|
|
Books > Computing & IT > General
This book looks at the history of computing in education from two
points of view - as a history of the impact of computing on
education over the past forty years and as the use of the history
of computing as a pedagogical tool in computing education. These
two intertwined views look back at computer education and the ways
in which organizations have attempted to use computers to enhance
teaching and learning from elementary education through university
studies in several countries. The topics include: considerations of
cybernetics and informatics; government sponsored open source
software for school education; learning with the artificial
sciences; technology leading to historic changes; ICT in Catalan
schools; streams in the history of computer education in Australia;
growth of computing technology for education in India; computing
and education in the UK; evolution of e-inclusion for the disabled;
educational hypermedia computing; keyboard training; studies of
educational computing projects; and using computing history to
enhance teaching. History of Computing in Education is unique in
its topic, the field having not been the subject of extensive study
in the past. the impact of computing on education is only now
receiving due attention. This book derives from contributions made
at the History of Computing in Education conference at the IFIP
18th World Computer Congress, held in August 2004 in Toulouse,
France and sponsored by the International Federation for
Information Processing (IFIP). Teachers, students, researchers,
authors, and education developers should find this work as a
welcome addition to their educational repertoire. It will also
provide new dimensions of breadth and depth in the evolution of
computing in education.
As part of the best-selling Pocket Primer series, this book is
meant to familiarize readers with regular expressions as part of
their data-related tasks. Regular expressions (regex) are used in
search engines, search and replace dialogs of word processors and
text editors, in text processing utilities such as sed and awk, and
in lexical analysis. Many programming languages provide regex
capabilities, either built-in or via libraries. Readers will learn
how to use bash commands grep, awk, and sed in order to use regular
expressions in conjunction with datasets and data-related tasks.
Companion files with source code are available for downloading from
the publisher. Features: A practical introduction to using
flexible, bash commands to perform common data cleaning tasks.
Assumes the reader has no prior experience, but the topic is
covered comprehensively enough to teach a pro some new tricks.
Simple yet powerful shell scripts for data cleaning tasks.
This textbook offers an accessible introduction to the historical,
technical, and strategic context of global cyber conflict. The
second edition has been revised and updated throughout, with three
new chapters. Cyber warfare involves issues of doctrine, strategy,
policy, international relations (IR) and operational practice
associated with computer network attack, computer network
exploitation and computer network defense. However, it is conducted
within complex sociopolitical settings alongside related forms of
digital contestation. This book provides students with a
comprehensive perspective on the technical, strategic and policy
issues associated with cyber conflict, as well as an introduction
to key state and non-state actors. Specifically, the book provides
a comprehensive overview of several key issue areas: The historical
context of the emergence and evolution of cyber warfare, including
the basic characteristics and methods of computer network attack,
exploitation and defense An interdisciplinary set of theoretical
perspectives on conflict in the digital age from the point of view
of the fields of IR, security studies, psychology and science,
technology and society (STS) studies Current national perspectives,
policies, doctrines and strategies relevant to cyber warfare An
examination of key challenges in international law, norm
development and deterrence; and The role of emerging information
technologies like artificial intelligence and quantum computing in
shaping the dynamics of global cyber conflict This textbook will be
essential reading for students of cybersecurity/cyber conflict and
information warfare, and highly recommended for students of
intelligence studies, security and strategic studies, defense
policy, and IR in general.
With the advent of advanced hand-held technology and the widespread
nature of the Internet, the world of animated filmmaking is more
exciting and accessible than ever. Due to this cultural and
technological development, the success of independent animated film
makers is on the rise. Independent Animation: Developing, Producing
and Distributing Your Animated Films, Second Edition showcases some
of the greatest, most innovative giants in the field and helps
guide readers through the artistic process and production
techniques. Story development, casting, color theory, distribution
and the intimidating aspects of production are elucidated using
various examples of acclaimed, viral and award-winning animated
films from all over the world. Readers will also explore the
changing nature of audiences, festivals and distributors’
relationships with animation and be granted first-hand guidance in
navigating the diverse fields of animated filmmaking. Key Features:
Covers the entire process of creating an independent animated film
from story development and casting to editing and distribution
Presents a comprehensive array of classic and contemporary case
studies covering all manner of production methods from traditional
pipelines to avant-garde, auteur and experimental approaches
Features input and exclusive insight into the working processes of
some of the industry’s most noteworthy indie animation talents,
including Signe Baumane, Adam Elliot, Don Hertzfeldt, Kirsten
Lepore, Robert Morgan, David OReilly, PES, Bill Plympton, Rosto,
Chris Shepherd and dozens more Additional resources and interviews
are available through a special section of Skwigly Online Animation
Magazine.
