![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
Quantum Computing for the Brain argues that the brain is the killer application for quantum computing. No other system is as complex, as multidimensional in time and space, as dynamic, as less well-understood, as of peak interest, and as in need of three-dimensional modeling as it functions in real-life, as the brain.Quantum computing has emerged as a platform suited to contemporary data processing needs, surpassing classical computing and supercomputing. This book shows how quantum computing's increased capacity to model classical data with quantum states and the ability to run more complex permutations of problems can be employed in neuroscience applications such as neural signaling and synaptic integration. State-of-the-art methods are discussed such as quantum machine learning, tensor networks, Born machines, quantum kernel learning, wavelet transforms, Rydberg atom arrays, ion traps, boson sampling, graph-theoretic models, quantum optical machine learning, neuromorphic architectures, spiking neural networks, quantum teleportation, and quantum walks.Quantum Computing for the Brain is a comprehensive one-stop resource for an improved understanding of the converging research frontiers of foundational physics, information theory, and neuroscience in the context of quantum computing.
Electronic Chips & Systems Design Languagesoutlines and describes the latest advances in design languages. The challenge of System on a Chip (SOC) design requires designers to work in a multi-lingual environment which is becoming increasingly difficult to master. It is therefore crucial for them to learn, almost in real time, from the experiences of their colleagues in the use of design languages and how these languages have become more advanced to cope with system design. System designers, as well as students willing to become system designers, often do not have the time to attend all scientific events where they could learn the necessary information. This book will bring them a selected digest of the best contributions and industry strength case studies. All the levels of abstraction that are relevant, from the informal user requirements down to the implementation specifications, are addressed by different contributors. The author, together with colleague authors who provide valuable additional experience, presents examples of actual industrial world applications. Furthermore the academic concepts presented in this book provide excellent theories to student readers and the concepts described are up to date and in so doing provide most suitable root information for Ph.D. postgraduates.
Digital Approaches to Inclusion and Participation in Cultural Heritage brings together best examples and practices of digital and interactive approaches and platforms from a number of projects based in European countries to foster social inclusion and participation in heritage and culture. It engages with ongoing debates on the role of culture and heritage in contemporary society relating to inclusion and exclusion, openness, access, and bottom-up participation. The contributions address key themes such as the engagement of marginalised communities, the opening of debates and new interpretations around socially and historically contested heritages, and the way in which digital technologies may foster more inclusive cultural heritage practices. They will also showcase examples of work that can inspire reflection, further research, and also practice for readers such as practice-focused researchers in both HCI and design. Indeed, as well as consolidating the achievements of researchers, the contributions also represent concrete approaches to digital heritage innovation for social inclusion purposes. The book's primary audience is academics, researchers, and students in the fields of cultural heritage, digital heritage, human-computer interaction, digital humanities, and digital media, as well as practitioners in the cultural sector.
China's Belt and Road Initiatives (BRI) is an ambitious infrastructure project conceived in 2013 by President Xi Jinping with development and investment initiatives stretching from Asia and Europe that reflect the original Silk Road with business networks through countries such as Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as India and Pakistan, spanning a route of more than four thousand miles and history that can be dated back more than 2200 years. Given the background of China's unique approach in fighting the COVID-19, and against the backdrop of sluggish economic growth, innovation and management within the sustainable development of BRI will be the key and the driving force for the post-pandemic economic recovery for many countries, especially when BRI countries now accounts for nearly 30% of China's foreign trade and 15% of outward direct investment. The vision to create a vast network of railways, energy pipelines, highways, and streamlined border crossings to expand the international use of Chinese currency and improve connectivity to China is good foresight and fortuitous with COVID-19 pandemic came to plague the world, and amid in the conflicts between US and China as well as a War between Russia and Ukraine. Since the inception of BRI many books are written to cover topics ranging from globalization to detailing how China's business and politics as a major motivation for China's overseas economic activities with case studies and practices, yet seldom of these books provide structured approach to the sustainable management of BRI projects. This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project. Here the readers will find guidelines and insights to survive and prosper in a myriad of BRI opportunities and risks. Most important of all, this book provides a glimpse of different approach for success in BRI projects, including sustainability, environmental issues, social and political aspects, technological, choice of industry, project management, education and training, governance and many more.
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
This title discusses design strategies, implementation difficulties, and the effectiveness of online labs. It provides scholars, researchers, and practitioners support for lab-based e-learning, gives guidance on the selection of technologies for various projects, and illustrates Web-based teaching with case studies.
