![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. ""Computational Advancements in End-User Technologies: Emerging Models and Frameworks"" contains leading research and practices into the advancement, significance, and comprehensive nature of end-user computing. A defining collection of significant tools, applications, and methodologies within this expanding field of study, this publication provides academicians, researchers, and practitioners with a complete and practical resource of expert international findings.
This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. The papers discuss the recent advances in the areas of big data analytics, data analytics in cloud, smart cities and grid, etc. This volume primarily focuses on the application of knowledge which promotes ideas for solving problems of the society through cutting-edge big-data technologies. The essays featured in this proceeding provide novel ideas that contribute for the growth of world class research and development. It will be useful to researchers in the area of advanced engineering sciences.
This book applies novel theories to improve algorithms in complex data analysis in various fields, including object detection, remote sensing, data transmission, data fusion, gesture recognition, and medical image processing and analysis. It is intended for Ph.D. students, academics, researchers, and software developers working in the areas of digital video processing and computer vision technologies.
This book provides a timely and comprehensive overview of current theories and methods in fuzzy logic, as well as relevant applications in a variety of fields of science and technology. Dedicated to Lotfi A. Zadeh on his one year death anniversary, the book goes beyond a pure commemorative text. Yet, it offers a fresh perspective on a number of relevant topics, such as computing with words, theory of perceptions, possibility theory, and decision-making in a fuzzy environment. Written by Zadeh's closest colleagues and friends, the different chapters are intended both as a timely reference guide and a source of inspiration for scientists, developers and researchers who have been dealing with fuzzy sets or would like to learn more about their potential for their future research.
This book describes the networks, applications, services of 2030 and beyond, their management. Novel end-to-end network and services architectures using cloud, wired, wireless, and space technologies to support future applications and services are presented. The book ties key concepts together such as cloud, space networking, network slicing, AI/ML, edge computing, burst switching, and optical computing in achieving end-to-end automated future services. Expected future applications, services, and network and data center architectures to support these applications and services in the year 2030 and beyond, along with security, routing, QoS, and management architecture and capabilities are described. The book is written by recognized global experts in the field from both industry and academia.
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
This book provides an essential overview of the broad range of functional brain imaging techniques, as well as neuroscientific methods suitable for various scientific tasks in fundamental and clinical neuroscience. It also shares information on novel methods in computational neuroscience, mathematical algorithms, image processing, and applications to neuroscience. The mammalian brain is a huge and complex network that consists of billions of neural and glial cells. Decoding how information is represented and processed by this neural network requires the ability to monitor the dynamics of large numbers of neurons at high temporal and spatial resolution over a large part of the brain. Functional brain optical imaging has seen more than thirty years of intensive development. Current light-using methods provide good sensitivity to functional changes through intrinsic contrast and are rapidly exploiting the growing availability of exogenous fluorescence probes. In addition, various types of functional brain optical imaging are now being used to reveal the brain's microanatomy and physiology.
This book discusses the evolution of future-generation technologies through the Internet of things, bringing together all the related technologies on a single platform to offer valuable insights for undergraduate and postgraduate students, researchers, academics and industry practitioners. The book uses data, network engineering and intelligent decision- support system-by-design principles to design a reliable IoT-enabled ecosystem and to implement cyber-physical pervasive infrastructure solutions. It takes readers on a journey that begins with understanding the insight paradigm of IoT-enabled technologies and how it can be applied. It walks readers through engaging with real-time challenges and building a safe infrastructure for IoT-based, future-generation technologies. The book helps researchers and practitioners to understand the design architecture through IoT and the state of the art in IoT countermeasures. It also highlights the differences between heterogeneous platforms in IoT-enabled infrastructure and traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on functional frameworks for IoT, object identification, IoT domain model, RFID technology, wearable sensors, WBAN, IoT semantics, knowledge extraction, and security and privacy issues in IoT-based ecosystems. Written by leading international experts, it explores IoT-enabled insight paradigms, which are utilized for the future benefit of humans. It also includes references to numerous works. Divided into stand-alone chapters, this highly readable book is intended for specialists, researchers, graduate students, designers, experts, and engineers involved in research on healthcare-related issues.