This is the 3rd volume of Advances in Telecommunication Management,
focusing on Information Technology and Crisis Management.
In a significant contribution to the study of the brain and
behavior, Coward develops a system model for the human brain based
on a new physiologically based theory of learning and memory. The
work is primarily intended for neuropsychologists, but will be of
interest to anyone concerned with understanding the brain as a
functioning system. The author has twenty years' experience in most
of the different aspects of designing complex electronic systems.
Such a system today has up to several billion hardware components
such as individual transistors, and millions of lines of software.
Coward argues that the methodology used to handle the design of
such systems can be modified and adapted to understand the brain.
In the design of electronic systems, the concept instruction makes
it possible to rigorously translate from high level operational
descriptions to detailed descriptions in terms of machine code and
transistor structures. In the brain, the concept pattern can make
it possible to translate between the descriptions of psychology and
physiology and make functional understanding possible. Any change
in the state of a neuron can be interpreted on a system level as
the recognition of a pattern. Pattern is precisely defined and
includes both objects and changes to objects. Based on these
observations, Coward designs a model called the cascaded pattern
extraction hierarchy to explain the functioning of the brain,
showing that the brain can be visualized as a pattern extraction
template, in which successive layers are able to extract
increasingly complex patterns from relatively simple input.
Coward demonstrates that as a pattern extraction template, the
brain forms a hierarchy in connectivity space. Early layers--those
closest to sensory input--can be interpreted as extracting patterns
from simple sensory input. Later layers generate action
recommendations, and later still, they select actions, all within
the same pattern extraction paradigm. According to the model, the
firing of a neuron at these points constitutes both pattern
recognition and action recommendation. Coward's system model not
only provides a framework for understanding and predicting
psychological phenomena, including the functioning of personality,
but also accounts for such apparent anomalies as the difference
between short and long term memory and the fact that localized
brain damage does not remove the memory of individual events.
Widely useful for studies of brain and behavior, Pattern Thinking
also suggests how to identify promising areas to investigate in the
treatment of psychological illnesses.
How we interface and interact with computing, communications and
entertainment devices is going through revolutionary changes, with
natural user inputs based on touch, voice, and vision replacing or
augmenting the use of traditional interfaces based on the keyboard,
mouse, joysticks, etc. As a result, displays are morphing from
one-way interface devices that merely show visual content to
two-way interaction devices that provide more engaging and
immersive experiences. This book provides an in-depth coverage of
the technologies, applications, and trends in the rapidly emerging
field of interactive displays enabled by natural human-interfaces.
Key features: * Provides a definitive reference reading on all the
touch technologies used in interactive displays, including their
advantages, limitations, and future trends. * Covers the
fundamentals and applications of speech input, processing and
recognition techniques enabling voice-based interactions. * Offers
a detailed review of the emerging vision-based sensing
technologies, and user interactions using gestures of hands, body,
face, and eye gazes. * Discusses multi-modal natural user interface
schemes which intuitively combine touch, voice, and vision for
life-like interactions. * Examines the requirements and technology
status towards realizing true 3D immersive and interactive
displays.
Purchasing and Financial Management of Information Technology aims
to significantly reduce the amount of money wasted on IT by
providing readers with a comprehensive guide to all aspects of
planning, managing and controlling IT purchasing and finance.
Starting from a recognition that IT purchasing and the financial
management often needs to be treated differently from other types
of expenditure, the author draws on over 25 years of experience in
the field to provide readers with useful mixture of good procedures
and common sense rules that have been tried, tested and found to
work. Many of these are illustrated by case histories, each with a
moral or a lesson. Purchasing and Financial Management of
Information Technology provides useful guidelines and advice on
whole range of topics including: * IT acquisitions policy * Dealing
with suppliers * Budgeting and cost control * IT cost and risk
management * Specification, selection and evaluation of systems *
IT value for money
IT Performance Management addresses the way organizations should
balance the demand and the supply of information technology,
optimizing the cost and maximizing the business value of IT.
In this book several aspects of IT performance management are
described. The way this management is executed and the techniques,
which should be used, depend on the maturity of the relationship
between the IT function and the lines of business of an
organization. The foundation of the authors' approach is based on
the flow of money and related management objectives. However,
performance management is primarily based on perceptions.
Therefore, this book introduces the IT value perception model. This
model describes four separate levels of perception for the business
value of IT. If the demand and the supply of IT do not share the
same perception level, the balance is lost, which will lead to
friction and inefficiency within an organization.
This book is not about what is good or what is bad, but rather is
about the 'what', the 'why' and to a limited extent the 'how' of
managing the performance of IT. Therefore, the book finishes with a
'back-to-business' section in which a self-assessment checklist, a
potential growth path and ten next steps are provided. This enables
the reader to start applying this book in his every day working
environment immediately.
