![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
The papers in this volume are based on lectures given at the IMA workshop on the Parallel Solution of PDE during June 9-13, 1997. The numerical solution of partial differential equations has been of major importance to the development of many technologies and has been the target of much of the development of parallel computer hardware and software. Parallel computer offers the promise of greatly increased performance and the routine calculation of previously intractable problems.This volume contains papers on the development and assessment of new approximation and solution techniques that can take advantage of parallel computers. It will be of interest to applied mathematicians, computer scientists, and engineers concerned with investigating the state of the art and future directions in numerical computing.Topics include domain decomposition methods, parallel multi-grid methods, front tracking methods, sparse matrix techniques, adaptive methods, fictitious domain methods, and novel time and space discretizations. Applications discussed include fluid dynamics, radiative transfer, solid mechanics, and semiconductor simulation.
Delivers the hard information the reader needs to assess network options for the 1990s. It describes how networks are configured, what your options are in the multivendor environment, and how you can get the most efficient and effective network solutions with limited communications budgets.
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
The high failure rate of enterprise resource planning (ERP) projects is a pressing concern for both academic researchers and industrial practitioners. The challenges of an ERP implementation are particularly high when the project involves designing and developing a system from scratch. Organizations often turn to vendors and consultants for handling such projects but, every aspect of an ERP project is opaque for both customers and vendors. Unlocking the mysteries of building a large-scale ERP system, The Adventurous and Practical Journey to a Large-Scale Enterprise Solution tells the story of implementing an applied enterprise solution. The book covers the field of enterprise resource planning by examining state-of-the-art concepts in software project management methodology, design and development integration policy, and deployment framework, including: A hybrid project management methodology using waterfall as well as a customized Scrum-based approach A novel multi-tiered software architecture featuring an enhanced flowable process engine A unique platform for coding business processes efficiently Integration to embed ERP modules in physical devices A heuristic-based framework to successfully step into the Go-live period Written to help ERP project professionals, the book charts the path that they should travel from project ideation to systems implementation. It presents a detailed, real-life case study of implementing a large-scale ERP and uses storytelling to demonstrate incorrect and correct decisions frequently made by vendors and customers. Filled with practical lessons learned, the book explains the ins and outs of adopting project methodologies. It weaves a tale that features both real-world and scholarly aspects of an ERP implementation.
While most discoverability evaluation studies in the Library and Information Science field discuss the intersection of discovery layers and library systems, this book looks specifically at digital repositories, examining discoverability from the lenses of system structure, user searches, and external discovery avenues. Discoverability, the ease with which information can be found by a user, is the cornerstone of all successful digital information platforms. Yet, most digital repository practitioners and researchers lack a holistic and comprehensive understanding of how and where discoverability happens. This book brings together current understandings of user needs and behaviors and poses them alongside a deeper examination of digital repositories around the theme of discoverability. It examines discoverability in digital repositories from both user and system perspectives by exploring how users access content (including their search patterns and habits, need for digital content, effects of outreach, or integration with Wikipedia and other web-based tools) and how systems support or prevent discoverability through the structure or quality of metadata, system interfaces, exposure to search engines or lack thereof, and integration with library discovery tools. Discoverability in Digital Repositories will be particularly useful to digital repository managers, practitioners, and researchers, metadata librarians, systems librarians, and user studies, usability and user experience librarians. Additionally, and perhaps most prominently, this book is composed with the emerging practitioner in mind. Instructors and students in Library and Information Science and Information Management programs will benefit from this book that specifically addresses discoverability in digital repository systems and services.
Tackles a topic in a concise and accessible way that most believe too advanced to pick up easily. Author has over 40 years teaching and industry experience which they utilize in this book. Contains an appendix with extended code and examples of topics discussed in text.
Covers different technologies like AI, IoT and Signal Processing in the context of biomedical applications Reviews medical image analysis, disease detection, and prediction Comprehends the advantage of recent technologies for medical record keeping through electronics health records (EHRs) Presents state of art research in the field of biomedical engineering using various physiological signals Explores different Bio Sensors used in Healthcare Applications using IoT
One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
Provides a wide snapshot of building knowledge-based systems, inconsistency measures, methods for handling consistency, and methods for integrating knowledge bases. Provides the mathematical background to solve problems of restoring consistency and problems of integrating probabilistic knowledge bases in the integrating process. The research results presented in the book can be applied in decision support systems, semantic web systems, multimedia information retrieval systems, medical imaging systems, cooperative information systems, and more.
This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
This textbook introduces basic and advanced embedded system topics through Arm Cortex M microcontrollers, covering programmable microcontroller usage starting from basic to advanced concepts using the STMicroelectronics Discovery development board. Designed for use in upper-level undergraduate and graduate courses on microcontrollers, microprocessor systems, and embedded systems, the book explores fundamental and advanced topics, real-time operating systems via FreeRTOS and Mbed OS, and then offers a solid grounding in digital signal processing, digital control, and digital image processing concepts - with emphasis placed on the usage of a microcontroller for these advanced topics. The book uses C language, "the" programming language for microcontrollers, C++ language, and MicroPython, which allows Python language usage on a microcontroller. Sample codes and course slides are available for readers and instructors, and a solutions manual is available to instructors. The book will also be an ideal reference for practicing engineers and electronics hobbyists who wish to become familiar with basic and advanced microcontroller concepts.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
This book will attempt to give a first synthesis of recent works con cerning reactive system design. The term "reactive system" has been introduced in order to at'oid the ambiguities often associated with by the term "real-time system," which, although best known and more sugges tive, has been given so many different meanings that it is almost in evitably misunderstood. Industrial process control systems, transporta tion control and supervision systems, signal-processing systems, are ex amples of the systems we have in mind. Although these systems are more and more computerized, it is sur prising to notice that the problem of time in computer science has been studied only recently by "pure" computer scientists. Until the early 1980s, time problems were regarded as the concern of performance evalu ation, or of some (unjustly scorned) "industrial computer engineering," or, at best, of operating systems. A second surprising fact, in contrast, is the growth of research con cerning timed systems during the last decade. The handling of time has suddenly become a fundamental goal for most models of concurrency. In particular, Robin Alilner 's pioneering works about synchronous process algebras gave rise to a school of thought adopting the following abstract point of view: As soon as one admits that a system can instantaneously react to events, i. e."
