|
|
Books > Computing & IT
Systems Analysis and Synthesis: Bridging Computer Science and
Information Technology presents several new graph-theoretical
methods that relate system design to core computer science
concepts, and enable correct systems to be synthesized from
specifications. Based on material refined in the author's
university courses, the book has immediate applicability for
working system engineers or recent graduates who understand
computer technology, but have the unfamiliar task of applying their
knowledge to a real business problem. Starting with a comparison of
synthesis and analysis, the book explains the fundamental building
blocks of systems-atoms and events-and takes a graph-theoretical
approach to database design to encourage a well-designed schema.
The author explains how database systems work-useful both when
working with a commercial database management system and when
hand-crafting data structures-and how events control the way data
flows through a system. Later chapters deal with system dynamics
and modelling, rule-based systems, user psychology, and project
management, to round out readers' ability to understand and solve
business problems.
MESH ist ein mathematisches Video ber vielfl chige Netzwerke und
ihre Rolle in der Geometrie, der Numerik und der Computergraphik.
Der unter Anwendung der neuesten Technologie vollst ndig
computergenierte Film spannt einen Bogen von der antiken
griechischen Mathematik zum Gebiet der heutigen geometrischen
Modellierung. MESH hat zahlreiche wissenschaftliche Preise weltweit
gewonnen. Die Autoren sind Konrad Polthier, ein Professor der
Mathematik, und Beau Janzen, ein professioneller Filmdirektor.
Der Film ist ein ausgezeichnetes Lehrmittel f r Kurse in
Geometrie, Visualisierung, wissenschaftlichem Rechnen und
geometrischer Modellierung an Universit ten, Zentren f r
wissenschaftliches Rechnen, kann jedoch auch an Schulen genutzt
werden.
Analyzing data sets has continued to be an invaluable application
for numerous industries. By combining different algorithms,
technologies, and systems used to extract information from data and
solve complex problems, various sectors have reached new heights
and have changed our world for the better. The Handbook of Research
on Engineering, Business, and Healthcare Applications of Data
Science and Analytics is a collection of innovative research on the
methods and applications of data analytics. While highlighting
topics including artificial intelligence, data security, and
information systems, this book is ideally designed for researchers,
data analysts, data scientists, healthcare administrators,
executives, managers, engineers, IT consultants, academicians, and
students interested in the potential of data application
technologies.
Fog computing is quickly increasing its applications and uses to
the next level. As it continues to grow, different types of
virtualization technologies can thrust this branch of computing
further into mainstream use. The Handbook of Research on Cloud and
Fog Computing Infrastructures for Data Science is a key reference
volume on the latest research on the role of next-generation
systems and devices that are capable of self-learning and how those
devices will impact society. Featuring wide-ranging coverage across
a variety of relevant views and themes such as cognitive analytics,
data mining algorithms, and the internet of things, this
publication is ideally designed for programmers, IT professionals,
students, researchers, and engineers looking for innovative
research on software-defined cloud infrastructures and
domain-specific analytics.
Malware Diffusion Models for Wireless Complex Networks: Theory and
Applications provides a timely update on malicious software
(malware), a serious concern for all types of network users, from
laymen to experienced administrators. As the proliferation of
portable devices, namely smartphones and tablets, and their
increased capabilities, has propelled the intensity of malware
spreading and increased its consequences in social life and the
global economy, this book provides the theoretical aspect of
malware dissemination, also presenting modeling approaches that
describe the behavior and dynamics of malware diffusion in various
types of wireless complex networks. Sections include a systematic
introduction to malware diffusion processes in computer and
communications networks, an analysis of the latest state-of-the-art
malware diffusion modeling frameworks, such as queuing-based
techniques, calculus of variations based techniques, and game
theory based techniques, also demonstrating how the methodologies
can be used for modeling in more general applications and practical
scenarios.
From the chaos of the early DARPA, ARPANET and NSF-funded NSFNET
has emerged a globe-spanning communications facility we today call
simply "The Internet." It has become so commonplace and so taken
for granted that Wired News has decreed that writers should no
longer capitalize it. This tale is not singularly focused on the
past. It tells not only how we got here, but where we think the
Commercial Internet must go. For all its greatness, today's
Internet has serious shortcomings. Theft of personal data, identity
theft, online scams, and advertising fraud run rampant, with online
dollars diverted to organized crime. Insecure systems, poor
security practices and an attitude of secrecy and reluctance to
acknowledge failings inhibit real solutions. We propose a way
forward, a networking future that is bright, optimistic, and
secure.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Repetitive Project Scheduling: Theory and Methods is the first book
to comprehensively, and systematically, review new methods for
scheduling repetitive projects that have been developed in response
to the weaknesses of the most popular method for project
scheduling, the Critical Path Method (CPM). As projects with
significant levels of repetitive scheduling are common in
construction and engineering, especially construction of buildings
with multiple stories, highways, tunnels, pipelines, power
distribution networks, and so on, the book fills a much needed gap,
introducing the main repetitive project scheduling methods, both
comprehensively and systematically. Users will find valuable
information on core methodologies, including how to identify the
controlling path and controlling segment, how to convert RSM to a
network model, and examples based on practical scheduling problems.
