![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
With recent advancements in electronics, specifically nanoscale devices, new technologies are being implemented to improve the properties of automated systems. However, conventional materials are failing due to limited mobility, high leakage currents, and power dissipation. To mitigate these challenges, alternative resources are required to advance electronics further into the nanoscale domain. Carbon nanotube field-effect transistors are a potential solution yet lack the information and research to be properly utilized. Major Applications of Carbon Nanotube Field-Effect Transistors (CNTFET) is a collection of innovative research on the methods and applications of converting semiconductor devices from micron technology to nanotechnology. The book provides readers with an updated status on existing CNTs, CNTFETs, and their applications and examines practical applications to minimize short channel effects and power dissipation in nanoscale devices and circuits. While highlighting topics including interconnects, digital circuits, and single-wall CNTs, this book is ideally designed for electrical engineers, electronics engineers, students, researchers, academicians, industry professionals, and practitioners working in nanoscience, nanotechnology, applied physics, and electrical and electronics engineering.
Although the transition between the first three industrial revolutions took more than a century, Industry 4.0 is progressing quickly. The emergence of digitalization has been rapid thanks to the development of cutting-edge technologies. Though we are witnessing this rapid technological decentralization and interconnectivity at present, organizations and researchers are already discussing Industry 5.0 where full integration of the human side of business and intelligent systems is expected. In this scenario, it is essential to look forward to such strategic workplaces that allow a combination of humans and technology to assure a high degree of automation merged with the cognitive skills of business leaders. Managing Technology Integration for Human Resources in Industry 5.0 provides insights into the impact of the Industrial Revolution 4.0 on human resources. It provides insights for both industry and academia to assist them in teaching and training the next generation leaders through universities and corporate training. Covering topics such as business performance, human technology integration, and digitalization, this premier reference source is an essential resource for human resource managers, IT managers, organizational executives and leaders, entrepreneurs, students and educators of higher education, librarians, researchers, and academicians.
As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.
Pultrusion: State-of-the-Art Process Models with Applications, Second Edition is a detailed guide to pultrusion, providing methodical coverage of process models and computation simulation, governing principles and science, and key challenges to help readers enable process optimization and scale-up. This new edition has been revised and expanded to include the latest advances, state-of-the-art process models, and governing principles. The main challenges in pultrusion, such as the process induced residual stresses, shape distortions, thermal history, species conversion, phase changes, impregnation of the reinforcements and pulling force are described, with related examples are provided. Moreover, strategies for having a reliable and optimized process using probabilistic approaches and optimization algorithms are summarized. Another focus of this book is on the thermo-chemical and mechanical analyses of the pultrusion process for industrial profiles.
Over the last two decades, researchers are looking at imbalanced data learning as a prominent research area. Many critical real-world application areas like finance, health, network, news, online advertisement, social network media, and weather have imbalanced data, which emphasizes the research necessity for real-time implications of precise fraud/defaulter detection, rare disease/reaction prediction, network intrusion detection, fake news detection, fraud advertisement detection, cyber bullying identification, disaster events prediction, and more. Machine learning algorithms are based on the heuristic of equally-distributed balanced data and provide the biased result towards the majority data class, which is not acceptable considering imbalanced data is omnipresent in real-life scenarios and is forcing us to learn from imbalanced data for foolproof application design. Imbalanced data is multifaceted and demands a new perception using the novelty at sampling approach of data preprocessing, an active learning approach, and a cost perceptive approach to resolve data imbalance. The Handbook of Research on Data Preprocessing, Active Learning, and Cost Perceptive Approaches for Resolving Data Imbalance offers new aspects for imbalanced data learning by providing the advancements of the traditional methods, with respect to big data, through case studies and research from experts in academia, engineering, and industry. The chapters provide theoretical frameworks and the latest empirical research findings that help to improve the understanding of the impact of imbalanced data and its resolving techniques based on data preprocessing, active learning, and cost perceptive approaches. This book is ideal for data scientists, data analysts, engineers, practitioners, researchers, academicians, and students looking for more information on imbalanced data characteristics and solutions using varied approaches.
