|
Books > Computing & IT
If you look around you will find that all computer systems, from
your portable devices to the strongest supercomputers, are
heterogeneous in nature. The most obvious heterogeneity is the
existence of computing nodes of different capabilities (e.g.
multicore, GPUs, FPGAs, ...). But there are also other
heterogeneity factors that exist in computing systems, like the
memory system components, interconnection, etc. The main reason for
these different types of heterogeneity is to have good performance
with power efficiency. Heterogeneous computing results in both
challenges and opportunities. This book discusses both. It shows
that we need to deal with these challenges at all levels of the
computing stack: from algorithms all the way to process technology.
We discuss the topic of heterogeneous computing from different
angles: hardware challenges, current hardware state-of-the-art,
software issues, how to make the best use of the current
heterogeneous systems, and what lies ahead. The aim of this book is
to introduce the big picture of heterogeneous computing. Whether
you are a hardware designer or a software developer, you need to
know how the pieces of the puzzle fit together. The main goal is to
bring researchers and engineers to the forefront of the research
frontier in the new era that started a few years ago and is
expected to continue for decades. We believe that academics,
researchers, practitioners, and students will benefit from this
book and will be prepared to tackle the big wave of heterogeneous
computing that is here to stay.
The internet of things (IoT) has emerged as a trending technology
that is continually being implemented into various practices within
the field of engineering and science due to its versatility and
various benefits. Despite the levels of innovation that IoT
provides, researchers continue to search for networks that maintain
levels of sustainability and require fewer resources. A network
that measures up to these expectations is Narrowband IoT (NBIoT),
which is a low power wide area version of IoT networks and is
suitable for larger projects. Engineers and other industry
professionals are in need of in-depth knowledge on this growing
technology and its various applications. Principles and
Applications of Narrowband Internet of Things (NBIoT) is an
essential reference source that provides an in-depth understanding
on the recent advancements of NBIoT as well as the crucial roles of
emerging low power IoT networks in various regions of the world.
Featuring research on topics such as security monitoring,
sustainability, and cloud infrastructure, this book is ideally
designed for developers, engineers, practitioners, researchers,
students, managers, and policymakers seeking coverage on the
large-scale deployment and modern applications of NBIoT.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
There is a significant deficiency among contemporary medicine
practices reflected by experts making medical decisions for a large
proportion of the population for which no or minimal data exists.
Fortunately, our capacity to procure and apply such information is
rapidly rising. As medicine becomes more individualized, the
implementation of health IT and data interoperability become
essential components to delivering quality healthcare. Quality
Assurance in the Era of Individualized Medicine is a collection of
innovative research on the methods and utilization of digital
readouts to fashion an individualized therapy instead of a
mass-population-directed strategy. While highlighting topics
including assistive technologies, patient management, and clinical
practices, this book is ideally designed for health professionals,
doctors, nurses, hospital management, medical administrators, IT
specialists, data scientists, researchers, academicians, and
students.
A crash course into 8086/8088 assembler programming, in an easy way
with practice at each step. You will learn how to use the
registers, move data, do arithmetic, and handle text and graphics.
You can run these programs on any PC machine and no program exceeds
512 bytes of executable code! The example programs include: * Guess
the number. * Tic-Tac-Toe game. * Text graphics. * Mandelbrot set.
* F-Bird game. * Invaders game. * Pillman game. * Toledo Atomchess.
* bootBASIC language.
The Etch-a-Sketch and Other Fun Programs is a collection of Apple
II software programmed by a student in the 1980s. BASIC and machine
language programming were once taught in schools, and here you'll
find a variety of useful graphics, education, utility, and game
software. The author also shares stories about his programming
experiences in school. Features 13 Programs Including: - The
Etch-a-Sketch - fun drawing with keyboard, joystick, and sound. -
The Apple - the six color logo in beautiful lo-res. - Annual Graph
Matrix - graph monthly amounts for one year. - Compound Interest -
calculate investment interest over time. - States & Capitals -
learn about the U.S. through quizzes. - H - a powerful HELLO
program for launching files in DOS 3.3. - Random Access Filer - a
simple text database for contacts. - Tunnel Race - dodge obstacles
through a text-based cavern. - Joystick Calibration - optimize your
entertainment device.
