|
|
Books > Computing & IT > Applications of computing > General
Originating from papers presented at the 18th International
Conference on Railway Engineering Design and Operation, this book
provides up-to-date research on the use of advanced systems,
promoting their general awareness throughout the management,
design, manufacture and operation of railways and other emerging
passenger, freight and transit systems. A key emphasis is placed on
the use of computer systems in advanced railway engineering. The
included works are compiled from a variety of specialists
interested in the development of railways, including managers,
consultants, railway engineers, designers of advanced train control
systems and computer specialists. Topics covered include: Traffic
safety, security and monitoring; Train and railways analysis;
Operation of rail networks; Advanced train control;
Energy-efficient design; Traffic modelling and simulation.
Advances in Computers, Volume 126 presents innovations in computer
hardware, software, theory, design and applications, with this
updated volume including new chapters on VLSI for Super-Computing:
Creativity in R+D from Applications and Algorithms to Masks and
Chips, Bulk Bitwise Execution Model in Memory: Mechanisms,
Implementation, and Evaluation, Embracing the Laws of Physics:
Three Reversible Models of Computation, WSNs in Environmental
Monitoring: Data Acquisition and Dissemination Aspects, Energy
efficient implementation of tensor operations using dataflow
paradigm for machine learning, and A Run-Time Job Scheduling
Algorithm for Cluster Architectures with DataFlow Accelerators.
Up-to-date coverage of every topic on the CEH v11 exam This
effective self-study guide covers 100% of the EC Council's
Certified Ethical Hacker Version 11 exam objectives. The book
discusses the latest ethical hacking tools, techniques, and
exploits. Readers will find learning objectives at the beginning of
each chapter, step-by-step exercises, exam tips, practice exam
questions, and in-depth explanations. An integrated test
preparation system based on proven pedagogy, CEH Certified Ethical
Hacker All-in-One Exam Guide, Fifth Edition covers all five phases
of ethical hacking: reconnaissance, gaining access, enumeration,
maintaining access, and covering tracks. Readers will learn about
malware, hacking Web applications and mobile platforms, cloud
computing vulnerabilities, and more. Designed to help candidates
pass the exam with ease, this authoritative resource also serves as
an essential on-the-job reference. Complete coverage of all CEH v11
exam objectives Includes online access to the Total Tester
customizable practice exam software containing 300 practice
questions Written by an experienced educator with more than 20
years of experience in the field
Structured Light for Optical Communication highlights principles
and applications in the rapidly evolving field of structured light
in wide-ranging contexts, from classical forms of communication to
new frontiers of quantum communication. Besides the basic
principles and applications, the book covers the background of
structured light in its most common forms, as well as
state-of-the-art developments. Structured light has been hailed as
affording outstanding prospects for the realization of high
bandwidth communication, enhanced tools for more highly secure
cryptography, and exciting opportunities for providing a reliable
platform for quantum computing. This book is a valuable resource
for graduate students and other active researchers, as well as
others who may be interested in learning about this cutting-edge
research field.
A Tour of Computer Science Concepts provides students with a solid
foundational knowledge base within the discipline of computer
science. The opening chapter offers readers a concise overview of
computer history, including the development of computers and the
birth of the internet. Additional chapters discuss the differences
between analog and digital data, as well as techniques to map one
type to another; number base systems; data storage; computer
architecture and hardware components; and system software and
application software. Students learn about hypertext markup
language (HTML) and Cascading Style Sheets (CSS). Fundamental
programming concepts, such as variable declaration, assignment
statements, user input/output, conditional statements, and loop
control structures and functions, are demonstrated through the use
of JavaScript. Closing chapters cover computer networks, data
transmission between devices, and the increased importance of
cybersecurity in modern-day computing. Each chapter features a
summary, review of key concepts and terms, and discussion questions
to enrich the learning experience. Succinct yet highly informative,
A Tour of Computer Science Concepts is an ideal resource for
foundational courses in computer science.
The Internet of Medical Things (IoMT) allows clinicians to monitor
patients remotely via a network of wearable or implantable devices.
The devices are embedded with software or sensors to enable them to
send and receive data via the internet so that healthcare
professionals can monitor health data such as vital statistics,
metabolic rates or drug delivery regimens, and can provide advice
or treatment plans based on this real-world, real-time data. This
edited book discusses key IoT technologies that facilitate and
enhance this process, such as computer algorithms, network
architecture, wireless communications, and network security.
Providing a systemic review of trends, challenges and future
directions of IoMT technologies, the book examines applications
such as breast cancer monitoring systems, patient-centric systems
for handling, tracking and monitoring virus variants, and
video-based solutions for monitoring babies. The book discusses
machine learning techniques for the management of clinical data and
includes security issues such as the use of blockchain technology.
Written by a range of international researchers, this book is a
great resource for computer engineering researchers and
practitioners in the fields of data mining, machine learning,
artificial intelligence and the IoT in the healthcare sector.
Quantum computing is radically different from the conventional
approach of transforming bits strings from one set of 0's and 1's
to another. With quantum computing, everything changes. The physics
that we use to understand bits of information and the devices that
manipulate them are totally different. The way in which we build
such devices is different, requiring new materials, new design
rules and new processor architectures. Finally, the way we program
these systems is entirely different. Quantum engineering is a
revolutionary approach to quantum technology. It encompasses both
fundamental physics and the broad engineering skill-set necessary
to meet the practical challenges of the future. The proposed book
will cover the high-quality reviewed book chapters on original
research & innovations and compelling insights in Quantum
Computing and Engineering. Data scientists, Engineers, Industry,
researchers and students working in the field of quantum computing
and its allied research will benefit greatly from this publication.
Advances in Mathematics for Industry 4.0 examines key tools,
techniques, strategies, and methods in engineering applications. By
covering the latest knowledge in technology for engineering design
and manufacture, chapters provide systematic and comprehensive
coverage of key drivers in rapid economic development. Written by
leading industry experts, chapter authors explore managing big data
in processing information and helping in decision-making, including
mathematical and optimization techniques for dealing with large
amounts of data in short periods.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
|
|