![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
This book provides a general survey of the main concepts, questions and results that have been developed in the recent interactions between quantum information, quantum computation and logic. Divided into 10 chapters, the books starts with an introduction of the main concepts of the quantum-theoretic formalism used in quantum information. It then gives a synthetic presentation of the main "mathematical characters" of the quantum computational game: qubits, quregisters, mixtures of quregisters, quantum logical gates. Next, the book investigates the puzzling entanglement-phenomena and logically analyses the Einstein-Podolsky-Rosen paradox and introduces the reader to quantum computational logics, and new forms of quantum logic. The middle chapters investigate the possibility of a quantum computational semantics for a language that can express sentences like "Alice knows that everybody knows that she is pretty", explore the mathematical concept of quantum Turing machine, and illustrate some characteristic examples that arise in the framework of musical languages. The book concludes with an analysis of recent discussions, and contains a Mathematical Appendix which is a survey of the definitions of all main mathematical concepts used in the book.
This uniquely accessible book helps readers use CABology to solve real-world business problems and drive real competitive advantage. It provides reliable, concise information on the real benefits, usage and operationalization aspects of utilizing the "Trio Wave" of cloud, analytic and big data. Anyone who thinks that the game changing technology is slow paced needs to think again. This book opens readers' eyes to the fact that the dynamics of global technology and business are changing. Moreover, it argues that businesses must transform themselves in alignment with the Trio Wave if they want to survive and excel in the future. CABology focuses on the art and science of optimizing the business goals to deliver true value and benefits to the customer through cloud, analytic and big data. It offers business of all sizes a structured and comprehensive way of discovering the real benefits, usage and operationalization aspects of utilizing the Trio Wave.
Technology has impacted how many teachers develop methods of instruction in their classroom settings. The Continuous Practice Improvement (CPI) professional development program introduces teachers to infusing computers into the curriculum and classroom activities seamlessly. ""Infusing Technology into the Classroom: Continuous Practice Improvement"" retells compelling stories of a successful computer-related professional development program that was implemented into Kindergarten through eighth grade classrooms of a Philadelphia school. Through an analysis of the study, a theoretical model to guide technology infused professional development for teachers is discovered.
This book constitutes the refereed proceedings of the 14th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2018, held in Athens, Greece, in June 2018. The 14 revised full papers and 2 short papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and are organized in the following thematic sections: organizational aspects of OSS projects, OSS projects validity, mining OSS data, OSS in public administration, OSS governance, and OSS reusability.
This two-volume set of IFIP AICT 617 and 618 constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation" on Transfer and Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in December 2020.The 86 revised full papers and 36 short papers presented were carefully reviewed and selected from 224 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts: Part I: artificial intelligence and autonomous systems; big data and analytics; blockchain; diffusion and adoption technology; emerging technologies in e-Governance; emerging technologies in consumer decision making and choice; fin-tech applications; healthcare information technology; and Internet of Things Part II: information technology and disaster management; adoption of mobile and platform-based applications; smart cities and digital government; social media; and diffusion of information technology and systems
An exciting aspect of contemporary legal scholarship is a concern for law from a global perspective across all legal fields. The book draws upon examples from North America, Western Europe, Africa, Asia, Eastern Europe, and Latin America. It refers to the basic private law fields of torts, property, contracts, and family law. It also refers to the basic public law fields of constitutional law, administrative law, criminal law, and international law. It analyzes diverse legal policy problems from a perspective that is designed to produce solutions whereby conservatives, liberals, and other major viewpoints can all come out ahead of their best initial expectations simultaneously. Such solutions can be considered an important part of an innovative concept of justice that emphasizes being effective, efficient, and equitable simultaneously, rather than compromising on any of those justice components. Another exciting aspect of contemporary legal scholarship is a concern for the use of modern technology in the form of microcomputer software that can be helpful in law teaching, practice, and research. Computer-aided instruction can supplement the case method by using what-if analysis to make changes in the goals to be achieved, alternative decisions available for achieving them, the factual relations, and other inputs to see how the decisions might change with changes in those inputs. Computer-aided law practice can be helpful in counseling, negotiation, mediation, case analysis, legal policy evaluation, and advocacy. Computer-aided research can be helpful in testing deductive or statistical models to determine how well they can explain variance across the judicial process or other legal processes.
