|
|
Books > Computing & IT
Edsger Wybe Dijkstra (1930-2002) was one of the most influential
researchers in the history of computer science, making fundamental
contributions to both the theory and practice of computing. Early
in his career, he proposed the single-source shortest path
algorithm, now commonly referred to as Dijkstra's algorithm. He
wrote (with Jaap Zonneveld) the first ALGOL 60 compiler, and
designed and implemented with his colleagues the influential THE
operating system. Dijkstra invented the field of concurrent
algorithms, with concepts such as mutual exclusion, deadlock
detection, and synchronization. A prolific writer and forceful
proponent of the concept of structured programming, he convincingly
argued against the use of the Go To statement. In 1972 he was
awarded the ACM Turing Award for "fundamental contributions to
programming as a high, intellectual challenge; for eloquent
insistence and practical demonstration that programs should be
composed correctly, not just debugged into correctness; for
illuminating perception of problems at the foundations of program
design." Subsequently he invented the concept of self-stabilization
relevant to fault-tolerant computing. He also devised an elegant
language for nondeterministic programming and its weakest
precondition semantics, featured in his influential 1976 book A
Discipline of Programming in which he advocated the development of
programs in concert with their correctness proofs. In the later
stages of his life, he devoted much attention to the development
and presentation of mathematical proofs, providing further support
to his long-held view that the programming process should be viewed
as a mathematical activity. In this unique new book, 31 computer
scientists, including five recipients of the Turing Award, present
and discuss Dijkstra's numerous contributions to computing science
and assess their impact. Several authors knew Dijkstra as a friend,
teacher, lecturer, or colleague. Their biographical essays and
tributes provide a fascinating multi-author picture of Dijkstra,
from the early days of his career up to the end of his life.
AI-ENABLED 6G NETWORKS AND APPLICATIONS Provides authoritative
guidance on utilizing AI techniques in 6G network design and
optimization Written and edited by active researchers, this book
covers hypotheses and practical considerations and provides
insights into the design of evolutionary AI algorithms for 6G
networks, with focus on network transparency, interpretability and
simulatability for vehicular networks, space systems, surveillance
systems and their usages in different emerging engineering fields.
AI-Enabled 6G Networks and Applications includes a review of AI
techniques for 6G Networks and will focus on deployment of AI
techniques to efficiently and effectively optimize the network
performance, including AI-empowered mobile edge computing,
intelligent mobility and handover management, and smart spectrum
management. This book includes the design of a set of evolutionary
AI hybrid algorithms with communication protocols, showing how to
use them in practice to solve problems relating to vehicular
networks, aerial networks, and communication networks. Reviews
various types of AI techniques such as AI-empowered mobile edge
computing, intelligent handover management, and smart spectrum
management Describes how AI techniques manage computation
efficiency, algorithm robustness, hardware development, and energy
management Identifies and provides solutions to problems in current
4G/5G networks and emergent 6G architectures Discusses privacy and
security issues in IoT-enabled 6G Networks Examines the use of
machine learning to achieve closed-loop optimization and
intelligent wireless communication AI-Enabled 6G Networks and
Applications is an essential reference guide to advanced hybrid
computational intelligence methods for 6G supportive networks and
protocols, suitable for graduate students and researchers in
network forensics and optimization, computer science, and
engineering.
Mathematical and numerical modelling of engineering problems in
medicine is aimed at unveiling and understanding multidisciplinary
interactions and processes and providing insights useful to
clinical care and technology advances for better medical equipment
and systems. When modelling medical problems, the engineer is
confronted with multidisciplinary problems of electromagnetism,
heat and mass transfer, and structural mechanics with, possibly,
different time and space scales, which may raise concerns in
formulating consistent, solvable mathematical models. Computational
Medical Engineering presents a number of engineering for medicine
problems that may be encountered in medical physics, procedures,
diagnosis and monitoring techniques, including electrical activity
of the heart, hemodynamic activity monitoring, magnetic drug
targeting, bioheat models and thermography, RF and microwave
hyperthermia, ablation, EMF dosimetry, and bioimpedance methods.