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
This book introduces a new scheduler to fairly and efficiently distribute system resources to many users of varying usage patterns compete for them in large shared computing environments. The Rawlsian Fair scheduler developed for this effort is shown to boost performance while reducing delay in high performance computing workloads of certain types including the following four types examined in this book: i. Class A - similar but complementary workloads ii. Class B - similar but steady vs intermittent workloads iii. Class C - Large vs small workloads iv. Class D - Large vs noise-like workloads This new scheduler achieves short-term fairness for small timescale demanding rapid response to varying workloads and usage profiles. Rawlsian Fair scheduler is shown to consistently benefit workload Classes C and D while it only benefits Classes A and B workloads where they become disproportionate as the number of users increases. A simulation framework, dSim, simulates the new Rawlsian Fair scheduling mechanism. The dSim helps achieve instantaneous fairness in High Performance Computing environments, effective utilization of computing resources, and user satisfaction through the Rawlsian Fair scheduler.
Show your PC who's boss Nothing's more annoying than a tech malfunction, especially when it's your PC--with the exception of perhaps wading through reams of random, unreliable theories online looking for a solution, or paying an expensive tech geek to show up to perform a five-minute fix. The latest edition of Troubleshooting & Maintaining Your PC All-in-One For Dummies puts all this frustration behind you and gets you straight to work solving the problem yourself! In his straightforward, friendly style, Dan Gookin--bestselling tech author and all-round Mr. Fixit--packs everything you need to know into 5-books-in-1, giving you the knowledge and process to hit on the right solution, fast. From identifying common problems to methodically narrowing down to the correct fix, you'll save hours of frustrating research--and experience the sweet, righteous satisfaction of having achieved it all yourself. Pick up quick fixes Understand and reconnect networks Restore memory Boost your PC's performance Every problem has a solution and PCs are no different: get this book and you'll never catch yourself shouting at your monitor or frustrated with the motherboard again--well, maybe not quite so often.
This book pioneers the field of gain-cell embedded DRAM (GC-eDRAM) design for low-power VLSI systems-on-chip (SoCs). Novel GC-eDRAMs are specifically designed and optimized for a range of low-power VLSI SoCs, ranging from ultra-low power to power-aware high-performance applications. After a detailed review of prior-art GC-eDRAMs, an analytical retention time distribution model is introduced and validated by silicon measurements, which is key for low-power GC-eDRAM design. The book then investigates supply voltage scaling and near-threshold voltage (NTV) operation of a conventional gain cell (GC), before presenting novel GC circuit and assist techniques for NTV operation, including a 3-transistor full transmission-gate write port, reverse body biasing (RBB), and a replica technique for optimum refresh timing. Next, conventional GC bitcells are evaluated under aggressive technology and voltage scaling (down to the subthreshold domain), before novel bitcells for aggressively scaled CMOS nodes and soft-error tolerance as presented, including a 4-transistor GC with partial internal feedback and a 4-transistor GC with built-in redundancy.
The idea behind this book is to simplify the journey of aspiring readers and researchers to understand the convergence of Big Data with the Cloud. This book presents the latest information on the adaptation and implementation of Big Data technologies in various cloud domains and Industry 4.0. Synergistic Interaction of Big Data with Cloud Computing for Industry 4.0 discusses how to develop adaptive, robust, scalable, and reliable applications that can be used in solutions for day-to-day problems. It focuses on the two frontiers - Big Data and Cloud Computing - and reviews the advantages and consequences of utilizing Cloud Computing to tackle Big Data issues within the manufacturing and production sector as part of Industry 4.0. The book unites some of the top Big Data experts throughout the world who contribute their knowledge and expertise on the different aspects, approaches, and concepts related to new technologies and novel findings. Based on the latest technologies, the book offers case studies and covers the major challenges, issues, and advances in Big Data and Cloud Computing for Industry 4.0. By exploring the basic and high-level concepts, this book serves as a guide for those in the industry, while also helping beginners and more advanced learners understand both basic and more complex aspects of the synergy between Big Data and Cloud Computing.
Unique selling point: The Internet of Things (IoT), AI, and analytics are studied on how they can combat pandemics Core audience: Researchers and medical informatics professionals Place in the market: Academic reference title on timely topic also appealing to professionals
Operation Research methods are often used in every field of modern life like industry, economy and medicine. The authors have compiled of the latest advancements in these methods in this volume comprising some of what is considered the best collection of these new approaches. These can be counted as a direct shortcut to what you may search for. This book provides useful applications of the new developments in OR written by leading scientists from some international universities. Another volume about exciting applications of Operations Research is planned in the near future. We hope you enjoy and benefit from this series!
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way. |
![]() ![]() You may like...
Security with Noisy Data - On Private…
Pim Tuyls, Boris Skoric, …
Hardcover
R3,077
Discovery Miles 30 770
Applications of Machine Learning and…
Ran Yan, Shuaian Wang
Hardcover
Machine Learning and Biometrics
Jucheng Yang, Dong Sun Park, …
Hardcover
R3,321
Discovery Miles 33 210
Behind Prison Walls - Unlocking a Safer…
Edwin Cameron, Rebecca Gore, …
Paperback
|