![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
Discussing career decision making (CDM), career guidance, a
computerized system of career guidance, and the interplay among
them, this book describes the way people sort themselves, or are
sorted, into educational and occupational options. The options
represent the content of this book, and the sorting represents the
process. The sequence of decisions may extend over a lifetime, but
several crucial choice-points tend to occur at predictable stages
in a career. Career guidance is a professional intervention in CDM;
"professional" implies that practitioners conform to a standard of
ethics, knowledge, and competence beyond what may be offered by
other intervenors. Guidance is partly an art, but it is also partly
a science -- at least an application of science, based on a
synthesis of logic and evidence derived from research.
The objective of this edited volume is to offer a general view at the recent conceptual developments of Soft Computing (SC) regarded as a general methodology supporting the design of hybrid systems along with their diversified applications to modeling, simulation and control of non-linear dynamical systems. As of now, SC methodologies embrace neural networks, fuzzy logic, genetic algorithms and chaos theory. Each of these methodologies exhibits well delineated advantages and disadvantages. Interestingly, they have been found useful in solving a broad range of problems. However, many real-world complex problems require a prudent, carefully orchestrated integration of several of these methodologies to fully achieve the required efficiency, accuracy, and interpretability of the solutions. In this edited volume, an overview of SC methodologies, and their applications to modeling, simulation and control, will be given in an introductory paper by the Editors. Then, detailed methods for integrating the different SC methodologies in solving real-world problems will be given in the papers by the other authors in the book. The edited volume will cover a wide spectrum of applications including areas such as: robotic dynamic systems, non-linear plants, manufacturing systems, and time series prediction.
This work examines the topic of dispute resolution, specifically the multi-criteria approach that seeks to arrive at a conclusion that is mutually beneficial to both sides. Through the use of decision-aiding software, the multi-criteria approach can allow each side to give on various criteria that are not important to it, but are important to the other side. In this way, a super-optimum solution may even be met, in which both sides receive something significantly better than they had expected. Such a result is very difficult, if not impossible, to achieve, Stuart Nagel points out, in traditional single-dimension dispute resolution. Nagel and Mills describe the nature of multi-criteria dispute resolution utilizing decision-aiding software. The first part of the book clarifies the general character of computer-aided negotiation, computer-aided mediation, and super-optimizing dispute resolution. Part two guides the reader through the use of Policy/Goal Percentaging (P/G%) decision-aiding software, centering on general decision-making, negotiation, mediation, and prediction of outcomes. Multi-criteria resolution in the context of rule-making and legal policy disputes is the focus of part three, where such matters as determining initial alternatives and criteria, resolving deadlocks, and arriving at super-optimum solutions are discussed. Part four emphasizes dispute resolution in the context of rule-applying and litigation disputes, as well as mediation at the international level and between lawyers and clients. The final part deals with future applications, such as computer-aided mediation and group decision-making with phone modems. The book's combination of decision-aiding software, arbitration-mediation, and super-optimum expansionist decision-making brings a truly innovative approach to the topic of dispute resolution. This volume should be a welcome addition to academic, legal, and public libraries, and a valuable reference work for lawyers, law students, and legal professors and researchers.
Cycloadditions are a very important class of reactions, which can be 1 used to obtain compounds of various ring sizes * Although these ,2 react? been largf: nvnntigated expnnivnntntit consi:fn ee f, :~oversy still fgeir mechanism, A reaction gene' ves the formaci new (J bonds between the reactants at the expense of n bonds. For such processes it is possible to postulate three different mechanisms: i) a synchron.ous concerted approach involving a cyclic transition state (TS) new bonds formed extent: ii)a neynchronous co:,:':" m:"chanism in whict fWO disticc to changes in e:f,me occurring the reactants and the single TS and the others mainly between the TS and products. iii) a two-step process, which occurs in two kinetically distinct steps via a ghnntical intermedintn Renect! gene computed the petential enerse or the ies of prototype tion reaction:f 4a i) the [2+2] cycloadditions H2C=CH2 + H C=CH , H C=O + H C=O,':b 2 2 2 2 H2 = 2 + O=O:4c C CH ii) the 1,3 dipolar cycloaddition HCNO + HC=CH, HCNO + H2C=CH2, H2CNHO 4d + H2C=CHd' 4e iii) cgdoaddition H C=CH * 2 2 have been potential enenpd th (STO-3G)5 ab-ini techniques f:ntcnged (4-31G)6 basis sets. All critical points have been fully optimized 7 using MC-SCF gradient techniques and characterized by diagonalizing 35 the related Hessian matrices computed using finite differences.
