![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
This book introduces the technological innovations of robotic vehicles. It presents the concepts required for self-driving cars on the road. Besides, readers can gain invaluable knowledge in the construction, programming, and control of the six-legged robot. The book also presents the controllers and aerodynamics of several different types of rotorcrafts. It includes the simulation and flight of the various kinds of rotor-propelled air vehicles under each of their different aerodynamics environment. The book is suitable for academia, educators, students, and researchers who are interested in autonomous vehicles, robotics, and rotor-propelled vehicles.
The evolution of soft computing applications have offered a multitude of methodologies and techniques that are useful in facilitating new ways to address practical and real scenarios in a variety of fields. Exploring Innovative and Successful Applications of Soft Computing highlights the applications and conclusions associated with soft computing in different technological environments. Providing potential results based on new trends in the development of these services, this book aims to be a reference source for researchers, practitioners, and students interested in the most successful soft computing methods applied to recent problems.
The world is changing at a fast pace, so is the Government and Governance style. Humans are bound to go for Algorithmic strategies rather than manual or electronic ones in different domains. This book introduces the Algorithmic Government or Government by Algorithm, which refers to authorizing machines in the Public Sector for automated decision-making based on Artificial Intelligence, Data Science, and other technologies. It is an emerging concept introduced globally and will be considered revolutionary in the future. The book covers concepts, applications, progress status, and potential use-cases of Algorithmic Government. This book serves as introductory material for the readers from technology, public policy, administration, and management fields.
This book aims to provide some insights into recently developed bio-inspired algorithms within recent emerging trends of fog computing, sentiment analysis, and data streaming as well as to provide a more comprehensive approach to the big data management from pre-processing to analytics to visualization phases. The subject area of this book is within the realm of computer science, notably algorithms (meta-heuristic and, more particularly, bio-inspired algorithms). Although application domains of these new algorithms may be mentioned, the scope of this book is not on the application of algorithms to specific or general domains but to provide an update on recent research trends for bio-inspired algorithms within a specific application domain or emerging area. These areas include data streaming, fog computing, and phases of big data management. One of the reasons for writing this book is that the bio-inspired approach does not receive much attention but shows considerable promise and diversity in terms of approach of many issues in big data and streaming. Some novel approaches of this book are the use of these algorithms to all phases of data management (not just a particular phase such as data mining or business intelligence as many books focus on); effective demonstration of the effectiveness of a selected algorithm within a chapter against comparative algorithms using the experimental method. Another novel approach is a brief overview and evaluation of traditional algorithms, both sequential and parallel, for use in data mining, in order to provide an overview of existing algorithms in use. This overview complements a further chapter on bio-inspired algorithms for data mining to enable readers to make a more suitable choice of algorithm for data mining within a particular context. In all chapters, references for further reading are provided, and in selected chapters, the author also include ideas for future research.
Globalization, along with its digital and information communication technology counterparts, including the Internet and cyberspace, may signify a whole new era for human rights, characterized by new tensions, challenges, and risks for human rights, as well as new opportunities. Human Rights and Risks in the Digital Era: Globalization and the Effects of Information Technologies explores the emergence and evolution of digital rights that challenge and transform more traditional legal, political, and historical understandings of human rights. Academic and legal scholars will explore individual, national, and international democratic dilemmas--sparked by economic and environmental crises, media culture, data collection, privatization, surveillance, and security--that alter the way individuals and societies think about, regulate, and protect rights when faced with new challenges and threats. The book not only uncovers emerging changes in discussions of human rights, it proposes legal remedies and public policies to mitigate the challenges posed by new technologies and globalization.
This book presents a summary of artificial intelligence and machine learning techniques in its first two chapters. The remaining chapters of the book provide everything one must know about the basic artificial intelligence to modern machine intelligence techniques including the hybrid computational intelligence technique, using the concepts of several real-life solved examples, design of projects and research ideas. The solved examples with more than 200 illustrations presented in the book are a great help to instructors, students, non-AI professionals, and researchers. Each example is discussed in detail with encoding, normalization, architecture, detailed design, process flow, and sample input/output. Summary of the fundamental concepts with solved examples is a unique combination and highlight of this book.
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.
Advancements of information systems are rapidly altering both the economy and society. This progression of information creates operational and strategic advantages which is important to the success of organizations and firms. Approaches and Processes for Managing the Economics of Information Systems explores the value of information and its management by highlighting theoretical and empirical approaches in the economics of information systems. By providing insight into how information systems can generate economic value for businesses and consumers, this book is essential for professors, students, researchers, and developers of information systems.
This book constitutes the refereed proceedings of the 20th International TRIZ Future Conference on Automated Invention for Smart Industries, TFC 2020, held in Cluj-Napoca, Romania, in October 2020 and sponsored by IFIP WG 5.4. The conference was held virtually.The 34 full papers presented were carefully reviewed and selected from 91 submissions. They are organized in the following thematic sections: computing TRIZ; education and pedagogy; sustainable development; tools and techniques of TRIZ for enhancing design; TRIZ and system engineering; TRIZ and complexity; and cross-fertilization of TRIZ for innovation management.
This volume gathers papers presented at the Workshop on Computational Diffusion MRI (CDMRI 2019), held under the auspices of the International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI), which took place in Shenzhen, China on October 17, 2019. This book presents the latest advances in the rapidly expanding field of diffusion MRI. It shares new perspectives on the latest research challenges for those currently working in the field, but also offers a valuable starting point for anyone interested in learning about computational techniques in diffusion MRI. The book includes rigorous mathematical derivations, a wealth of rich, full-colour visualisations and extensive clinically relevant results. As such, it will be of interest to researchers and practitioners in the fields of computer science, MRI physics and applied mathematics. Readers will find contributions covering a broad range of topics, from the mathematical foundations of the diffusion process and signal generation, to new computational methods and estimation techniques for the in vivo recovery of microstructural and connectivity features, as well as diffusion-relaxometry and frontline applications in research and clinical practice. This edition includes invited works from high-profile researchers with a specific focus on three new and important topics that are gaining momentum within the diffusion MRI community, including diffusion MRI signal acquisition and processing strategies, machine learning for diffusion MRI, and diffusion MRI outside the brain and clinical applications.
