|
Books > Computing & IT
Evolution of Knowledge Science: Myth to Medicine: Intelligent
Internet-Based Humanist Machines explains how to design and build
the next generation of intelligent machines that solve social and
environmental problems in a systematic, coherent, and optimal
fashion. The book brings together principles from computer and
communication sciences, electrical engineering, mathematics,
physics, social sciences, and more to describe computer systems
that deal with knowledge, its representation, and how to deal with
knowledge centric objects. Readers will learn new tools and
techniques to measure, enhance, and optimize artificial
intelligence strategies for efficiently searching through vast
knowledge bases, as well as how to ensure the security of
information in open, easily accessible, and fast digital networks.
Author Syed Ahamed joins the basic concepts from various
disciplines to describe a robust and coherent knowledge sciences
discipline that provides readers with tools, units, and measures to
evaluate the flow of knowledge during course work or their
research. He offers a unique academic and industrial perspective of
the concurrent dynamic changes in computer and communication
industries based upon his research. The author has experience both
in industry and in teaching graduate level telecommunications and
network architecture courses, particularly those dealing with
applications of networks in education.
The Physics of Computing gives a foundational view of the physical
principles underlying computers. Performance, power, thermal
behavior, and reliability are all harder and harder to achieve as
transistors shrink to nanometer scales. This book describes the
physics of computing at all levels of abstraction from single gates
to complete computer systems. It can be used as a course for
juniors or seniors in computer engineering and electrical
engineering, and can also be used to teach students in other
scientific disciplines important concepts in computing. For
electrical engineering, the book provides the fundamentals of
computing that link core concepts to computing. For computer
science, it provides foundations of key challenges such as power
consumption, performance, and thermal. The book can also be used as
a technical reference by professionals.
Parallel Programming with OpenACC is a modern, practical guide to
implementing dependable computing systems. The book explains how
anyone can use OpenACC to quickly ramp-up application performance
using high-level code directives called pragmas. The OpenACC
directive-based programming model is designed to provide a simple,
yet powerful, approach to accelerators without significant
programming effort. Author Rob Farber, working with a team of
expert contributors, demonstrates how to turn existing applications
into portable GPU accelerated programs that demonstrate immediate
speedups. The book also helps users get the most from the latest
NVIDIA and AMD GPU plus multicore CPU architectures (and soon for
Intel (R) Xeon Phi (TM) as well). Downloadable example codes
provide hands-on OpenACC experience for common problems in
scientific, commercial, big-data, and real-time systems. Topics
include writing reusable code, asynchronous capabilities, using
libraries, multicore clusters, and much more. Each chapter explains
how a specific aspect of OpenACC technology fits, how it works, and
the pitfalls to avoid. Throughout, the book demonstrates how the
use of simple working examples that can be adapted to solve
application needs.
Predictive Modeling of Drug Sensitivity gives an overview of drug
sensitivity modeling for personalized medicine that includes data
characterizations, modeling techniques, applications, and research
challenges. It covers the major mathematical techniques used for
modeling drug sensitivity, and includes the requisite biological
knowledge to guide a user to apply the mathematical tools in
different biological scenarios. This book is an ideal reference for
computer scientists, engineers, computational biologists, and
mathematicians who want to understand and apply multiple approaches
and methods to drug sensitivity modeling. The reader will learn a
broad range of mathematical and computational techniques applied to
the modeling of drug sensitivity, biological concepts, and
measurement techniques crucial to drug sensitivity modeling, how to
design a combination of drugs under different constraints, and the
applications of drug sensitivity prediction methodologies.
This provocative book investigates the relationship between law and
artificial intelligence (AI) governance, and the need for new and
innovative approaches to regulating AI and big data in ways that go
beyond market concerns alone and look to sustainability and social
good. Taking a multidisciplinary approach, the contributors
demonstrate the interplay between various research methods, and
policy motivations, to show that law-based regulation and
governance of AI is vital to efforts at ensuring justice, trust in
administrative and contractual processes, and inclusive social
cohesion in our increasingly technologically-driven societies. The
book provides valuable insights on the new challenges posed by a
rapid reliance on AI and big data, from data protection regimes
around sensitive personal data, to blockchain and smart contracts,
platform data reuse, IP rights and limitations, and many other
crucial concerns for law's interventions. The book also engages
with concerns about the 'surveillance society', for example
regarding contact tracing technology used during the Covid-19
pandemic. The analytical approach provided will make this an
excellent resource for scholars and educators, legal practitioners
(from constitutional law to contract law) and policy makers within
regulation and governance. The empirical case studies will also be
of great interest to scholars of technology law and public policy.
The regulatory community will find this collection offers an
influential case for law's relevance in giving institutional
enforceability to ethics and principled design.
Resources designed to support learners of the new next generation
BTEC First in Information Technology specification*. Covers all
three mandatory units and a wide selection of optional units. Each
unit of the Student Book is presented in topics to ensure the
content is accessible and engaging for learners. Covers of all the
underpinning knowledge and understanding needed at level 2 to
ensure that learners are fully prepared for this course. Activities
in each unit provide support and clear direction for learners and
can be used in the classroom or for independent work. New
Assessment Zone guides learners through both internal and external
assessment. Practice assignments and assessment guidance help
learners to achieve their potential in internally assessed units. *
From 2012, Pearson's BTEC First qualifications have been under
re-development, so schools and colleges could be teaching the
existing 2010 specification or the new next generation 2012-2013
specification. There are different Student Books to support each
specification. If learners are unsure, they should check with their
teacher or tutor.