Robotic systems are characterized by the intersection of computer intelligence with the physical world. This blend of physical reasoning and computational intelligence is well illustrated by the Tetrobot study described in this book. Tetrobot: A Modular Approach to Reconfigurable Parallel Robotics describes a new approach to the design of robotic systems. The Tetrobot approach utilizes modular components which may be reconfigured into many different mechanisms which are suited to different applications. The Tetrobot system includes two unique contributions: a new mechanism (a multilink spherical joint design), and a new control architecture based on propagation of kinematic solutions through the structure. The resulting Tetrobot system consists of fundamental components which may be mechanically reassembled into any modular configuration, and the control architecture will provide position control of the resulting structure. A prototype Tetrobot system has been built and evaluated experimentally. Tetrobot arms, platforms, and walking machines have been built and controlled in a variety of motion and loading conditions. The Tetrobot system has applications in a variety of domains where reconfiguration, flexibility, load capacity, and failure recovery are important aspects of the task. A number of key research directions have been opened by the Tetrobot research activities. Continuing topics of interest include: development of a more distributed implementation of the computer control architecture, analysis of the dynamics of the Tetrobot system motion for improved control of high-speed motions, integration of sensor systems to control the motion and shape of the high-dimensionality systems, and exploration of self-reconfiguration of the system. Tetrobot: A Modular Approach to Reconfigurable Parallel Robotics will be of interest to research workers, specialists and professionals in the areas of robotics, mechanical systems and computer engineering.
Designing VLSI systems represents a challenging task. It is a transfonnation among different specifications corresponding to different levels of design: abstraction, behavioral, stntctural and physical. The behavioral level describes the functionality of the design. It consists of two components; static and dynamic. The static component describes operations, whereas the dynamic component describes sequencing and timing. The structural level contains infonnation about components, control and connectivity. The physical level describes the constraints that should be imposed on the floor plan, the placement of components, and the geometry of the design. Constraints of area, speed and power are also applied at this level. To implement such multilevel transfonnation, a design methodology should be devised, taking into consideration the constraints, limitations and properties of each level. The mapping process between any of these domains is non-isomorphic. A single behavioral component may be transfonned into more than one structural component. Design methodologies are the most recent evolution in the design automation era, which started off with the introduction and subsequent usage of module generation especially for regular structures such as PLA's and memories. A design methodology should offer an integrated design system rather than a set of separate unrelated routines and tools. A general outline of a desired integrated design system is as follows: * Decide on a certain unified framework for all design levels. * Derive a design method based on this framework. * Create a design environment to implement this design method.
While simulation has a vast area of application, this textbook focuses on the use of simulation to analyse business processes. It provides an up-to-date coverage of all stages of the discrete-event simulation (DES) process, covering important areas such as conceptual modelling, modelling input data, verification and validation and simulation output analysis. The book is comprehensive yet uncomplicated, covering the theoretical aspects of the subject and the practical elements of a typical simulation project, demonstrated by cases, examples and exercises. It also shows how simulation relates to new developments in machine learning, big data analytics and conceptual modelling techniques. Guidance is provided on how to build DES models using the Arena, Simio and Simul8 simulation software, and tutorials for using the software are incorporated throughout. Simulation Modelling offers a uniquely practical and end-to-end overview of the subject, which makes it perfect required or recommended reading for advanced undergraduate and postgraduate students studying business simulation and simulation modelling as part of operations research, business analytics, supply chain management and computer science courses.
