![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
A variety of applications have been developed in order to engage with society. These tools have enabled computer scientists to captured large sets of unstructured data for machine learning and make the information widely available in academia. Techniques for Coding Imagery and Multimedia: Emerging Research and Opportunities is a pivotal reference source featuring the latest scholarly research on ways researchers code imagery and multimedia for research purposes, as well as describe some of the applied methods for research value. Including coverage on a wide variety of topics such as linguistic analysis, gender communication, and mass surveillance, this book is an important resource for researchers, academics, graduate students, and professionals seeking current research on best ways to globally expand multimedia research and imagery.
Set your students on track to achieve the best grade possible with My Revision Notes: AQA A-level Computer Science. Our clear and concise approach to revision will help students learn, practise and apply their skills and understanding. Coverage of key content is combined with practical study tips and effective revision strategies to create a guide that can be relied on to build both knowledge and confidence. With My Revision Notes: AQA A-level Computer Science, students can: > Consolidate knowledge with clear, focused and relevant content coverage, based on what examiners are looking for > Develop understanding with self-testing - our regular 'Now test yourself,' tasks and answers will help commit knowledge to memory > Improve technique through exam-style practice questions, expert tips and examples of typical mistakes to avoid > Identify key connections between topics and subjects with our 'Learning links' focus > Plan and manage a successful revision programme with our topic-by-topic planner, new exam breakdown feature, user-friendly definitions throughout and questions and answers online
An intellectual property discussion is central to qualitative research projects, and ethical guidelines are essential to the safe accomplishment of research projects. Undertaking research studies without adhering to ethics may be dangerous to researchers and research subjects. Therefore, it is important to understand and develop practical techniques for handling ethics with a specific focus on qualitative projects so that researchers conducting this type of research may continue to use ethical practices at every step of the project. Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities discusses in detail the methods related to the social constructionist paradigm that is popular with qualitative research projects. These methods help researchers undertake ideal qualitative projects that are free from quantitative research techniques/concepts all while acquiring practical skills in handling ethics and ethical issues in qualitative projects. The chapters each contain case studies, learning outcomes, question and answer sections, and discuss critical research philosophies in detail along with topics such as ethics, research design, data gathering and sampling methods, research outputs, data analysis, and report writing. Featuring a wide range of topics such as epistemology, probability sampling, and big data, this book is ideal for researchers, practitioners, computer scientists, academicians, analysts, coders, and students looking to become competent qualitative research specialists.
Complex Systems occur in an infinite variety of problems, not only in the realm of physical sciences and engineering, but encompassing fields as diverse as economy, the environment, humanities, social and political sciences. The high level of dynamics of such systems, which is usually expressed through the frequent occurrence of unpredictable disruptive events, makes conventional optimizers, batch schedulers and resource planning systems unworkable. Composed of selected research papers, this book brings together new developments and processes for managing complexity. The included works originate from renowned complexity thinkers, well established practitioners and new researchers in the field and detail issues of common interest. This title will particularly appeal to researchers, developers and users of complex systems from a variety of disciplines, alongside specialists in modelling complex issues.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
Code Nation explores the rise of software development as a social, cultural, and technical phenomenon in American history. The movement germinated in government and university labs during the 1950s, gained momentum through corporate and counterculture experiments in the 1960s and 1970s, and became a broad-based computer literacy movement in the 1980s. As personal computing came to the fore, learning to program was transformed by a groundswell of popular enthusiasm, exciting new platforms, and an array of commercial practices that have been further amplified by distributed computing and the Internet. The resulting society can be depicted as a "Code Nation"-a globally-connected world that is saturated with computer technology and enchanted by software and its creation. Code Nation is a new history of personal computing that emphasizes the technical and business challenges that software developers faced when building applications for CP/M, MS-DOS, UNIX, Microsoft Windows, the Apple Macintosh, and other emerging platforms. It is a popular history of computing that explores the experiences of novice computer users, tinkerers, hackers, and power users, as well as the ideals and aspirations of leading computer scientists, engineers, educators, and entrepreneurs. Computer book and magazine publishers also played important, if overlooked, roles in the diffusion of new technical skills, and this book highlights their creative work and influence. Code Nation offers a "behind-the-scenes" look at application and operating-system programming practices, the diversity of historic computer languages, the rise of user communities, early attempts to market PC software, and the origins of "enterprise" computing systems. Code samples and over 80 historic photographs support the text. The book concludes with an assessment of contemporary efforts to teach computational thinking to young people.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
Fog computing is quickly increasing its applications and uses to the next level. As it continues to grow, different types of virtualization technologies can thrust this branch of computing further into mainstream use. The Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science is a key reference volume on the latest research on the role of next-generation systems and devices that are capable of self-learning and how those devices will impact society. Featuring wide-ranging coverage across a variety of relevant views and themes such as cognitive analytics, data mining algorithms, and the internet of things, this publication is ideally designed for programmers, IT professionals, students, researchers, and engineers looking for innovative research on software-defined cloud infrastructures and domain-specific analytics.
