![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > General
Nature has long provided the inspiration for a variety of scientific discoveries in engineering, biomedicine, and computing, though only recently have these elements of nature been used directly in computational systems. Natural Computing for Simulation and Knowledge Discovery investigates the latest developments in nature-influenced technologies. Within its pages, readers will find an in-depth analysis of such advances as cryptographic solutions based on cell division, the creation and manipulation of biological computers, and particle swarm optimisation techniques. Scientists, practitioners, and students in fields such as computing, mathematics, and molecular science will make use of this essential reference to explore current trends in natural computation and advance nature-inspired technologies to the next generation.
With the advent of the World Wide Web, electronic commerce has revolutionized traditional commerce, boosting sales and facilitating exchanges of merchandise and information. The emergence of wireless and mobile networks has made possible the introduction of electronic commerce to a new application and research area: mobile commerce. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies offers 22 outstanding chapters from 71 world-renowned scholars and IT professionals covering themes such as handheld computing for mobile commerce, handheld computing research and technologies, wireless networks and handheld/mobile security, and handheld images and video. It includes research and development results of lasting significance in the theory, design, implementation, analysis, and application of handheld computing. This book is essential for IT students, researchers, and professionals seeking to better understand handheld devices and concepts, thereby producing more useful and effective handheld applications and products.
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.
When researchers in computer-mediated communications discuss digital textuality, they rarely venture beyond the now commonplace notion that computer textuality embodies contemporary post-structuralist theories. Written for students and faculty of contemporary literature and composition theories, this book is the first to move from general to specific considerations. Advancing from general considerations of how computers are changing literacy, Digital Fictions moves on to a specific consideration of how computers are altering one particular set of literature practices: reading and writing fiction. Suffused through the sensibility of a creative writer, this book includes an historical overview of writing stories on computers. In addition, Sloane conducts interviews with the makers of hypertext fictions (including Stuart Moulthrop, Michael Joyce, and Carolyn Guyer) and offers close reading of digital fictions. Making careful analyses of the meaning-making activities of both readers and writers of this emerging genre, this work is embedded in a perspective both feminist and semiotic. Digital Fictions explores and distinguishes among four distinct iterations of text-based digital fictions; text adventures, Carnegie Mellon University Oz Project, hypertext fictions, and MUDs. Ultimately, Sloane revises the rhetorical triangle and proposes a new rhetorical theory, one that attends to the materials, processes, and locations of stories told on-line.
Technology has impacted how many teachers develop methods of instruction in their classroom settings. The Continuous Practice Improvement (CPI) professional development program introduces teachers to infusing computers into the curriculum and classroom activities seamlessly. ""Infusing Technology into the Classroom: Continuous Practice Improvement"" retells compelling stories of a successful computer-related professional development program that was implemented into Kindergarten through eighth grade classrooms of a Philadelphia school. Through an analysis of the study, a theoretical model to guide technology infused professional development for teachers is discovered.
Telemedicine has the potential to significantly alter structures, procedures, and eventually outcomes in healthcare structures worldwide. Today the field of telemedicine is still dominated by very committed efforts of research and development. However, there is a growing number of concepts and applications which have been implemented in clinical routine or are ready to be implemented. Health care providers, patients, third party payers, and not at least policy makers should be informed about these rapidly emerging applications, which could have a considerable impact on the delivery of health care. This book offers a comprehensive source of information not only for experts but also for the target groups mentioned above. It provides background information on legal aspects, issues concerning further development, and evaluation of telemedicine applications. The work also presents numerous projects covering the clinical fields of emergency medicine, surgery, oncology, cardiology, endocrinology, ophthalmology, dermatology, radiology, pathology, psychiatry and other clinical specialties. Recognizing the Internet as a major source of information on issues related to telemedicine and information technology in general, a 'Webliography' provides links to a selection of the most relevant Web sites on the Internet.
