![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
The focus of these conference proceedings is on research, development, and applications in the fields of numerical geometry, scientific computing and numerical simulation, particularly in mesh generation and related problems. In addition, this year's special focus is on Delaunay triangulations and their applications, celebrating the 130th birthday of Boris Delaunay. In terms of content, the book strikes a balance between engineering algorithms and mathematical foundations. It presents an overview of recent advances in numerical geometry, grid generation and adaptation in terms of mathematical foundations, algorithm and software development and applications. The specific topics covered include: quasi-conformal and quasi-isometric mappings, hyperelastic deformations, multidimensional generalisations of the equidistribution principle, discrete differential geometry, spatial and metric encodings, Voronoi-Delaunay theory for tilings and partitions, duality in mathematical programming and numerical geometry, mesh-based optimisation and optimal control methods. Further aspects examined include iterative solvers for variational problems and algorithm and software development. The applications of the methods discussed are multidisciplinary and include problems from mathematics, physics, biology, chemistry, material science, and engineering.
Complex Systems occur in an infinite variety of problems, not only in the realm of physical sciences and engineering, but encompassing fields as diverse as economy, the environment, humanities, social and political sciences. The high level of dynamics of such systems, which is usually expressed through the frequent occurrence of unpredictable disruptive events, makes conventional optimizers, batch schedulers and resource planning systems unworkable. Composed of selected research papers, this book brings together new developments and processes for managing complexity. The included works originate from renowned complexity thinkers, well established practitioners and new researchers in the field and detail issues of common interest. This title will particularly appeal to researchers, developers and users of complex systems from a variety of disciplines, alongside specialists in modelling complex issues.
Fuzzy cognitive maps (FCMs) have gained popularity in the scientific community due to their capabilities in modeling and decision making for complex problems.This book presents a novel algorithm called glassoFCM to enable automatic learning of FCM models from data. Specifically, glassoFCM is a combination of two methods, glasso (a technique originated from machine learning) for data modeling and FCM simulation for decision making. The book outlines that glassoFCM elaborates simple, accurate, and more stable models that are easy to interpret and offer meaningful decisions. The research results presented are based on an investigation related to a real-world business intelligence problem to evaluate characteristics that influence employee work readiness.Finally, this book provides readers with a step-by-step guide of the 'fcm' package to execute and visualize their policies and decisions through the FCM simulation process.
Text analysis tools aid in extracting meaning from digital content. As digital text becomes more and more complex, new techniques are needed to understand conceptual structure. Concept Parsing Algorithms (CPA) for Textual Analysis and Discovery: Emerging Research and Opportunities provides an innovative perspective on the application of algorithmic tools to study unstructured digital content. Highlighting pertinent topics such as semantic tools, semiotic systems, and pattern detection, this book is ideally designed for researchers, academics, students, professionals, and practitioners interested in developing a better understanding of digital text analysis.
The book is addressed to young people interested in computer technologies and computer science. The objective of this book is to provide the reader with all the necessary elements to get him or her started in the modern field of informatics and to allow him or her to become aware of the relationship between key areas of computer science. The book is addressed not only to future software developers, but also to all who are interested in computing in a widely understood sense. The authors also expect that some computer professionals will want to review this book to lift themselves above the daily grind and to embrace the excellence of the whole field of computer science. Unlike existing books, this one bypasses issues concerning the construction of computers and focuses only on information processing. Recognizing the importance of the human factor in information processing, the authors intend to present the theoretical foundations of computer science, software development rules, and some business aspects of informatics in non-technocratic, humanistic terms.
Information in today's advancing world is rapidly expanding and becoming widely available. This eruption of data has made handling it a daunting and time-consuming task. Natural language processing (NLP) is a method that applies linguistics and algorithms to large amounts of this data to make it more valuable. NLP improves the interaction between humans and computers, yet there remains a lack of research that focuses on the practical implementations of this trending approach. Neural Networks for Natural Language Processing is a collection of innovative research on the methods and applications of linguistic information processing and its computational properties. This publication will support readers with performing sentence classification and language generation using neural networks, apply deep learning models to solve machine translation and conversation problems, and apply deep structured semantic models on information retrieval and natural language applications. While highlighting topics including deep learning, query entity recognition, and information retrieval, this book is ideally designed for research and development professionals, IT specialists, industrialists, technology developers, data analysts, data scientists, academics, researchers, and students seeking current research on the fundamental concepts and techniques of natural language processing.
