques Tools and Challenges provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics including: Basic fundamentals of Cloud Computing Cloud security concepts vulnerabilities security standards and reference models Cloud security goals key issues and privacy requirements Threat model detailed taxonomy of cloud attacks Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook for a semester course at undergraduate and post graduate level in Computer Science Information Technology Information Security and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners cloud security team and the cloud security auditor as well. To get the most out of this book the reader should have a working knowledge of various operating system environments hypervisors cloud computing fundamentals programming languages like Python and a working knowledge of security tools. | Cloud Security Attacks Techniques Tools and Challenges

GBP 130.00
1

Fundamentals of Causal Inference With R

Fundamentals of Causal Inference With R

Overall this textbook is a perfect guide for interested researchers and students who wish to understand the rationale and methods of causal inference. Each chapter provides an R implementation of the introduced causal concepts and models and concludes with appropriate exercises. An-Shun Tai & Sheng-Hsuan Lin in BiometricsOne of the primary motivations for clinical trials and observational studies of humans is to infer cause and effect. Disentangling causation from confounding is of utmost importance. Fundamentals of Causal Inference explains and relates different methods of confounding adjustment in terms of potential outcomes and graphical models including standardization difference-in-differences estimation the front-door method instrumental variables estimation and propensity score methods. It also covers effect-measure modification precision variables mediation analyses and time-dependent confounding. Several real data examples simulation studies and analyses using R motivate the methods throughout. The book assumes familiarity with basic statistics and probability regression and R and is suitable for seniors or graduate students in statistics biostatistics and data science as well as PhD students in a wide variety of other disciplines including epidemiology pharmacy the health sciences education and the social economic and behavioral sciences. Beginning with a brief history and a review of essential elements of probability and statistics a unique feature of the book is its focus on real and simulated datasets with all binary variables to reduce complex methods down to their fundamentals. Calculus is not required but a willingness to tackle mathematical notation difficult concepts and intricate logical arguments is essential. While many real data examples are included the book also features the Double What-If Study based on simulated data with known causal mechanisms in the belief that the methods are best understood in circumstances where they are known to either succeed or fail. Datasets R code and solutions to odd-numbered exercises are available on the book's website at www. routledge. com/9780367705053. Instructors can also find slides based on the book and a full solutions manual under 'Instructor Resources'. | Fundamentals of Causal Inference With R

GBP 56.99
1

R Markdown Cookbook

Pocket Book of Integrals and Mathematical Formulas

Advanced Wireless Communication and Sensor Networks Applications and Simulations

Real and Complex Analysis

Raspberry Pi OS System Administration with systemd A Practical Approach

Data Science for Water Utilities Data as a Source of Value

CRC Standard Mathematical Tables and Formulas

Parallel Algorithms

C++ for Financial Mathematics

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications Challenges and Management

Intelligent Cyber-Physical Systems Security for Industry 4. 0: Applications Challenges and Management presents new cyber-physical security findings for Industry 4. 0 using emerging technologies like artificial intelligence (with machine/deep learning) data mining applied mathematics. All these are the essential components for processing data recognizing patterns modeling new techniques and improving the advantages of data science. Features • Presents an integrated approach with Cyber-Physical Systems CPS security and Industry 4. 0 in one place • Exposes the necessity of security initiatives standards security policies and procedures in the context of industry 4. 0 • Suggests solutions for enhancing the protection of 5G and the Internet of Things (IoT) security • Promotes how optimization or intelligent techniques envisage the role of artificial intelligence-machine/deep learning (AI-ML/DL) in cyberphysical systems security for industry 4. 0 This book is primarily aimed at graduates researchers and professionals working in the field of security. Executives concerned with security management knowledge dissemination information and policy development for data and network security in different educational government and non-government organizations will also find this book useful. | Intelligent Cyber-Physical Systems Security for Industry 4. 0 Applications Challenges and Management

GBP 110.00
1

Applications of Differential Transform to Real World Problems