This book provides both conceptual knowledge of quantitative finance and a hands-on approach to using Python. It begins with a description of concepts prior to the application of Python with the purpose of understanding how to compute and interpret results. This book offers practical applications in the field of finance concerning Python, a language that is more and more relevant in the financial arena due to big data. This will lead to a better understanding of finance as it gives a descriptive process for students, academics and practitioners.
This unique volume introduces and discusses the methods of validating computer simulations in scientific research. The core concepts, strategies, and techniques of validation are explained by an international team of pre-eminent authorities, drawing on expertise from various fields ranging from engineering and the physical sciences to the social sciences and history. The work also offers new and original philosophical perspectives on the validation of simulations. Topics and features: introduces the fundamental concepts and principles related to the validation of computer simulations, and examines philosophical frameworks for thinking about validation; provides an overview of the various strategies and techniques available for validating simulations, as well as the preparatory steps that have to be taken prior to validation; describes commonly used reference points and mathematical frameworks applicable to simulation validation; reviews the legal prescriptions, and the administrative and procedural activities related to simulation validation; presents examples of best practice that demonstrate how methods of validation are applied in various disciplines and with different types of simulation models; covers important practical challenges faced by simulation scientists when applying validation methods and techniques; offers a selection of general philosophical reflections that explore the significance of validation from a broader perspective. This truly interdisciplinary handbook will appeal to a broad audience, from professional scientists spanning all natural and social sciences, to young scholars new to research with computer simulations. Philosophers of science, and methodologists seeking to increase their understanding of simulation validation, will also find much to benefit from in the text.
Telemedicine has the potential to significantly alter structures, procedures, and eventually outcomes in healthcare structures worldwide. Today the field of telemedicine is still dominated by very committed efforts of research and development. However, there is a growing number of concepts and applications which have been implemented in clinical routine or are ready to be implemented. Health care providers, patients, third party payers, and not at least policy makers should be informed about these rapidly emerging applications, which could have a considerable impact on the delivery of health care. This book offers a comprehensive source of information not only for experts but also for the target groups mentioned above. It provides background information on legal aspects, issues concerning further development, and evaluation of telemedicine applications. The work also presents numerous projects covering the clinical fields of emergency medicine, surgery, oncology, cardiology, endocrinology, ophthalmology, dermatology, radiology, pathology, psychiatry and other clinical specialties. Recognizing the Internet as a major source of information on issues related to telemedicine and information technology in general, a 'Webliography' provides links to a selection of the most relevant Web sites on the Internet.
When researchers in computer-mediated communications discuss digital textuality, they rarely venture beyond the now commonplace notion that computer textuality embodies contemporary post-structuralist theories. Written for students and faculty of contemporary literature and composition theories, this book is the first to move from general to specific considerations. Advancing from general considerations of how computers are changing literacy, Digital Fictions moves on to a specific consideration of how computers are altering one particular set of literature practices: reading and writing fiction. Suffused through the sensibility of a creative writer, this book includes an historical overview of writing stories on computers. In addition, Sloane conducts interviews with the makers of hypertext fictions (including Stuart Moulthrop, Michael Joyce, and Carolyn Guyer) and offers close reading of digital fictions. Making careful analyses of the meaning-making activities of both readers and writers of this emerging genre, this work is embedded in a perspective both feminist and semiotic. Digital Fictions explores and distinguishes among four distinct iterations of text-based digital fictions; text adventures, Carnegie Mellon University Oz Project, hypertext fictions, and MUDs. Ultimately, Sloane revises the rhetorical triangle and proposes a new rhetorical theory, one that attends to the materials, processes, and locations of stories told on-line.
