![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
The theory developed for 2 4-additive codes is the starting point for much generalization about codes over mixed alphabets. They have opened a new, emergent area of research. The techniques used for 2 4-linear codes are being generalized and applied to more general codes. By example, these codes have contributed to the classification of many nonlinear codes. Moreover, they can be considered as the starting point of many different generalizations given over mixed alphabets, thereby representing a useful area of research. Since 2010, more than 30 papers have been published about the codes considered in the book, which includes important classes of binary codes (1-perfect, Hadamard, etc.) that are not linear in general. For example, much recent research has shown the application of the techniques described for the family of cyclic 2 4-linear codes. Topics and Features: Examines everything from the basic definitions to very advanced results Provides numerous examples, succinctly and comprehensively gathering and using the relevant information Includes examples using commands from a new Magma package, developed mostly by the same authors Proposes algorithms, for instance to describe coding and decoding strategies This unique volume will be eminently suitable for researchers working on coding theory over rings, especially over mixed alphabets. Experts will find commands and algorithms that will be useful in the generalization to codes over mixed alphabets. Additionally, by outlining the basic theory of codes over mixed alphabets and providing numerous examples, the book will be useful to researchers wanting to be introduced to the topic. The authors are all affiliated with the Dept. of Information and Communications Engineering at the Universitat Autonoma de Barcelona, Spain. Joaquim Borges and Cristina Fernandez-Cordoba are Associate Professors, Jaume Pujol is a now retired Associate Professor, Josep Rifa is Professor Emeritus, and Merce Villanueva is Associate Professor.
Professional photographer David Taylor's concise, jargon-free text guides the reader through the basics of composition, why it matters, and how to attune the mind to the art of looking. The main composition concepts - from the Rule of Thirds, the Golden Section, the Rule of Odds, visual weight and contrast, to actual and implied lines in an image, symmetry, viewpoint and abstraction - are each analysed and demonstrated with the aid of the author's own beautiful images.
Electronic Chips & Systems Design Languagesoutlines and describes the latest advances in design languages. The challenge of System on a Chip (SOC) design requires designers to work in a multi-lingual environment which is becoming increasingly difficult to master. It is therefore crucial for them to learn, almost in real time, from the experiences of their colleagues in the use of design languages and how these languages have become more advanced to cope with system design. System designers, as well as students willing to become system designers, often do not have the time to attend all scientific events where they could learn the necessary information. This book will bring them a selected digest of the best contributions and industry strength case studies. All the levels of abstraction that are relevant, from the informal user requirements down to the implementation specifications, are addressed by different contributors. The author, together with colleague authors who provide valuable additional experience, presents examples of actual industrial world applications. Furthermore the academic concepts presented in this book provide excellent theories to student readers and the concepts described are up to date and in so doing provide most suitable root information for Ph.D. postgraduates.
Recent industry surveys expect the cloud computing services market to be in excess of $20 billion and cloud computing jobs to be in excess of 10 million worldwide in 2014 alone. In addition, since a majority of existing information technology (IT) jobs is focused on maintaining legacy in-house systems, the demand for these kinds of jobs is likely to drop rapidly if cloud computing continues to take hold of the industry. However, there are very few educational options available in the area of cloud computing beyond vendor-specific training by cloud providers themselves. Cloud computing courses have not found their way (yet) into mainstream college curricula. This book is written as a textbook on cloud computing for educational programs at colleges. It can also be used by cloud service providers who may be interested in offering a broader perspective of cloud computing to accompany their own customer and employee training programs. The typical reader is expected to have completed a couple of courses in programming using traditional high-level languages at the college-level, and is either a senior or a beginning graduate student in one of the science, technology, engineering or mathematics (STEM) fields. We have tried to write a comprehensive book that transfers knowledge through an immersive "hands-on approach," where the reader is provided the necessary guidance and knowledge to develop working code for real-world cloud applications. Additional support is available at the book's website: www.cloudcomputingbook.info Organization The book is organized into three main parts. Part I covers technologies that form the foundations of cloud computing. These include topics such as virtualization, load balancing, scalability & elasticity, deployment, and replication. Part II introduces the reader to the design & programming aspects of cloud computing. Case studies on design and implementation of several cloud applications in the areas such as image processing, live streaming and social networks analytics are provided. Part III introduces the reader to specialized aspects of cloud computing including cloud application benchmarking, cloud security, multimedia applications and big data analytics. Case studies in areas such as IT, healthcare, transportation, networking and education are provided.
