|
|
Books > Computing & IT
There is a tremendous need for computer scientists, data
scientists, and software developers to learn how to develop
Socratic problem-solving applications. While the amount of data and
information processing has been accelerating, our ability to learn
and problem-solve with that data has fallen behind. Meanwhile,
problems have become too complex to solve in the workplace without
a concerted effort to follow a problem-solving process. This
problem-solving process must be able to deal with big and disparate
data. Furthermore, it must solve problems that do not have a "rule"
to apply in solving them. Moreover, it must deal with ambiguity and
help humans use informed judgment to build on previous steps and
create new understanding. Computer-based Socratic problem-solving
systems answer this need for a problem-solving process using big
and disparate data. Furthermore, computer scientists, data
scientists, and software developers need the knowledge to develop
these systems. Socrates Digital (TM) for Learning and Problem
Solving presents the rationale for developing a Socratic
problem-solving application. It describes how a computer-based
Socratic problem-solving system called Socrates DigitalTM can keep
problem-solvers on track, document the outcome of a problem-solving
session, and share those results with problem-solvers and larger
audiences. In addition, Socrates DigitalTM assists problem-solvers
to combine evidence about their quality of reasoning for individual
problem-solving steps and their overall confidence in the solution.
Socrates DigitalTM also captures, manages, and distributes this
knowledge across organizations to improve problem-solving. This
book also presents how to build a Socrates DigitalTM system by
detailing the four phases of design and development: Understand,
Explore, Materialize, and Realize. The details include flow charts
and pseudo-code for readers to implement Socrates DigitalTM in a
general-purpose programming language. The completion of the design
and development process results in a Socrates DigitalTM system that
leverages artificial intelligence services from providers that
include Apple, Microsoft, Google, IBM, and Amazon. In addition, an
appendix provides a demonstration of a no-code implementation of
Socrates DigitalTM in Microsoft Power Virtual Agent.
Introduction to Graphic Arts and Media Technologies provides
students with an accessible and informative overview of various
facets of and opportunities within the graphic arts and media
technologies industry. The text provides readers with the knowledge
and skillsets required to help them to succeed in their future
careers, whether in graphic design, advertising design, printing
technologies, web design, video and sound design, or 3D modeling
and animation. The opening chapter offers students a brief history
of the industry and describes a variety of jobs available to them.
Additional chapters examine historical reference points that can
influence and inspire today's artists, from the cave paintings of
Lascaux to the art style of Walt Disney to modern web design
aesthetics. Students learn how to expand their creativity, think
like a designer, and apply key design elements and principles to
produce effective media solutions. Dedicated chapters cover imagery
in graphics, type and typography, industry workflows, and media and
communication options. The closing chapter speaks to building a
professional portfolio, leveraging industry resources, and tapping
into future educational opportunities. Featuring vibrant,
full-color images and enlightening interviews with professionals in
the industry, Introduction to Graphic Arts and Media Technologies
is an ideal resource for courses and programs in the visual arts.
As digital technology continues to revolutionize the world,
businesses are also evolving by adopting digital technologies such
as artificial intelligence, digital marketing, and analytical
methods into their daily practices. Due to this growing adoption,
further study on the potential solutions modern technology provides
to businesses is required to successfully apply it across
industries. AI-Driven Intelligent Models for Business Excellence
explores various artificial intelligence models and methods for
business applications and considers algorithmic approaches for
business excellence across numerous fields and applications.
Covering topics such as business analysis, deep learning, machine
learning, and analytical methods, this reference work is ideal for
managers, business owners, computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
This organizational history relates the role of the National
Science Foundation (NSF) in the development of modern computing.