An understanding of the techniques used to make distributed computing systems and networks reliable, fault-tolerant and secure will be crucial to those who design and deploy the next generation of mission-critical applications and Web Services. Reliable Distributed Systems reviews and describes the key concepts, principles and applications of modern distributed computing systems and architectures. This self-contained book consists of five parts. The first covers introductory material, including the basic architecture of the Internet, simple protocols such as RPC and TCP, object oriented architectures, operating systems enhance-ments for high performance, and reliability issues. The second covers the Web, with a focus on Web Services technologies, Microsofta (TM)s .NET and the Java Enterprise Edition. The last three parts look at a number of reliability and fault-tolerance issues and techniques, with an emphasis on replication applied in Web Services settings. Topics and features: * Explains fault-tolerance in clear, readily understood terms with concrete examples drawn from real-world settings * A practical focus aimed at building "mission-critical" networked applications that keep working even when things go wrong * Includes modern topics, such as Corba, Web Services, XML, .NET, J2EE, group communication, transactions, peer-to-peer systems, time-critical protocols, scalability and security * Thorough coverage of fundamental mechanisms, with an emphasis on the idea of "consistent behavior" in systems that replicate critical components for availability * Reviews more than 25 major research efforts, placing them in context with pointers to sources *Includes 80 problems ranging from simple tests of understanding to challenging protocol and systems design topics suitable for semester-long projects * Web-based materials for instructors, including a comprehensive slide set, available at: http: //www.cs.cornell.edu/ken/book With its well-focused approach and clarity of presentation, this new text is an excellent resource for both advanced students and practitioners in computer science, computer networks and distributed systems. Anyone seeking a solid background in distributed computing and Web Services architectures will find the book an essential and practical learning tool.
Semantic interoperability provides the means to automatically process and integrate large amounts of information without human intervention. ""Cases on Semantic Interoperability for Information Systems Integration: Practices and Applications"" provides an in-depth analysis of issues involved with the application of semantic interoperability to information assimilation tasks followed by field professionals. This significant collection of research explains in-depth issues involved the integration of large amounts of heterogeneous information and points to deficiencies of current systems.
Reconfigurable computing brings immense flexibility to on-chip processing while network-on-chip has improved flexibility in on-chip communication. Integrating these two areas of research reaps the benefits of both and represents the promising future of multiprocessor systems-on-chip. Dynamic Reconfigurable Network-on-Chip Design: Innovations for Computational Processing and Communication is the one of the first compilations written to demonstrate this future for network -on-chip design. Through dynamic and creative research into questions ranging from integrating reconfigurable computing techniques, to task assigning, scheduling and arrival, to designing an operating system to take advantage of the computing and communication flexibilities brought about by run-time reconfiguration and network-on-chip, this book represents a complete source of the techniques and applications for reconfigurable network-on-chip necessary for understanding of future of this field.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.
This book presents case studies of the development of videotex in the UK, France, Germany, Italy, the Netherlands, Austria, Switzerland, Belgium, Denmark, Spain, Sweden, Ireland and the United States. These studies offer an excellent overview of the many factors which might influence the outcome of complex innovation and implementation processes. Videotex is an interlocked innovation comprising not only innovations in the infrastructure (networks, hard- and software) but also an innovation in the supply of services and the user demand. If only one of these elements is absent the entire chain breaks down and the innovation process is hampered. In Europe two different implementation strategies can be distinguished: the Prestel and the Teletel scenarios. Until now, only Teletel has proved successful and only in one country: France. Given this state of affairs the following question is raised - will the relaunch of videotex succeed in countries where the initial Prestel strategy failed? Or will an open market approach, as followed in the United States, present a more direct route to the successful relaunch of videotex in the 1990's. This collection presents a coherent up-to-date survey and analysis of videotex systems operating throughout Europe. It analyses the use, success, limitations and future of videotex systems and related technologies. The collection will be of interest to computer, information and communication scientists, especially those who work in telecommunication and information management. It also offers case study of information technology policy analysis and as such should be of interest to social and political scientists specialising in technological policy.
Conflicts between agents acting in a multi-agent environment arise for different reasons, involve different concepts, and are dealt with in different ways, depending on the kind of agents and on the domain where they are considered. Agents may have conflicting beliefs, conflicting goals, or may have to share limited resources. Consequently, conflicts may be expressed as mere differences, or as contradictions, or even as social conflicts. They may be avoided, solved, kept, or even created deliberately. Conflicting Agents studies conflicts in the context of multi-agent systems, i.e. artificial societies modeled on the basis of autonomous, interacting agents. This book addresses questions about types of conflicts, conflict definitions and the use of conflicts as trigger functions for activities in multi-agent systems. The book is also dedicated to questions of conflict management, resolution and avoidance, i.e. the question of how agents cope with conflicts and conflicting situations.