Digital Approaches to Inclusion and Participation in Cultural Heritage brings together best examples and practices of digital and interactive approaches and platforms from a number of projects based in European countries to foster social inclusion and participation in heritage and culture. It engages with ongoing debates on the role of culture and heritage in contemporary society relating to inclusion and exclusion, openness, access, and bottom-up participation. The contributions address key themes such as the engagement of marginalised communities, the opening of debates and new interpretations around socially and historically contested heritages, and the way in which digital technologies may foster more inclusive cultural heritage practices. They will also showcase examples of work that can inspire reflection, further research, and also practice for readers such as practice-focused researchers in both HCI and design. Indeed, as well as consolidating the achievements of researchers, the contributions also represent concrete approaches to digital heritage innovation for social inclusion purposes. The book's primary audience is academics, researchers, and students in the fields of cultural heritage, digital heritage, human-computer interaction, digital humanities, and digital media, as well as practitioners in the cultural sector.
China's Belt and Road Initiatives (BRI) is an ambitious infrastructure project conceived in 2013 by President Xi Jinping with development and investment initiatives stretching from Asia and Europe that reflect the original Silk Road with business networks through countries such as Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as India and Pakistan, spanning a route of more than four thousand miles and history that can be dated back more than 2200 years. Given the background of China's unique approach in fighting the COVID-19, and against the backdrop of sluggish economic growth, innovation and management within the sustainable development of BRI will be the key and the driving force for the post-pandemic economic recovery for many countries, especially when BRI countries now accounts for nearly 30% of China's foreign trade and 15% of outward direct investment. The vision to create a vast network of railways, energy pipelines, highways, and streamlined border crossings to expand the international use of Chinese currency and improve connectivity to China is good foresight and fortuitous with COVID-19 pandemic came to plague the world, and amid in the conflicts between US and China as well as a War between Russia and Ukraine. Since the inception of BRI many books are written to cover topics ranging from globalization to detailing how China's business and politics as a major motivation for China's overseas economic activities with case studies and practices, yet seldom of these books provide structured approach to the sustainable management of BRI projects. This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project. Here the readers will find guidelines and insights to survive and prosper in a myriad of BRI opportunities and risks. Most important of all, this book provides a glimpse of different approach for success in BRI projects, including sustainability, environmental issues, social and political aspects, technological, choice of industry, project management, education and training, governance and many more.
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
Semantic interoperability provides the means to automatically process and integrate large amounts of information without human intervention. ""Cases on Semantic Interoperability for Information Systems Integration: Practices and Applications"" provides an in-depth analysis of issues involved with the application of semantic interoperability to information assimilation tasks followed by field professionals. This significant collection of research explains in-depth issues involved the integration of large amounts of heterogeneous information and points to deficiencies of current systems.
This title discusses design strategies, implementation difficulties, and the effectiveness of online labs. It provides scholars, researchers, and practitioners support for lab-based e-learning, gives guidance on the selection of technologies for various projects, and illustrates Web-based teaching with case studies.
An understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure will be crucial to those who design and deploy the next generation of mission-critical applications and Web Services. Reliable Distributed Systems reviews and describes the key concepts, principles and applications of modern distributed computing systems and architectures. This self-contained book consists of five parts. The first covers introductory material, including the basic architecture of the Internet, simple protocols such as RPC and TCP, object oriented architectures, operating systems enhance-ments for high performance, and reliability issues. The second covers the Web, with a focus on Web Services technologies, Microsofta (TM)s .NET and the Java Enterprise Edition. The last three parts look at a number of reliability and fault-tolerance issues and techniques, with an emphasis on replication applied in Web Services settings. Topics and features: * Explains fault-tolerance in clear, readily understood terms with concrete examples drawn from real-world settings * A practical focus aimed at building "mission-critical" networked applications that keep working even when things go wrong * Includes modern topics, such as Corba, Web Services, XML, .NET, J2EE, group communication, transactions, peer-to-peer systems, time-critical protocols, scalability and security * Thorough coverage of fundamental mechanisms, with an emphasis on the idea of "consistent behavior" in systems that replicate critical components for availability * Reviews more than 25 major research efforts, placing them in context with pointers to sources *Includes 80 problems ranging from simple tests of understanding to challenging protocol and systems design topics suitable for semester-long projects * Web-based materials for instructors, including a comprehensive slide set, available at: http: //www.cs.cornell.edu/ken/book With its well-focused approach and clarity of presentation, this new text is an excellent resource for both advanced students and practitioners in computer science, computer networks and distributed systems. Anyone seeking a solid background in distributed computing and Web Services architectures will find the book an essential and practical learning tool.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
The book investigates various MPPT algorithms, and the optimization of solar energy using machine learning and deep learning. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse engineering domains including electrical, electronics and communication, computer, and environmental. This book: Discusses data acquisition by the internet of things for real-time monitoring of solar cells. Covers artificial neural network techniques, solar collector optimization, and artificial neural network applications in solar heaters, and solar stills. Details solar analytics, smart centralized control centers, integration of microgrids, and data mining on solar data. Highlights the concept of asset performance improvement, effective forecasting for energy production, and Low-power wide-area network applications. Elaborates solar cell design principles, the equivalent circuits of single and two diode models, measuring idealist factors, and importance of series and shunt resistances. The text elaborates solar cell design principles, the equivalent circuit of single diode model, the equivalent circuit of two diode model, measuring idealist factor, and importance of series and shunt resistances. It further discusses perturb and observe technique, modified P&O method, incremental conductance method, sliding control method, genetic algorithms, and neuro-fuzzy methodologies. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse engineering domains including electrical, electronics and communication, computer, and environmental.
Reconfigurable computing brings immense flexibility to on-chip processing while network-on-chip has improved flexibility in on-chip communication. Integrating these two areas of research reaps the benefits of both and represents the promising future of multiprocessor systems-on-chip. Dynamic Reconfigurable Network-on-Chip Design: Innovations for Computational Processing and Communication is the one of the first compilations written to demonstrate this future for network -on-chip design. Through dynamic and creative research into questions ranging from integrating reconfigurable computing techniques, to task assigning, scheduling and arrival, to designing an operating system to take advantage of the computing and communication flexibilities brought about by run-time reconfiguration and network-on-chip, this book represents a complete source of the techniques and applications for reconfigurable network-on-chip necessary for understanding of future of this field.
Conflicts between agents acting in a multi-agent environment arise for different reasons, involve different concepts, and are dealt with in different ways, depending on the kind of agents and on the domain where they are considered. Agents may have conflicting beliefs, conflicting goals, or may have to share limited resources. Consequently, conflicts may be expressed as mere differences, or as contradictions, or even as social conflicts. They may be avoided, solved, kept, or even created deliberately. Conflicting Agents studies conflicts in the context of multi-agent systems, i.e. artificial societies modeled on the basis of autonomous, interacting agents. This book addresses questions about types of conflicts, conflict definitions and the use of conflicts as trigger functions for activities in multi-agent systems. The book is also dedicated to questions of conflict management, resolution and avoidance, i.e. the question of how agents cope with conflicts and conflicting situations.
This book presents case studies of the development of videotex in the UK, France, Germany, Italy, the Netherlands, Austria, Switzerland, Belgium, Denmark, Spain, Sweden, Ireland and the United States. These studies offer an excellent overview of the many factors which might influence the outcome of complex innovation and implementation processes. Videotex is an interlocked innovation comprising not only innovations in the infrastructure (networks, hard- and software) but also an innovation in the supply of services and the user demand. If only one of these elements is absent the entire chain breaks down and the innovation process is hampered. In Europe two different implementation strategies can be distinguished: the Prestel and the Teletel scenarios. Until now, only Teletel has proved successful and only in one country: France. Given this state of affairs the following question is raised - will the relaunch of videotex succeed in countries where the initial Prestel strategy failed? Or will an open market approach, as followed in the United States, present a more direct route to the successful relaunch of videotex in the 1990's. This collection presents a coherent up-to-date survey and analysis of videotex systems operating throughout Europe. It analyses the use, success, limitations and future of videotex systems and related technologies. The collection will be of interest to computer, information and communication scientists, especially those who work in telecommunication and information management. It also offers case study of information technology policy analysis and as such should be of interest to social and political scientists specialising in technological policy.