This book presents an intuitive picture-oriented approach to the formative processes technique and to its applications. In the first part the authors introduce basic set-theoretic terminology and properties, the decision problem in set theory, and formative processes. The second part of the book is devoted to applications of the technique of formative processes to decision problems. All chapters contain exercises and the book is appropriate for researchers and graduate students in the area of computer science logic.
A new class of provably capacity achieving error-correction codes, polar codes are suitable for many problems, such as lossless and lossy source coding, problems with side information, multiple access channel, etc. The first comprehensive book on the implementation of decoders for polar codes, the authors take a tutorial approach to explain the practical decoder implementation challenges and trade-offs in either software or hardware. They also demonstrate new trade-offs in latency, throughput, and complexity in software implementations for high-performance computing and GPGPUs, and hardware implementations using custom processing elements, full-custom application-specific integrated circuits (ASICs), and field-programmable-gate arrays (FPGAs). Presenting a good overview of this research area and future directions, High-Speed Decoders for Polar Codes is perfect for any researcher or SDR practitioner looking into implementing efficient decoders for polar codes, as well as students and professors in a modern error correction class. As polar codes have been accepted to protect the control channel in the next-generation mobile communication standard (5G) developed by the 3GPP, the audience includes engineers who will have to implement decoders for such codes and hardware engineers designing the backbone of communication networks.
This book addresses agent-based computing, concentrating in particular on evolutionary multi-agent systems (EMAS), which have been developed since 1996 at the AGH University of Science and Technology in Cracow, Poland. It provides the relevant background information on and a detailed description of this computing paradigm, along with key experimental results. Readers will benefit from the insightful discussion, which primarily concerns the efficient implementation of computing frameworks for developing EMAS and similar computing systems, as well as a detailed formal model. Theoretical deliberations demonstrating that computing with EMAS always helps to find the optimal solution are also included, rounding out the coverage.
HACKING: Ultimate Hacking for Beginners Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government. This book lists the various ways hackers can breach the security of an individual or an organization's data and network. Its information is for learning purposes only, and the hacking techniques should not be tried because it is a crime to hack someone's personal details without his or her consent. In HACKING: Ultimate Hacking for Beginners you will learn: The advantages and disadvantages of Bluetooth technology. The tools and software that is used for Bluetooth hacking with a brief description The four primary methods of hacking a website and a brief explanation of each Seven different types of spamming, with a focus on email spamming and how to prevent it. Eight common types of security breaches How to understand the process of hacking computers and how to protect against it Using CAPTCHA to prevent hacking
This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.
This book presents (i) a comprehensive methodological approach in analyzing karst surface features using contemporary GIS tools of high resolution applied on a large study area and extensive dataset, (ii) a revision and evaluation of the existing concepts valid in the modern karst geomorphology, (iii) a detailed elaboration of overlooked and yet undefined karst surface features, and (iv) an innovation in the discussion on origin and evolution of karst surface features. The book contains the first example of such comprehensive application of the modern technologies in spatial analysis in the field of karst geomorphology, and it offers several new methodological and theoretical perspectives and presents numerous starting points for further research. It contributes both to the understanding of the local karst evolution and to the knowledge of karst surface features globally.
Set your students on track to achieve the best grade possible with My Revision Notes: AQA A-level Computer Science. Our clear and concise approach to revision will help students learn, practise and apply their skills and understanding. Coverage of key content is combined with practical study tips and effective revision strategies to create a guide that can be relied on to build both knowledge and confidence. With My Revision Notes: AQA A-level Computer Science, students can: > Consolidate knowledge with clear, focused and relevant content coverage, based on what examiners are looking for > Develop understanding with self-testing - our regular 'Now test yourself,' tasks and answers will help commit knowledge to memory > Improve technique through exam-style practice questions, expert tips and examples of typical mistakes to avoid > Identify key connections between topics and subjects with our 'Learning links' focus > Plan and manage a successful revision programme with our topic-by-topic planner, new exam breakdown feature, user-friendly definitions throughout and questions and answers online
This edited volume on computational intelligence algorithms-based applications includes work presented at the International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA 2017). It provides the latest research findings on the significance of computational intelligence and related application areas. It also introduces various computation platforms involving evolutionary algorithms, fuzzy logic, swarm intelligence, artificial neural networks and several other tools for solving real-world problems. It also discusses various tools that are hybrids of more than one solution framework, highlighting the theoretical aspects as well as various real-world applications.
