|
Books > Computing & IT > Computer hardware & operating systems > Handheld devices (eg Palm, PocketPC)
You ve just purchased a TI-83 Plus calculator to assist in
performing different types of mathematical equations now, how can
you get the most out of it? You ll find the answer to this question
with our comprehensive, 3-panel guide that shows in great detail
what exactly the TI-83 Plus can do. Function key and mode
descriptions, as well as problem-solving examples, are included
within a color-coded format for easy reference.
"
A Handheld History is a unique celebration of portable platforms and their iconic games.
Forty years ago, businessmen fiddling with calculators inspired Gunpei Yokoi to create the Game & Watch. Ever since then, handheld gaming has been hugely influential, spawning communities who trade Pokémon in the playground and share Miis on the subway. This introspective adventure will delve into decades of gaming memories and reconnect you to that long car journey full of discarded AA batteries before speeding ahead to the contemporary days of blockbusters in your backpack.
Handheld gaming is celebrated loudly, proudly, and across hundreds of beautifully assembled pages of art and essays. Featuring words from many incredible voices, this is an unmissable ode to the gaming device that you keep close to your heart – right in your jacket pocket.
The internet of things (IoT) has had a major impact on academic and
industrial fields. Applying these technologies to healthcare
systems reduces medical costs while enriching the patient-centric
approach to medicine, allowing for better overall healthcare
proficiency. However, usage of IoT in healthcare is still suffering
from significant challenges with respect to the cost and accuracy
of medical sensors, non-standard IoT system architectures, assorted
wearable devices, the huge volume of generated data, and
interoperability issues. Incorporating the Internet of Things in
Healthcare Applications and Wearable Devices is an essential
publication that examines existing challenges and provides
solutions for building smart healthcare systems with the latest
IoT-enabled technology and addresses how IoT improves the
proficiency of healthcare with respect to wireless sensor networks.
While highlighting topics including mobility management, sensor
integration, and data analytics, this book is ideally designed for
computer scientists, bioinformatics analysts, doctors, nurses,
hospital executives, medical students, IT specialists, software
developers, computer engineers, industry professionals,
academicians, researchers, and students seeking current research on
how these emerging wireless technologies improve efficiency within
the healthcare domain.
Wearable continuous monitoring systems are necessary in risky
environments such as mining and diving and are especially important
in the medical monitoring of patients both in medical facilities
and at home. All these applications of monitoring with data
transmission functions can be achieved by using wearable antennas.
Recently, possibilities of connecting completely independent
appliances with textiles have emerged. However, full success will
be achieved only when antennas and all related components are
entirely converted into 100% textile materials. Design and
Optimization of Sensors and Antennas for Wearable Devices provides
innovative insights on the development of adaptable materials and
textile antennas that can be used in the construction of wearable
devices that are biocompatible and offer high conductivity, low
cost, simplistic manufacturing, are comfortable for the wearer, and
are water/climate safe and condition amicable. The content within
this publication examines data transmission, wearable computing,
and medical applications. It is designed for engineers,
manufacturers, researchers, academicians, and scientists who are
interested in the development of wearable technologies.
The proliferation of wireless communications has led to mobile
computing, a new era in data communication and processing allowing
people to access information anywhere and anytime using lightweight
computer devices. Aligned with this phenomenon, a vast number of
mobile solutions, systems, and applications have been continuously
developed. However, despite the opportunities, there exist
constraints, challenges, and complexities in realizing the full
potential of mobile computing, requiring research and
experimentation. Algorithms, Methods, and Applications in Mobile
Computing and Communications is a critical scholarly publication
that examines the various aspects of mobile computing and
communications from engineering, business, and organizational
perspectives. The book details current research involving mobility
challenges that hinder service applicability, mobile money transfer
services and anomaly detection, and mobile fog environments. As a
resource rich in information about mobile devices, wireless
broadcast databases, and machine communications, it is an ideal
source for computer scientists, IT specialists, service providers,
information technology professionals, academicians, and researchers
interested in the field of mobile computing.