Creativity has been integral to the development of the modern
State, and yet it is becoming increasingly sidelined, especially as
a result of the development of new machinic technologies including
3D printing. Arguing that inner creativity has been endangered by
the rise of administrative regulation, James Griffin explores a
number of reforms to ensure that upcoming regulations do take
creativity into account. The State of Creativity examines how the
State has become distanced from individual processes of creativity.
This book investigates how the failure to incorporate creativity
into administrative regulation is, in fact, adversely impacting the
regulation of new technologies such as 3D and 4D printing and
augmented reality, by focusing on issues concerning copyright and
patents. This is an important read for intellectual property law
scholars, as well as those studying computer science who wish to
gain a more in-depth understanding of the current laws surrounding
digital technologies such as 3D printing in our modern world. Legal
practitioners wanting to remain abreast of developments surrounding
3D printing will also benefit from this book.
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
Though humans have been communicating through virtual mediators
since the invention of the telephone, new technologies make the use
of virtual communications even more immediate and pervasive than
ever before. By understanding the theories and models behind
virtual communication, one can understand the way society has been
changed and how it will continue to do so. Analyzing Digital
Discourse and Human Behavior in Modern Virtual Environments
examines the implications of virtual communication and online
interaction and the theories and trends associated with them. It
will discuss and address the differences and challenges that
develop when communicating virtually and explore the various
influences virtual communication plays in work, education, and
quotidian life. This title provides a foundation of emerging trends
from which new theories and models of communication can grow. This
book will become a cherished resource for academics, researchers,
technology developers, students, and government or institutional
leaders.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
Peering Carrier Ethernet Networks begins by providing background
information on the evolution of important concepts and building
blocks that have led to the current state of high bandwidth and
high performance Ethernet technology in order to support current
and emerging customer applications. The background information
covered includes an overview of Public Switched Telephone Networks
(PSTN) to describe circuit switching, multiplexing, and voice
digitization that lead to the development of T1/T3 and SONET/SDH
for transport. It interweaves these developments with changes in
the regulatory regime. Additional coverage includes Carrier
Ethernet networks' technical standards, which describe how service
providers can offer services to off-net customers using peered
Carrier Ethernet networks and a description of the taxonomy of
customers and their current and emerging applications at Layer 2
and Layer 3 on peered Carrier Ethernet networks. The book concludes
by describing next steps in Ethernet technology to meet growing
demands and emerging trends.
![Makupedia (Hardcover): Peter K Matthews - Akukalia](//media.loot.co.za/images/x80/5697635449205179215.jpg) |
Makupedia
(Hardcover)
Peter K Matthews - Akukalia
|
R1,828
Discovery Miles 18 280
|
Ships in 12 - 17 working days
|
|
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
The Wolfram language is the programming language of Mathematica,
used increasingly by scientists due to its ease of learning and
user-friendliness. This book focuses on applications of the Wolfram
language to applied mathematics, physics and chemistry. Topics
discussed are broad and comprehensive, from differential equations
and special functions to fractals and chess, from electromagnetism
and optics to relativity and black holes. There is also extensive
coverage of quantum theory and quantum chemistry, and the book is
peppered with more than 200 color graphics to aid visualization of
these concepts. The program codes are provided online as
Mathematica notebooks, allowing readers to modify them and
manipulate the graphics in real time. This book should be a
valuable resource for researchers, educators and students in
science and computing who can profit from a more interactive form
of instruction.
Scientific experiments and medical improvements in recent years
have augmented our bodies, made them manipulable; our personal data
have been downloaded, stored, sold, analyzed; and the pandemic has
given new meaning to the idea of 'virtual presence'. Such phenomena
are often thought to belong to the era of the 'posthuman', an era
that both promises and threatens to redefine the notion of the
human: what does it mean to be human? Can technological advances
impact the way we define ourselves as a species? What will the
future of humankind look like? These questions have gained urgency
in recent years, and continue to preoccupy cultural and legal
practitioners alike. How can the law respond and adapt to a world
shaped by technology and AI? How can it ensure that technological
developments remain inclusive, while simultaneously enforcing
ethical limits to its reach? The volume explores how fictional
texts, whether on the page or on screen, negotiate the legal
dilemmas posed by the increasing infiltration of technology into
modern life.
As human activities moved to the digital domain, so did all the
well-known malicious behaviors including fraud, theft, and other
trickery. There is no silver bullet, and each security threat calls
for a specific answer. One specific threat is that applications
accept malformed inputs, and in many cases it is possible to craft
inputs that let an intruder take full control over the target
computer system. The nature of systems programming languages lies
at the heart of the problem. Rather than rewriting decades of
well-tested functionality, this book examines ways to live with the
(programming) sins of the past while shoring up security in the
most efficient manner possible. We explore a range of different
options, each making significant progress towards securing legacy
programs from malicious inputs. The solutions explored include
enforcement-type defenses, which excludes certain program
executions because they never arise during normal operation.
Another strand explores the idea of presenting adversaries with a
moving target that unpredictably changes its attack surface thanks
to randomization. We also cover tandem execution ideas where the
compromise of one executing clone causes it to diverge from another
thus revealing adversarial activities. The main purpose of this
book is to provide readers with some of the most influential works
on run-time exploits and defenses. We hope that the material in
this book will inspire readers and generate new ideas and
paradigms.
|
You may like...
A Guide To SQL
Philip Pratt, Hassan Afyouni, …
Paperback
R1,253
R1,119
Discovery Miles 11 190
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|