![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
As a software engineer, you'll encounter countless programming challenges that initially seem confusing, difficult, or even impossible. Don't despair! Many of these "new" problems already have well-established solutions. Advanced Algorithms and Data Structures teaches you powerful approaches to a wide range of tricky coding challenges that you can adapt and apply to your own applications. Providing a balanced blend of classic, advanced, and new algorithms, this practical guide upgrades your programming toolbox with new perspectives and hands-on techniques. about the technology Data structures and algorithms are the foundations for how programs store and process information. Choosing the optimal algorithms ensures that your programs are fast, efficient, and reliable. about the book Algorithms and Data Structures in Action expands on the basic algorithms you already know to give you a better selection of solutions to different programming problems. In it, you'll discover techniques for improving priority queues, efficient caching, clustering data, and more. Each example is fully illustrated with graphics, language agnostic pseudo-code, and code samples in various languages. When you're done, you will be able to implement advanced and little-known algorithms to deliver better performance from your code. what's inside Improving on basic data structures Efficient caching Nearest neighbour search, including k-d trees and S-trees Full 'pseudo-code' and samples in multiple languages about the readerFor programmers with basic or intermediate skills. Written in a language-agnostic manner, no specific language knowledge is required. about the author Marcello La Rocca is a research scientist and a full-stack engineer focused on optimization algorithms, genetic algorithms, machine learning and quantum computing. He has contributed to large-scale web applications at companies like Twitter and Microsoft, has undertaken applied research in both academia and industry, and authored the Neatsort adaptive sorting algorithm.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. It is the first edited volume based on this subject. This volume includes, but is not limited to, the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."
Full coverage of functional programming and all OCA Java Programmer exam objectives OCA, Oracle Certified Associate Java SE 8 Programmer I Study Guide, Exam 1Z0-808 is a comprehensive study guide for those taking the Oracle Certified Associate Java SE 8 Programmer I exam (1Z0-808). With complete coverage of 100% of the exam objectives, this book provides everything you need to know to confidently take the exam. The release of Java 8 brought the language's biggest changes to date, and for the first time, candidates are required to learn functional programming to pass the exam. This study guide has you covered, with thorough functional programming explanation and information on all key topic areas Java programmers need to know. You'll cover Java inside and out, and learn how to apply it efficiently and effectively to create solutions applicable to real-world scenarios. * Work confidently with operators, conditionals, and loops * Understand object-oriented design principles and patterns * Master functional programming fundamentals
This book presents selected papers from the International Conference on Computing, Communication, Electrical and Biomedical Systems (ICCCEBS 2021), held in March 2021 at KPR College of Engineering and Technology, Coimbatore, Tamil Nadu, India. The conference explores the interface between industry and real-time environments with newly developed techniques in computing and communications engineering. The papers describe results of conceptual, constructive, empirical, experimental, and theoretical work in areas of computing, communication, electrical, and biomedical systems. Contributors include academic scientists, researchers, industry representatives, postdoctoral fellows, and research scholars from around the world.
Machine Vision Algorithms in Java provides a comprehensive introduction to the algorithms and techniques associated with machine vision systems. The Java programming language is also introduced, with particular reference to its imaging capabilities. The book contains explanations of key machine vision techniques and algorithms, along with the associated Java source code.Special features include: - A complete self-contained treatment of the topics and techniques essential to the understanding and implementation of machine vision.- An introduction to object-oriented programming and to the Java programming language, with particular reference to its imaging capabilities.- Java source code for a wide range of practical image processing and analysis functions.- Readers will be given the opportunity to download a fully functional Java-based visual programming environment for machine vision, available via the WWW. This contains over 200 image processing, manipulation and analysis functions and will enable users to implement many of the ideas covered in this book. - Details relating to the design of a Java-based visual programming environment for machine vision.- An introduction to the Java 2D imaging and Java Advanced Imaging (JAI) APIs- A wide range of illustrative examples.- Practical treatment of the subject matter. This book is aimed at senior undergraduate and postgraduate students in engineering and computer science as well as practitioners in machine vision who may wish to update or expand their knowledge of the subject. The techniques and algorithms of machine vision are expounded in a way that will be understood not only by specialists but also by those who are less familiar with the topic.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
This book provides a comprehensive overview of the emerging technologies for next-generation 5G mobile communications, with insights into the long-term future of 5G. Written by international leading experts on the subject, this contributed volume covers a wide range of technologies, research results, and networking methods. Key enabling technologies for 5G systems include, but are not limited to, millimeter-wave communications, massive MIMO technology and non-orthogonal multiple access. 5G will herald an even greater rise in the prominence of mobile access based upon both human-centric and machine-centric networks. Compared with existing 4G communications systems, unprecedented numbers of smart and heterogeneous wireless devices will be accessing future 5G mobile systems. As a result, a new paradigm shift is required to deal with challenges on explosively growing requirements in mobile data traffic volume (1000x), number of connected devices (10-100x), typical end-user data rate (10-100x), and device/network lifetime (10x). Achieving these ambitious goals calls for revolutionary candidate technologies in future 5G mobile systems. Designed for researchers and professionals involved with networks and communication systems, 5G Mobile Communications is a straightforward, easy-to-read analysis of the possibilities of 5G systems.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
The book presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), which took place on November 28-29, 2018 in Manila, Philippines. The conference featured the following tracks: Industrial Engineering and Healthcare, Sustainable Infrastructure; Water Resources Planning and Management; Heat transfer and fluids; Electronics and Electrical Engineering; and Internet of Things. Papers stem from academia and industry throughout the world, showing a variety of perspectives. Presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), November 28-29, 2018 in Manila, Philippines Shows how engineering and technology serve to support a variety for industries from manufacturing to water resources Features papers from a variety of researchers and developers from around the world
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.