The second half of this century will remain as the era of proliferation of electronic computers. They did exist before, but they were mechanical. During next century they may perform other mutations to become optical or molecular or even biological. Actually, all these aspects are only fancy dresses put on mathematical machines. This was always recognized to be true in the domain of software, where "machine" or "high level" languages are more or less rigourous, but immaterial, variations of the universaly accepted mathematical language aimed at specifying elementary operations, functions, algorithms and processes. But even a mathematical machine needs a physical support, and this is what hardware is all about. The invention of hardware description languages (HDL's) in the early 60's, was an attempt to stay longer at an abstract level in the design process and to push the stage of physical implementation up to the moment when no more technology independant decisions can be taken. It was also an answer to the continuous, exponential growth of complexity of systems to be designed. This problem is common to hardware and software and may explain why the syntax of hardware description languages has followed, with a reasonable delay of ten years, the evolution of the programming languages: at the end of the 60's they were" Algol like" , a decade later "Pascal like" and now they are "C or ADA-like". They have also integrated the new concepts of advanced software specification languages.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
This monograph, for the first time in book form, considers the large structure of metric spaces as captured by bornologies: families of subsets that contain the singletons, that are stable under finite unions, and that are stable under taking subsets of its members. The largest bornology is the power set of the space and the smallest is the bornology of its finite subsets. Between these lie (among others) the metrically bounded subsets, the relatively compact subsets, the totally bounded subsets, and the Bourbaki bounded subsets. Classes of functions are intimately connected to various bornologies; e.g., (1) a function is locally Lipschitz if and only if its restriction to each relatively compact subset is Lipschitz; (2) a subset is Bourbaki bounded if and only if each uniformly continuous function on the space is bounded when restricted to the subset. A great deal of attention is given to the variational notions of strong uniform continuity and strong uniform convergence with respect to the members of a bornology, leading to the bornology of UC-subsets and UC-spaces. Spaces on which its uniformly continuous real-valued functions are stable under pointwise product are characterized in terms of the coincidence of the Bourbaki bounded subsets with a usually larger bornology. Special attention is given to Lipschitz and locally Lipschitz functions. For example, uniformly dense subclasses of locally Lipschitz functions within the real-valued continuous functions, Cauchy continuous functions, and uniformly continuous functions are presented. It is shown very generally that a function between metric spaces has a particular metric property if and only if whenever it is followed in a composition by a real-valued Lipschitz function, the composition has the property. Bornological convergence of nets of closed subsets, having Attouch-Wets convergence as a prototype, is considered in detail. Topologies of uniform convergence for continuous linear operators between normed spaces is explained in terms of the bornological convergence of their graphs. Finally, the idea of a bornological extension of a topological space is presented, and all regular extensions can be so realized.
Workflow management systems (WFMS) are enjoying increasing popular ity due to their ability to coordinate and streamline complex organizational processes within organizations of all sizes. Organizational processes are de scriptions of an organization's activities engineered to fulfill its mission such as completing a business contract or satisfying a specific customer request. Gaining control of these processes allows an organization to reengineer and improve each process or adapt them to changing requirements. The goal of WFMSs is to manage these organizational processes and coordinate their execution. was demonstrated in the first half The high degree of interest in WFMSs of the 1990s by a significant increase in the number of commercial products (once estimated to about 250) and the estimated market size (in combined $2 billion in 1996. Ensuing maturity product sales and services) of about is demonstrated by consolidations during the last year. Ranging from mere e-mail based calendar tools and flow charting tools to very sophisticated inte grated development environments for distributed enterprise-wide applications and systems to support programming in the large, these products are finding an eager market and opening up important research and development op portunities. In spite of their early success in the market place, however, the current generation of systems can benefit from further research and develop ment, especially for increasingly complex and mission-critical applications.
Photographers! Your guide is here! The demand for high-quality photographs is higher than ever. Whether you're building your influencer rating online, capturing the moments of a child's life, or are looking for ways to improve your skills, photography know-how is a must-have skill. Digital Photography For Dummies helps you do more than pointing, shooting, and hoping for the best or slapping a filter on a camera phone shot. This book introduces you to the camera settings and techniques that separate okay pictures from frame-worthy portraits. It then explains how to apply those skills to capturing your own portraits, landscape shots, and high-action photos. Develop a better eye for image composition Discover how to light photos better, including using natural light Learn to get quick results in auto settings or take full control in manual mode Discover the elements of exposure and how they influence the final product Find instructions on taking a formal or casual portrait Apply basic editing techniques to finalize your image Go beyond photo apps and apply the techniques pros use for their images. |
![]() ![]() You may like...
We Are Still Human - And Work Shouldn't…
Brad Shorkend, Andy Golding
Paperback
![]()
Pressure and Temperature Sensitive…
Tianshu Liu, John P. Sullivan
Hardcover
R6,703
Discovery Miles 67 030
Progress in Turbulence VIII…
Ramis Oerlu, Alessandro Talamelli, …
Hardcover
R4,625
Discovery Miles 46 250
Michigan's C. Harold Wills - The Genius…
Alan Naldrett, Lynn Lyon Naldrett
Paperback
Nanofabrication Using Focused Ion and…
Ivo Utke, Stanislav Moshkalev, …
Hardcover
R11,079
Discovery Miles 110 790
|