The second half of this century will remain as the era of proliferation of electronic computers. They did exist before, but they were mechanical. During next century they may perform other mutations to become optical or molecular or even biological. Actually, all these aspects are only fancy dresses put on mathematical machines. This was always recognized to be true in the domain of software, where "machine" or "high level" languages are more or less rigourous, but immaterial, variations of the universaly accepted mathematical language aimed at specifying elementary operations, functions, algorithms and processes. But even a mathematical machine needs a physical support, and this is what hardware is all about. The invention of hardware description languages (HDL's) in the early 60's, was an attempt to stay longer at an abstract level in the design process and to push the stage of physical implementation up to the moment when no more technology independant decisions can be taken. It was also an answer to the continuous, exponential growth of complexity of systems to be designed. This problem is common to hardware and software and may explain why the syntax of hardware description languages has followed, with a reasonable delay of ten years, the evolution of the programming languages: at the end of the 60's they were" Algol like" , a decade later "Pascal like" and now they are "C or ADA-like". They have also integrated the new concepts of advanced software specification languages.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
With a global view and a vision of our digital future, we should move forward with an understanding of data rights legislation at pace. The earlier we set the value norms around data in this digital long distance race, the more likely we will grasp the opportunities therein and embrace a future of commonly understood values. With a view to the future, the branch of Chinese law that is most likely to lead the world is that related to the digital economy. At the same time, if China wants to be amongst the world's leading digital economies, the basics to be understood and promoted most are higher quality, fairer and more sustainable institutional protection for data rights and subject-relevant interests, and the ability to offer systematic and accurate legal rules within the various digital disciplines.
Workflow management systems (WFMS) are enjoying increasing popular ity due to their ability to coordinate and streamline complex organizational processes within organizations of all sizes. Organizational processes are de scriptions of an organization's activities engineered to fulfill its mission such as completing a business contract or satisfying a specific customer request. Gaining control of these processes allows an organization to reengineer and improve each process or adapt them to changing requirements. The goal of WFMSs is to manage these organizational processes and coordinate their execution. was demonstrated in the first half The high degree of interest in WFMSs of the 1990s by a significant increase in the number of commercial products (once estimated to about 250) and the estimated market size (in combined $2 billion in 1996. Ensuing maturity product sales and services) of about is demonstrated by consolidations during the last year. Ranging from mere e-mail based calendar tools and flow charting tools to very sophisticated inte grated development environments for distributed enterprise-wide applications and systems to support programming in the large, these products are finding an eager market and opening up important research and development op portunities. In spite of their early success in the market place, however, the current generation of systems can benefit from further research and develop ment, especially for increasingly complex and mission-critical applications.
This volume details a collection of state-of-art methods including identification of novel ncRNAs and their targets, functional annotation and disease association in different biological contexts. Chapters guide readers through an overview of disease-specific ncRNAs, computational methods and workflows for ncRNA discovery, annotation based on high-throughput sequencing data, bioinformatics tools and databases for ncRNA analyses, network-based methods, and kinetic modelling of ncRNA-mediated gene regulation. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and cutting-edge, Computational Biology of Non-Coding RNA: Methods and Protocols aims to provide a state-of-the-art collection of computational methods and approaches that will be of value to researchers interested in ncRNA field.
Computer technology has developed remarkably in the field of neurosurgery during the past 10 to 20 years. Great achievements have been made recently in neuroimaging techniques and computer technology for neuronavigation, from frameless, armless systems to robotic microscopes. Contained in the present volume are all the papers presented at the International Symposium on Computer-Assisted Neurosurgery and selected papers presented at the 6th Annual Meeting of the Japanese Society of Computers in Neurosurgery, which were held in Kobe, Japan, on January 24-26, 1997. This volume is a comprehensive description and review of current technical ad vancements in computer-assisted neurosurgery, with a special focus on advanced intraoperative neuroimaging, various neuronavigation system, robotic microscopes, and strategies for preoperative and intraoperative surgical planning using high-power workstations with three-dimensional software. We express our thanks to the contributors for their participation and cooperation, and to Springer-Verlag for personal and technical assistance in publishing this work. We sincerely hope that this volume will contribute to improving neurosurgical technology and outcomes. |
![]() ![]() You may like...
Energy-Efficient Communication…
Robert Fasthuber, Francky Catthoor, …
Hardcover
R5,000
Discovery Miles 50 000
Number Tracing Workbook For Preschoolers…
Activity Treasures
Hardcover
Near Threshold Computing - Technology…
Michael Hubner, Cristina Silvano
Hardcover
R1,521
Discovery Miles 15 210
|