|
|
Books > Computing & IT > General theory of computing
Algebraic Theory for True Concurrency presents readers with the
algebraic laws for true concurrency. Parallelism and concurrency
are two of the core concepts within computer science. This book
covers the different realms of concurrency, which enables programs,
algorithms or problems to be broken out into order-independent or
partially ordered components to improve computation and execution
speed. There are two primary approaches for executing concurrency:
interleaving concurrency and true concurrency. The main
representative of interleaving concurrency is bisimulation/rooted
branching bisimulation equivalences which is also readily explored.
This work eventually founded the comprehensive axiomatization
modulo bisimulation equivalence -- ACP (Algebra of Communicating
Processes).The other approach to concurrency is true concurrency.
Research on true concurrency is active and includes many emerging
applications. First, there are several truly concurrent
bisimulation equivalences, including: pomset bisimulation
equivalence, step bisimulation equivalence, history-preserving
(hp-) bisimulation equivalence, and hereditary history-preserving
(hhp-) bisimulation equivalence, the most well-known truly
concurrent bisimulation equivalence.
Comprehensive Metaheuristics: Algorithms and Applications presents
the foundational underpinnings of metaheuristics and a broad scope
of algorithms and real-world applications across a variety of
research fields. The book starts with fundamentals, mathematical
prerequisites, and conceptual approaches to provide readers with a
solid foundation. After presenting multi-objective optimization,
constrained optimization, and problem formation for metaheuristics,
world-renowned authors give readers in-depth understanding of the
full spectrum of algorithms and techniques. Scientists,
researchers, academicians, and practitioners who are interested in
optimizing a process or procedure to achieve a goal will benefit
from the case studies of real-world applications from different
domains. The book takes a much-needed holistic approach, putting
the most widely used metaheuristic algorithms together with an
in-depth treatise on multi-disciplinary applications of
metaheuristics. Each algorithm is thoroughly analyzed to observe
its behavior, providing a detailed tutorial on how to solve
problems using metaheuristics. New case studies and research
problem statements are also discussed, which will help researchers
in their application of the concepts.
The Definitive Guide to Arm (R) Cortex (R)-M23 and Cortex-M33
Processors focuses on the Armv8-M architecture and the features
that are available in the Cortex-M23 and Cortex- M33 processors.
This book covers a range of topics, including the instruction set,
the programmer's model, interrupt handling, OS support, and debug
features. It demonstrates how to create software for the Cortex-M23
and Cortex-M33 processors by way of a range of examples, which will
enable embedded software developers to understand the Armv8-M
architecture. This book also covers the TrustZone (R) technology in
detail, including how it benefits security in IoT applications, its
operations, how the technology affects the processor's hardware
(e.g., memory architecture, interrupt handling, etc.), and various
other considerations in creating secure software.
Whether you are a beginner or experienced user, learn about new
features in this version or discover and use some of Word's
functions for the first time. Joan Lambert, author of multiple
books on the Microsoft Office Suite, creator of many Lynda.com
videos and an experienced corporate trainer used her experience and
knowledge to cover the most relevant functions for users at
different levels. Suggested uses: Workplace -- flat for easy
storage and access at a moments notice to find a function you need
to use, or to jog your memory for a function you do not use often;
Company Training -- reduce help-desk calls and keep productivity
flowing for a team or for your entire company;
Students/Teachers/Parents -- help with the learning curve in a
classroom or for your child and any projects requiring Word;
College Students -- make sure you are using features that can make
your life easier.
Originating from papers presented at the 18th International
Conference on Railway Engineering Design and Operation, this book
provides up-to-date research on the use of advanced systems,
promoting their general awareness throughout the management,
design, manufacture and operation of railways and other emerging
passenger, freight and transit systems. A key emphasis is placed on
the use of computer systems in advanced railway engineering. The
included works are compiled from a variety of specialists
interested in the development of railways, including managers,
consultants, railway engineers, designers of advanced train control
systems and computer specialists. Topics covered include: Traffic
safety, security and monitoring; Train and railways analysis;
Operation of rail networks; Advanced train control;
Energy-efficient design; Traffic modelling and simulation.