Drawing upon new and existing oral histories, extensive use of NSF
documents, and the experience of two of the authors as senior
managers, this book describes how NSF's programmatic activities
originated and evolved to become the primary source of funding for
fundamental research in computing and information technologies. The
book traces how NSF's support has provided facilities and education
for computing usage by all scientific disciplines, aided in
institution and professional community building, supported
fundamental research in computer science and allied disciplines,
and led the efforts to broaden participation in computing by all
segments of society. Today, the research and infrastructure
facilitated by NSF computing programs are significant economic
drivers of American society and industry. For example, NSF
supported work that led to the first widely-used web browser,
Netscape; sponsored the creation of algorithms at the core of the
Google search engine; facilitated the growth of the public
Internet; and funded research on the scientific basis for countless
other applications and technologies. NSF has advanced the
development of human capital and ideas for future advances in
computing and its applications. This account is the first
comprehensive coverage of NSF's role in the extraordinary growth
and expansion of modern computing and its use. It will appeal to
historians of computing, policy makers and leaders in government
and academia, and individuals interested in the history and
development of computing and the NSF.
As environmental issues remain at the forefront of energy research,
renewable energy is now an all-important field of study. And as
smart technology continues to grow and be refined, its applications
broaden and increase in their potential to revolutionize
sustainability studies. This potential can only be fully realized
with a thorough understanding of the most recent breakthroughs in
the field. Research Advancements in Smart Technology, Optimization,
and Renewable Energy is a collection of innovative research that
explores the recent steps forward for smart applications in
sustainability. Featuring coverage on a wide range of topics
including energy assessment, neural fuzzy control, and
biogeography, this book is ideally designed for advocates,
policymakers, engineers, software developers, academicians,
researchers, and students.
Because it continually implements entrepreneurial creativity and
innovative business models, the economic landscape is ever-changing
in today's globalized world. As consumers become more willing to
accept new strategic trends, this has led to the emergence of
disruptive technologies. Since this equipment has an insufficient
amount of information and high risks, it is necessary to assess the
potential of disruptive technologies in the commercial environment.
Impact of Disruptive Technologies on the Sharing Economy provides
emerging research exploring the theoretical and practical aspects
of disruptive technologies and knowledge-based entrepreneurial
efforts and applications within management, business, and
economics. Featuring coverage on a broad range of topics such as
consumer ethics, corporate governance, and insurance issues, this
book is ideally designed for IT specialists, IT consultants,
software developers, computer engineers, managers, executives,
managing directors, students, professors, scientists,
professionals, industry practitioners, academicians, and
researchers seeking current research on the consequences of
disruptive technologies.
Mobile Sensors and Context-Aware Computing is a useful guide that
explains how hardware, software, sensors, and operating systems
converge to create a new generation of context-aware mobile
applications. This cohesive guide to the mobile computing landscape
demonstrates innovative mobile and sensor solutions for platforms
that deliver enhanced, personalized user experiences, with examples
including the fast-growing domains of mobile health and vehicular
networking. Users will learn how the convergence of mobile and
sensors facilitates cyber-physical systems and the Internet of
Things, and how applications which directly interact with the
physical world are becoming more and more compatible. The authors
cover both the platform components and key issues of security,
privacy, power management, and wireless interaction with other
systems.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
Predictive Modeling of Drug Sensitivity gives an overview of drug
sensitivity modeling for personalized medicine that includes data
characterizations, modeling techniques, applications, and research
challenges. It covers the major mathematical techniques used for
modeling drug sensitivity, and includes the requisite biological
knowledge to guide a user to apply the mathematical tools in
different biological scenarios. This book is an ideal reference for
computer scientists, engineers, computational biologists, and
mathematicians who want to understand and apply multiple approaches
and methods to drug sensitivity modeling. The reader will learn a
broad range of mathematical and computational techniques applied to
the modeling of drug sensitivity, biological concepts, and
measurement techniques crucial to drug sensitivity modeling, how to
design a combination of drugs under different constraints, and the
applications of drug sensitivity prediction methodologies.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
|
You may like...
Law@Work
A. Van Niekerk, N. Smit
Paperback
R1,367
R1,195
Discovery Miles 11 950
|