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book gathers outstanding research papers presented at the
International Joint Conference on Advances in Computational
Intelligence (IJCACI 2020), organized by Daffodil International
University (DIU) and Jahangirnagar University (JU) in Bangladesh
and South Asian University (SAU) in India. These proceedings
present novel contributions in the areas of computational
intelligence and offer valuable reference material for advanced
research. The topics covered include collective intelligence, soft
computing, optimization, cloud computing, machine learning,
intelligent software, robotics, data science, data security, big
data analytics, and signal and natural language processing.
This book presents best selected papers presented at the 4th
International Conference on Smart Computing and Informatics (SCI
2020), held at the Department of Computer Science and Engineering,
Vasavi College of Engineering (Autonomous), Hyderabad, Telangana,
India. It presents advanced and multi-disciplinary research towards
the design of smart computing and informatics. The theme is on a
broader front which focuses on various innovation paradigms in
system knowledge, intelligence and sustainability that may be
applied to provide realistic solutions to varied problems in
society, environment and industries. The scope is also extended
towards the deployment of emerging computational and knowledge
transfer approaches, optimizing solutions in various disciplines of
science, technology and health care.
Portable Biosensors and Point-of-Care Systems describes the
principles, design and applications of a new generation of
analytical and diagnostic biomedical devices, characterized by
their very small size, ease of use, multi-analytical capabilities
and speed to provide handheld and mobile point-of-care (POC)
diagnostics. The book is divided in four Parts. Part I is an
in-depth analysis of the various technologies upon which portable
diagnostic devices and biosensors are built. In Part II, advances
in the design and optimization of special components of biosensor
systems and handheld devices are presented. In Part III, a wide
scope of applications of portable biosensors and handheld POC
devices is described, ranging from the support of primary
healthcare to food and environmental safety screening. Diverse
topics are covered, including counterterrorism, travel medicine and
drug development. Finally, Part IV of the book is dedicated to the
presentation of commercially available products including a review
of the products of point-of-care in-vitro-diagnostics companies, a
review of technologies which have achieved a high Technology
Readiness Level, and a special market case study of POC infusion
systems combined with intelligent patient monitoring. This book is
essential reading for researchers and experts in the healthcare
diagnostic and analytical sector, and for electronics and material
engineers working on portable sensors.
With the proliferation of GPS devices in daily life, trajectory
data that records where and when people move is now readily
available on a large scale. As one of the most typical
representatives, it has now become widely recognized that taxi
trajectory data provides rich opportunities to enable promising
smart urban services. Yet, a considerable gap still exists between
the raw data available, and the extraction of actionable
intelligence. This gap poses fundamental challenges on how we can
achieve such intelligence. These challenges include inaccuracy
issues, large data volumes to process, and sparse GPS data, to name
but a few. Moreover, the movements of taxis and the leaving
trajectory data are the result of a complex interplay between
several parties, including drivers, passengers, travellers, urban
planners, etc. In this book, we present our latest findings on
mining taxi GPS trajectory data to enable a number of smart urban
services, and to bring us one step closer to the vision of smart
mobility. Firstly, we focus on some fundamental issues in
trajectory data mining and analytics, including data map-matching,
data compression, and data protection. Secondly, driven by the real
needs and the most common concerns of each party involved, we
formulate each problem mathematically and propose novel data mining
or machine learning methods to solve it. Extensive evaluations with
real-world datasets are also provided, to demonstrate the
effectiveness and efficiency of using trajectory data. Unlike other
books, which deal with people and goods transportation separately,
this book also extends smart urban services to goods transportation
by introducing the idea of crowdshipping, i.e., recruiting taxis to
make package deliveries on the basis of real-time information.
Since people and goods are two essential components of smart
cities, we feel this extension is bot logical and essential.
Lastly, we discuss the most important scientific problems and open
issues in mining GPS trajectory data.