Lean thinking involves more than just eliminating waste; through
its five guiding principles-value, value chain, continuous flow,
pull production, and perfection-its successful applications are
commonly found in the manufacturing sector. Although its
application and benefits to companies is no longer contested, it is
rare to find works that consolidate applications of lean thinking
in sectors that are unconventional, such as healthcare and
government. Cases on Lean Thinking Applications in Unconventional
Systems allows readers to broaden their view on lean thinking
applications and visualize insights for research. It presents case
studies and applications of lean thinking within several different
industries. Covering topics such as emergency care units,
standardized work, and national humanization policy, this case book
is an essential resource for engineers, hospital administrators,
healthcare professionals, IT managers, government officials,
students and faculty of higher education, researchers, and
academicians.
As technology continues to develop, the healthcare industry must
adapt and implement new technologies and services. Recent
advancements, opportunities, and challenges for bio-medical image
processing and authentication in telemedicine must be considered to
ensure patients receive the best possible care. Advancements in
Bio-Medical Image Processing and Authentication in Telemedicine
introduces recent advancements, opportunities, and challenges for
bio-medical image processing and authentication in telemedicine and
discusses the design of high-accuracy decision support systems.
Covering key topics such as artificial intelligence, medical
imaging, telemedicine, and technology, this premier reference
source is ideal for medical professionals, nurses, policymakers,
researchers, scholars, academicians, practitioners, instructors,
and students.
In today's competitive market, a manager must be able to look at
data, understand it, analyze it, and then interpret it to design a
smart business strategy. Big data is also a valuable source of
information on how customers interact with firms through various
mediums such as social media platforms, online reviews, and many
more. The applications and uses of business analytics are numerous
and must be further studied to ensure they are utilized
appropriately. Data-Driven Approaches for Effective Managerial
Decision Making investigates management concepts and applications
using data analytics and outlines future research directions. The
book also addresses contemporary advancements and innovations in
the field of management. Covering key topics such as big data,
business intelligence, and artificial intelligence, this reference
work is ideal for managers, business owners, industry
professionals, researchers, scholars, academicians, practitioners,
instructors, and students.
Meeting the Challenges of Data Quality Management outlines the
foundational concepts of data quality management and its
challenges. The book enables data management professionals to help
their organizations get more value from data by addressing the five
challenges of data quality management: the meaning challenge
(recognizing how data represents reality), the process/quality
challenge (creating high-quality data by design), the people
challenge (building data literacy), the technical challenge
(enabling organizational data to be accessed and used, as well as
protected), and the accountability challenge (ensuring
organizational leadership treats data as an asset). Organizations
that fail to meet these challenges get less value from their data
than organizations that address them directly. The book describes
core data quality management capabilities and introduces new and
experienced DQ practitioners to practical techniques for getting
value from activities such as data profiling, DQ monitoring and DQ
reporting. It extends these ideas to the management of data quality
within big data environments. This book will appeal to data quality
and data management professionals, especially those involved with
data governance, across a wide range of industries, as well as
academic and government organizations. Readership extends to people
higher up the organizational ladder (chief data officers, data
strategists, analytics leaders) and in different parts of the
organization (finance professionals, operations managers, IT
leaders) who want to leverage their data and their organizational
capabilities (people, processes, technology) to drive value and
gain competitive advantage. This will be a key reference for
graduate students in computer science programs which normally have
a limited focus on the data itself and where data quality
management is an often-overlooked aspect of data management
courses.
Advances in Computers, Volume 126 presents innovations in computer
hardware, software, theory, design and applications, with this
updated volume including new chapters on VLSI for Super-Computing:
Creativity in R+D from Applications and Algorithms to Masks and
Chips, Bulk Bitwise Execution Model in Memory: Mechanisms,
Implementation, and Evaluation, Embracing the Laws of Physics:
Three Reversible Models of Computation, WSNs in Environmental
Monitoring: Data Acquisition and Dissemination Aspects, Energy
efficient implementation of tensor operations using dataflow
paradigm for machine learning, and A Run-Time Job Scheduling
Algorithm for Cluster Architectures with DataFlow Accelerators.
|
|