In this book the author presents some techniques for exploring trees and graphs. He illustrates the linear search technique and the backtracking technique, and as instances of tree exploration methods he presents various algorithms for parsing subclasses of context-free languages. He also illustrates some tree and graph exploration and manipulation methods by presenting, among others, algorithms for visiting trees, evaluating Boolean expressions, proving propositional formulas, computing paths in graphs, and performing string matching. This book has been used for advanced undergraduate and graduate courses on automata and formal languages, and assumes some prior exposure to the basic notions in that area. Sample programs are presented in Java and Prolog.
Despite advancements in technological and engineering fields, there is still a digital gender divide in the adoption, use, and development of information communication technology (ICT) services. This divide is also evident in educational environments and careers, specifically in the STEM fields. In order to mitigate this divide, policy approaches must be addressed and improved in order to encourage the inclusion of women in ICT disciplines. Gender Gaps and the Social Inclusion Movement in ICT provides emerging research exploring the theoretical and practical aspects of gender and policy from developed and developing country perspectives and its applications within ICT through various forms of research including case studies. Featuring coverage on a broad range of topics such as digital identity, human rights, and social inclusion, this book is ideally designed for policymakers, academicians, researchers, students, and technology developers seeking current research on gender inequality in ICT environments.
Information communication technologies (ICT) have long been important in supporting doctoral study. Though ICTs have been integrated into educational practices at all levels, there is little understanding of how effective these technologies are in supporting resource development for students and researchers in academic institutions. Enhancing the Role of ICT in Doctoral Research Processes is a collection of innovative research that identifies the ways that doctoral supervisors and students perceive the role of ICTs within the doctoral research process and supports the development of guidelines to enhance ICT skills within these programs. While highlighting topics including professional development, online learning, and ICT management, this book is ideally designed for academicians, researchers, and professionals seeking current research on ICT use for doctoral research.
As real-time and integrated systems become increasingly sophisticated, issues related to development life cycles, non-recurring engineering costs, and poor synergy between development teams will arise. The Handbook of Research on Embedded Systems Design provides insights from the computer science community on integrated systems research projects taking place in the European region. This premier references work takes a look at the diverse range of design principles covered by these projects, from specification at high abstraction levels using standards such as UML and related profiles to intermediate design phases. This work will be invaluable to designers of embedded software, academicians, students, practitioners, professionals, and researchers working in the computer science industry.
Modern computing systems preserve all information in intricate binary codes. The evolution of systems and technologies that aid in this preservation process must be continually assessed to ensure that they are keeping up with the demands of society. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities is a crucial scholarly resource that examines the current methodologies used in number generator construction, and how they pertain to the overall advancement of contemporary computer systems. Featuring coverage on relevant topics such as cellular automata theory, inhomogeneous cells, and sequence generators, this publication is ideal for software engineers, computer programmers, academicians, students, and researchers that are interested in staying abreast of innovative trends within the computer engineering field.
The latest edition of a classic text on concurrency and distributed programming - from a winner of the ACM/SIGCSE Award for Outstanding Contribution to Computer Science Education.
Due to the growing use of web applications and communication devices, the use of data has increased throughout various industries. It is necessary to develop new techniques for managing data in order to ensure adequate usage. The Handbook of Research on Pattern Engineering System Development for Big Data Analytics is a critical scholarly resource that examines the incorporation of pattern management in business technologies as well as decision making and prediction process through the use of data management and analysis. Featuring coverage on a broad range of topics such as business intelligence, feature extraction, and data collection, this publication is geared towards professionals, academicians, practitioners, and researchers seeking current research on the development of pattern management systems for business applications.
>Great new publication with first time ever released professional programming! Are you aware that C Programming is one of the most popular and most commonly used programming languages today? Did you know many expert developers have started with learning C in order to become knowledgeable in computer programming? Were you aware that your children are learning C Programming today in their schools? If you are having doubts learning the language, do not! C is actually easy to learn. Compared to C++, C is much simpler! You do not need to spend years to become a master of this language. Well start right here! Learn the coding necessary in less than a day, become profound and knowledgeable to move up the ladder to becoming a proficient programmer! It start right now and by the time you finish and implement the steps here, you will have learned everything there is to know in less than a day!
Technology's presence in society continues to increase as new products and programs emerge. As such, it is vital for various industries to rapidly adapt and learn to incorporate the latest technology applications and tools. The Handbook of Research on Technology Integration in the Global World is an essential reference source that examines a variety of approaches to integrating technology through technology diffusion, e-collaboration, and e-adoption. The book explores topics such as information systems agility, semantic web, and the digital divide. This publication is a valuable resource for academicians, practitioners, researchers, and upper-level graduate students.
