|
|
Books > Computing & IT > Applications of computing
In recent decades, the industrial revolution has increased economic
growth despite its immersion in global environmental issues such as
climate change. Researchers emphasize the adoption of circular
economy practices in global supply chains and businesses for better
socio-environmental sustainability without compromising economic
growth. Integrating blockchain technology into business practices
could promote the circular economy as well as global environmental
sustainability. Integrating Blockchain Technology Into the Circular
Economy discusses the technological advancements in circular
economy practices, which provide better results for both economic
growth and environmental sustainability. It provides relevant
theoretical frameworks and the latest empirical research findings
in the applications of blockchain technology. Covering topics such
as big data analytics, financial market infrastructure, and
sustainable performance, this book is an essential resource for
managers, operations managers, executives, manufacturers,
environmentalists, researchers, industry practitioners, students
and educators of higher education, and academicians.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Quantum Inspired Computational Intelligence: Research and
Applications explores the latest quantum computational intelligence
approaches, initiatives, and applications in computing,
engineering, science, and business. The book explores this emerging
field of research that applies principles of quantum mechanics to
develop more efficient and robust intelligent systems. Conventional
computational intelligence-or soft computing-is conjoined with
quantum computing to achieve this objective. The models covered can
be applied to any endeavor which handles complex and meaningful
information.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
Over the last 20 years, the role of unmanned aircraft systems in
modern warfare has grown at an unprecedented rate. No longer simply
used for intelligence, data collection or reconnaissance, drones
are routinely used for target acquisition and to strike enemy
targets with missiles and bombs. Organized by nationality, Military
Drones offers a compact guide to the main unmanned aerial vehicles
being flown in combat zones today. These include classics, such as
the MQ-1 Predator, primarily used for intelligence gathering; the
Black Hornet Nano, a micro UAV that is so small it can fit in the
palm of your hand and is used by ground troops for local
situational awareness; the Chinese tri-copter Scorpion, which is
ideal for the stationary observation and strike role in a built-up
area; and the French EADS Talarion, a twinjet long-endurance UAV
designed for high-altitude surveillance. Illustrated with more than
100 photographs and artworks, Military Drones provides a detailed
insight into the specialist military unmanned aerial vehicles that
play a key role in the modern battle space.
Data mapping in a data warehouse is the process of creating a link
between two distinct data models' (source and target)
tables/attributes. Data mapping is required at many stages of DW
life-cycle to help save processor overhead; every stage has its own
unique requirements and challenges. Therefore, many data warehouse
professionals want to learn data mapping in order to move from an
ETL (extract, transform, and load data between databases) developer
to a data modeler role. Data Mapping for Data Warehouse Design
provides basic and advanced knowledge about business intelligence
and data warehouse concepts including real life scenarios that
apply the standard techniques to projects across various domains.
After reading this book, readers will understand the importance of
data mapping across the data warehouse life cycle.
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
Data Simplification: Taming Information With Open Source Tools
addresses the simple fact that modern data is too big and complex
to analyze in its native form. Data simplification is the process
whereby large and complex data is rendered usable. Complex data
must be simplified before it can be analyzed, but the process of
data simplification is anything but simple, requiring a specialized
set of skills and tools. This book provides data scientists from
every scientific discipline with the methods and tools to simplify
their data for immediate analysis or long-term storage in a form
that can be readily repurposed or integrated with other data.
Drawing upon years of practical experience, and using numerous
examples and use cases, Jules Berman discusses the principles,
methods, and tools that must be studied and mastered to achieve
data simplification, open source tools, free utilities and snippets
of code that can be reused and repurposed to simplify data, natural
language processing and machine translation as a tool to simplify
data, and data summarization and visualization and the role they
play in making data useful for the end user.
The second volume will deal with a presentation of the main matrix
and tensor decompositions and their properties of uniqueness, as
well as very useful tensor networks for the analysis of massive
data. Parametric estimation algorithms will be presented for the
identification of the main tensor decompositions. After a brief
historical review of the compressed sampling methods, an overview
of the main methods of retrieving matrices and tensors with missing
data will be performed under the low rank hypothesis. Illustrative
examples will be provided.
The world is witnessing the growth of a global movement facilitated
by technology and social media. Fueled by information, this
movement contains enormous potential to create more accountable,
efficient, responsive, and effective governments and businesses, as
well as spurring economic growth. Big Data Governance and
Perspectives in Knowledge Management is a collection of innovative
research on the methods and applications of applying robust
processes around data, and aligning organizations and skillsets
around those processes. Highlighting a range of topics including
data analytics, prediction analysis, and software development, this
book is ideally designed for academicians, researchers, information
science professionals, software developers, computer engineers,
graduate-level computer science students, policymakers, and
managers seeking current research on the convergence of big data
and information governance as two major trends in information
management.
In the era of cyber-physical systems, the area of control of
complex systems has grown to be one of the hardest in terms of
algorithmic design techniques and analytical tools. The 23
chapters, written by international specialists in the field, cover
a variety of interests within the broader field of learning,
adaptation, optimization and networked control. The editors have
grouped these into the following 5 sections: "Introduction and
Background on Control Theory", "Adaptive Control and Neuroscience",
"Adaptive Learning Algorithms", "Cyber-Physical Systems and
Cooperative Control", "Applications". The diversity of the research
presented gives the reader a unique opportunity to explore a
comprehensive overview of a field of great interest to control and
system theorists. This book is intended for researchers and control
engineers in machine learning, adaptive control, optimization and
automatic control systems, including Electrical Engineers, Computer
Science Engineers, Mechanical Engineers, Aerospace/Automotive
Engineers, and Industrial Engineers. It could be used as a text or
reference for advanced courses in complex control systems. *
Collection of chapters from several well-known professors and
researchers that will showcase their recent work * Presents
different state-of-the-art control approaches and theory for
complex systems * Gives algorithms that take into consideration the
presence of modelling uncertainties, the unavailability of the
model, the possibility of cooperative/non-cooperative goals and
malicious attacks compromising the security of networked teams *
Real system examples and figures throughout, make ideas concrete
In light of the emerging global information infrastructure,
information technology standards are becoming increasingly
important. At the same time, however, the standards setting process
has been criticized as being slow, inefficient and out of touch
with market needs. What can be done to resolve this situation? To
provide a basis for an answer to this question, Information
Technology Standards and Standardization: A Global Perspective
paints as full a picture as possible of the varied and diverse
aspects surrounding standards and standardization. This book will
serve as a foundation for research, discussion and practice as it
addresses trends, problems and solutions for and by numerous
disciplines, such as economics, social sciences, management
studies, politics, computer science and, particularly, users.
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
The development of artificial intelligence (AI) involves the
creation of computer systems that can do activities that would
ordinarily require human intelligence, such as visual perception,
speech recognition, decision making, and language translation.
Through increasingly complex programming approaches, it has been
transforming and advancing the discipline of computer science.
Artificial Intelligence Methods and Applications in Computer
Engineering illuminates how today's computer engineers and
scientists can use AI in real-world applications. It focuses on a
few current and emergent AI applications, allowing a more in-depth
discussion of each topic. Covering topics such as biomedical
research applications, navigation systems, and search engines, this
premier reference source is an excellent resource for computer
scientists, computer engineers, IT managers, students and educators
of higher education, librarians, researchers, and academicians.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
|
|