|
|
Books > Computing & IT
The considerable growth of RFID is currently accompanied by the
development of numerous identification technologies that complement
those already available while seeking to answer new problems.
Chipless RFID is one example. The goal is to both significantly
reduce the price of the tag and increase the amount of information
it contains, in order to compete with the barcode while retaining
the benefits of a flexible reading approach based on radio
communication. To solve the problem of the number of bits, this
book describes the possibility of coding the information at the
level of the overall shape of the RCS of the tag, which would
facilitate reaching very large quantities. The design of the tags
then returns to the resolution of the inverse problem of the
electromagnetic signature. The proposed design methodology
regularizes the problem by decomposing the signature on a basis of
elementary patterns whose signature is chosen in advance.
Automatic identification has evolved to use techniques that can
identify an object or subject without direct human intervention.
Such devices include the bar code, magnetic-stripe, integrated
circuit, and biometric and radio-frequency identification.
Innovative Automatic Identification & Location-Based Services:
From Bar Codes to Chip Implants emphasizes the convergence and
trajectory of automatic identification and location-based services
toward chip implants and real-time positioning capabilities.
Recording the history of automatic identification, this book also
discusses the social, cultural, and ethical implications of the
technological possibilities with respect to national security
initiatives.
As environmental issues remain at the forefront of energy research,
renewable energy is now an all-important field of study. And as
smart technology continues to grow and be refined, its applications
broaden and increase in their potential to revolutionize
sustainability studies. This potential can only be fully realized
with a thorough understanding of the most recent breakthroughs in
the field. Research Advancements in Smart Technology, Optimization,
and Renewable Energy is a collection of innovative research that
explores the recent steps forward for smart applications in
sustainability. Featuring coverage on a wide range of topics
including energy assessment, neural fuzzy control, and
biogeography, this book is ideally designed for advocates,
policymakers, engineers, software developers, academicians,
researchers, and students.
Universal UX Design: Building Multicultural User Experience
provides an ideal guide as multicultural UX continues to emerge as
a transdisciplinary field that, in addition to the traditional UI
and corporate strategy concerns, includes socio/cultural and
neurocognitive concerns that constitute one of the first steps in a
truly global product strategy. In short, multicultural UX is no
longer a nice-to-have in your overall UX strategy, it is now a
must-have. This practical guide teaches readers about international
concerns on the development of a uniquely branded, yet culturally
appealing, software end-product. With hands-on examples throughout,
readers will learn how to accurately predict user behavior,
optimize layout and text elements, and integrate persuasive design
in layout, as well as how to determine which strategies to
communicate image and content more effectively, while demystifying
the psychological and sociopolitical factors associated with
culture. The book reviews the essentials of cognitive UI perception
and how they are affected by socio-cultural conditioning, as well
as how different cultural bias and expectations can work in UX
design.
 |
One of Us
(Hardcover)
Louis B Rosenberg; Illustrated by Olha Bondarenko
|
R362
R338
Discovery Miles 3 380
Save R24 (7%)
|
Ships in 18 - 22 working days
|
|
|
Because it continually implements entrepreneurial creativity and
innovative business models, the economic landscape is ever-changing
in today's globalized world. As consumers become more willing to
accept new strategic trends, this has led to the emergence of
disruptive technologies. Since this equipment has an insufficient
amount of information and high risks, it is necessary to assess the
potential of disruptive technologies in the commercial environment.
Impact of Disruptive Technologies on the Sharing Economy provides
emerging research exploring the theoretical and practical aspects
of disruptive technologies and knowledge-based entrepreneurial
efforts and applications within management, business, and
economics. Featuring coverage on a broad range of topics such as
consumer ethics, corporate governance, and insurance issues, this
book is ideally designed for IT specialists, IT consultants,
software developers, computer engineers, managers, executives,
managing directors, students, professors, scientists,
professionals, industry practitioners, academicians, and
researchers seeking current research on the consequences of
disruptive technologies.
