|
Books > Computing & IT > General theory of computing
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
Many approaches have sprouted from artificial intelligence (AI) and
produced major breakthroughs in the computer science and
engineering industries. Deep learning is a method that is
transforming the world of data and analytics. Optimization of this
new approach is still unclear, however, and there's a need for
research on the various applications and techniques of deep
learning in the field of computing. Deep Learning Techniques and
Optimization Strategies in Big Data Analytics is a collection of
innovative research on the methods and applications of deep
learning strategies in the fields of computer science and
information systems. While highlighting topics including data
integration, computational modeling, and scheduling systems, this
book is ideally designed for engineers, IT specialists, data
analysts, data scientists, engineers, researchers, academicians,
and students seeking current research on deep learning methods and
its application in the digital industry.
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
Over the last two decades, researchers are looking at imbalanced
data learning as a prominent research area. Many critical
real-world application areas like finance, health, network, news,
online advertisement, social network media, and weather have
imbalanced data, which emphasizes the research necessity for
real-time implications of precise fraud/defaulter detection, rare
disease/reaction prediction, network intrusion detection, fake news
detection, fraud advertisement detection, cyber bullying
identification, disaster events prediction, and more. Machine
learning algorithms are based on the heuristic of
equally-distributed balanced data and provide the biased result
towards the majority data class, which is not acceptable
considering imbalanced data is omnipresent in real-life scenarios
and is forcing us to learn from imbalanced data for foolproof
application design. Imbalanced data is multifaceted and demands a
new perception using the novelty at sampling approach of data
preprocessing, an active learning approach, and a cost perceptive
approach to resolve data imbalance. The Handbook of Research on
Data Preprocessing, Active Learning, and Cost Perceptive Approaches
for Resolving Data Imbalance offers new aspects for imbalanced data
learning by providing the advancements of the traditional methods,
with respect to big data, through case studies and research from
experts in academia, engineering, and industry. The chapters
provide theoretical frameworks and the latest empirical research
findings that help to improve the understanding of the impact of
imbalanced data and its resolving techniques based on data
preprocessing, active learning, and cost perceptive approaches.
This book is ideal for data scientists, data analysts, engineers,
practitioners, researchers, academicians, and students looking for
more information on imbalanced data characteristics and solutions
using varied approaches.
Step up your Excel skills with our 6-page laminated guide focusing
on tips and tricks for using data efficiently while ensuring data
quality. Curtis Frye, author of multiple books on Excel, creator of
many Lynda.com videos and an experienced corporate trainer used his
experience and knowledge to cover the most relevant functions for
users at different levels. This is the second in the Excel 2016
series. Suggested uses: Workplace -- Kept conveniently at your desk
for easy reference; Company Training -- reduce help-desk calls and
keep productivity flowing for a team or for your entire company;
Students/Teachers/Parents -- help for classroom or homework;
College Professors/Students -- offers a range of guides for
different levels.
Modelling and simulation (M&S) based systems engineering
(MSBSE) is the extension of MBSE, which enhances the value of MBSE
and the ability of digitally evaluating and optimizing the whole
system through comprehensive applications of M&S technologies.
This book puts together the recent research in MSBSE, and hopefully
this will provide the researchers and engineers with reference
cases in M&S technologies to support the R&D of complex
products and systems.
