|
|
Books > Computing & IT > General theory of computing
Advancements in the nature-inspired swarm intelligence algorithms
continue to be useful in solving complicated problems in nonlinear,
non-differentiable, and un-continuous functions as well as being
applied to solve real-world applications. Recent Algorithms and
Applications in Swarm Intelligence Research highlights the current
research on swarm intelligence algorithms and its applications.
Including research and survey and application papers, this book
serves as a platform for students and scholars interested in
achieving their studies on swarm intelligence algorithms and their
applications.
CSS Programming Professional Made Easy 2nd Edition: Expert CSS
Programming Language Success in a Day for any Computer User! Do you
know why CSS programming will save you time over any other
programming language? Do you know why CSS programming loads pages
faster? Do you know why using CSS has multiple device
compatibilities? Need to learn CSS Selectors & association
styles? What are the CSS Measurement Units? Need everything on
colours, fonts, and background programming with CSS? Get right into
it with all the answers provided with just one click!
We live in an increasingly interconnected and highly sophisticated
society, where the Internet has led to tremendous improvements in
the efficiency and effectiveness of public services. The Handbook
of Research on E-Services in the Public Sector: E-Government
Strategies and Advancements illustrates how technology in
e-government saves individuals significant amounts of time and
money, while adding value to citizens' experiences with government,
thus better serving their needs. This handbook provides
comprehensive coverage of the issues facing managers, consultants,
and practitioners in e-government and assists them in formulating
ICT strategies for use within their field. These new strategies
will enable them to implement collaborative policy initiatives
within the private, public, and non-profit sectors to ultimately
eliminate the global digital divide.
Artificial Higher Order Neural Networks (HONNs) significantly
change the research methodology that is used in economics and
business areas for nonlinear data simulation and prediction. With
the important advances in HONNs, it becomes imperative to remain
knowledgeable about its benefits and improvements. Artificial
Higher Order Neural Networks for Economics and Business is the
first book to provide practical education and applications for the
millions of professionals working in economics, accounting, finance
and other business areas on HONNs and the ease of their usage to
obtain more accurate application results. This source provides
significant, informative advancements in the subject and introduces
the concepts of HONN group models and adaptive HONNs.
Although the field of informal learning has much to contribute to
the field of formal learning, these fields appear to be failing to
synergize and balance to create the ideal education environment.
Multiple Literacy and Science Education: ICTs in Formal and
Informal Learning Environments explores the nature of various
learning enlightenment mediums and their consequences within a
classroom context to synchronize understanding within the schooling
fields. This authoritative collection provides an overview of
current research, practices, and evidence-based approaches
regarding further development for best practices of multiple
literacy teaching atmospheres.
This book introduces policy, government, and security professionals
to the concept of "information warfare," covering its evolution
over the last decade and its developments among such economic and
political giants as China, Russia, Japan, India, and Singapore. The
text describes various conceptions of information warfare, along
with how they function in military, diplomatic, political, and
economic contexts. Recent notable cyber attacks are analyzed, the
challenges faced by countries who fail to secure their cyberspace
(Japan, the US, etc.) are enumerated, and ways to distinguish
between cybercrime, cyberwarfare, and cyberterrrorism are
discussed.
Cellular Automata (CA) are a class of spatially and temporally
discrete mathematical systems characterized by local interaction
and synchronous dynamical evolution, which show complex behavior
and are able to model biological phenomena. Cellular Automata and
Complex Systems: Methods for Modeling Biological Phenomena
describes the use of cellular automata to provide important
insights into a vast range of physical, biological, social,
economic and psychological phenomena. This book presents
contemporary research on discrete dynamical systems such as
one-dimensional and two-dimensional cellular automata and outlines
how these systems can be exploited for artistic purposes,
translating their mathematical configurations into music and visual
media.
C# Programming at its best! Discover A Book That Tells You What You
Should Do and How! Instead of jumping right into the instructions,
this book will provide you first with all the necessary concepts
that you need to learn in order to make the learning process a
whole lot easier. This way, you're sure not to get lost in
confusion once you get to the more complex lessons provided in the
latter chapters. Sample codes,are provided for a more visual
approach on your learning You will also learn the designs and forms
of C#, and what's more convenient than getting to know both sides!
Want to know More? Buy Now
Technology has become profoundly integrated into modern society;
however, this increases the risk of vulnerabilities, such as
hacking and other system errors, along with other online threats.
Security, Privacy, and Anonymization in Social Networks: Emerging
Research and Opportunities is a pivotal reference source for the
most up-to-date research on edge clustering models and weighted
social networks. Presenting widespread coverage across a range of
applicable perspectives and topics, such as neighborhood attacks,
fast k-degree anonymization (FKDA), and vertex-clustering
algorithms, this book is ideally designed for academics,
researchers, post-graduates, and practitioners seeking current
research on undirected networks and greedy algorithms for social
network anonymization.
