![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > General
Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.
Smart homes, smart cities, and wearable technologies are the growing applications of the internet of things (IoT). Ranging from healthcare tracking applications to smart watches and smart bands for personal safety, the IoT has turned out to be one of the most indispensable parts of our lives even as it is becoming more interconnected to better serve people. With the exponential growth of the IoT and its applications, building the next-generation smart world becomes much more feasible. The IoT and the Net Revolutions Automating the World covers a spectrum of intelligent applications of the IoT in parking, traffic management, waste management, lighting, air pollution controlling, healthcare, weather tracking, retail, and other areas calling for automation. Highlighting a wide range of topics such as e-commerce, security management, and web infrastructure, this book is ideal for academicians, students, researchers, industry professionals, IT consultants, engineers, and scientists.
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. ""Computational Advancements in End-User Technologies: Emerging Models and Frameworks"" contains leading research and practices into the advancement, significance, and comprehensive nature of end-user computing. A defining collection of significant tools, applications, and methodologies within this expanding field of study, this publication provides academicians, researchers, and practitioners with a complete and practical resource of expert international findings.
A decade after Anonymous first appeared, it has grown from a small band of hacktivists to a Global Collective with organized National Cells in half the countries on Earth and 2.5 million dedicated participants worldwide. Behind The Mask explores four critical years in the formation of Anonymous as it solidified into the most powerful movement in human history. Join Commander X and other Anons from those early days as they take you on a grand adventure, and give everyone a small glimpse Behind The Mask. www.BehindTheMask.cf
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
Advances in web technology and the proliferation of sensors and mobile devices connected to the internet have resulted in the generation of immense data sets available on the web that need to be represented, saved, and exchanged. Massive data can be managed effectively and efficiently to support various problem-solving and decision-making techniques. Emerging Technologies and Applications in Data Modeling and Processing is a critical scholarly publication that examines the importance of data management strategies that coincide with advancements in web technologies. Highlighting topics such as geospatial coverages, data analysis, and keyword query, this book is ideal for professionals, researchers, academicians, data analysts, web developers, and web engineers.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
At one time, the office was a physical place, and employees congregated in the same location to work together on projects. The advent of the internet and the world wide web, however, not only made the unthinkable possible, it forever changed the way persons view both the office and work. ""Handbook of Research on Virtual Workplaces and the New Nature of Business Practices"" compiles authoritative research from XX scholars from over XX countries, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace.
Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.
Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
Due to growing technologies for learning processes, universities are making modifications in the development and construction of courses and services they offer. ""Monitoring and Assessment in Online Collaborative Environments: Emergent Computational Technologies for E-Learning Support"" focuses on new models and systems that perform efficient evaluation of student activity in Internet-based education. Containing research from leading international experts, this Premier Reference Source introduces original case studies and experiences of educators worldwide regarding e-learning activities.
Outsourcing is currently one of the hottest topics in business practices and in particular in the field of management information systems (MIS) education. Outsourcing Management Information Systems focuses on concepts, processes, and methodologies for firms who are planning to undertake, or are currently involved in, outsourcing decisions in the field of management information systems. Outsourcing Management Information Systems helps MIS managers to manage outsourcing projects by establishing performance metrics, including: appropriate risk factor considerations, structuring a centralized architecture that best suits the organization, and avoiding the case study pitfalls reported in the literature.
While much has been written about strategic information systems planning, the integration of strategic planning with portfolio management has been ignored, leaving the potential benefits of their combined approach to planning yet to be explored. ""Strategic Information Technology and Portfolio Management"" bridges the knowledge between information technology planning, enterprise architecture, and IT portfolio management taking into account their financial impact. Intended for IT professionals, researchers, and academicians, this book provides techniques and tools appropriate for building application portfolios and developing strategies which increase financial performance.
Radio Frequency Identification (RFID) is an automatic
identification method, relying on storing and remotely retrieving
data using devices called RFID tags (also called transponders).
A hands-on roadmap to using Python for artificial intelligence programming In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples. Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learning Expansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learning Practical AI and Python "cheat sheet" quick references This hands-on AI programming guide is perfect for anyone with a basic knowledge of programming--including familiarity with variables, arrays, loops, if-else statements, and file input and output--who seeks to understand foundational concepts in AI and AI development.
This book presents the stream-tube method (STM), a method offering computational means of dealing with the two- and three-dimensional properties of numerous incompressible materials in static and dynamic conditions. The authors show that the kinematics and stresses associated with the flow and deformation in such materials can be treated by breaking the system down into simple computational sub-domains in which streamlines are straight and parallel and using one or two mapping functions in steady-state and non-steady-state conditions. The STM is considered for various problems in non-Newtonian fluid mechanics with different geometries. The book makes use of examples and applications to illustrate the use of the STM. It explores the possibilities of computation on simple mapped rectangular domains and three-dimensional parallel-piped domains under different conditions. Complex materials with memory are considered simply without particle tracking problems. Readers, including researchers, engineers and graduate students, with a foundational knowledge of calculus, linear algebra, differential equations and fluid mechanics will benefit most greatly from this book.
Recent advances in gene sequencing technology are now shedding light on the complex interplay between genes that elicit phenotypic behavior characteristic of any given organism. In order to mediate internal and external signals, the daunting task of classifying an organism's genes into complex signaling pathways needs to be completed. The Handbook of Research on Computational Methodologies in Gene Regulatory Networks focuses on methods widely used in modeling gene networks including structure discovery, learning, and optimization. This innovative Handbook of Research presents a complete overview of computational intelligence approaches for learning and optimization and how they can be used in gene regulatory networks.
This book concerns issues related to biomathematics, medicine, or cybernetics as practiced by engineers. Considered population dynamics models are still in the interest of researchers, and even this interest is increasing, especially now in the time of SARS-CoV-2 coronavirus pandemic, when models are intensively studied in order to help predict its behaviour within human population. The structures of population dynamics models and practical methods of finding their solutions are discussed. Finally, the hypothesis of the existence of non-trivial ergodic properties of the model of erythropoietic response dynamics formulated by A. Lasota in the form of delay differential equation with unimodal feedback is analysed. The research can be compared with actual medical data, as well as shows that the structures of population models can reflect the dynamic structures of reality. |
![]() ![]() You may like...
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, …
Paperback
![]()
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, …
Hardcover
R3,357
Discovery Miles 33 570
Artificial Intelligence in Label-free…
Ata Mahjoubfar, Claire Lifan Chen, …
Hardcover
R3,369
Discovery Miles 33 690
|