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
Note: This is the second printing. It contains all of the corrections as of May 2017 as well as an updated back cover. Roger Wagner's Assembly Lines articles originally appeared in Softalk magazine from October 1980 to June 1983. The first fifteen articles were reprinted in 1982 in Assembly Lines: The Book. Now, for the first time, all thirty-three articles are available in one complete volume. This edition also contains all of the appendices from the original book as well as new appendices on the 65C02, zero-page memory usage, and a beginner's guide to using the Merlin Assembler. The book is designed for students of all ages: the nostalgic programmer enjoying the retro revolution, the newcomer interested in learning low-level assembly coding, or the embedded systems developer using the latest 65C02 chips from Western Design Center. "Roger Wagner didn't just read the first book on programming the Apple computer-he wrote it." - Steve Wozniak
The book provides suggestions on how to start using bionic optimization methods, including pseudo-code examples of each of the important approaches and outlines of how to improve them. The most efficient methods for accelerating the studies are discussed. These include the selection of size and generations of a study's parameters, modification of these driving parameters, switching to gradient methods when approaching local maxima, and the use of parallel working hardware. Bionic Optimization means finding the best solution to a problem using methods found in nature. As Evolutionary Strategies and Particle Swarm Optimization seem to be the most important methods for structural optimization, we primarily focus on them. Other methods such as neural nets or ant colonies are more suited to control or process studies, so their basic ideas are outlined in order to motivate readers to start using them. A set of sample applications shows how Bionic Optimization works in practice. From academic studies on simple frames made of rods to earthquake-resistant buildings, readers follow the lessons learned, difficulties encountered and effective strategies for overcoming them. For the problem of tuned mass dampers, which play an important role in dynamic control, changing the goal and restrictions paves the way for Multi-Objective-Optimization. As most structural designers today use commercial software such as FE-Codes or CAE systems with integrated simulation modules, ways of integrating Bionic Optimization into these software packages are outlined and examples of typical systems and typical optimization approaches are presented. The closing section focuses on an overview and outlook on reliable and robust as well as on Multi-Objective-Optimization, including discussions of current and upcoming research topics in the field concerning a unified theory for handling stochastic design processes.
China Satellite Navigation Conference (CSNC 2021) Proceedings presents selected research papers from CSNC 2021 held during 22nd-25th May, 2021 in Nanchang, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 10 topics to match the corresponding sessions in CSNC2021 which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
This book shows you 1000 ways to seduce your website's visitor: Make visitors to buyers. Better: Make customers to friends. It explains how to become a successful seller by viral marketing at the web.
The world-class National Palace Museum (NPM) in Taiwan possesses a repository of the largest collection of Chinese cultural treasures of outstanding quality. Through implementing a two-organizational restructuring, and shifting its operational focus from being object-oriented to public-centered, it aims to capture the attention of people and promote awareness of the culture and traditions of China. In this vein, the NPM combines its expertise in museum service with the possibilities afforded by Information Technology (IT). This book analyses the research results of a team sponsored by the National Science Council in Taiwan to observe the development processes and accomplishments, and to conduct scientific researches covering not only the technology and management disciplines, but also the humanities and social science disciplines. The development process of new digital content and IT-enabled services of NPM would be a useful benchmark for museums, cultural and creative organizations and traditional organizations in Taiwan and around the world.
The concept of innovation management and learning organizations concepts strongly emphasize the high role of human/intellectual capital in the company and the crucial function of knowledge in modern society. However, there is often a paradox between managerial language and actual practice in many organizations: on one hand, knowledge-workers are perceived as the most valued members of organizations while, on the other, they are being manipulated and "engineered"-commonly driven to burn-out, and deprived of family life. All this leads to the emergence of new organizational phenomena that, up to now, have been insufficiently analyzed and described. Management Practices in High-Tech Environments studies this issue thoroughly from an international, comparative, cross-cultural perspective, presenting cutting-edge research on management practices in American, European, Asian and Middle-Eastern high-tech companies, with particular focus on fieldwork-driven, but reflective, contributions.