The Etch-a-Sketch and Other Fun Programs is a collection of Apple
II software programmed by a student in the 1980s. BASIC and machine
language programming were once taught in schools, and here you'll
find a variety of useful graphics, education, utility, and game
software. The author also shares stories about his programming
experiences in school. Features 13 Programs Including: - The
Etch-a-Sketch - fun drawing with keyboard, joystick, and sound. -
The Apple - the six color logo in beautiful lo-res. - Annual Graph
Matrix - graph monthly amounts for one year. - Compound Interest -
calculate investment interest over time. - States & Capitals -
learn about the U.S. through quizzes. - H - a powerful HELLO
program for launching files in DOS 3.3. - Random Access Filer - a
simple text database for contacts. - Tunnel Race - dodge obstacles
through a text-based cavern. - Joystick Calibration - optimize your
entertainment device.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
Introduction to Information Systems, 9th Edition delivers an
essential resource for undergraduate business majors seeking ways
to harness information technology systems to succeed in their
current or future jobs. The book assists readers in developing a
foundational understanding of information systems and technology
and apply it to common business problems. This International
Adaptation covers applications of the latest technologies with the
addition of new cases from Europe, Middle East, Africa, Australia,
and Asia-Pacific countries. It focuses on global business
environment for students to understand the norms of using
technology while operating on online platforms for exploring new
avenues in different geographical locations. The book includes real
business scenarios of how latest technologies such as Big Data,
Cloud Computing, Blockchain, and IoT are perceived and adopted
across countries. New cases highlight key technology issues faced
by organizations such as designing and implementing IT security
policies, dealing with ethical dilemma of securing customer data,
moving IT infrastructure to cloud, and identifying how AI can be
used to improve the efficiency of business operations.
Up-to-date coverage of every topic on the CEH v11 exam This
effective self-study guide covers 100% of the EC Council's
Certified Ethical Hacker Version 11 exam objectives. The book
discusses the latest ethical hacking tools, techniques, and
exploits. Readers will find learning objectives at the beginning of
each chapter, step-by-step exercises, exam tips, practice exam
questions, and in-depth explanations. An integrated test
preparation system based on proven pedagogy, CEH Certified Ethical
Hacker All-in-One Exam Guide, Fifth Edition covers all five phases
of ethical hacking: reconnaissance, gaining access, enumeration,
maintaining access, and covering tracks. Readers will learn about
malware, hacking Web applications and mobile platforms, cloud
computing vulnerabilities, and more. Designed to help candidates
pass the exam with ease, this authoritative resource also serves as
an essential on-the-job reference. Complete coverage of all CEH v11
exam objectives Includes online access to the Total Tester
customizable practice exam software containing 300 practice
questions Written by an experienced educator with more than 20
years of experience in the field
Although the transition between the first three industrial
revolutions took more than a century, Industry 4.0 is progressing
quickly. The emergence of digitalization has been rapid thanks to
the development of cutting-edge technologies. Though we are
witnessing this rapid technological decentralization and
interconnectivity at present, organizations and researchers are
already discussing Industry 5.0 where full integration of the human
side of business and intelligent systems is expected. In this
scenario, it is essential to look forward to such strategic
workplaces that allow a combination of humans and technology to
assure a high degree of automation merged with the cognitive skills
of business leaders. Managing Technology Integration for Human
Resources in Industry 5.0 provides insights into the impact of the
Industrial Revolution 4.0 on human resources. It provides insights
for both industry and academia to assist them in teaching and
training the next generation leaders through universities and
corporate training. Covering topics such as business performance,
human technology integration, and digitalization, this premier
reference source is an essential resource for human resource
managers, IT managers, organizational executives and leaders,
entrepreneurs, students and educators of higher education,
librarians, researchers, and academicians.
Advances in Nonvolatile Memory and Storage Technology, Second
Edition, addresses recent developments in the non-volatile memory
spectrum, from fundamental understanding, to technological aspects.
The book provides up-to-date information on the current memory
technologies as related by leading experts in both academia and
industry. To reflect the rapidly changing field, many new chapters
have been included to feature the latest in RRAM technology,
STT-RAM, memristors and more. The new edition describes the
emerging technologies including oxide-based ferroelectric memories,
MRAM technologies, and 3D memory. Finally, to further widen the
discussion on the applications space, neuromorphic computing
aspects have been included. This book is a key resource for
postgraduate students and academic researchers in physics,
materials science and electrical engineering. In addition, it will
be a valuable tool for research and development managers concerned
with electronics, semiconductors, nanotechnology, solid-state
memories, magnetic materials, organic materials and portable
electronic devices.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|