Artificial Intelligence is a seemingly neutral technology, but it is increasingly used to manage workforces and make decisions to hire and fire employees. Its proliferation in the workplace gives the impression of a fairer, more efficient system of management. A machine can't discriminate, after all. Augmented Exploitation explores the reality of the impact of AI on workers' lives. While the consensus is that AI is a completely new way of managing a workplace, the authors show that, on the contrary, AI is used as most technologies are used under capitalism: as a smokescreen that hides the deep exploitation of workers. Going beyond platform work and the gig economy, the authors explore emerging forms of algorithmic governance and AI-augmented apps that have been developed to utilise innovative ways to collect data about workers and consumers, as well as to keep wages and worker representation under control. They also show that workers are not taking this lying down, providing case studies of new and exciting form of resistance that are springing up across the globe.
Despite advancements in technological and engineering fields, there is still a digital gender divide in the adoption, use, and development of information communication technology (ICT) services. This divide is also evident in educational environments and careers, specifically in the STEM fields. In order to mitigate this divide, policy approaches must be addressed and improved in order to encourage the inclusion of women in ICT disciplines. Gender Gaps and the Social Inclusion Movement in ICT provides emerging research exploring the theoretical and practical aspects of gender and policy from developed and developing country perspectives and its applications within ICT through various forms of research including case studies. Featuring coverage on a broad range of topics such as digital identity, human rights, and social inclusion, this book is ideally designed for policymakers, academicians, researchers, students, and technology developers seeking current research on gender inequality in ICT environments.
Do you use a single API Call Processing Server? Worse yet, do you have all of your web servers making individual API calls all on their own? Just a single API transaction takes 9 steps to complete through TCP, and your system is getting bogged down with delays from TCP communications. The internet runs on HTTP, and HTTP runs on TCP. You could still use websockets to keep some of the overhead low. However, the TCP/IP stack is just one of many bottlenecks in your infrastructure. Did you know that you don't need to collect the response from every API call you make? What if you could always speak to every API in your format of choice? I'll show you how. In this book, you'll learn about how implementing an API Call Processing Server or cloud can dramatically reduce the time to transact with an API, reduce your web server overhead, and make programming with APIs so much easier.
The theory of computation is used to address challenges arising in many computer science areas such as artificial intelligence, language processors, compiler writing, information and coding systems, programming language design, computer architecture and more. To grasp topics concerning this theory readers need to familiarize themselves with its computational and language models, based on concepts of discrete mathematics including sets, relations, functions, graphs and logic. This handbook introduces with rigor the important concepts of this kind and uses them to cover the most important mathematical models for languages and computation, such as various classical as well as modern automata and grammars. It explains their use in such crucially significant topics of computation theory as computability, decidability, and computational complexity. The authors pay special attention to the implementation of all these mathematical concepts and models and explains clearly how to encode them in computational practice. All computer programs are written in C#.
Technology has opened a wide window of novel communication methods and techniques and has become ubiquitous in modern society. With advancements occurring rapidly and transforming practices and efficiencies within all fields including business, education, medicine, engineering, and so on, it is important to remain up to date on the latest research findings. Human-Computer Interaction and Technology Integration in Modern Society is a critical reference source that examines the integration of technological innovations into every aspect of modern society including education and business. Highlighting important topics that include digitization, human development, knowledge management, and open innovation, this book is ideal for IT specialists, policymakers, professionals, academicians, researchers, practitioners, and students.