Recent industry surveys expect the cloud computing services market to be in excess of $20 billion and cloud computing jobs to be in excess of 10 million worldwide in 2014 alone. In addition, since a majority of existing information technology (IT) jobs is focused on maintaining legacy in-house systems, the demand for these kinds of jobs is likely to drop rapidly if cloud computing continues to take hold of the industry. However, there are very few educational options available in the area of cloud computing beyond vendor-specific training by cloud providers themselves. Cloud computing courses have not found their way (yet) into mainstream college curricula. This book is written as a textbook on cloud computing for educational programs at colleges. It can also be used by cloud service providers who may be interested in offering a broader perspective of cloud computing to accompany their own customer and employee training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. We have tried to write a comprehensive book that transfers knowledge through an immersive "hands-on approach," where the reader is provided the necessary guidance and knowledge to develop working code for real-world cloud applications. Additional support is available at the book's website: www.cloudcomputingbook.info Organization The book is organized into three main parts. Part I covers technologies that form the foundations of cloud computing. These include topics such as virtualization, load balancing, scalability & elasticity, deployment, and replication. Part II introduces the reader to the design & programming aspects of cloud computing. Case studies on design and implementation of several cloud applications in the areas such as image processing, live streaming and social networks analytics are provided. Part III introduces the reader to specialized aspects of cloud computing including cloud application benchmarking, cloud security, multimedia applications and big data analytics. Case studies in areas such as IT, healthcare, transportation, networking and education are provided.
This book presents the outcomes of the trans- and interdisciplinary research project NEMo (Nachhaltige Erfullung von Mobilitatsbedurfnissen im landlichen Raum - Sustainable Fulfilment of Mobility Needs in Rural Areas). Due to demographic change, it is becoming increasingly difficult for rural districts and communities to maintain a basic set of public transport services such as bus and train transit without encountering issues regarding necessary social participation, sensible regional value creation and, last but not least, achievable environmental protection goals. At the same time, the demand for mobility in rural areas will continue to rise in the future, e.g. due to the concentration of medical care facilities and shopping centres close to cities. Focusing on the development of sustainable and innovative mobility services and business models, this book explains how new mobility offers can be created in which citizens themselves become mobility providers. To do so, it combines the findings of the individual research groups with external contributions from science and practice.
We are now entering an era where the human world assumes recognition of itself as data. Much of humanity's basis for existence is becoming subordinate to software processes that tabulate, index, and sort the relations that comprise what we perceive as reality. The acceleration of data collection threatens to relinquish ephemeral modes of representation to ceaseless processes of computation. This situation compels the human world to form relations with non-human agencies, to establish exchanges with software processes in order to allow a profound upgrade of our own ontological understanding. By mediating with a higher intelligence, we may be able to rediscover the inner logic of the age of intelligent machines. In The End of the Future, Stephanie Polsky conceives an understanding of the digital through its dynamic intersection with the advent and development of the nation-state, race, colonization, navigational warfare, mercantilism, and capitalism, and the mathematical sciences over the past five centuries, the era during which the world became "modern." The book animates the twenty-first century as an era in which the screen has split off from itself and proliferated onto multiple surfaces, allowing an inverted image of totalitarianism to flash up and be altered to support our present condition of binary apperception. It progresses through a recognition of atomized political power, whose authority lies in the control not of the means of production, but of information, and in which digital media now serves to legitimize and promote a customized micropolitics of identity management. On this new apostolate plane, humanity may be able to shape a new world in which each human soul is captured and reproduced as an autonomous individual bearing affects and identities. The digital infrastructure of the twenty-first century makes it possible for power to operate through an esoteric mathematical means, and for factual material to be manipulated in the interest of advancing the means of control. This volume travels a course from Elizabethan England, to North American slavery, through cybernetic Social Engineering, Cold War counterinsurgency, and the (neo)libertarianism of Silicon Valley in order to arrive at a place where an organizing intelligence that started from an ambition to resourcefully manipulate physical bodies has ended with their profound neutralization.
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Today's IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives.""Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education"" delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.