The authors discuss the core approach methodology to pose and solve
different problems of medical engineering, including essentials of
mathematical modelling (e.g., criteria for well-posed problems);
physics scaling (homogenization techniques); Constructal Law
criteria in morphing shape and structure of systems with internal
flows; computational domain construction (CAD and, or
reconstruction techniques based on medical images); numerical
modelling issues, and validation techniques used to ascertain
numerical simulation results. In addition, new ideas and venues to
investigate and understand finer scale models and merge them into
continuous media medical physics are provided as case studies.
Recent advancements in the technology of medical imaging, such as
CT and MRI scanners, are making it possible to create more detailed
3D and 4D images. These powerful images require vast amounts of
digital data to help with the diagnosis of the patient. Artificial
intelligence (AI) must play a vital role in supporting with the
analysis of this medical imaging data, but it will only be viable
as long as healthcare professionals and AI interact to embrace deep
thinking platforms such as automation in the identification of
diseases in patients. AI Innovation in Medical Imaging Diagnostics
is an essential reference source that examines AI applications in
medical imaging that can transform hospitals to become more
efficient in the management of patient treatment plans through the
production of faster imaging and the reduction of radiation dosages
through the PET and SPECT imaging modalities. The book also
explores how data clusters from these images can be translated into
small data packages that can be accessed by healthcare departments
to give a real-time insight into patient care and required
interventions. Featuring research on topics such as assistive
healthcare, cancer detection, and machine learning, this book is
ideally designed for healthcare administrators, radiologists, data
analysts, computer science professionals, medical imaging
specialists, diagnosticians, medical professionals, researchers,
and students.
Most of our everyday life experiences are multisensory in nature;
that is, they consist of what we see, hear, feel, taste, smell, and
much more. Almost any experience you can think of, such as eating a
meal or going to the cinema, involves a magnificent sensory world.
In recent years, many of these experiences have been increasingly
transformed and capitalised on through advancements that adapt the
world around us - through technology, products, and services - to
suit our ever more computerised environment. Multisensory
Experiences: Where the senses meet technology looks at this trend
and offers a comprehensive introduction to the dynamic world of
multisensory experiences and design. It takes the reader from the
fundamentals of multisensory experiences, through the relationship
between the senses and technology, to finally what the future of
those experiences may look like, and our responsibility in it. This
book empowers you to shape your own and other people's experiences
by considering the multisensory worlds that we live in through a
journey that marries science and practice. It also shows how we can
take advantage of the senses and how they shape our experiences
through intelligent technological design.
The Definitive Guide to Arm (R) Cortex (R)-M23 and Cortex-M33
Processors focuses on the Armv8-M architecture and the features
that are available in the Cortex-M23 and Cortex- M33 processors.
This book covers a range of topics, including the instruction set,
the programmer's model, interrupt handling, OS support, and debug
features. It demonstrates how to create software for the Cortex-M23
and Cortex-M33 processors by way of a range of examples, which will
enable embedded software developers to understand the Armv8-M
architecture. This book also covers the TrustZone (R) technology in
detail, including how it benefits security in IoT applications, its
operations, how the technology affects the processor's hardware
(e.g., memory architecture, interrupt handling, etc.), and various
other considerations in creating secure software.
This book examines the tangled responsibilities of states,
companies, and individuals surrounding human rights in the digital
age. Digital technologies have a huge impact – for better and
worse – on human lives; while they can clearly enhance some human
rights, they also facilitate a wide range of violations. States are
expected to implement efficient measures against powerful private
companies, but, at the same time, they are drawn to technologies
that extend their own control over citizens. Tech companies are
increasingly asked to prevent violations committed online by their
users, yet many of their business models depend on the accumulation
and exploitation of users’ personal data. While civil society has
a crucial part to play in upholding human rights, it is also the
case that individuals harm other individuals online. All three
stakeholders need to ensure that technology does not provoke the
disintegration of human rights. Bringing together experts from a
range of disciplines, including law, international relations, and
journalism, this book provides a detailed analysis of the impact of
digital technologies on human rights, which will be of interest to
academics, research students and professionals concerned by this
issue.