Predictive Modeling of Drug Sensitivity gives an overview of drug
sensitivity modeling for personalized medicine that includes data
characterizations, modeling techniques, applications, and research
challenges. It covers the major mathematical techniques used for
modeling drug sensitivity, and includes the requisite biological
knowledge to guide a user to apply the mathematical tools in
different biological scenarios. This book is an ideal reference for
computer scientists, engineers, computational biologists, and
mathematicians who want to understand and apply multiple approaches
and methods to drug sensitivity modeling. The reader will learn a
broad range of mathematical and computational techniques applied to
the modeling of drug sensitivity, biological concepts, and
measurement techniques crucial to drug sensitivity modeling, how to
design a combination of drugs under different constraints, and the
applications of drug sensitivity prediction methodologies.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
Data is the most important commodity, which is why data protection
has become a global priority. Data breaches and security flaws can
jeopardize the global economy. Organizations face a greater risk of
failing to achieve strategy and business goals as cyber threat
behavior grows in frequency, sophistication, and destructiveness. A
breach can result in data loss, business interruption, brand and
reputation harm, as well as regulatory and legal consequences. A
company needs a well-thought-out cybersecurity strategy to secure
its critical infrastructure and information systems in order to
overcome these challenges. Cross-Industry Applications of Cyber
Security Frameworks provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program. It is equipped with cross-industry
applications of cybersecurity frameworks, best practices for common
practices, and suggestions that may be highly relevant or
appropriate in every case. Covering topics such as legal
frameworks, cybersecurity in FinTech, and open banking, this
premier reference source is an essential resource for executives,
business leaders, managers, entrepreneurs, IT professionals,
government officials, hospital administrators, educational
administrators, privacy specialists, researchers, and academicians.
Digital Signal Processing 101: Everything You Need to Know to Get
Started provides a basic tutorial on digital signal processing
(DSP). Beginning with discussions of numerical representation and
complex numbers and exponentials, it goes on to explain difficult
concepts such as sampling, aliasing, imaginary numbers, and
frequency response. It does so using easy-to-understand examples
with minimum mathematics. In addition, there is an overview of the
DSP functions and implementation used in several DSP-intensive
fields or applications, from error correction to CDMA mobile
communication to airborne radar systems. This book has been updated
to include the latest developments in Digital Signal Processing,
and has eight new chapters on: Automotive Radar Signal Processing
Space-Time Adaptive Processing Radar Field Orientated Motor Control
Matrix Inversion algorithms GPUs for computing Machine Learning
Entropy and Predictive Coding Video compression
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
Chemical modelling covers a wide range of disciplines, and this
book is the first stop for any chemist, materials scientist,
biochemist, or molecular physicist wishing to acquaint themselves
with major developments in the applications and theory of chemical
modelling. Containing both comprehensive and critical reviews, it
is a convenient reference to the current literature. Coverage
includes, but is not limited to, considerations towards rigorous
foundations for the natural-orbital representation of molecular
electronic transitions, quantum and classical embedding schemes for
optical properties, machine learning for excited states, ultrafast
and wave function-based electron dynamics, and attosecond
chemistry.
The success of any organization is largely dependent on positive
feedback and repeat business from patrons. By utilizing acquired
marketing data, business professionals can more accurately assess
practices, services, and products that their customers find
appealing. The Handbook of Research on Intelligent Techniques and
Modeling Applications in Marketing Analytics features innovative
research and implementation practices of analytics in marketing
research. Highlighting various techniques in acquiring and
deciphering marketing data, this publication is a pivotal reference
for professionals, managers, market researchers, and practitioners
interested in the observation and utilization of data on marketing
trends to promote positive business practices.
4 zettabytes (4 billion terabytes) of data generated in 2013, 44
zettabytes predicted for 2020 and 185 zettabytes for 2025. These
figures are staggering and perfectly illustrate this new era of
data deluge. Data has become a major economic and social challenge.
The speed of processing of these data is the weakest link in a
computer system: the storage system. It is therefore crucial to
optimize this operation. During the last decade, storage systems
have experienced a major revolution: the advent of flash memory.
Flash Memory Integration: Performance and Energy Issues contributes
to a better understanding of these revolutions. The authors offer
us an insight into the integration of flash memory in computer
systems, their behavior in performance and in power consumption
compared to traditional storage systems. The book also presents, in
their entirety, various methods for measuring the performance and
energy consumption of storage systems for embedded as well as
desktop/server computer systems. We are invited on a journey to the
memories of the future.
As technology continues to expand and develop, the internet of
things (IoT) is playing a progressive role in the infrastructure of
electronics. The increasing amount of IoT devices, however, has led
to the emergence of significant privacy and security challenges.
Security and Privacy Issues in Sensor Networks and IoT is a
collection of innovative research on the methods and applications
of protection disputes in the internet of things and other
computing structures. While highlighting topics that include cyber
defense, digital forensics, and intrusion detection, this book is
ideally designed for security analysts, IT specialists, software
developers, computer engineers, industry professionals,
academicians, students, and researchers seeking current research on
defense concerns in cyber physical systems.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|