![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This book focuses on mathematical modeling, describes the process of constructing and evaluating models, discusses the challenges and delicacies of the modeling process, and explicitly outlines the required rules and regulations so that the reader will be able to generalize and reuse concepts in other problems by relying on mathematical logic.Undergraduate and postgraduate students of different academic disciplines would find this book a suitable option preparing them for jobs and research fields requiring modeling techniques. Furthermore, this book can be used as a reference book for experts and practitioners requiring advanced skills of model building in their jobs.
In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.
Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.
In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities.
When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.
With the rapid development and drastic change of the world economy, "Digital Finance", "Internet Finance", "Science and Technology Finance" have become new hotspots, which also represent the future trend of economy development in the era of big data. Enterprises are facing more uncertainty, opportunities coexist with challenges. There are more possibilities for economic development and enterprise management to accelerate the integration of cutting-edge research results, to deepen hot topics discussion and to promote opinion exchanges among academic and business circles. The Sixth International Conference on Economic and Business Management (FEBM2021) was successfully held online on October 16-17, 2021, and aimed to provide a platform for researchers, engineers, academics as well as industry professionals from all over the world to present their latest research findings and development activities in economic and business management. These proceedings include 51 accepted articles selected from 94 submissions.
The book emphasizes the predictive models of Big Data, Genetic Algorithm, and IoT with a case study. The book illustrates the predictive models with integrated fuel consumption models for smart and safe traveling. The text is a coordinated amalgamation of research contributions and industrial applications in the field of Intelligent Transportation Systems. The advanced predictive models and research results were achieved with the case studies, deployed in real transportation environments. Features: Provides a smart traffic congestion avoidance system with an integrated fuel consumption model. Predicts traffic in short-term and regular. This is illustrated with a case study. Efficient Traffic light controller and deviation system in accordance with the traffic scenario. IoT based Intelligent Transport Systems in a Global perspective. Intelligent Traffic Light Control System and Ambulance Control System. Provides a predictive framework that can handle the traffic on abnormal days, such as weekends, festival holidays. Bunch of solutions and ideas for smart traffic development in smart cities. This book focuses on advanced predictive models along with offering an efficient solution for smart traffic management system. This book will give a brief idea of the available algorithms/techniques of big data, IoT, and genetic algorithm and guides in developing a solution for smart city applications. This book will be a complete framework for ITS domain with the advanced concepts of Big Data Analytics, Genetic Algorithm and IoT. This book is primarily aimed at IT professionals. Undergraduates, graduates and researchers in the area of computer science and information technology will also find this book useful.
This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia. The contributions deal with various interdisciplinary research topics, particularly in the fields of social sciences, economics and the arts. The papers focus especially on such topics as language, cultural studies, economics, behavior studies, political sciences, media and communication, psychology and human development. The theoretical research studies included here should provide a solid foundation for the development of new tools that explore the possibilities of developing tourism, hospitality, service industries in Knowledge Economic Era, and the empirical papers will advance our knowledge regarding the impact of information technologies in organizations' and institutions' practices. These proceedings should be of interest to academics and professionals in the wider field of social sciences, including disciplines such as education, psychology, tourism and knowledge management.
Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
Covering both the fundamentals and the in-depth topics related to Verilog digital design, both students and experts can benefit from reading this book by gaining a comprehensive understanding of how modern electronic products are designed and implemented. Principles of Verilog Digital Design contains many hands-on examples accompanied by RTL codes that together can bring a beginner into the digital design realm without needing too much background in the subject area. This book has a particular focus on how to transform design concepts into physical implementations using architecture and timing diagrams. Common mistakes a beginner or even an experienced engineer can make are summarized and addressed as well. Beyond the legal details of Verilog codes, the book additionally presents what uses Verilog codes have through some pertinent design principles. Moreover, students reading this book will gain knowledge about system-level design concepts. Several ASIC designs are illustrated in detail as well. In addition to design principles and skills, modern design methodology and how it is carried out in practice today are explored in depth as well.
This book addresses the high performance computing of the Discrete Element Model (DEM). It is a comprehensive presentation of parallel implementation of the DEM on three popular parallel computing platforms; the multi-core PC, the GPU computer, and the cluster supercomputer. Featuring accompanying MatLab source this book helps you implement the DEM model for use with high performing technology, for particular implementation of the dynamic failure of solids, granular flow and stress wave propagation through solids.
This new book provides an insightful look at the varied and exciting uses and applications of Wi-Fi and the Internet of Things in agriculture. With internet-enabled communications becoming more widely available, farms and agricultural establishments can take advantage of these new technologies for a wide range of farm operations, such as crop management, farm vehicle tracking, livestock monitoring, storage monitoring, and more. The collected data from these devices can be stored in the cloud system or server and accessed by the farmers via the internet or mobile phones. This book shows the many benefits to farmers from applying IoT, including better utilizing information for monitoring crops, optimizing water use, planning effective fertilization strategies, and saving time and reducing the operation expenses. Topics include using IoT for vertical farming, IoT-based smart irrigation system, landslide susceptibility assessment, automated aeroponics systems, crop survival analysis, and more. The volume also considers the challenges of IoT in agriculture, such as the requirements of applications of wireless sensor networks, the threat of attacks and the detection of vulnerabilities in wireless sensor networks, and more. Internet of Things for Agriculture 4.0: Impact and Challenges provides a better understanding of the time- and resourcing-saving benefits of wireless sensors and remote monitoring devices in agriculture. The volume will be useful for those involved in agricultural operations as well as scientists and researchers, and faculty and students in agriculture and computer and information science engineering.
Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework
Introducing strong foundations to practical Cyber-Physical Systems Leveraging CPS for pandemic affected society Ensuring Secured and Privacy aware CPS for Sensitive Data in a pandemic situation Providing methodologies to deploy CPS in industries affect by a pandemic
In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities.
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
Discusses various aspects of role of Internet of Things (IoT) and Machine Learning in smart buildings. Explains pertinent system architecture focusing on power generation and distribution. Covers power enabling technologies for smart cities. Includes Photovoltaic System Integrated Smart Buildings.
Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources. Covers data centre and cyber security with excellent data storage features for smart buildings. Includes systematic and detailed strategies for building air conditioning and lighting. Details smart building security propulsion.
Explores the role of Artificial Intelligence and Smart Computing in health informatics and healthcare with an emphasis on clinical data management and analysis for precise prediction and prompt action Presents cutting edge tracking, monitoring, real time assistance, and security for IoT in healthcare Discusses broadly on wearable sensors and IoT devices and their role in smart living assistance and energy conservation Describes a system mode and architecture for a clear picture of IoT in healthcare Explains the challenges and opportunities with IoT based healthcare industries and includes a study of threats, impacts, and the need of information security
When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation. |
![]() ![]() You may like...
Human Aspects in Ambient Intelligence…
Tibor Bosse, Diane J. Cook, …
Hardcover
Multi-Agent-Based Simulations Applied to…
Diana Francisca Adamatti
Hardcover
R5,653
Discovery Miles 56 530
Advances in Object-oriented Database…
Asuman Dogac, Alexandros Biliris, …
Hardcover
R2,625
Discovery Miles 26 250
|