![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > General
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. ""Computational Advancements in End-User Technologies: Emerging Models and Frameworks"" contains leading research and practices into the advancement, significance, and comprehensive nature of end-user computing. A defining collection of significant tools, applications, and methodologies within this expanding field of study, this publication provides academicians, researchers, and practitioners with a complete and practical resource of expert international findings.
Human, Social, and Organizational Aspects of Health Information Systems offers an evidence-based management approach to issues associated with the human and social aspects of designing, developing, implementing, and maintaining health information systems across a healthcare organization - specific to an individual, team, organizational, system, and international perspective. Integrating knowledge from multiple levels, this book will benefit scholars and practitioners from the medical information, health service management, information technology arenas.
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
Advances in web technology and the proliferation of sensors and mobile devices connected to the internet have resulted in the generation of immense data sets available on the web that need to be represented, saved, and exchanged. Massive data can be managed effectively and efficiently to support various problem-solving and decision-making techniques. Emerging Technologies and Applications in Data Modeling and Processing is a critical scholarly publication that examines the importance of data management strategies that coincide with advancements in web technologies. Highlighting topics such as geospatial coverages, data analysis, and keyword query, this book is ideal for professionals, researchers, academicians, data analysts, web developers, and web engineers.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
Radio Frequency Identification (RFID) is an automatic
identification method, relying on storing and remotely retrieving
data using devices called RFID tags (also called transponders).
Recent advances in gene sequencing technology are now shedding light on the complex interplay between genes that elicit phenotypic behavior characteristic of any given organism. In order to mediate internal and external signals, the daunting task of classifying an organism's genes into complex signaling pathways needs to be completed. The Handbook of Research on Computational Methodologies in Gene Regulatory Networks focuses on methods widely used in modeling gene networks including structure discovery, learning, and optimization. This innovative Handbook of Research presents a complete overview of computational intelligence approaches for learning and optimization and how they can be used in gene regulatory networks.
Due to growing technologies for learning processes, universities are making modifications in the development and construction of courses and services they offer. ""Monitoring and Assessment in Online Collaborative Environments: Emergent Computational Technologies for E-Learning Support"" focuses on new models and systems that perform efficient evaluation of student activity in Internet-based education. Containing research from leading international experts, this Premier Reference Source introduces original case studies and experiences of educators worldwide regarding e-learning activities.
Outsourcing is currently one of the hottest topics in business practices and in particular in the field of management information systems (MIS) education. Outsourcing Management Information Systems focuses on concepts, processes, and methodologies for firms who are planning to undertake, or are currently involved in, outsourcing decisions in the field of management information systems. Outsourcing Management Information Systems helps MIS managers to manage outsourcing projects by establishing performance metrics, including: appropriate risk factor considerations, structuring a centralized architecture that best suits the organization, and avoiding the case study pitfalls reported in the literature.
The only book of its kind to look at how our legal system needs to change to accommodate a world in which machines, in addition to people, make decisions. For years, robots were solely a matter of science fiction. Today, artificial intelligence technologies serve to accelerate our already fast-paced lives even further. From Apple's Siri to the Google Car to GPS, machines and technologies that make decisions and take action without direct human supervision have become commonplace in our daily lives. As a result, laws must be amended to protect companies that produce robots and the people that buy and use them. This book provides an extensive examination of how numerous legal areas-including liability, traffic, zoning, and international and constitutional law-must adapt to the widespread use of artificial intelligence in nearly every area of our society. The author scrutinizes the laws governing such fields as transportation, medicine, law enforcement, childcare, and real estate development. Describes court cases, regulations, and statutes that are affected by the technological advances of artificial intelligence Eschews overtly technical or legalistic discussions to provide clear, accessible information Discusses a number of popular, topical, and controversial technologies, providing historical background for each and their legal implications Focuses on devices that are already in use to illustrate where the law falls short in governing artificial intelligence and how legal models should be amended
While much has been written about strategic information systems planning, the integration of strategic planning with portfolio management has been ignored, leaving the potential benefits of their combined approach to planning yet to be explored. ""Strategic Information Technology and Portfolio Management"" bridges the knowledge between information technology planning, enterprise architecture, and IT portfolio management taking into account their financial impact. Intended for IT professionals, researchers, and academicians, this book provides techniques and tools appropriate for building application portfolios and developing strategies which increase financial performance.
Yours can be the first APPLE house on the block! Learn how to save time and money by using your Apple II computer to control your home: the security, lights, temperature, telephone, and much more. With John Blankenship's system of software and hardware, your house can accept verbal commands and respond with its own voice. It does not need human instruction and performs many useful tasks on its own. Once you get used to an intelligent house, you will wonder how you ever got along without one. Even though devices featured in The Apple House can be purchased, the author shows how you can save money by building some from scratch. He also points out that you can substitute equipment you already own because of the system's modularity. Although written with an Apple II computer in mind, the principles discussed can easily be transferred to other computer systems.
This book describes the development of an intrusion detection system for online poker, which uses player's game strategy as the behavioral profile. The system is improved by modifications to the similarity measure functions and different ways of representing behavioral signatures. The system is further enhanced by inclusion of spatial, temporal and contextual information about the environment alongside the user's behavior. Possibility of creation of artificial behavioral profiles and use of such profiles for spoofing of behavior-based security systems is investigated and promising results are achieved. In a somewhat related research, recognizing importance of games in our experiments, it is proven that poker is a game of skill. Finally, a number of games are analyzed in terms of their spatial ontologies.
This book presents recently developed computational approaches for the study of reactive materials under extreme physical and thermodynamic conditions. It delves into cutting edge developments in simulation methods for reactive materials, including quantum calculations spanning nanometer length scales and picosecond timescales, to reactive force fields, coarse-grained approaches, and machine learning methods spanning microns and nanoseconds and beyond. These methods are discussed in the context of a broad range of fields, including prebiotic chemistry in impacting comets, studies of planetary interiors, high pressure synthesis of new compounds, and detonations of energetic materials. The book presents a pedagogical approach for these state-of-the-art approaches, compiled into a single source for the first time. Ultimately, the volume aims to make valuable research tools accessible to experimentalists and theoreticians alike for any number of scientific efforts, spanning many different types of compounds and reactive conditions.
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
With the ever-present growth in technology, opportunities to explore and experience technology at an early age are increasingly important in order to develop problem-solving and thinking skills. ""Technology for Early Childhood Education and Socialization: Developmental Applications and Methodologies"" provides readers with valuable and authentic research on how technology relates to early childhood growth. Including international perspectives on technology and education from expert authors, this book discusses important issues of assessment, teacher education, special education, and family involvement in terms of technology. |
![]() ![]() You may like...
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,119
Discovery Miles 41 190
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|