|
|
Books > Computing & IT
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
As environmental issues remain at the forefront of energy research,
renewable energy is now an all-important field of study. And as
smart technology continues to grow and be refined, its applications
broaden and increase in their potential to revolutionize
sustainability studies. This potential can only be fully realized
with a thorough understanding of the most recent breakthroughs in
the field. Research Advancements in Smart Technology, Optimization,
and Renewable Energy is a collection of innovative research that
explores the recent steps forward for smart applications in
sustainability. Featuring coverage on a wide range of topics
including energy assessment, neural fuzzy control, and
biogeography, this book is ideally designed for advocates,
policymakers, engineers, software developers, academicians,
researchers, and students.
Because it continually implements entrepreneurial creativity and
innovative business models, the economic landscape is ever-changing
in today's globalized world. As consumers become more willing to
accept new strategic trends, this has led to the emergence of
disruptive technologies. Since this equipment has an insufficient
amount of information and high risks, it is necessary to assess the
potential of disruptive technologies in the commercial environment.
Impact of Disruptive Technologies on the Sharing Economy provides
emerging research exploring the theoretical and practical aspects
of disruptive technologies and knowledge-based entrepreneurial
efforts and applications within management, business, and
economics. Featuring coverage on a broad range of topics such as
consumer ethics, corporate governance, and insurance issues, this
book is ideally designed for IT specialists, IT consultants,
software developers, computer engineers, managers, executives,
managing directors, students, professors, scientists,
professionals, industry practitioners, academicians, and
researchers seeking current research on the consequences of
disruptive technologies.
ClearRevise is all about making your revision easy. At the end of
the course, doing practice papers is useful - but an exam tutor can
make a big difference. This book helps provide support from both
angles and will really help you to ace the exam. The first section
is your exam tutor. It shows you example questions with model
answers. Just like a tutor, it gives you exam tips and lets you
know what the examiner is looking for. Secondly, you are then given
similar questions from the same topic for you to have a go at,
applying your knowledge and tips. With over 400 marks in this
section and all the answers provided you'll easily revise the
topics as you go. Lastly, there are two complete exam papers
written in the same style as the live OCR papers to try. They're
exactly the same length and marks as the real exam, providing a
realistic experience and a great opportunity to show how much
you've progressed.
Mobile Sensors and Context-Aware Computing is a useful guide that
explains how hardware, software, sensors, and operating systems
converge to create a new generation of context-aware mobile
applications. This cohesive guide to the mobile computing landscape
demonstrates innovative mobile and sensor solutions for platforms
that deliver enhanced, personalized user experiences, with examples
including the fast-growing domains of mobile health and vehicular
networking. Users will learn how the convergence of mobile and
sensors facilitates cyber-physical systems and the Internet of
Things, and how applications which directly interact with the
physical world are becoming more and more compatible. The authors
cover both the platform components and key issues of security,
privacy, power management, and wireless interaction with other
systems.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
Predictive Modeling of Drug Sensitivity gives an overview of drug
sensitivity modeling for personalized medicine that includes data
characterizations, modeling techniques, applications, and research
challenges. It covers the major mathematical techniques used for
modeling drug sensitivity, and includes the requisite biological
knowledge to guide a user to apply the mathematical tools in
different biological scenarios. This book is an ideal reference for
computer scientists, engineers, computational biologists, and
mathematicians who want to understand and apply multiple approaches
and methods to drug sensitivity modeling. The reader will learn a
broad range of mathematical and computational techniques applied to
the modeling of drug sensitivity, biological concepts, and
measurement techniques crucial to drug sensitivity modeling, how to
design a combination of drugs under different constraints, and the
applications of drug sensitivity prediction methodologies.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
Evolution of Knowledge Science: Myth to Medicine: Intelligent
Internet-Based Humanist Machines explains how to design and build
the next generation of intelligent machines that solve social and
environmental problems in a systematic, coherent, and optimal
fashion. The book brings together principles from computer and
communication sciences, electrical engineering, mathematics,
physics, social sciences, and more to describe computer systems
that deal with knowledge, its representation, and how to deal with
knowledge centric objects. Readers will learn new tools and
techniques to measure, enhance, and optimize artificial
intelligence strategies for efficiently searching through vast
knowledge bases, as well as how to ensure the security of
information in open, easily accessible, and fast digital networks.
Author Syed Ahamed joins the basic concepts from various
disciplines to describe a robust and coherent knowledge sciences
discipline that provides readers with tools, units, and measures to
evaluate the flow of knowledge during course work or their
research. He offers a unique academic and industrial perspective of
the concurrent dynamic changes in computer and communication
industries based upon his research. The author has experience both
in industry and in teaching graduate level telecommunications and
network architecture courses, particularly those dealing with
applications of networks in education.
The Physics of Computing gives a foundational view of the physical
principles underlying computers. Performance, power, thermal
behavior, and reliability are all harder and harder to achieve as
transistors shrink to nanometer scales. This book describes the
physics of computing at all levels of abstraction from single gates
to complete computer systems. It can be used as a course for
juniors or seniors in computer engineering and electrical
engineering, and can also be used to teach students in other
scientific disciplines important concepts in computing. For
electrical engineering, the book provides the fundamentals of
computing that link core concepts to computing. For computer
science, it provides foundations of key challenges such as power
consumption, performance, and thermal. The book can also be used as
a technical reference by professionals.
Chemical modelling covers a wide range of disciplines, and this
book is the first stop for any chemist, materials scientist,
biochemist, or molecular physicist wishing to acquaint themselves
with major developments in the applications and theory of chemical
modelling. Containing both comprehensive and critical reviews, it
is a convenient reference to the current literature. Coverage
includes, but is not limited to, considerations towards rigorous
foundations for the natural-orbital representation of molecular
electronic transitions, quantum and classical embedding schemes for
optical properties, machine learning for excited states, ultrafast
and wave function-based electron dynamics, and attosecond
chemistry.
The success of any organization is largely dependent on positive
feedback and repeat business from patrons. By utilizing acquired
marketing data, business professionals can more accurately assess
practices, services, and products that their customers find
appealing. The Handbook of Research on Intelligent Techniques and
Modeling Applications in Marketing Analytics features innovative
research and implementation practices of analytics in marketing
research. Highlighting various techniques in acquiring and
deciphering marketing data, this publication is a pivotal reference
for professionals, managers, market researchers, and practitioners
interested in the observation and utilization of data on marketing
trends to promote positive business practices.
|
|