|
|
Books > Computing & IT > Applications of computing
A fascinating work on the history and development of cryptography,
from the Egyptians to WWII. Many of the earliest books,
particularly those dating back to the 1900s and before, are now
extremely scarce and increasingly expensive. Hesperides Press are
republishing these classic works in affordable, high quality,
modern editions, using the original text and artwork Contents
Include The Beginings of Cryptography From the Middle Ages Onwards
Signals, Signs, And Secret Languages Commercial Codes Military
Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering
Bibliography
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
In recent decades, the industrial revolution has increased economic
growth despite its immersion in global environmental issues such as
climate change. Researchers emphasize the adoption of circular
economy practices in global supply chains and businesses for better
socio-environmental sustainability without compromising economic
growth. Integrating blockchain technology into business practices
could promote the circular economy as well as global environmental
sustainability. Integrating Blockchain Technology Into the Circular
Economy discusses the technological advancements in circular
economy practices, which provide better results for both economic
growth and environmental sustainability. It provides relevant
theoretical frameworks and the latest empirical research findings
in the applications of blockchain technology. Covering topics such
as big data analytics, financial market infrastructure, and
sustainable performance, this book is an essential resource for
managers, operations managers, executives, manufacturers,
environmentalists, researchers, industry practitioners, students
and educators of higher education, and academicians.
Image data has portrayed immense potential as a foundation of
information for numerous applications. Recent trends in multimedia
computing have witnessed a rapid growth in digital image
collections, resulting in a need for increased image data
management. Feature Dimension Reduction for Content-Based Image
Identification is a pivotal reference source that explores the
contemporary trends and techniques of content-based image
recognition. Including research covering topics such as feature
extraction, fusion techniques, and image segmentation, this book
explores different theories to facilitate timely identification of
image data and managing, archiving, maintaining, and extracting
information. This book is ideally designed for engineers, IT
specialists, researchers, academicians, and graduate-level students
seeking interdisciplinary research on image processing and
analysis.
This book is a celebration of Leslie Lamport's work on concurrency,
interwoven in four-and-a-half decades of an evolving industry: from
the introduction of the first personal computer to an era when
parallel and distributed multiprocessors are abundant. His works
lay formal foundations for concurrent computations executed by
interconnected computers. Some of the algorithms have become
standard engineering practice for fault tolerant distributed
computing - distributed systems that continue to function correctly
despite failures of individual components. He also developed a
substantial body of work on the formal specification and
verification of concurrent systems, and has contributed to the
development of automated tools applying these methods. Part I
consists of technical chapters of the book and a biography. The
technical chapters of this book present a retrospective on
Lamport's original ideas from experts in the field. Through this
lens, it portrays their long-lasting impact. The chapters cover
timeless notions Lamport introduced: the Bakery algorithm, atomic
shared registers and sequential consistency; causality and logical
time; Byzantine Agreement; state machine replication and Paxos;
temporal logic of actions (TLA). The professional biography tells
of Lamport's career, providing the context in which his work arose
and broke new grounds, and discusses LaTeX - perhaps Lamport's most
influential contribution outside the field of concurrency. This
chapter gives a voice to the people behind the achievements,
notably Lamport himself, and additionally the colleagues around
him, who inspired, collaborated, and helped him drive worldwide
impact. Part II consists of a selection of Leslie Lamport's most
influential papers. This book touches on a lifetime of
contributions by Leslie Lamport to the field of concurrency and on
the extensive influence he had on people working in the field. It
will be of value to historians of science, and to researchers and
students who work in the area of concurrency and who are interested
to read about the work of one of the most influential researchers
in this field.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
The world is witnessing the growth of a global movement facilitated
by technology and social media. Fueled by information, this
movement contains enormous potential to create more accountable,
efficient, responsive, and effective governments and businesses, as
well as spurring economic growth. Big Data Governance and
Perspectives in Knowledge Management is a collection of innovative
research on the methods and applications of applying robust
processes around data, and aligning organizations and skillsets
around those processes. Highlighting a range of topics including
data analytics, prediction analysis, and software development, this
book is ideally designed for academicians, researchers, information
science professionals, software developers, computer engineers,
graduate-level computer science students, policymakers, and
managers seeking current research on the convergence of big data
and information governance as two major trends in information
management.
The communication field is evolving rapidly in order to keep up
with society's demands. As such, it becomes imperative to research
and report recent advancements in computational intelligence as it
applies to communication networks. The Handbook of Research on
Recent Developments in Intelligent Communication Application is a
pivotal reference source for the latest developments on emerging
data communication applications. Featuring extensive coverage
across a range of relevant perspectives and topics, such as
satellite communication, cognitive radio networks, and wireless
sensor networks, this book is ideally designed for engineers,
professionals, practitioners, upper-level students, and academics
seeking current information on emerging communication networking
trends.
