|
|
Books > Computing & IT
Clinical Engineering: A Handbook for Clinical and Biomedical
Engineers, Second Edition, helps professionals and students in
clinical engineering successfully deploy medical technologies. The
book provides a broad reference to the core elements of the
subject, drawing from a range of experienced authors. In addition
to engineering skills, clinical engineers must be able to work with
both patients and a range of professional staff, including
technicians, clinicians and equipment manufacturers. This book will
not only help users keep up-to-date on the fast-moving scientific
and medical research in the field, but also help them develop
laboratory, design, workshop and management skills. The updated
edition features the latest fundamentals of medical technology
integration, patient safety, risk assessment and assistive
technology.
Advances in Imaging and Electron Physics, Volume 227 in the
Advances in Imaging and Electron Physics series, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features articles on the physics of electron devices (especially
semiconductor devices), particle optics at high and low energies,
microlithography, image science, digital image processing,
electromagnetic wave propagation, electron microscopy and the
computing methods used in all these domains.
Through an array of detailed case studies, this book explores the
vibrant digital expressions of diverse groups of Muslim cybernauts:
religious clerics and Sufis, feminists and fashionistas, artists
and activists, hajj pilgrims and social media influencers. These
stories span a vast cultural and geographic landscape—from
Indonesia, Iran, and the Arab Middle East to North America. These
granular case studies contextualize cyber Islam within broader
social trends: racism and Islamophobia, gender dynamics, celebrity
culture, identity politics, and the shifting terrain of
contemporary religious piety and practice. The book’s authors
examine an expansive range of digital multimedia technologies as
primary “texts.” These include websites, podcasts, blogs,
Twitter, Facebook, Instagram, YouTube channels, online magazines
and discussion forums, and religious apps. The contributors also
draw on a range of methodological and theoretical models from
multiple academic disciplines, including communication and media
studies, anthropology, history, global studies, religious studies,
and Islamic studies.
Cellular Internet of Things: From Massive Deployments to Critical
5G Applications, Second Edition, gives insights into the recent and
rapid work performed by the 3rd Generation Partnership Project
(3GPP) and the Multefire Alliance (MFA) to develop systems for the
Cellular IoT. Beyond the technologies, readers will learn what the
mMTC and cMTC market segments look like, deployment options and
expected performance in terms of system capacity, expected battery
lifetime, data throughput, access delay time and device cost,
regulations for operation in unlicensed frequency bands, and how
they impact system design and performance. This new edition
contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT
features in 3GPP Release 15, critical communication, i.e. URLLC,
specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT
for unlicensed frequency bands specified in the Multefire Alliance
(MFA), and an updated outlook of what the future holds in
Industrial IoT and drone communications, amongst other topics.
Exam Board: Pearson BTEC Academic Level: BTEC National Subject:
Computing First teaching: September 2016 First Exams: Summer 2017
For all four of the externally assessed units 1, 2, 3 and 4. Builds
confidence with scaffolded practice questions. Unguided questions
that allow students to test their own knowledge and skills in
advance of assessment. Clear unit-by-unit correspondence between
this Workbook and the Revision Guide and ActiveBook.
Handbook of Research on Blockchain Technology presents the latest
information on the adaptation and implementation of Blockchain
technologies in real world business, scientific, healthcare and
biomedical applications. The book's editors present the rapid
advancements in existing business models by applying Blockchain
techniques. Novel architectural solutions in the deployment of
Blockchain comprise the core aspects of this book. Several use
cases with IoT, biomedical engineering, and smart cities are also
incorporated. As Blockchain is a relatively new technology that
exploits decentralized networks and is used in many sectors for
reliable, cost-effective and rapid business transactions, this book
is a welcomed addition on existing knowledge. Financial services,
retail, insurance, logistics, supply chain, public sectors and
biomedical industries are now investing in Blockchain research and
technologies for their business growth. Blockchain prevents double
spending in financial transactions without the need of a trusted
authority or central server. It is a decentralized ledger platform
that facilitates verifiable transactions between parties in a
secure and smart way.
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
In the computer science industry, high levels of performance remain
the focal point in software engineering. This quest has made
current systems exceedingly complex, as practitioners strive to
discover novel approaches to increase the capabilities of modern
computer structures. A prevalent area of research in recent years
is scalable transaction processing and its usage in large databases
and cloud computing. Despite its popularity, there remains a need
for significant research in the understanding of scalability and
its performance within distributed databases. Handling Priority
Inversion in Time-Constrained Distributed Databases provides
emerging research exploring the theoretical and practical aspects
of database transaction processing frameworks and improving their
performance using modern technologies and algorithms. Featuring
coverage on a broad range of topics such as consistency mechanisms,
real-time systems, and replica management, this book is ideally
designed for IT professionals, computing specialists, developers,
researchers, data engineers, executives, academics, and students
seeking research on current trends and developments in distributed
computing and databases.
Air Route Networks through Complex Networks Theory connects theory
research with network connectivity analysis, providing
practitioners with the tools they need to develop more efficient,
resilient and profitable air route networks. The book helps airline
route planners and executives create more robust route networks
that are less vulnerable to disruptions, such as node isolation.
The book further explores errors and attacks in complex networks,
strategies for detecting critical nodes and cascading failure
models to assess and maximize robustness. The book explains how to
measure air route network connectivity with complex network
representations. Air transport is among the most dynamic and
toughest competition industries in today's global economy. The
quality of air route network design is a key strategic factor in an
airline's viability. These robust networks provide for more stable
and secure carrier operations vs. those based simply on existing
supply and demand volumes. Node-specific and network-specific
representations are covered, along with in-depth coverage of
connectivity in special and temporal networks. These collective
tools serve as a guide for practitioners seeking to apply complex
network theory to the airline industry.
Dielectric Metamaterials: Fundamentals, Designs, and Applications
links fundamental Mie scattering theory with the latest dielectric
metamaterial research, providing a valuable reference for new and
experienced researchers in the field. The book begins with a
historical, evolving overview of Mie scattering theory. Next, the
authors describe how to apply Mie theory to analytically solve the
scattering of electromagnetic waves by subwavelength particles.
Later chapters focus on Mie resonator-based metamaterials, starting
with microwaves where particles are much smaller than the free
space wavelengths. In addition, several chapters focus on
wave-front engineering using dielectric metasurfaces and the
nonlinear optical effects, spontaneous emission manipulation,
active devices, and 3D effective media using dielectric
metamaterials.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
The transition towards exascale computing has resulted in major
transformations in computing paradigms. The need to analyze and
respond to such large amounts of data sets has led to the adoption
of machine learning (ML) and deep learning (DL) methods in a wide
range of applications. One of the major challenges is the fetching
of data from computing memory and writing it back without
experiencing a memory-wall bottleneck. To address such concerns,
in-memory computing (IMC) and supporting frameworks have been
introduced. In-memory computing methods have ultra-low power and
high-density embedded storage. Resistive Random-Access Memory
(ReRAM) technology seems the most promising IMC solution due to its
minimized leakage power, reduced power consumption and smaller
hardware footprint, as well as its compatibility with CMOS
technology, which is widely used in industry. In this book, the
authors introduce ReRAM techniques for performing distributed
computing using IMC accelerators, present ReRAM-based IMC
architectures that can perform computations of ML and
data-intensive applications, as well as strategies to map ML
designs onto hardware accelerators. The book serves as a bridge
between researchers in the computing domain (algorithm designers
for ML and DL) and computing hardware designers.
|
|