The book is addressed to young people interested in computer technologies and computer science. The objective of this book is to provide the reader with all the necessary elements to get him or her started in the modern field of informatics and to allow him or her to become aware of the relationship between key areas of computer science. The book is addressed not only to future software developers, but also to all who are interested in computing in a widely understood sense. The authors also expect that some computer professionals will want to review this book to lift themselves above the daily grind and to embrace the excellence of the whole field of computer science. Unlike existing books, this one bypasses issues concerning the construction of computers and focuses only on information processing. Recognizing the importance of the human factor in information processing, the authors intend to present the theoretical foundations of computer science, software development rules, and some business aspects of informatics in non-technocratic, humanistic terms.
The aim of the book is to serve as a text for students learning programming in 'C' on Data Structures such as array, linked list, stack, queue, trees, graph and sorting and searching methodology. The book illustrates in detail the methods, algorithms, functions and implementation of each and every concept of data structures. Algorithms are written in pseudo syntax i.e., near to 'C' language for easy understanding. It contains worked examples to amplify the material, and enhance the pedagogy. The content is not overburdened with math, and instead pays attention to the key components of the subject, especially link listing. By discussing the practical applications of the subject, the author has lessened the dry theory involved, and made the book more approachable.
In recent years, swarm intelligence has become a popular computational approach among researchers working on optimization problems throughout the globe. Several algorithms inside swarm intelligence have been implemented due to their application to real-world issues and other advantages. A specific procedure, Fireworks Algorithm, is an emerging method that studies the explosion process of fireworks within local areas. Applications of this developing program are undiscovered, and research is necessary for scientists to fully understand the workings of this innovative system. The Handbook of Research on Fireworks Algorithms and Swarm Intelligence is a pivotal reference source that provides vital research on theory analysis, improvements, and applications of fireworks algorithm. While highlighting topics such as convergence rate, parameter applications, and global optimization analysis, this publication explores up-to-date progress on the specific techniques of this algorithm. This book is ideally designed for researchers, data scientists, mathematicians, engineers, software developers, postgraduates, and academicians seeking coverage on this evolutionary computation method.
Smart healthcare technology improves the diagnosis and treatment of patients, provides easy access to medical facilities and emergency care services, and minimizes the gaps between patients and healthcare providers. While clinical data protection remains a major challenge, innovations such as the internet of medical things and smart healthcare systems increase the efficiency and quality of patient care. Healthcare technology can only become faster, more profitable, and more flexible as additional research on its advancements is conducted and collected. Smart Medical Data Sensing and IoT Systems Design in Healthcare is an essential reference source that focuses on robust and easy solutions for the delivery of medical information from patients to doctors and explores low-cost, high-performance, highly efficient, deployable IoT system options in healthcare systems. Featuring research on topics such as hospital management systems, electronic health records, and bio-signals, this book is ideally designed for technologists, engineers, scientists, clinicians, biomedical engineers, hospital directors, doctors, nurses, healthcare practitioners, telemedical agents, students, and academicians seeking coverage on the latest technological developments in medical data analysis and connectivity.
A crash course into 8086/8088 assembler programming, in an easy way with practice at each step. You will learn how to use the registers, move data, do arithmetic, and handle text and graphics. You can run these programs on any PC machine and no program exceeds 512 bytes of executable code! The example programs include: * Guess the number. * Tic-Tac-Toe game. * Text graphics. * Mandelbrot set. * F-Bird game. * Invaders game. * Pillman game. * Toledo Atomchess. * bootBASIC language.
The latest edition of a classic text on concurrency and distributed programming - from a winner of the ACM/SIGCSE Award for Outstanding Contribution to Computer Science Education. |
![]() ![]() You may like...
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,214
Discovery Miles 42 140
Information Systems, International…
Ralph Stair, George Reynolds
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,403
Discovery Miles 24 030
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
![]()
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,490
Discovery Miles 14 900
|