The book 'International English Olympiad' has been divided into
five sections namely Word Structure and Knowledge, Reading
Comprehension, Spoken and Written Expressions, Achievers section,
and Model Papers. In every chapter, the theory has been explained
through solved examples in lucid language. Multiple Choice
Questions (MCQs) with Answer Key and Solutions are provided in the
end of each chapter. Two Model Papers have been provided for
practice purpose. A CD containing Study Chart for systematic
preparation, Tips & Tricks to crack English Olympiad, Pattern
of exam, and links of Previous Years Papers is accompanied with
this book. #v&spublishers
Consisting of an integrated technology platform, enterprise
information systems enable organizations to integrate and
coordinate all business processes, offering a strategic area of
focus. ""Enterprise Information Systems for Business Integration in
SMEs: Technological, Organizational, and Social Dimensions""
discusses the main issues, challenges, opportunities, and trends
related to the impact of IT on every part of organizational and
inter-organizational environments. Containing expert international
contributions by leading field researchers, this publication
provides readers with the most relevant findings in the topic of
enterprise information systems.
As modern technologies continue to transform and impact our
society, Radio Frequency Identification has emerged as one of the
top areas of study to do just that. Using its wireless data
capturing technique and incredible capabilities such as automatic
identification, tracking, handling large amounts of data, and
flexibility in operation, RFID aims to revamp the new millennium.
Advanced RFID Systems, Security, and Applications features a
comprehensive collection of research provided by leading experts in
both academia and industries. This leading reference source
provides state-of-the- art development on RFID and its contents
will be of the upmost use to students and researchers at all levels
as well as technologists, planners, and policy makers. RFID
technology is progressing into a new phase of development.
An Address Book Designed for Social Media Lovers, Bloggers,
YouTubers, Entrepreneurs, Business Professionals and anyone who
uses the Internet every day. Created by YouTuber and Blogger,
Sherry Adepitan. Record Internet Usernames and Passwords, Website
Addresses and Additional Information. Never forget another
Password.
Education and research in the field of information technology
management can prove problematic without the proper resources and
tools on the most relevant issues, trends, and advancements.
Selected Readings on Information Technology Management:
Contemporary Issues supplements course instruction and student
research with quality chapters focused on key issues concerning the
management and utilization of information technology. Containing
over 30 chapters from authors across the globe, these selected
readings in areas such as information systems, knowledge
management, and IT governance depict the most relevant and
important areas of classroom discussion within the categories of
Fundamental Concepts and Theories; Development and Design
Methodologies; Tools and Technologies; Application and Utilization;
Critical Issues; and Emerging Trends.
The 1980s and 1990s saw a growing interest in research and practice
in information systems design and development from a human-centred
perspective. This is an interest that is accelerated by the
increase in organizations in which the human resource provides the
means to key competitive advantage. This work is a compilation of
contributed chapters by researchers and practitioners addressing
the relationships between human activity, organizational issues and
technology.
Analysis and Design of Algorithms provides a structured view of
algorithm design techniques in a concise, easy-to-read manner. The
book was written with an express purpose of being easy - to
understand, read, and carry. It presents a pioneering approach in
the teaching of algorithms, based on learning algorithm design
techniques, and not merely solving a collection of problems. This
allows students to master one design technique at a time and apply
it to a rich variety of problems. Analysis and Design of Algorithms
covers the algorithmic design techniques of divide and conquer,
greedy, dynamic programming, branch and bound, and graph traversal.
For each of these techniques, there are templates and guidelines on
when to use and not to use each technique. Many sections contain
innovative mnemonics to aid the readers in remembering the
templates and key takeaways. Additionally, the book covers
NP-completeness and the inherent hardness of problems. The third
edition includes a new section on polynomial multiplication, as
well as additional exercise problems, and an updated appendix.
Written with input from students and professionals, Analysis and
Design of Algorithms is well suited for introductory algorithm
courses at the undergraduate and graduate levels. The structured
organization of the text makes it especially appropriate for online
and distance learning.
ASP.NET Programming at its best! Discover A Book That Tells You
What You Should Do and How! Instead of jumping right into the
instructions, this book will provide you first with all the
necessary concepts that you need to learn in order to make the
learning process a whole lot easier. This way, you're sure not to
get lost in confusion once you get to the more complex lessons
provided in the latter chapters. Graphs and flowcharts, as well as
sample codes, are provided for a more visual approach on your
learning You will also learn the designs and forms of ASP.NET, and
what's more convenient than getting to know both sides! Want to
know More? Buy Now!
Language learning is one of the most rapidly changing disciplines.
Along with changing perspectives in learning in the field of Second
Language Acquisition, information communication technology (ICT)
has also created many learning paths to assist the process of
learning a second language (L2). In such an ever-evolving
environment, teachers, researchers, and professionals of a diverse
number of disciplines need access to the most current information
about research on the field of computer-enhanced language
acquisition and learning.""Handbook of Research on
Computer-Enhanced Language Acquisition and Learning"" provides
comprehensive coverage of successful translation of language
learning designs utilizing ICT in practical learning contexts. This
authoritative reference source amasses research from over XX
authors from XX countries, offering researchers, scholars,
students, and professionals worldwide, access to the latest
knowledge related to research on computer-enhanced language
acquisition and learning.
|
You may like...
Broken Land
Daylin Paul
Hardcover
R420
R388
Discovery Miles 3 880
|