|
|
Books > Computing & IT
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Wireless Public Safety Networks, Volume Two: A Systematic Approach
presents the latest advances in the wireless Public Safety Networks
(PSNs) field, the networks established by authorities to either
prepare the population for an eminent catastrophe, or those used
for support during crisis and normalization phases. Maintaining
communication capabilities in a disaster scenario is crucial for
avoiding loss of lives and damages to property. This book examines
past communication failures that have directly contributed to the
loss of lives, giving readers in-depth discussions of the public
networks that impact emergency management, covering social media,
crowdsourcing techniques, wearable wireless sensors, moving-cells
scenarios, mobility management protocols, 5G networks, broadband
networks, data dissemination, and the resources of the frequency
spectrum.
Quantum Inspired Computational Intelligence: Research and
Applications explores the latest quantum computational intelligence
approaches, initiatives, and applications in computing,
engineering, science, and business. The book explores this emerging
field of research that applies principles of quantum mechanics to
develop more efficient and robust intelligent systems. Conventional
computational intelligence-or soft computing-is conjoined with
quantum computing to achieve this objective. The models covered can
be applied to any endeavor which handles complex and meaningful
information.
Complex systems are pervasive in many areas of science. With the
increasing requirement for high levels of system performance,
complex systems has become an important area of research due to its
role in many industries. Advances in System Dynamics and Control
provides emerging research on the applications in the field of
control and analysis for complex systems, with a special emphasis
on how to solve various control design and observer design
problems, nonlinear systems, interconnected systems, and singular
systems. Featuring coverage on a broad range of topics, such as
adaptive control, artificial neural network, and synchronization,
this book is an important resource for engineers, professionals,
and researchers interested in applying new computational and
mathematical tools for solving the complicated problems of
mathematical modeling, simulation, and control.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
Software development and design is an intricate and complex process
that requires a multitude of steps to ultimately create a quality
product. One crucial aspect of this process is minimizing potential
errors through software fault prediction. Enhancing Software Fault
Prediction With Machine Learning: Emerging Research and
Opportunities is an innovative source of material on the latest
advances and strategies for software quality prediction. Including
a range of pivotal topics such as case-based reasoning, rate of
improvement, and expert systems, this book is an ideal reference
source for engineers, researchers, academics, students,
professionals, and practitioners interested in novel developments
in software design and analysis.
Over the last 20 years, the role of unmanned aircraft systems in
modern warfare has grown at an unprecedented rate. No longer simply
used for intelligence, data collection or reconnaissance, drones
are routinely used for target acquisition and to strike enemy
targets with missiles and bombs. Organized by nationality, Military
Drones offers a compact guide to the main unmanned aerial vehicles
being flown in combat zones today. These include classics, such as
the MQ-1 Predator, primarily used for intelligence gathering; the
Black Hornet Nano, a micro UAV that is so small it can fit in the
palm of your hand and is used by ground troops for local
situational awareness; the Chinese tri-copter Scorpion, which is
ideal for the stationary observation and strike role in a built-up
area; and the French EADS Talarion, a twinjet long-endurance UAV
designed for high-altitude surveillance. Illustrated with more than
100 photographs and artworks, Military Drones provides a detailed
insight into the specialist military unmanned aerial vehicles that
play a key role in the modern battle space.
Data mapping in a data warehouse is the process of creating a link
between two distinct data models' (source and target)
tables/attributes. Data mapping is required at many stages of DW
life-cycle to help save processor overhead; every stage has its own
unique requirements and challenges. Therefore, many data warehouse
professionals want to learn data mapping in order to move from an
ETL (extract, transform, and load data between databases) developer
to a data modeler role. Data Mapping for Data Warehouse Design
provides basic and advanced knowledge about business intelligence
and data warehouse concepts including real life scenarios that
apply the standard techniques to projects across various domains.
After reading this book, readers will understand the importance of
data mapping across the data warehouse life cycle.
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
Data Simplification: Taming Information With Open Source Tools
addresses the simple fact that modern data is too big and complex
to analyze in its native form. Data simplification is the process
whereby large and complex data is rendered usable. Complex data
must be simplified before it can be analyzed, but the process of
data simplification is anything but simple, requiring a specialized
set of skills and tools. This book provides data scientists from
every scientific discipline with the methods and tools to simplify
their data for immediate analysis or long-term storage in a form
that can be readily repurposed or integrated with other data.
Drawing upon years of practical experience, and using numerous
examples and use cases, Jules Berman discusses the principles,
methods, and tools that must be studied and mastered to achieve
data simplification, open source tools, free utilities and snippets
of code that can be reused and repurposed to simplify data, natural
language processing and machine translation as a tool to simplify
data, and data summarization and visualization and the role they
play in making data useful for the end user.
The second volume will deal with a presentation of the main matrix
and tensor decompositions and their properties of uniqueness, as
well as very useful tensor networks for the analysis of massive
data. Parametric estimation algorithms will be presented for the
identification of the main tensor decompositions. After a brief
historical review of the compressed sampling methods, an overview
of the main methods of retrieving matrices and tensors with missing
data will be performed under the low rank hypothesis. Illustrative
examples will be provided.
The world is witnessing the growth of a global movement facilitated
by technology and social media. Fueled by information, this
movement contains enormous potential to create more accountable,
efficient, responsive, and effective governments and businesses, as
well as spurring economic growth. Big Data Governance and
Perspectives in Knowledge Management is a collection of innovative
research on the methods and applications of applying robust
processes around data, and aligning organizations and skillsets
around those processes. Highlighting a range of topics including
data analytics, prediction analysis, and software development, this
book is ideally designed for academicians, researchers, information
science professionals, software developers, computer engineers,
graduate-level computer science students, policymakers, and
managers seeking current research on the convergence of big data
and information governance as two major trends in information
management.
Trusted Platform Modules (TPMs) are small, inexpensive chips which
provide a limited set of security functions. They are most commonly
found as a motherboard component on laptops and desktops aimed at
the corporate or government markets, but can also be found on many
consumer-grade machines and servers, or purchased as independent
components. Their role is to serve as a Root of Trust - a highly
trusted component from which we can bootstrap trust in other parts
of a system. TPMs are most useful for three kinds of tasks:
remotely identifying a machine, or machine authentication;
providing hardware protection of secrets, or data protection; and
providing verifiable evidence about a machine's state, or
attestation. This book describes the primary uses for TPMs, and
practical considerations such as when TPMs can and should be used,
when they shouldn't be, what advantages they provide, and how to
actually make use of them, with use cases and worked examples of
how to implement these use cases on a real system. Topics covered
include when to use a TPM; TPM concepts and functionality;
programming introduction; provisioning: getting the TPM ready to
use; first steps: TPM keys; machine authentication; data
protection; attestation; other TPM features; software and
specifications; and troubleshooting. Appendices contain basic
cryptographic concepts; command equivalence and requirements
charts; and complete code samples.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|