The internet of things (IoT) revolution has given rise to smart
cities and villages all over the world. With technology
advancements such as cloud computing, fog computing, and
software-defined networking, it is necessary to examine ways that
these environments can implement innovation for cost-effective
citizen services and e-governance. Also, as cyber-physical systems
are becoming more vulnerable with IoT attacks threatening their
security and privacy, there is an even greater need for solutions
that offer protection for all of these advancing technologies. The
Handbook of Research on Implementation and Deployment of IoT
Projects in Smart Cities is an essential research publication that
combines theory and practice, reflecting on advancing technologies
for the automation, protection, and sustainability of urban
environments. Highlighting a wide range of topics such as
blockchain, smart grid, and sustainability, this book is ideal for
researchers, academicians, scientists, engineers, programmers, IT
consultants, professionals, and policymakers.
In order to study living organisms, scientists not only study them
at an overall macroscopic scale but also on a more detailed
microscopic scale. This observation, pushed to its limits, consists
of investigating the very center of each cell, where we find the
molecules that determine the way it functions: DNA
(deoxyribonucleic acid) and RNA (ribonucleic acid). In an organism,
DNA carries the genetic information, which is called the genome. It
is represented as four-letter sequences using the letters A, C, G
and T; based on these sequences, computer methods described in this
book can answer fundamental questions in bioinformatics. This book
explores how to quickly find sequences of a few hundred nucleotides
within a genome that may be made up of several billion, how to
compare those sequences and how to reconstruct the complete
sequence of a genome. It also discusses the problems of identifying
bacteria in a given environment and predicting the structure of RNA
based on its sequence.
Strategy, Leadership and AI in the Cyber Ecosystem investigates the
restructuring of the way cybersecurity and business leaders engage
with the emerging digital revolution towards the development of
strategic management, with the aid of AI, and in the context of
growing cyber-physical interactions (human/machine co-working
relationships). The book explores all aspects of strategic
leadership within a digital context. It investigates the
interactions from both the firm/organization strategy perspective,
including cross-functional actors/stakeholders who are operating
within the organization and the various characteristics of
operating in a cyber-secure ecosystem. As consumption and reliance
by business on the use of vast amounts of data in operations
increase, demand for more data governance to minimize the issues of
bias, trust, privacy and security may be necessary. The role of
management is changing dramatically, with the challenges of
Industry 4.0 and the digital revolution. With this intelligence
explosion, the influence of artificial intelligence technology and
the key themes of machine learning, big data, and digital twin are
evolving and creating the need for cyber-physical management
professionals.
Child and Adolescent Online Risk Exposure: An Ecological
Perspective focuses on online risks and outcomes for children and
adolescents using an ecological perspective (i.e., the intersection
of individuals in relevant contexts) for a better understanding of
risks associated with the youth online experience. The book
examines the specific consequences of online risks for youth and
demonstrates how to develop effective and sensitive interventions
and policies. Sections discuss why online risks are important,
individual and contextual factors, different types of risk, online
risks among special populations, such as LGBT youth, physically or
intellectually disabled youth, and ethnic and religious minorities,
and intervention efforts.
E-health applications such as tele-medicine, tele-radiology,
tele-ophthalmology, and tele-diagnosis are very promising and have
immense potential to improve global healthcare. They can improve
access, equity, and quality through the connection of healthcare
facilities and healthcare professionals, diminishing geographical
and physical barriers. One critical issue, however, is related to
the security of data transmission and access to the technologies of
medical information. Currently, medical-related identity theft
costs billions of dollars each year and altered medical information
can put a person's health at risk through misdiagnosis, delayed
treatment or incorrect prescriptions. Yet, the use of hand-held
devices for storing, accessing, and transmitting medical
information is outpacing the privacy and security protections on
those devices. Researchers are starting to develop some
imperceptible marks to ensure the tamper-proofing, cost effective,
and guaranteed originality of the medical records. However, the
robustness, security and efficient image archiving and retrieval of
medical data information against these cyberattacks is a
challenging area for researchers in the field of e-health
applications. Intelligent Data Security Solutions for e-Health
Applications focuses on cutting-edge academic and industry-related
research in this field, with particular emphasis on
interdisciplinary approaches and novel techniques to provide
security solutions for smart applications. The book provides an
overview of cutting-edge security techniques and ideas to help
graduate students, researchers, as well as IT professionals who
want to understand the opportunities and challenges of using
emerging techniques and algorithms for designing and developing
more secure systems and methods for e-health applications.
|
|