The concept of innovation management and learning organizations concepts strongly emphasize the high role of human/intellectual capital in the company and the crucial function of knowledge in modern society. However, there is often a paradox between managerial language and actual practice in many organizations: on one hand, knowledge-workers are perceived as the most valued members of organizations while, on the other, they are being manipulated and "engineered"-commonly driven to burn-out, and deprived of family life. All this leads to the emergence of new organizational phenomena that, up to now, have been insufficiently analyzed and described. Management Practices in High-Tech Environments studies this issue thoroughly from an international, comparative, cross-cultural perspective, presenting cutting-edge research on management practices in American, European, Asian and Middle-Eastern high-tech companies, with particular focus on fieldwork-driven, but reflective, contributions.
This book is a concise navigator across the history of cybernetics, its state-of-the-art and prospects. The evolution of cybernetics (from N. Wiener to the present day) and the reasons of its ups and downs are presented. The correlation of cybernetics with the philosophy and methodology of control, as well as with system theory and systems analysis is clearly demonstrated. The book presents a detailed analysis focusing on the modern trends of research in cybernetics. A new development stage of cybernetics (the so-called cybernetics 2.0) is discussed as a science on general regularities of systems organization and control. The author substantiates the topicality of elaborating a new branch of cybernetics, i.e. organization theory which studies an organization as a property, process and system. The book is intended for theoreticians and practitioners, as well as for students, postgraduates and doctoral candidates. In the first place, the target audience includes tutors and lecturers preparing courses on cybernetics, control theory and systems science.
This book is aimed at two kinds of readers: firstly, people working in or near mathematics, who are curious about continued fractions; and secondly, senior or graduate students who would like an extensive introduction to the analytic theory of continued fractions. The book contains several recent results and new angles of approach and thus should be of interest to researchers throughout the field. The first five chapters contain an introduction to the basic theory, while the last seven chapters present a variety of applications. Finally, an appendix presents a large number of special continued fraction expansions. This very readable book also contains many valuable examples and problems.
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Today's IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives.""Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education"" delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.
This book brings together the latest findings on efficient solutions of multi/many-objective optimization problems from the leading researchers in the field. The focus is on solving real-world optimization problems using strategies ranging from evolutionary to hybrid frameworks, and involving various computation platforms. The topics covered include solution frameworks using evolutionary to hybrid models in application areas like Analytics, Cancer Research, Traffic Management, Networks and Communications, E-Governance, Quantum Technology, Image Processing, etc. As such, the book offers a valuable resource for all postgraduate students and researchers interested in exploring solution frameworks for multi/many-objective optimization problems.
This book shows you 1000 ways to seduce your website's visitor: Make visitors to buyers. Better: Make customers to friends. It explains how to become a successful seller by viral marketing at the web. |
![]() ![]() You may like...
Rough Computing - Theories, Technologies…
Aboul Ella Hassanien, Zbigniew Suraj, …
Hardcover
R4,951
Discovery Miles 49 510
Topics in Parallel and Distributed…
Sushil K. Prasad, Anshul Gupta, …
Paperback
R1,576
Discovery Miles 15 760
Earth's Magnetosphere - Formed by the…
Wayne Keith, Walter Heikkila
Paperback
R3,554
Discovery Miles 35 540
Migrating to the Cloud - Oracle…
Tom Laszewski, Prakash Nauduri
Paperback
|