This book offers a new Modular Petri Net as a solution to the vast Petri net models. It presents some approaches centering around modules (known as "Petri modules"). The goal of this book is to introduce a methodology in which Petri nets are moved to a new level. In this new level, large Petri net models are made of Petri modules, which are independent and run on different computers. This book also contains the literature study on modular Petri nets and definitions for the newer Petri modules. Also, algorithms for extracting Petri modules, and algorithms for connecting Petri modules, and applications are given in this book. Besides, the ideas and algorithms given in this book are implemented in the software General-purpose Petri Net Simulator (GPenSIM). Hence, with the use of this book the readers/users would be able to know that real-life discrete event systems could be modeled, analyzed, and performance-optimized with GPenSIM.
Teach students to maximize the use of mobile devices, make the most of online tools for collaboration and communications, and fully utilize today's Internet capabilities with the latest edition DISCOVERING COMPUTERS ENHANCED. Introductory computing students see how technology skills assist in employment and advancing careers. This edition highlights the most recent developments in computer tools and technology with new emphasis on Web Development, creating a strong web presence, and the latest Windows 10 information. To keep content as current as possible, online coverage of contemporary technology developments builds on the book's discussions. The authors emphasize actionable content with a proven learning structure and practice to reinforce key skills. Self-assessments open each chapter, enabling learners to target study and learn more in less time. DISCOVERING COMPUTERS ENHANCED presents the content students need to succeed in a way that ensures understanding.
Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem solving. For example, Chapter 2 is devoted to algorithm development, Chapter 8 is devoted to program design, and problem-solving sections appear throughout the book. The third edition introduces several new Java language features, most of the end-of-chapter GUI sections and the final GUI chapters use JavaFX, and almost all end-of-chapter exercises are new.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.
A Formal Approach to Hardware Design discusses designing computations to be realised by application specific hardware. It introduces a formal design approach based on a high-level design language called Synchronized Transitions. The models created using Synchronized Transitions enable the designer to perform different kinds of analysis and verification based on descriptions in a single language. It is, for example, possible to use exactly the same design description both for mechanically supported verification and synthesis. Synchronized Transitions is supported by a collection of public domain CAD tools. These tools can be used with the book in presenting a course on the subject. A Formal Approach to Hardware Design illustrates the benefits to be gained from adopting such techniques, but it does so without assuming prior knowledge of formal design methods. The book is thus not only an excellent reference, it is also suitable for use by students and practitioners.
Although GIS has been in existence for over 20 years, the systems have only recently matured to the point where they have become accessible to geographers, planners, environmental scientists and others as an affordable and practical tool for spatial analysis. Much of the GIS literature is scattered over the journals and technical reports of a number of disciplines. These sources are often not widely available especially to the newcomer to the field. This text was assembled to bring together what we believe is a balanced sampling of written works that cover important aspects of the basic principles involved in GIS, as well as to provide some examples of GIS applications.
Modern Placement Techniques explains physical design and VLSI/CAD
placement to the professional engineer and engineering student.
Along with explaining the problems that are associated with
placement, the book gives an overview of existing placement
algorithms, techniques and methodologies. Modern Placement
Techniques emphasizes recent advances in addressing the placement
problem, including congestion-driven, timing driven, mixed
macro-cell and standard cell placement.
The first edition of Exercises in Programming Style was honored as an ACM Notable Book and praised as "The best programming book of the decade." This new edition retains the same presentation but has been upgraded to Python 3, and there is a new section on neural network styles. Using a simple computational task (term frequency) to illustrate different programming styles, Exercises in Programming Style helps readers understand the various ways of writing programs and designing systems. It is designed to be used in conjunction with code provided on an online repository. The book complements and explains the raw code in a way that is accessible to anyone who regularly practices the art of programming. The book can also be used in advanced programming courses in computer science and software engineering programs. The book contains 40 different styles for writing the term frequency task. The styles are grouped into ten categories: historical, basic, function composition, objects and object interactions, reflection and metaprogramming, adversity, data-centric, concurrency, interactivity, and neural networks. The author states the constraints in each style and explains the example programs. Each chapter first presents the constraints of the style, next shows an example program, and then gives a detailed explanation of the code. Most chapters also have sections focusing on the use of the style in systems design as well as sections describing the historical context in which the programming style emerged.
The computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity to tie these subjects together and reinforce learning. In fact, automata theory and logic evolved hand-in-hand, yet this connection was severed in the '70s as separate automata-theory and logic courses became possible. Now, with computer science departments suffering from overcrowded syllabi, it is often possible for undergraduates to get a BS without having had to take a course in mathematical logic Today's students want to know how knowledge can work for them - learning theory as a tool is preferable to learning theory for theory's sake. To prove that theoretical tenents are not only applicable, but also necessary and relevant, useful examples must be presented. This textbook uses interactive tools throughout, such as simple BDD and SAT tools. shown to be both inviting and current. Topics are also illustrated in multiple domains so that information is reinforced and students can begin to tie theory and logic together. Having used this book, students will not only know and understand automata theory, but also be able to apply their knowledge in real practice.
Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms evolutionary computation, neural networks, fuzzy systems, evolvable hardware, DNA computing, artificial immune systems. A unitary whole of theory and application, the book provides readers with the fundamentals, background information, and practical methods for building a hybrid intelligent system. It treats a panoply of applications, including many in industry, educational systems, forecasting, financial engineering, and bioinformatics. This volume is useful to newcomers in the field because it quickly familiarizes them with engineering elements of developing hybrid intelligent systems and a wide range of real applications, including non-industrial applications. Researchers, developers and technically oriented managers can use the book for developing both new hybrid intelligent systems approaches and new applications requiring the hybridization of the typical tools and concepts to computational intelligence."
This book explores clustering operations in the context of social networks and consensus-reaching paths that take into account non-cooperative behaviors. This book focuses on the two key issues in large-scale group decision-making: clustering and consensus building. Clustering aims to reduce the dimension of a large group. Consensus reaching requires that the divergent individual opinions of the decision makers converge to the group opinion. This book emphasizes the similarity of opinions and social relationships as important measurement attributes of clustering, which makes it different from traditional clustering methods with single attribute to divide the original large group without requiring a combination of the above two attributes. The proposed consensus models focus on the treatment of non-cooperative behaviors in the consensus-reaching process and explores the influence of trust loss on the consensus-reaching process.The logic behind is as follows: firstly, a clustering algorithm is adopted to reduce the dimension of decision-makers, and then, based on the clusters' opinions obtained, a consensus-reaching process is carried out to obtain a decision result acceptable to the majority of decision-makers. Graduates and researchers in the fields of management science, computer science, information management, engineering technology, etc., who are interested in large-scale group decision-making and consensus building are potential audience of this book. It helps readers to have a deeper and more comprehensive understanding of clustering analysis and consensus building in large-scale group decision-making.
Numerical methods are playing an ever-increasing role in physics and engineering. This is especially true after the recent explosion of computing power on the desk-top. This book is aimed at helping the user to make intelligent use of this power tool. Each method is introduced through realistic examples and actual computer programs. The explanations provide the background for making a choice between similar approaches and the knowledge to explore the network for the appropriate existing codes. Tedious proofs and derivations, on the other hand, are delegated to references. Examples of uncoventional methods are also given to stimulate readers in exploring new ways of solving problems.
This study surveys the approaches used and problems encountered in the modelling of real geophysical data. It addresses key themes of the modelling process including the selection of reliable data, the choice of data structure and the objective analysis of 3-D information presented in the model.
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective). |
![]() ![]() You may like...
GIS Applications in the Tourism and…
Somnath Chaudhuri, Nilanjan Ray
Hardcover
R5,798
Discovery Miles 57 980
High Performance Computing in Science…
Wolfgang E. Nagel, Dietmar H. Kroener, …
Hardcover
R5,973
Discovery Miles 59 730
Recent Advances in Estimating Nonlinear…
Jun Ma, Mark Wohar
Hardcover
Small Flying Drones - Applications for…
Gianluca Casagrande, Andras Sik, …
Hardcover
R5,285
Discovery Miles 52 850
Sensor Systems Simulations - From…
Willem Dirk van Driel, Oliver Pyper, …
Hardcover
R3,622
Discovery Miles 36 220
Risk-Based Engineering - An Integrated…
Prabhakar V. Varde, Michael G. Pecht
Hardcover
R3,919
Discovery Miles 39 190
|