Cultural tourism, domestic and international, is comprised of
travel that takes people out of their usual environments and
focuses on activities that are related to the cultural aspects of
an area. Rapid progress in technology, especially the advancement
of mobile applications, has changed various aspects of travel,
especially in areas such as transportation. Cultural Tourism in the
Wake of Web Innovation: Emerging Research and Opportunities is an
essential scholarly book that examines revolutionary changes taking
place in the field of cultural tourism that are a result of the
applications of web-based and other information technologies
including Web 2.0 innovations, locational technologies, and digital
imaging. It features a wide range of topics such as economic
development, mobile applications, and green development, and is
intended for use by hotel management, travel agents, event
organizers and planners, airline managers, academicians,
researchers, students, and professionals in the tourism and
hospitality industry.
The Fourth Industrial Revolution revolves around cyber-physical
systems and artificial intelligence. Little is certain about this
new wave of innovation, which leaves industrialists and educators
in the lurch without much guidance on adapting to this new digital
landscape. Society must become more agile and place a higher
emphasis on lifelong learning to master new technologies in order
to stay ahead of the changes and overcome challenges to become more
globally competitive. Promoting Inclusive Growth in the Fourth
Industrial Revolution is a collection of innovative research that
focuses on the role of formal education in preparing students for
uncertain futures and for societies that are changing at great
speed in terms of their abilities to drive job creation, economic
growth, and prosperity for millions in the future. Featuring
coverage on a broad range of topics including economics, higher
education, and safety and regulation, this book is ideally designed
for teachers, managers, entrepreneurs, economists, policymakers,
academicians, researchers, students, and professionals in the
fields of human resources, organizational design, learning design,
information technology, and e-learning.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
Reinforcement learning (RL) is one of the foundational pillars of
artificial intelligence and machine learning. An important
consideration in any optimization or control problem is the notion
of risk, but its incorporation into RL has been a fairly recent
development. This monograph surveys research on risk-sensitive RL
that uses policy gradient search. The authors survey some of the
recent work in this area specifically where policy gradient search
is the solution approach. In the first risk-sensitive RL setting,
they cover popular risk measures based on variance, conditional
value at-risk and chance constraints, and present a template for
policy gradient-based risk-sensitive RL algorithms using a
Lagrangian formulation. For the setting where risk is incorporated
directly into the objective function, they consider an exponential
utility formulation, cumulative prospect theory, and coherent risk
measures. Written for novices and experts alike the authors have
made the text completely self-contained but also organized in a
manner that allows expert readers to skip background chapters. This
is a complete guide for students and researchers working on this
aspect of machine learning.
Internet of things (IoT) is an emerging research field that is
rapidly becoming an important part of our everyday lives including
home automation, smart buildings, smart things, and more. This is
due to cheap, efficient, and wirelessly-enabled circuit boards that
are enabling the functions of remote sensing/actuating,
decentralization, autonomy, and other essential functions.
Moreover, with the advancements in embedded artificial
intelligence, these devices are becoming more self-aware and
autonomous, hence making decisions themselves. Current research is
devoted to the understanding of how decision support systems are
integrated into industrial IoT. Decision Support Systems and
Industrial IoT in Smart Grid, Factories, and Cities presents the
internet of things and its place during the technological
revolution, which is taking place now to bring us a better,
sustainable, automated, and safer world. This book also covers the
challenges being faced such as relations and implications of IoT
with existing communication and networking technologies;
applications like practical use-case scenarios from the real world
including smart cities, buildings, and grids; and topics such as
cyber security, user privacy, data ownership, and information
handling related to IoT networks. Additionally, this book focuses
on the future applications, trends, and potential benefits of this
new discipline. This book is essential for electrical engineers,
computer engineers, researchers in IoT, security, and smart cities,
along with practitioners, researchers, academicians, and students
interested in all aspects of industrial IoT and its applications.
The internet of things (IoT) has had a major impact on academic and
industrial fields. Applying these technologies to healthcare
systems reduces medical costs while enriching the patient-centric
approach to medicine, allowing for better overall healthcare
proficiency. However, usage of IoT in healthcare is still suffering
from significant challenges with respect to the cost and accuracy
of medical sensors, non-standard IoT system architectures, assorted
wearable devices, the huge volume of generated data, and
interoperability issues. Incorporating the Internet of Things in
Healthcare Applications and Wearable Devices is an essential
publication that examines existing challenges and provides
solutions for building smart healthcare systems with the latest
IoT-enabled technology and addresses how IoT improves the
proficiency of healthcare with respect to wireless sensor networks.
While highlighting topics including mobility management, sensor
integration, and data analytics, this book is ideally designed for
computer scientists, bioinformatics analysts, doctors, nurses,
hospital executives, medical students, IT specialists, software
developers, computer engineers, industry professionals,
academicians, researchers, and students seeking current research on
how these emerging wireless technologies improve efficiency within
the healthcare domain.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|