IT Performance Management:
* Provides an overview of best practices and available thinking on
the subject of IT cost and value
* Describes the subject of IT cost and value related to management
issues on IT strategy, portfolio management, service management,
architecture and sourcing
* Addresses differing degrees of maturitybetween IT and the
business, illustrated by case studies
Practical and easy to integrate into day to day decision making
immediately
Deals with multiple perceptions on the role of the IT organisation
in the business
Discusses the topics currently on the CIO's agenda
Recent advances in science and engineering have led to the
proliferation of cyber-physical systems. Now viewed as a pivotal
area of research, the application of CPS has expanded into several
new and innovative areas. Challenges, Opportunities, and Dimensions
of Cyber-Physical Systems explores current trends and enhancements
of CPS, highlighting the critical need for further research and
advancement in this field. Focusing on architectural fundamentals,
interdisciplinary functions, and futuristic implications, this book
is an imperative reference source for scholars, engineers, and
students in the scientific community interested in the current and
future advances in CPS.
Cases on ICT Utilization, Practice and Solutions: Tools for
Managing Day-to-Day Issues presents past, present and future
research directions within the field. This book includes cases on
the latest advances in Information Communication Technology. The
authors have provided in-depth insight into the current state of
research in ICT as well as identified successful approaches, tools
and methodologies in ICT research. They explore points of good
practices, while addressing potential pitfalls to avoid, and
examining and evaluating solutions to some of ICT researchers'
toughest challenges.
Documentation of our cultural heritage is experiencing an explosion
of innovation. New tools have appeared in recent decades including
laser scanning, rapid prototyping, high dynamic range spherical and
infrared imagery, drone photography, augmented and virtual reality
and computer rendering in multiple dimensions. These give us
visualisations and data that are at once interesting, intriguing
and yet sometimes deceptive. This text provides an objective and
integrated approach to the subject, bringing together the
techniques of conservation with management, photographic methods,
various modelling techniques and the use of unmanned aerial
systems. This interdisciplinary approach addresses the need for
knowledge about deploying advanced digital technologies and the
materials and methods for the assessment, conservation,
rehabilitation and maintenance of the sustainability of existing
structures and designated historic buildings. Furthermore, this
book actively provides the knowhow to facilitate the creation of
heritage inventories, assessing risk, and addressing the need for
sustainability.In so doing it becomes more feasible to mitigate the
threats from inherent and external causes, not only for the built
heritage but also for moveable objects and intangible heritage that
suffer abandonment and negligence as well as looting and illegal
trafficking. The book is written by a team of international experts
based upon their practical experience and expertise. It therefore
creates a unique book that encapsulates the knowledge of this
discipline required by anyone working in this field.
Are you looking to supercharge your business and grow your online community?
The key to a booming business is your community. Founder of social media consultancy The Selfhood, Daisy Morris, is here with the ultimate guide for all the side-hustlers, creators, business owners and freelancers looking to build a genuine community on social media.
This book drops the jargon – Daisy will teach you how to take your community on a journey. From brand awareness through to conversion, you will have the confidence to expand your reach while nurturing your existing fans, followers, subscribers and customers to turn them in to loyal and repeat customers. You will learn how to create meaningful connections with your audience, through real-life case studies, simple exercises and top-notch business advice. A must-read for any business owner.
Explore the concepts, algorithms, and applications underlying
federated learning In Federated Learning for Future Intelligent
Wireless Networks, a team of distinguished researchers delivers a
robust and insightful collection of resources covering the
foundational concepts and algorithms powering federated learning,
as well as explanations of how they can be used in wireless
communication systems. The editors have included works that examine
how communication resource provision affects federated learning
performance, accuracy, convergence, scalability, and security and
privacy. In the book, readers will explore a wide range of topics
that show how federated learning algorithms, concepts, and design
and optimization issues that apply to wireless communications.
Readers will also find: A thorough introduction to the fundamental
concepts and algorithms of federated learning, including
horizontal, vertical, and hybrid FL Comprehensive explorations of
wireless communication network design and optimization for
federated learning Practical discussions of novel federated
learning algorithms and frameworks for future wireless networks
Expansive case studies in edge intelligence, autonomous driving,
IoT, MEC, blockchain, and content caching and distribution Perfect
for electrical and computer science engineers, researchers,
professors, and postgraduate students with an interest in machine
learning, Federated Learning for Future Intelligent Wireless
Networks will also benefit regulators and institutional actors
responsible for overseeing and making policy in the area of
artificial intelligence.
|
You may like...
Nexus
Yuval Noah Harari
Paperback
R345
R308
Discovery Miles 3 080
|