If databases are so critical, why do they remain so vulnerable? Save The Database, Save The World delves into the topics of database security - from recent statistics, attack vectors, the threat of cyberwar, and why security best practices are so rarely followed.
Are you aware that C Programming is one of the most popular and most commonly used programming languages today? Did you know many expert developers have started with learning C in order to become knowledgeable in computer programming? Were you aware that grade schools and high schools have begun implementing C Programming in their curriculum's? Are you wanting a simple way to understand a step by step action to learning C Programming? While skipping all the technical jargon so many learners fear in programming? If you are having doubts learning the language, do not! C is actually easy to learn. Compared to C++, C is much simpler! You do not need to spend years to become a master of this language.
Information Communication Technologies (ICTs) exert a great influence on global activities. ITC has affected the structure of governments, economies, cultures, and even human health. Another area in which ICT has had a tremendous impact is within the developing world and nations where women face repression and fewer opportunities. Overcoming Gender Inequalities through Technology Integration is a critical source for understanding the role of technology adoption within female empowerment and equality in developing nations and beyond. This publication examines the strategies applicable to the use of technology in the purist of societal recognition of women in addition to the trajectory and visibility of women in developing as well as developed countries in which they have access to ICTs. This book is an essential reference source for students and teachers of gender studies or information technology, women's advocacy groups, policy makers, NGOs, and technology developers.
Multi-Agent Applications with Evolutionary Computation and Biologically Inspired Technologies: Intelligent Techniques for Ubiquity and Optimization compiles numerous ongoing projects and research efforts in the design of agents in light of recent development in neurocognitive science and quantum physics. This innovative collection provides readers with interdisciplinary applications of multi-agents systems, ranging from economics to engineering.
This book chronicles a 10-year introduction of blended learning into the delivery at a leading technological university, with a longstanding tradition of technology-enabled teaching and learning, and state-of-the-art infrastructure. Hence, both teachers and students were familiar with the idea of online courses. Despite this, the longitudinal experiment did not proceed as expected. Though few technical problems, it required behavioural changes from teachers and learners, thus unearthing a host of socio-technical issues, challenges, and conundrums. With the undercurrent of design ideals such as "tech for good", any industrial sector must examine whether digital platforms are credible substitutes or at best complementary. In this era of Industry 4.0, higher education, like any other industry, should not be about the creative destruction of what we value in universities, but their digital transformation. The book concludes with an agenda for large, repeatable Randomised Controlled Trials (RCTs) to validate digital platforms that could fulfil the aspirations of the key stakeholder groups - students, faculty, and regulators as well as delving into the role of Massive Open Online Courses (MOOCs) as surrogates for "fees-free" higher education and whether the design of such a HiEd 4.0 platform is even a credible proposition. Specifically, the book examines the data-driven evidence within a design-based research methodology to present outcomes of two alternative instructional designs evaluated - traditional lecturing and blended learning. Based on the research findings and statistical analysis, it concludes that the inexorable shift to online delivery of education must be guided by informed educational management and innovation.
This book highlights essential concepts in connection with the traditional bat algorithm and its recent variants, as well as its application to find optimal solutions for a variety of real-world engineering and medical problems. Today, swarm intelligence-based meta-heuristic algorithms are extensively being used to address a wide range of real-world optimization problems due to their adaptability and robustness. Developed in 2009, the bat algorithm (BA) is one of the most successful swarm intelligence procedures, and has been used to tackle optimization tasks for more than a decade. The BA's mathematical model is quite straightforward and easy to understand and enhance, compared to other swarm approaches. Hence, it has attracted the attention of researchers who are working to find optimal solutions in a diverse range of domains, such as N-dimensional numerical optimization, constrained/unconstrained optimization and linear/nonlinear optimization problems. Along with the traditional BA, its enhanced versions are now also being used to solve optimization problems in science, engineering and medical applications around the globe.
The book shows that the analytic combinatorics (AC) method encodes the combinatorial problems of multiple object tracking-without information loss-into the derivatives of a generating function (GF). The book lays out an easy-to-follow path from theory to practice and includes salient AC application examples. Since GFs are not widely utilized amongst the tracking community, the book takes the reader from the basics of the subject to applications of theory starting from the simplest problem of single object tracking, and advancing chapter by chapter to more challenging multi-object tracking problems. Many established tracking filters (e.g., Bayes-Markov, PDA, JPDA, IPDA, JIPDA, CPHD, PHD, multi-Bernoulli, MBM, LMBM, and MHT) are derived in this manner with simplicity, economy, and considerable clarity. The AC method gives significant and fresh insights into the modeling assumptions of these filters and, thereby, also shows the potential utility of various approximation methods that are well established techniques in applied mathematics and physics, but are new to tracking. These unexplored possibilities are reviewed in the final chapter of the book.
This is a timely, self-contained introduction to the rapidly
expanding field of quantum information and computation that avoids
detailed mathematical proofs wherever possible. The author uses a
mixed exposition between a popular and technical approach,
connecting the standard results of the field with more recent
developments. |
![]() ![]() You may like...
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
![]()
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano
Paperback
R2,263
Discovery Miles 22 630
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|