A crash course into 8086/8088 assembler programming, in an easy way with practice at each step. You will learn how to use the registers, move data, do arithmetic, and handle text and graphics. You can run these programs on any PC machine and no program exceeds 512 bytes of executable code! The example programs include: * Guess the number. * Tic-Tac-Toe game. * Text graphics. * Mandelbrot set. * F-Bird game. * Invaders game. * Pillman game. * Toledo Atomchess. * bootBASIC language.
Code Nation explores the rise of software development as a social, cultural, and technical phenomenon in American history. The movement germinated in government and university labs during the 1950s, gained momentum through corporate and counterculture experiments in the 1960s and 1970s, and became a broad-based computer literacy movement in the 1980s. As personal computing came to the fore, learning to program was transformed by a groundswell of popular enthusiasm, exciting new platforms, and an array of commercial practices that have been further amplified by distributed computing and the Internet. The resulting society can be depicted as a "Code Nation"-a globally-connected world that is saturated with computer technology and enchanted by software and its creation. Code Nation is a new history of personal computing that emphasizes the technical and business challenges that software developers faced when building applications for CP/M, MS-DOS, UNIX, Microsoft Windows, the Apple Macintosh, and other emerging platforms. It is a popular history of computing that explores the experiences of novice computer users, tinkerers, hackers, and power users, as well as the ideals and aspirations of leading computer scientists, engineers, educators, and entrepreneurs. Computer book and magazine publishers also played important, if overlooked, roles in the diffusion of new technical skills, and this book highlights their creative work and influence. Code Nation offers a "behind-the-scenes" look at application and operating-system programming practices, the diversity of historic computer languages, the rise of user communities, early attempts to market PC software, and the origins of "enterprise" computing systems. Code samples and over 80 historic photographs support the text. The book concludes with an assessment of contemporary efforts to teach computational thinking to young people.
Personal technology continues to evolve every day, but business technology does not follow that trend. Business IT is often treated as a necessary evil that can't be relied upon to take companies to the next level in their corporate evolution. In "The Golden Age of Drive-Thru IT," author Kedar Sathe offers useful, wide-ranging, and imaginative advice about how to revive and strengthen IT departments. Sathe, who has been programming computers since age fourteen, discusses how businesses must establish and execute new IT strategies to maintain and increase their bottom line. "The Golden Age of Drive-Thru IT" describes various aspects of technology and how IT can rise to every occasion and become a strategic enabler. It shows how IT can become nimble and flexible, yet produce robust and graceful solutions that allow companies to drive toward success in an efficient and enriching fashion. "The Golden Age of Drive-Thru IT" communicates how innovative ideas and smart, enthusiastic contributors will allow IT transformations to take place, reinvent itself, rise to its true potential, and stop selling itself short.
C++ Programming Professional Made Easy: Expert C++ Programming Language Success in a Day for Any Computer User! Want to take your programming to the next level! Sam Key right back at providing his expert book from his great foundation food of c programming Did you love his first technical book? Well now you can take it up one notch! Know the basics and you want to get right into Variables and Operators? Discouraged to learn all the User Inputs Lets master Flow Controls! Grab your copy today and let's dive right in! PURCHASE NOW YOUR COPY!
Security video surveillance systems, such as homeland security and national defence, rely on specific mathematical algorithms in order to run effectively. It is essential for these parameters to be understood in order to design and create a successful system. Video Surveillance Techniques and Technologies presents empirical research and acquired experience on the original solutions and mathematical algorithms for motion detection and object identification problems. Emphasising a wide variety of applications of security systems, this book is an essential tool for graduate students and professionals in the field of signal and image processing applied in static/moving object detection, tracking, and identification.
The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context. Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, techniques, and practical applications related to the three dimensions of context awareness. Through the exploration of emerging research trends of pervasive computing, this book is beneficial to professors, students, researchers, and developers interested this latest development in the field of context-awareness and pervasive computing.
|
![]() ![]() You may like...
Pattern Recognition and Computer Vision…
Jianhuang Lai, Chenglin Liu, …
Paperback
R1,567
Discovery Miles 15 670
Web Services - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R9,718
Discovery Miles 97 180
Perceptual Organization for Artificial…
Kim L Boyer, Sudeep Sarkar
Hardcover
R3,085
Discovery Miles 30 850
|