|
Books > Computing & IT
In the digital era, novel applications and techniques in the realm
of computer science are increasing constantly. These innovations
have led to new techniques and developments in the field of
cybernetics. The Handbook of Research on Applied Cybernetics and
Systems Science is an authoritative reference publication for the
latest scholarly information on complex concepts of more adaptive
and self-regulating systems. Featuring exhaustive coverage on a
variety of topics such as infectious disease modeling, clinical
imaging, and computational modeling, this publication is an ideal
source for researchers and students in the field of computer
science seeking emerging trends in computer science and
computational mathematics.
Continual advancements in web technology have highlighted the need
for formatted systems that computers can utilize to easily read and
sift through the hundreds of thousands of data points across the
internet. Therefore, having the most relevant data in the least
amount of time to optimize the productivity of users becomes a
priority. Semantic Web Science and Real-World Applications provides
emerging research exploring the theoretical and practical aspects
of semantic web science and real-world applications within the area
of big data. Featuring coverage on a broad range of topics such as
artificial intelligence, social media monitoring, and microblogging
recommendation systems, this book is ideally designed for IT
consultants, academics, professionals, and researchers of web
science seeking the current developments, requirements and
standards, and technology spaces presented across academia and
industries.
Thanks to the digital revolution, even a traditional discipline
like philology has been enjoying a renaissance within academia and
beyond. Decades of work have been producing groundbreaking results,
raising new research questions and creating innovative educational
resources. This book describes the rapidly developing state of the
art of digital philology with a focus on Ancient Greek and Latin,
the classical languages of Western culture. Contributions cover a
wide range of topics about the accessibility and analysis of Greek
and Latin sources. The discussion is organized in five sections
concerning open data of Greek and Latin texts; catalogs and
citations of authors and works; data entry, collection and analysis
for classical philology; critical editions and annotations of
sources; and finally linguistic annotations and lexical databases.
As a whole, the volume provides a comprehensive outline of an
emergent research field for a new generation of scholars and
students, explaining what is reachable and analyzable that was not
before in terms of technology and accessibility.
The representation of abstract data and ideas can be a difficult
and tedious task to handle when learning new concepts; however, the
advances in emerging technology have allowed for new methods of
representing such conceptual data. Information Visualization
Techniques in the Social Sciences and Humanities is a critical
scholarly resource that examines the application of information
visualization in the social sciences and humanities. Featuring
coverage on a broad range of topics such as social network
analysis, complex systems, and visualization aesthetics, this book
is geared towards professionals, students, and researchers seeking
current research on information visualization.
The book deals with various tools and applications of
bioinformatics in the fields of: o agriculture, corals, structural
bioinformatics, data-mining, text-mining; o medicinal plants,
antibiotics, protein structure prediction, drug design; o gene
expression, micro-arrays, proteomics, molecular phylogenic location
of the Indian Liver Fluke, rough sets to predict protein structural
class; o artificial neural networks for prediction of amino acids
levels, plant systems biology, molecular modeling, homology
modeling, bio-efficacy of indigenous bacillus through in-silico
approach; o fresh aquaculture and fisheries, pesticides and
insecticides, databases and tools development in the relevant area.
The book would be of much use to the person working in the field of
agricultural biotechnology, bioinformatics, computer science and
applied statistics. This can act as a book for M.Sc, M.Tech and
Ph.D students of and the faculty of
Bioinformatics/Biotechnologists.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Drawing on research in the social sciences, communications, and
other fields, this book wants to analyze how the online environment
is influencing the experience of psychology. However, understanding
how the Internet is changing our everyday experience presents a
substantial challenge for the psychologists. Now, research in this
area is still sparse and limited in both the number and scope of
studies: actual research, especially studies with strict
methodologies, is only just beginning. The contributions in this
book are among the first scientific attempts to take a serious look
at various aspects of Internet-related psychology. However, we need
not start from scratch. Psychology has a broad knowledge about the
factors that affect human behaviour in other setting. So, the
papers collected for this book are descriptive and
practical-oriented in nature.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
This book is designed to cover three objectives. One, to provide a
comprehensive resource to individuals (including novice,
IT/Non-HP-UX administrators, HP-UX administrators) who intend to
take the Certified System Administrator for HP-UX certification
exam and pass it. Two, to provide a quick and valuable on-the-job
resource to HP-UX administrators, administrators of other UNIX
operating system software, IT managers, programmers, and DBAs
working in the HP-UX environment. Three, to provide an
easy-to-understand guide to novice and IT/non-HP-UX administrators
who intend to learn HP-UX from the beginning. This book contains 33
chapters. The book is organized in such a way that it helps its
audience understand concepts, implementation procedures, some basic
troubleshooting, command syntax, configuration files, and daemons
involved. There are three key areas: UNIX fundamentals, HP-UX
system administration, and HP-UX network administration. 1.UNIX
Fundamentals covers the basics of UNIX. Most information is not
specific to a particular UNIX flavor, but rather includes general
UNIX concepts, file manipulation and security techniques, shell and
awk programming, vi editor, basic commands, and other topics.
Chapters 01 through 06 and chapter 21 cover this area. Unlike many
other similar books, a chapter on shell scripting is presented
after covering HP-UX System Administration chapters. This is done
intentionally to provide readers with some practical examples based
on the knowledge they have gained from UNIX Fundamentals and HP-UX
System Administration chapters. 2.HP-UX System Administration
covers the HP-UX-specific system administration concepts and topics
including HP-UX installation methods; software and patch
management; user and group account administration; disk and device
file management; LVM and file system administration; swap space and
printer management; system startup and shutdown procedures; kernel
reconfiguration techniques; backup, restore, and system recovery
functions; job automation and process control; system logging and
performance monitoring; and so on. Chapters 07 through 20 cover
this area. 3.HP-UX Network Administration covers HP-UX network
administration concepts and topics such as OSI and TCP/IP models;
network hardware overview; LAN card administration; IP subnetting
and routing techniques; network troubleshooting tools; system
startup services; naming services such as DNS, NIS, and LDAP; File
sharing tools viz. NFS and AutoFS; Time synchronization using NTP;
internet services administration; BootP/TFTP services; system
security; and so on. Chapters 22 through 33 cover this area. The
beginning of each chapter highlights objectives covered. The end of
each chapter includes a summary as to what is learnt in the
chapter. Throughout the book tables, figures, screen shots, and
examples are given to explain concepts and tasks. The output
generated as a result of running commands is highlighted in light
grey background to differentiate it with surrounding text. The book
includes several appendices one of which contains more than 550
practice exam questions. Tables of commands, important files, and
service daemons are included in separate appendices.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,406
R1,302
Discovery Miles 13 020
|