|
|
Books > Computing & IT
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
Data Simplification: Taming Information With Open Source Tools
addresses the simple fact that modern data is too big and complex
to analyze in its native form. Data simplification is the process
whereby large and complex data is rendered usable. Complex data
must be simplified before it can be analyzed, but the process of
data simplification is anything but simple, requiring a specialized
set of skills and tools. This book provides data scientists from
every scientific discipline with the methods and tools to simplify
their data for immediate analysis or long-term storage in a form
that can be readily repurposed or integrated with other data.
Drawing upon years of practical experience, and using numerous
examples and use cases, Jules Berman discusses the principles,
methods, and tools that must be studied and mastered to achieve
data simplification, open source tools, free utilities and snippets
of code that can be reused and repurposed to simplify data, natural
language processing and machine translation as a tool to simplify
data, and data summarization and visualization and the role they
play in making data useful for the end user.
The second volume will deal with a presentation of the main matrix
and tensor decompositions and their properties of uniqueness, as
well as very useful tensor networks for the analysis of massive
data. Parametric estimation algorithms will be presented for the
identification of the main tensor decompositions. After a brief
historical review of the compressed sampling methods, an overview
of the main methods of retrieving matrices and tensors with missing
data will be performed under the low rank hypothesis. Illustrative
examples will be provided.
The world is witnessing the growth of a global movement facilitated
by technology and social media. Fueled by information, this
movement contains enormous potential to create more accountable,
efficient, responsive, and effective governments and businesses, as
well as spurring economic growth. Big Data Governance and
Perspectives in Knowledge Management is a collection of innovative
research on the methods and applications of applying robust
processes around data, and aligning organizations and skillsets
around those processes. Highlighting a range of topics including
data analytics, prediction analysis, and software development, this
book is ideally designed for academicians, researchers, information
science professionals, software developers, computer engineers,
graduate-level computer science students, policymakers, and
managers seeking current research on the convergence of big data
and information governance as two major trends in information
management.
Trusted Platform Modules (TPMs) are small, inexpensive chips which
provide a limited set of security functions. They are most commonly
found as a motherboard component on laptops and desktops aimed at
the corporate or government markets, but can also be found on many
consumer-grade machines and servers, or purchased as independent
components. Their role is to serve as a Root of Trust - a highly
trusted component from which we can bootstrap trust in other parts
of a system. TPMs are most useful for three kinds of tasks:
remotely identifying a machine, or machine authentication;
providing hardware protection of secrets, or data protection; and
providing verifiable evidence about a machine's state, or
attestation. This book describes the primary uses for TPMs, and
practical considerations such as when TPMs can and should be used,
when they shouldn't be, what advantages they provide, and how to
actually make use of them, with use cases and worked examples of
how to implement these use cases on a real system. Topics covered
include when to use a TPM; TPM concepts and functionality;
programming introduction; provisioning: getting the TPM ready to
use; first steps: TPM keys; machine authentication; data
protection; attestation; other TPM features; software and
specifications; and troubleshooting. Appendices contain basic
cryptographic concepts; command equivalence and requirements
charts; and complete code samples.
Cloud computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Design and Use of Virtualization
Technology in Cloud Computing is a crucial resource that provides
in-depth discussions on the background of virtualization, and the
ways it can help shape the future of cloud computing technologies.
Highlighting relevant topics including grid computing, mobile
computing, open source virtualization, and virtualization in
education, this scholarly reference source is ideal for computer
engineers, academicians, students, and researchers that are
interested in learning more about how to infuse current cloud
computing technologies with virtualization advancements.
In the era of cyber-physical systems, the area of control of
complex systems has grown to be one of the hardest in terms of
algorithmic design techniques and analytical tools. The 23
chapters, written by international specialists in the field, cover
a variety of interests within the broader field of learning,
adaptation, optimization and networked control. The editors have
grouped these into the following 5 sections: "Introduction and
Background on Control Theory", "Adaptive Control and Neuroscience",
"Adaptive Learning Algorithms", "Cyber-Physical Systems and
Cooperative Control", "Applications". The diversity of the research
presented gives the reader a unique opportunity to explore a
comprehensive overview of a field of great interest to control and
system theorists. This book is intended for researchers and control
engineers in machine learning, adaptive control, optimization and
automatic control systems, including Electrical Engineers, Computer
Science Engineers, Mechanical Engineers, Aerospace/Automotive
Engineers, and Industrial Engineers. It could be used as a text or
reference for advanced courses in complex control systems. *
Collection of chapters from several well-known professors and
researchers that will showcase their recent work * Presents
different state-of-the-art control approaches and theory for
complex systems * Gives algorithms that take into consideration the
presence of modelling uncertainties, the unavailability of the
model, the possibility of cooperative/non-cooperative goals and
malicious attacks compromising the security of networked teams *
Real system examples and figures throughout, make ideas concrete
As technology continues to evolve in organizations, it is vital to
understand the impact that these advances will have on different
aspects of the business environment as well as the opportunity for
further improvement. Effects of IT on Enterprise Architecture,
Governance, and Growth explores the influence of emerging
technology on different viewpoints associated with contemporary
enterprise. Emphasizing an interdisciplinary approach to the
comprehension of organizational structure and dynamics, this book
is an inclusive reference source for enterprise analysts, business
managers, and IT managers, as well as upper-level students
interested in a new framework for understanding business enterprise
in the new digital era.
GBBS Pro is a user-friendly, highly-modifiable Bulletin Board
System (BBS) for communications and entertainment. It has advanced
features that can be configured by a novice, yet challenge advanced
programmers. Originally released between 1980 and 1990 for Apple II
computers, this new version features Y2K compatibility and improved
reliability. Experience the world of BBS's from days gone by and
start your own BBS system! GBBS Pro Features: Multiple Bulletin
Boards, Private Electronic Mail, Full Editor, Downloads/Uploads,
Voting/Survey, Expandable Features, Modem Support, and
Internet-capable. Over 240 pages of expanded documentation,
tutorials, GBBS development history, as well as forwards from Kevin
M. Smallwood and experienced BBS sysops.
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
Between adolescence and adulthood, individuals begin to explore
themselves mentally and emotionally in an attempt to figure out who
they are and where they fit in society. Social technologies in the
modern age have ushered in an era where these evolving adolescents
must circumvent the negative pressures of online influences while
also still trying to learn how to be utterly independent. Recent
Advances in Digital Media Impacts on Identity, Sexuality, and
Relationships is a collection of critical reference materials that
provides imperative research on identity exploration in emerging
adults and examines how digital media is used to help explore and
develop one's identity. While highlighting topics such as mobile
addiction, online intimacy, and cyber aggression, this publication
explores a crucial developmental period in the human lifespan and
how digital media hinders (or helps) maturing adults navigate life.
This book is ideally designed for therapists, psychologists,
sociologists, psychiatrists, researchers, educators, academicians,
and professionals.
The development of artificial intelligence (AI) involves the
creation of computer systems that can do activities that would
ordinarily require human intelligence, such as visual perception,
speech recognition, decision making, and language translation.
Through increasingly complex programming approaches, it has been
transforming and advancing the discipline of computer science.
Artificial Intelligence Methods and Applications in Computer
Engineering illuminates how today's computer engineers and
scientists can use AI in real-world applications. It focuses on a
few current and emergent AI applications, allowing a more in-depth
discussion of each topic. Covering topics such as biomedical
research applications, navigation systems, and search engines, this
premier reference source is an excellent resource for computer
scientists, computer engineers, IT managers, students and educators
of higher education, librarians, researchers, and academicians.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|