Intelligent Cyber-Physical Systems Security for Industry 4.0:
Applications, Challenges and Management presents new cyber-physical
security findings for Industry 4.0 using emerging technologies like
artificial intelligence (with machine/deep learning), data mining,
applied mathematics. All these are the essential components for
processing data, recognizing patterns, modeling new techniques, and
improving the advantages of data science. Features * Presents an
integrated approach with Cyber-Physical Systems, CPS security, and
Industry 4.0 in one place * Exposes the necessity of security
initiatives, standards, security policies, and procedures in the
context of industry 4.0 * Suggests solutions for enhancing the
protection of 5G and the Internet of Things (IoT) security *
Promotes how optimization or intelligent techniques envisage the
role of artificial intelligence-machine/deep learning (AI-ML/DL) in
cyberphysical systems security for industry 4.0 This book is
primarily aimed at graduates, researchers and professionals working
in the field of security. Executives concerned with security
management, knowledge dissemination, information, and policy
development for data and network security in different educational,
government, and non-government organizations will also find this
book useful.
Data mapping in a data warehouse is the process of creating a link
between two distinct data models' (source and target)
tables/attributes. Data mapping is required at many stages of DW
life-cycle to help save processor overhead; every stage has its own
unique requirements and challenges. Therefore, many data warehouse
professionals want to learn data mapping in order to move from an
ETL (extract, transform, and load data between databases) developer
to a data modeler role. Data Mapping for Data Warehouse Design
provides basic and advanced knowledge about business intelligence
and data warehouse concepts including real life scenarios that
apply the standard techniques to projects across various domains.
After reading this book, readers will understand the importance of
data mapping across the data warehouse life cycle.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
Data Simplification: Taming Information With Open Source Tools
addresses the simple fact that modern data is too big and complex
to analyze in its native form. Data simplification is the process
whereby large and complex data is rendered usable. Complex data
must be simplified before it can be analyzed, but the process of
data simplification is anything but simple, requiring a specialized
set of skills and tools. This book provides data scientists from
every scientific discipline with the methods and tools to simplify
their data for immediate analysis or long-term storage in a form
that can be readily repurposed or integrated with other data.
Drawing upon years of practical experience, and using numerous
examples and use cases, Jules Berman discusses the principles,
methods, and tools that must be studied and mastered to achieve
data simplification, open source tools, free utilities and snippets
of code that can be reused and repurposed to simplify data, natural
language processing and machine translation as a tool to simplify
data, and data summarization and visualization and the role they
play in making data useful for the end user.
The effective application of knowledge management principles has
proven to be beneficial for modern organizations. When utilized in
the academic community, these frameworks can enhance the value and
quality of research initiatives. Enhancing Academic Research With
Knowledge Management Principles is a pivotal reference source for
the latest research on implementing theoretical frameworks of
information management in the context of academia and universities.
Featuring extensive coverage on relevant areas such as data mining,
organizational and academic culture, this publication is an ideal
resource for researchers, academics, practitioners, professionals,
and students.
Faced with the exponential development of Big Data and both its
legal and economic repercussions, we are still slightly in the dark
concerning the use of digital information. In the perpetual balance
between confidentiality and transparency, this data will lead us to
call into question how we understand certain paradigms, such as the
Hippocratic Oath in medicine. As a consequence, a reflection on the
study of the risks associated with the ethical issues surrounding
the design and manipulation of this "massive data" seems to be
essential. This book provides a direction and ethical value to
these significant volumes of data. It proposes an ethical analysis
model and recommendations to better keep this data in check. This
empirical and ethico-technical approach brings together the first
aspects of a moral framework directed toward thought, conscience
and the responsibility of citizens concerned by the use of data of
a personal nature.
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
The development of artificial intelligence (AI) involves the
creation of computer systems that can do activities that would
ordinarily require human intelligence, such as visual perception,
speech recognition, decision making, and language translation.
Through increasingly complex programming approaches, it has been
transforming and advancing the discipline of computer science.
Artificial Intelligence Methods and Applications in Computer
Engineering illuminates how today's computer engineers and
scientists can use AI in real-world applications. It focuses on a
few current and emergent AI applications, allowing a more in-depth
discussion of each topic. Covering topics such as biomedical
research applications, navigation systems, and search engines, this
premier reference source is an excellent resource for computer
scientists, computer engineers, IT managers, students and educators
of higher education, librarians, researchers, and academicians.
|
|