This book aims to present a survey of a large class of nonlinear dynamical systems exhibiting mixed-mode oscillations (MMOs). It is a sort of a guide to systems related to MMOs that features material from original research papers, including the author's own studies. The material is presented in seven chapters divided into sections. Usually, the first sections are of an introductory nature, explain phenomena, and exhibit numerical results. More advanced investigations are presented in the subsequent sections. Coverage includes * Dynamic behavior of nonlinear systems, * Fundamentals of processes exhibiting MMOs,* Mechanism and function of an structure of MMOs patterns, * Analysis of MMOs in electric circuits and systems, * MMOs in chemistry, biology, and medicine, * MMOs in mechanics and transport vehicles, * MMOs in fractional order systems. This is the first extensive description of these topics and the interpretation of analytical results and those obtained from computer simulations with the MATLAB environment. The book provides the readers with better understanding of the nature of MMOs, richness of their behaviors, and interesting applications.
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
This book presents the latest achievements of Russian scientists in the field of theory and practice of decision-making in SEMS, taking into account the information received from the sensors of its central nervous system (CNS). Recently, in the field of theory and practice of intelligent robotics systems management, the solution to the problem of SEMS type urgent task of making decisions about their expedient behavior is based on the integration of the processes of obtaining, processing and storing information, computing, control and monitoring. This enables the efficiency, reliability and safety of operation of SEMS in real time. Decision-making methods are described, both in the autonomous behavior of SEMS and in their group interaction, based on the principles of bionics, adaptability, intelligence and parallelism in information processing and computation. This book is intended for students, scientists and engineers specializing in the field of smart electromechanical systems and robotics.
This book provides a step-by-step methodology and derivation of deep learning algorithms as Long Short-Term Memory (LSTM) and Convolution Neural Network (CNN), especially for estimating parameters, with back-propagation as well as examples with real datasets of hydrometeorology (e.g. streamflow and temperature) and environmental science (e.g. water quality). Deep learning is known as part of machine learning methodology based on the artificial neural network. Increasing data availability and computing power enhance applications of deep learning to hydrometeorological and environmental fields. However, books that specifically focus on applications to these fields are limited. Most of deep learning books demonstrate theoretical backgrounds and mathematics. However, examples with real data and step-by-step explanations to understand the algorithms in hydrometeorology and environmental science are very rare. This book focuses on the explanation of deep learning techniques and their applications to hydrometeorological and environmental studies with real hydrological and environmental data. This book covers the major deep learning algorithms as Long Short-Term Memory (LSTM) and Convolution Neural Network (CNN) as well as the conventional artificial neural network model.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent. The drumbeat of terror resonates from everywhere; how can we stop it? What are the tripping points along the road and how can we avoid them? Increasingly more people have access to increasingly more information and increasingly more destructive technologies. In the meantime, increasingly advanced technologies help us create an increasingly safer and more harmonious world. Advantages and disadvantages are accelerating each other. While hybrid threats are intensifying, so are the opportunities to address them. But what are the compromises and how can we mitigate them? This book also looks at the unexpected and often random success and failure of policies to counter the evolving terror threat. The various aspects of the terrorism phenomena are presented in a unique way using scenario vignettes, which give the reader a realistic perception of the threat. The combination of positive and negative implications of emerging technologies is describing what might well be one of the most important dimensions of our common future.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the internet and the world wide web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. ""Handbook of Research on Virtual Workplaces and the New Nature of Business Practices"" compiles authoritative research from XX scholars from over XX countries, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace.
Digital audio, video, images, and documents are flying through
cyberspace to their respective owners. Unfortunately, along the
way, individuals may choose to intervene and take this content for
themselves. Digital watermarking and steganography technology
greatly reduces the instances of this by limiting or eliminating
the ability of third parties to decipher the content that he has
taken. The many techiniques of digital watermarking (embedding a
code) and steganography (hiding information) continue to evolve as
applications that necessitate them do the same. The authors of this
second edition provide an update on the framework for applying
these techniques that they provided researchers and professionals
in the first well-received edition. Steganography and steganalysis
(the art of detecting hidden information) have been added to a
robust treatment of digital watermarking, as many in each field
research and deal with the other. New material includes
watermarking with side information, QIM, and dirty-paper codes. The
revision and inclusion of new material by these influential authors
has created a must-own book for anyone in this profession.
This book gathers a collection of high-quality peer-reviewed research papers presented at the 2nd International Conference on Data and Information Sciences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29-30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology. |
![]() ![]() You may like...
Java for Bioinformatics and Biomedical…
Harshawardhan Bal, Johnny Hujol
Hardcover
R4,412
Discovery Miles 44 120
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,632
Discovery Miles 16 320
Interactive Web-based Virtual Reality…
Chi Chung Ko, Chang Dong Cheng
Hardcover
R4,567
Discovery Miles 45 670
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, …
Hardcover
R6,432
Discovery Miles 64 320
Queueing Networks - A Fundamental…
Richard J Boucherie, Nico M. van Dijk
Hardcover
R6,482
Discovery Miles 64 820
|