Research in the domains of learning analytics and educational data
mining has prototyped an approach where methodologies from data
science and machine learning are used to gain insights into the
learning process by using large amounts of data. As many training
and academic institutions are maturing in their data-driven
decision making, useful, scalable, and interesting trends are
emerging. Organizations can benefit from sharing information on
those efforts. Applying Data Science and Learning Analytics
Throughout a Learner's Lifespan examines novel and emerging
applications of data science and sister disciplines for gaining
insights from data to inform interventions into learners' journeys
and interactions with academic institutions. Data is collected at
various times and places throughout a learner's lifecycle, and the
learners and the institution should benefit from the insights and
knowledge gained from this data. Covering topics such as learning
analytics dashboards, text network analysis, and employment
recruitment, this book is an indispensable resource for educators,
computer scientists, faculty of higher education, government
officials, educational administration, students of higher
education, pre-service teachers, business professionals,
researchers, and academicians.
As various areas of discipline continue to progress into the
digital age, diverse modes of technology are being experimented
with and ultimately implemented into common practices. Mobile
products and interactive devices, specifically, are being tested
within educational environments as well as corporate business in
support of online learning and e-commerce initiatives. There is a
boundless stock of factors that play a role in successfully
implementing web technologies and user-driven learning strategies,
which require substantial research for executives and
administrators in these fields. Handbook of Research on User
Experience in Web 2.0 Technologies and Its Impact on Universities
and Businesses is an essential reference source that presents
research on the strategic role of user experience in e-learning and
e-commerce at the level of the global economy, networks and
organizations, teams and work groups, and information systems. The
book assesses the impact of e-learning and e-commerce technologies
on different organizations, including higher education
institutions, multinational corporations, health providers, and
business companies. Featuring research on topics such as ubiquitous
interfaces, computer graphics, and image processing, this book is
ideally designed for program developers and designers, researchers,
practitioners, IT professionals, executives, academicians, and
students.
Sudden Cardiac Death (SCD) is a sudden, unexpected death caused by
loss of heart function (sudden cardiac arrest) and Sudden Cardiac
Arrest (SCA) occurs when the electrical system to the heart
malfunctions and suddenly becomes very irregular. Death can often
be a result if not handled quick enough or effectively. New
technologies seek to help with this issue. Data processing is a
crucial step to developing prognostic models. Some of the
challenges in data processing are non-linear prediction models, a
large number of patients and numerous predictors with complicated
correlations. In traditional hypothesis-driven statistical analysis
it is difficult to overcome these challenges. Current approaches to
predict cardiovascular risk fail to identify many people who would
benefit from preventive treatment, while others receive unnecessary
intervention. So, there is an emergent need of an adaptation of AI
technologies such as Machine Learning and Deep Learning Techniques
to overcome the challenges. The Machine Learning (ML) approaches
have great potential in increasing the accuracy of cardiovascular
risk prediction and to avoid unnecessary treatment. The application
of ML techniques may have the potential to improve Heart Failure
outcomes and management, including cost savings by improving
existing diagnostic and treatment support systems. Moreover, ML
algorithms can also be applied to predict SCD. Also, Machine
Learning offers an opportunity to improve accuracy by exploiting
complex interactions between risk factors. The book addresses the
impact and power of technology driven approaches for prevention and
detection of SCA and SCD. It will provide insights on causes and
symptoms of SCA and SCD and evaluate whether AI Technologies can
improve the accuracy of cardiovascular risk prediction. It will
explore the current issues and future technology driven solutions
for SCA and SCD prevention and detection.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Joining a thriving field of new media, this collective volume
authored by global academics features important research by thought
leaders within computer-mediated communication (CMC) and social
media. Featuring 40 comprehensive chapters of new research that
focuses on what is new, relevant, and cutting edge in the areas of
CMC and social media, authors critically explore topics ranging
from social media theories to civil rights. Divided into three
parts, the handbook begins with theory and methods, which sets the
foundation for the text and then moves into the applicability of
strategy, tactics, and measurement. The final focus is toward the
future of CMC and social media and its impact on the study and
practice of communication. Uniquely relating social media
communication research to its computer-mediated communication
foundation, as well as digital and emerging media trends, this
handbook is an indispensable resource whether you're a graduate
student or a seasoned practitioner.
|
|