This book addresses a number of questions from the perspective of complex systems: How can we quantitatively understand the life phenomena? How can we model life systems as complex bio-molecular networks? Are there any methods to clarify the relationships among the structures, dynamics and functions of bio-molecular networks? How can we statistically analyse large-scale bio-molecular networks? Focusing on the modeling and analysis of bio-molecular networks, the book presents various sophisticated mathematical and statistical approaches. The life system can be described using various levels of bio-molecular networks, including gene regulatory networks, and protein-protein interaction networks. It first provides an overview of approaches to reconstruct various bio-molecular networks, and then discusses the modeling and dynamical analysis of simple genetic circuits, coupled genetic circuits, middle-sized and large-scale biological networks, clarifying the relationships between the structures, dynamics and functions of the networks covered. In the context of large-scale bio-molecular networks, it introduces a number of statistical methods for exploring important bioinformatics applications, including the identification of significant bio-molecules for network medicine and genetic engineering. Lastly, the book describes various state-of-art statistical methods for analysing omics data generated by high-throughput sequencing. This book is a valuable resource for readers interested in applying systems biology, dynamical systems or complex networks to explore the truth of nature.
This book examines construction safety from the perspective of informatics and econometrics. It demonstrates the potential of employing various information technology approaches to share construction safety knowledge. In addition, it presents the application of econometrics in construction safety studies, such as an analytic hierarchy process used to create a construction safety index. It also discusses structure equation and dynamic panel models for the analysis of construction safety claims. Lastly, it describes the use of mathematical and econometric models to investigate construction practitioners' safety.
Handbook of Research on Ambient Intelligence and Smart Environments: Trends and Perspectives covers the cutting-edge aspects of AMI applications, specifically those involving the effective design, realization, and implementation of a comprehensive AmI application. This pertinent publication targets researchers and practitioners in Ambient Intelligence, as well as those in ubiquitous and pervasive computing, artificial intelligence, sensor networks, knowledge representation, automated reasoning and learning, system and software engineering, and man-machine interfaces.
This book is an introduction into methodology and practice of analysis, design and implementation of distributed health information systems. Special attention is dedicated to security and interoperability of such systems as well as to advanced electronic health record approaches. In the book, both available architectures and implementations but also current and future innovations are considered. Therefore, the component paradigm, UML, XML, eHealth are discussed in a concise way. Many practical solutions specified and implemented first in the author's environment are presented in greater detail. The book addresses information scientists, administrators, health professionals, managers and other users of health information systems.
Several Python programming books feature tools designed for experimental psychologists. What sets this book apart is its focus on eye-tracking. Eye-tracking is a widely used research technique in psychology and neuroscience labs. Research grade eye-trackers are typically faster, more accurate, and of course, more expensive than the ones seen in consumer goods or usability labs. Not surprisingly, a successful eye-tracking study usually requires sophisticated computer programming. Easy syntax and flexibility make Python a perfect choice for this task, especially for psychology researchers with little or no computer programming experience. This book offers detailed coverage of the Pylink library, a Python interface for the gold standard EyeLink (R) eye-trackers, with many step-by-step example scripts. This book is a useful reference for eye-tracking researchers, but you can also use it as a textbook for graduate-level programming courses.
This is a volume of chapters on the historical study of information, computing, and society written by seven of the most senior, distinguished members of the History of Computing field. These are edited, expanded versions of papers presented in a distinguished lecture series in 2018 at the University of Colorado Boulder - in the shadow of the Flatirons, the front range of the Rocky Mountains. Topics range widely across the history of computing. They include the digitalization of computer and communication technologies, gender history of computing, the history of data science, incentives for innovation in the computing field, labor history of computing, and the process of standardization. Authors were given wide latitude to write on a topic of their own choice, so long as the result is an exemplary article that represents the highest level of scholarship in the field, producing articles that scholars in the field will still look to read twenty years from now. The intention is to publish articles of general interest, well situated in the research literature, well grounded in source material, and well-polished pieces of writing. The volume is primarily of interest to historians of computing, but individual articles will be of interest to scholars in media studies, communication, computer science, cognitive science, general and technology history, and business. |
![]() ![]() You may like...
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,349
Discovery Miles 23 490
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,119
Discovery Miles 41 190
|