|
|
Books > Computing & IT
Written chemical formulas, such as C2H6O, can tell us the
constituent atoms a molecule contains but they cannot differentiate
between the possible geometrical arrangements (isomers) of these
models. Yet the chemical properties of different isomers can vary
hugely. Therefore, to understand the world of chemistry we need to
ask what kind of isomers can be produced from a given atomic
composition, how are isomers converted into each other, how do they
decompose into smaller pieces, and how can they be made from
smaller pieces? The answers to these questions will help us to
discover new chemistry and new molecules. A potential energy
surface (PES) describes a system, such as a molecule, based on
geometrical parameters. The mathematical properties of the PES can
be used to calculate probable isomer structures as well as how they
are formed and how they might behave. Exploration on Quantum
Chemical Potential Energy Surfaces focuses on the PES search based
on quantum chemical calculations. It describes how to explore the
chemical world on PES, discusses fundamental methods and specific
techniques developed for efficient exploration on PES, and
demonstrates several examples of the PES search for chemical
structures and reaction routes.
A multicore platform uses distributed or parallel computing in a
single computer, and this can be used to assist image processing
algorithms in reducing computational complexities. By implementing
this novel approach, the performance of imaging, video, and vision
algorithms would improve, leading the way for cost-effective
devices like intelligent surveillance cameras. Multi-Core Computer
Vision and Image Processing for Intelligent Applications is an
essential publication outlining the future research opportunities
and emerging technologies in the field of image processing, and the
ways multi-core processing can further the field. This publication
is ideal for policy makers, researchers, technology developers, and
students of IT.
The effective application of knowledge management principles has
proven to be beneficial for modern organizations. When utilized in
the academic community, these frameworks can enhance the value and
quality of research initiatives. Enhancing Academic Research With
Knowledge Management Principles is a pivotal reference source for
the latest research on implementing theoretical frameworks of
information management in the context of academia and universities.
Featuring extensive coverage on relevant areas such as data mining,
organizational and academic culture, this publication is an ideal
resource for researchers, academics, practitioners, professionals,
and students.
We are living in interesting times characterized by increasing
digitalization of business enterprises in a global interconnected
knowledge economy. With waning euphoria about the first wave of
digital e-business enterprises and a sobering dot-com stock market,
business model innovation is being recognized as the key enabler
that can unleash value creation for new digital enterprises. In
contrast to traditional factors of production, knowledge assets and
intellectual capital are expected to play a dominant role in
determining both valuation and value-creation capabilities of most
new age enterprises. Not surprisingly, Knowledge Management for
Business Model Innovation is anticipated to be the mantra for
survival, competence and success of Net enterprises as well as
traditional brick-and-mortar enterprises faced with the challenge
of transforming their business models into and beyond
click-and-mortar companies.
Systems Analysis and Synthesis: Bridging Computer Science and
Information Technology presents several new graph-theoretical
methods that relate system design to core computer science
concepts, and enable correct systems to be synthesized from
specifications. Based on material refined in the author's
university courses, the book has immediate applicability for
working system engineers or recent graduates who understand
computer technology, but have the unfamiliar task of applying their
knowledge to a real business problem. Starting with a comparison of
synthesis and analysis, the book explains the fundamental building
blocks of systems-atoms and events-and takes a graph-theoretical
approach to database design to encourage a well-designed schema.
The author explains how database systems work-useful both when
working with a commercial database management system and when
hand-crafting data structures-and how events control the way data
flows through a system. Later chapters deal with system dynamics
and modelling, rule-based systems, user psychology, and project
management, to round out readers' ability to understand and solve
business problems.
MESH ist ein mathematisches Video ber vielfl chige Netzwerke und
ihre Rolle in der Geometrie, der Numerik und der Computergraphik.
Der unter Anwendung der neuesten Technologie vollst ndig
computergenierte Film spannt einen Bogen von der antiken
griechischen Mathematik zum Gebiet der heutigen geometrischen
Modellierung. MESH hat zahlreiche wissenschaftliche Preise weltweit
gewonnen. Die Autoren sind Konrad Polthier, ein Professor der
Mathematik, und Beau Janzen, ein professioneller Filmdirektor.
Der Film ist ein ausgezeichnetes Lehrmittel f r Kurse in
Geometrie, Visualisierung, wissenschaftlichem Rechnen und
geometrischer Modellierung an Universit ten, Zentren f r
wissenschaftliches Rechnen, kann jedoch auch an Schulen genutzt
werden.
Analyzing data sets has continued to be an invaluable application
for numerous industries. By combining different algorithms,
technologies, and systems used to extract information from data and
solve complex problems, various sectors have reached new heights
and have changed our world for the better. The Handbook of Research
on Engineering, Business, and Healthcare Applications of Data
Science and Analytics is a collection of innovative research on the
methods and applications of data analytics. While highlighting
topics including artificial intelligence, data security, and
information systems, this book is ideally designed for researchers,
data analysts, data scientists, healthcare administrators,
executives, managers, engineers, IT consultants, academicians, and
students interested in the potential of data application
technologies.
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
Malware Diffusion Models for Wireless Complex Networks: Theory and
Applications provides a timely update on malicious software
(malware), a serious concern for all types of network users, from
laymen to experienced administrators. As the proliferation of
portable devices, namely smartphones and tablets, and their
increased capabilities, has propelled the intensity of malware
spreading and increased its consequences in social life and the
global economy, this book provides the theoretical aspect of
malware dissemination, also presenting modeling approaches that
describe the behavior and dynamics of malware diffusion in various
types of wireless complex networks. Sections include a systematic
introduction to malware diffusion processes in computer and
communications networks, an analysis of the latest state-of-the-art
malware diffusion modeling frameworks, such as queuing-based
techniques, calculus of variations based techniques, and game
theory based techniques, also demonstrating how the methodologies
can be used for modeling in more general applications and practical
scenarios.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
Repetitive Project Scheduling: Theory and Methods is the first book
to comprehensively, and systematically, review new methods for
scheduling repetitive projects that have been developed in response
to the weaknesses of the most popular method for project
scheduling, the Critical Path Method (CPM). As projects with
significant levels of repetitive scheduling are common in
construction and engineering, especially construction of buildings
with multiple stories, highways, tunnels, pipelines, power
distribution networks, and so on, the book fills a much needed gap,
introducing the main repetitive project scheduling methods, both
comprehensively and systematically. Users will find valuable
information on core methodologies, including how to identify the
controlling path and controlling segment, how to convert RSM to a
network model, and examples based on practical scheduling problems.
|
|