This book is the essential guide for any student undertaking a computing/IS project, and will give you everything you need to achieve outstanding results. Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and provides the reader with the skills to excel.
Digital humanities is a dynamic and emerging field that aspires to enhance traditional research and scholarship through digital media. Although countries around the world are witnessing the widespread adoption of digital humanities, only a small portion of the literature discusses its development in the Asia Pacific region. Digital Humanities and Scholarly Research Trends in the Asia-Pacific provides innovative insights into the development of digital humanities and their ability to facilitate academic exchange and preserve cultural heritage. The content covers challenges including the need to maintain digital humanities momentum in libraries and research communities, to increase international collaboration, to maintain and promote developed digital projects, to deploy and redeploy resources to support research, and to build new skillsets and new professionals in the library. It is designed for librarians, government agencies, industry professionals, academicians, and researchers.
The book collects 3 years of researches in the penetration testing security field. It does not describe underground or fancy techniques, it is most focused on the state of the art in penetration testing methodologies. In other words, if you need to test a system, how do you do ? What is the first step ? What tools can be used ? what is the path to follow in order to find flaws ? The book shows many real world examples on how the described methodology has been used. For example: penetration testing on electronic voting machines, how malware did use the describe methodology to bypass common security mechanisms and attacks to reputation systems.
The edited book has been prepared through collection of precious research articles from eminent Extension scientists, which have contributed papers on Institutional arrangements for technology delivery, innovative Extension approaches, break through methodologies in Extension research, the reach and effectiveness of ICT tools in technology delivery, youth and gender inclusive extension strategies and Extension strategies for changing scenario of Agriculture. Papers in this book would definitely make an impact among Extension scientists and post graduate scholars of Extension in Agriculture, Veterinary and Fishery Sciences.The inputs that this book offers will be of much helpful to the researchers, administrators and policy makers. From the research findings of the selected research papers of this book, the Extension researchers can sharpen their future research strategies, the Extension administrators and policy makers in the Government can get to know about the impact and constraints of several institutional mechanisms of technology delivery which will facilitate them in evidence based policy making.
Advances in Nonvolatile Memory and Storage Technology, Second Edition, addresses recent developments in the non-volatile memory spectrum, from fundamental understanding, to technological aspects. The book provides up-to-date information on the current memory technologies as related by leading experts in both academia and industry. To reflect the rapidly changing field, many new chapters have been included to feature the latest in RRAM technology, STT-RAM, memristors and more. The new edition describes the emerging technologies including oxide-based ferroelectric memories, MRAM technologies, and 3D memory. Finally, to further widen the discussion on the applications space, neuromorphic computing aspects have been included. This book is a key resource for postgraduate students and academic researchers in physics, materials science and electrical engineering. In addition, it will be a valuable tool for research and development managers concerned with electronics, semiconductors, nanotechnology, solid-state memories, magnetic materials, organic materials and portable electronic devices.
|
![]() ![]() You may like...
Kwantitatiewe statistiese tegnieke
A. Swanepoel, F.L. Vivier, …
Paperback
R662
Discovery Miles 6 620
Spatial Synthesis - Computational Social…
Xinyue Ye, Hui Lin
Hardcover
R1,603
Discovery Miles 16 030
Bootstrap Methods - With Applications in…
Gerhard Dikta, Marsel Scheer
Hardcover
R3,143
Discovery Miles 31 430
Graphs and Discrete Dirichlet Spaces
Matthias Keller, Daniel Lenz, …
Hardcover
R4,289
Discovery Miles 42 890
Integrated Population Biology and…
Arni S.R. Srinivasa Rao, C.R. Rao
Hardcover
R6,611
Discovery Miles 66 110
Time Series Analysis - With Applications…
Jonathan D. Cryer, Kung-Sik Chan
Hardcover
R2,742
Discovery Miles 27 420
Order Statistics: Theory and Methods…
Narayanaswamy Balakrishnan, C.R. Rao
Hardcover
R5,759
Discovery Miles 57 590
Stochastic Analysis and Applications…
Dan Crisan, Ben Hambly, …
Hardcover
|