Narrow your search

Library

KU Leuven (9)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

ULiège (9)

VIVES (9)

ULB (8)

UCLL (7)

KBC (3)

UGent (3)

More...

Resource type

book (9)

digital (1)


Language

English (9)


Year
From To Submit

2024 (2)

2022 (1)

2020 (1)

2019 (1)

2018 (1)

More...
Listing 1 - 9 of 9
Sort by

Book
The plant cytoskeleton
Author:
ISBN: 1441909869 1441909877 Year: 2010 Publisher: New York, NY : Springer Science+Business Media, LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments. They constantly undergo remodeling to fulfill their roles in supporting cell division, enlargement, and differentiation. Following early studies on structural aspects of the networks, recent breakthroughs have connected them with more and more intracellular events essential for plant growth and development. Advanced technologies in cell biology (live-cell imaging in particular), molecular genetics, genomics, and proteomics have revolutionized this field of study. Stories summarized in this book may inspire enthusiastic scientists to pursue new directions toward understanding functions of the plant cytoskeleton. The Plant Cytoskeleton is divided into three sections: 1) Molecular Basis of the Plant Cytoskeleton; 2) Cytoskeletal Reorganization in Plant Cell Division; and 3) The Cytoskeleton in Plant Growth and Development. This book is aimed at serving as a resource for anyone who wishes to learn about the plant cytoskeleton beyond ordinary textbooks. Bo Liu is professor in the Department of Plant Biology at the University of California in Davis, California. He received his B.S. degree in cell biology and genetics and M.S. degree in cell biology from Peking University in Beijing, China, and Ph.D. degree in botany from the University of Georgia in Athens, Georgia. Research in his laboratory is focused on studying the cytoskeletal basis of intracellular motility in flowering plants and filamentous fungi.


Book
Molecular dynamics simulation : fundamentals and applications
Authors: ---
ISBN: 9780128166161 0128166169 0128164190 9780128164198 Year: 2022 Publisher: Amsterdam, Netherlands : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Molecular Dynamic Simulation: Fundamentals and Applications explains the basic principles of MD simulation and explores its recent developments and roles in advanced modeling approaches. The implementation of MD simulation and its application to various aspects of materials science and engineering including mechanical, thermal, mass transportation, and physical/chemical reaction problems are illustrated. Innovative modeling techniques that apply MD to explore the mechanics of typical nanomaterials and nanostructures and to characterize crystalline, amorphous, and liquid systems are also presented."--


Book
Plant cell biology
Authors: ---
ISBN: 1461478812 Year: 2020 Publisher: New York : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The aim of this project is to produce the world’s most comprehensive reference in plant sciences. The Plant Sciences will be published both in print and online; the online text will be regularly updated to enable the reference to remain a useful authoritative resource for decades to come. The aim is to provide a sustainable superstructure on which can be built further volumes as plant science evolves. The first edition will contain ten volumes, with approximately 20-30 chapters per volume. The target audience for the initial ten volumes will be upper-division undergraduates, as well as graduate students and practitioners looking for an entry into a particular topic. The Encyclopedia will provide both background and essential information in plant biology. Topics will include plant genetics, genomics, biochemistry, natural products, proteins, cell biology, development, reproduction, physiology, ecology, evolution, systematics, biodiversity, and applications, including crop improvement and non-food applications. .


Book
Automated Design of Analog and High-frequency Circuits : A Computational Intelligence Approach
Authors: --- ---
ISBN: 3642391613 3642391621 9783642391613 3642446450 9783642446450 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.


Book
Location Privacy in Mobile Applications
Authors: --- --- --- ---
ISBN: 9789811317057 9811317054 9811317046 Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.


Multi
Face De-identification: Safeguarding Identities in the Digital Era
Authors: --- --- --- ---
ISBN: 9783031582226 9783031582219 9783031582233 9783031582240 Year: 2024 Publisher: Cham Springer Nature, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in safeguarding personal information. It presents three innovative image privacy protection approaches, including differential private k-anonymity, identity differential privacy guarantee and personalized and invertible Face De-Identification. In addition, the authors propose a novel architecture for reversible Face Video De-Identification, which utilizes deep motion flow to ensure seamless privacy protection across video frames. This book is a compelling exploration of the rapidly evolving field of Face De-Identification and privacy protection in the age of advanced AI-based face recognition technology and pervasive surveillance. This insightful book embarks readers on a journey through the intricate landscape of facial recognition, artificial intelligence, social network and the challenges posed by the digital footprint left behind by individuals in their daily lives. The authors also explore emerging trends in privacy protection and discuss future research directions. Researchers working in computer science, artificial intelligence, machine learning, data privacy and cybersecurity as well as advanced-level students majoring in computers science will find this book useful as reference or secondary text. Professionals working in the fields of biometrics, data security, software development and facial recognition technology as well as policymakers and government officials will also want to purchase this book. .


Book
Trends and Applications in Knowledge Discovery and Data Mining : PAKDD 2013 Workshops: DMApps, DANTH, QIMIE, BDM, CDA, CloudSD, Golden Coast, QLD, Australia, Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 3642403182 3642403190 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) held in Gold Coast, Australia in April 2013. The 47 revised full papers presented were carefully reviewed and selected from 92 submissions. The workshops affiliated with PAKDD 2013 include: Data Mining Applications in Industry and Government (DMApps), Data Analytics for Targeted Healthcare (DANTH), Quality Issues, Measures of Interestingness and Evaluation of Data Mining Models (QIMIE), Biologically Inspired Techniques for Data Mining (BDM), Constraint Discovery and Application (CDA), Cloud Service Discovery (CloudSD).

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Health informatics. --- Data mining. --- Information storage and retrieval. --- Artificial intelligence. --- Computer Science. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence (incl. Robotics). --- Health Informatics. --- Information Storage and Retrieval. --- Information Systems Applications (incl. Internet). --- Database management --- Database searching --- Data mining --- Medical records --- Information storage and retrieva. --- Artificial Intelligence. --- Data processing. --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- EHR systems --- EHR technology --- EHRs (Electronic health records) --- Electronic health records --- Electronic medical records --- EMR systems --- EMRs (Electronic medical records) --- Information storage and retrieval systems --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Medical care --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Medicine --- Data processing


Book
Malicious Attack Propagation and Source Identification
Authors: --- --- --- --- --- et al.
ISBN: 3030021785 3030021793 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.


Book
The 7th International Conference on Information Science, Communication and Computing
Authors: --- --- --- --- --- et al.
ISBN: 9819971616 Year: 2024 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th International Conference on Information Science, Communication and Computing held in Chongqing, China, 2-5 June 2023. The topics focus on intelligent information science and technology, artificial intelligence and intelligent systems, cloud computing and big data, smart computing and communication technology, wireless network, and cyber security. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows, and undergraduate and graduate students who need to build a knowledge base of the latest advances and state of the practice in the topics covered by this conference proceedings. This will enable them to build, maintain and manage systems of high reliability and complexity. We would like to thank the authors for their hard work and dedication, and the reviewers for ensuring that only the highest quality papers were selected.

Listing 1 - 9 of 9
Sort by