The authors develop a malware fingerprinting framework to cover
accurate android malware detection and family attribution in this
book. The authors emphasize the following: (1) the scalability over
a large malware corpus; (2) the resiliency to common obfuscation
techniques; (3) the portability over different platforms and
architectures. First, the authors propose an approximate
fingerprinting technique for android packaging that captures the
underlying static structure of the android applications in the
context of bulk and offline detection at the app-market level. This
book proposes a malware clustering framework to perform malware
clustering by building and partitioning the similarity network of
malicious applications on top of this fingerprinting technique.
Second, the authors propose an approximate fingerprinting technique
that leverages dynamic analysis and natural language processing
techniques to generate Android malware behavior reports. Based on
this fingerprinting technique, the authors propose a portable
malware detection framework employing machine learning
classification. Third, the authors design an automatic framework to
produce intelligence about the underlying malicious
cyber-infrastructures of Android malware. The authors then leverage
graph analysis techniques to generate relevant intelligence to
identify the threat effects of malicious Internet activity
associated with android malware. The authors elaborate on an
effective android malware detection system, in the online detection
context at the mobile device level. It is suitable for deployment
on mobile devices, using machine learning classification on method
call sequences. Also, it is resilient to common code obfuscation
techniques and adaptive to operating systems and malware change
overtime, using natural language processing and deep learning
techniques. Researchers working in mobile and network security,
machine learning and pattern recognition will find this book useful
as a reference. Advanced-level students studying computer science
within these topic areas will purchase this book as well.
The book presents papers from the 6th International Conference on
Big Data and Cloud Computing Challenges (ICBCC 2019), held at the
University of Missouri, Kansas City, USA, on September 9 and 10,
2019 and organized in collaboration with VIT Chennai. The book
includes high-quality, original research on various aspects of big
data and cloud computing, offering perspectives from the industrial
and research communities on how to address the current challenges
in the field. As such it is a valuable reference resource for
researchers and practitioners in academia and industry.
In a digital context, trust is a multifaceted concept, including
trust in application usability, trust in information security, and
trust in fellow users. Mobile technologies have compounded the
impact of such considerations. Trust Management in Mobile
Environments: Autonomic and Usable Models explores current advances
in digital and mobile computing technologies from the user
perspective, evaluating trust models and autonomic trust
management. From the recent history of trust in digital
environments to prospective future developments, this book serves
as a potent reference source for professionals, graduate and
post-graduate students, researchers, and practitioners in the field
of trust management.
This book is focused on addressing the designs of FinFET-based
analog ICs for 5G and E-band communication networks. In addition,
it also incorporates some of the contemporary developments over
different fields. It highlights the latest advances, problems and
challenges and presents the latest research results in the field of
mm-wave integrated circuits designing based on scientific
literature and its practical realization. The traditional
approaches are excluded in this book. The authors cover various
design guidelines to be taken care for while designing these
circuits and detrimental scaling effects on the same. Moreover,
Gallium Nitrides (GaN) are also reported to show huge potentials
for the power amplifier designing required in 5G communication
network. Subsequently, to enhance the readability of this book, the
authors also include real-time problems in RFIC designing, case
studies from experimental results, and clearly demarking design
guidelines for the 5G communication ICs designing. This book
incorporates the most recent FinFET architecture for the analog IC
designing and the scaling effects along with the GaN technology as
well.
Originally designed for interpersonal communication, today mobile
devices are capable of connecting their users to a wide variety of
Internet-enabled services and applications. Multimodality in Mobile
Computing and Mobile Devices: Methods for Adaptable Usability
explores a variety of perspectives on multimodal user interface
design, describes a variety of novel multimodal applications, and
provides real-life experience reports. Containing research from
leading international experts, this innovative publication presents
core concepts that define multi-modal, multi-channel, and
multi-device interactions and their role in mobile, pervasive, and
ubiquitous computing.
|
You may like...
The New Room
Anne Giulieri, Samantha Chaffey
Paperback
R137
Discovery Miles 1 370
|