The Internet of Things (IoT) has become a major influence on the development of new technologies and innovations. When utilized properly, these applications can enhance business functions and make them easier to perform. Protocols and Applications for the Industrial Internet of Things discusses and addresses the difficulties, challenges, and applications of IoT in industrial processes and production and work life. Featuring coverage on a broad range of topics such as industrial process control, machine learning, and data mining, this book is geared toward academicians, computer engineers, students, researchers, and professionals seeking current and relevant research on applications of the IoT.
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
PHP is gaining positive reputation for its system administration and client-side application development capabilities. This administration and development is accomplished using the PHP-GTK extension. You can take advantage of client-side applications by implementing language bindings for the GTK (the GIMP Toolkit) library for creating cross-platform graphical user interfaces. "Pro PHP-GTK" acts as both a definitive reference and a hands-on tutorial to the PHP-GTK extension. The book couples the extension's key topics with practical examples to guide you through a real-world project: developing a database-driven client-side inventory manager. You'll also learn how to integrate this feature with other emerging technologies like SOAP and RSS, and how to generate XML-based interfaces.
The book discusses the evolution of cellular technology, then focusing in on 5G and its architecture and what it means for current engineers. The book first focuses on 4G and how it changed the industry, allowing people to communicate by connecting devices to the internet. The authors detail the emergence of services and applications that have revolutionized communication and continue to impact the daily habits of majority of the world's population. The authors endeavor to tell this story by showing the path taken until the arrival of 5G, detailing how technological and architectural progress evolved in all these years. It is a technical book, but the authors take care to explain in detail each aspect related to technology in order to allow everyone interested in the subject to delve into this important topic. Presents a comprehensive explanation about 4G and 5G architecture, modulation and protocols; Includes a thorough explanation of modern antennas technology and O-RAN; Relevant to technology professionals and students interested in 5G, but with little background in telecommunications; The English translation of this book from its Portuguese original manuscript was done with the help of artificial intelligence (machine translation by the service provider DeepL.com). A subsequent human revision of the content was done by the author.
Contains everything that a project team needs to know about the development and deployment of Web services with the IBM WebSphere product family. Includes examples for all development artifacts in a format that can be reused in the reader’s project. The text combines the authors’ own practical experiences with consolidated information on the latest product capabilities in a unique approach that allows the book to be easily accessible to a broad spectrum of readers. Finding a balance between a euphoric/optimistic and down-to earth/realistic view on the subject, this book should sit on every Web service developer’s bookshelf.
This comprehensive volume explores the evolving fields of consumer informatics and telemedicine as envisioned by the Institute of Medicine in its landmark reports on the electronic medical record, patient safety, and quality care. Each chapter describes the role of computers, technology, and telecommunications as enablers within a specific application focused on the needs of consumers. The applications covered are ones which empower consumers as they seek information, analyze their health care needs, and make decisions about their own health care. Such applications empower professionals in their efforts to serve patients, while increasing the knowledge of the consumer. Richly illustrated with detailed examples, this volume speaks to a wide range of audiences as it addresses issues raised by consumer informatics, the use of technology, research and development effects, and telemedicine. Chapter highlights include: Patient-Centered Communication; Using the Internet Toward Reliable Consumer Health Information; Disease Management and Home Telehealth; and Biothreats and Disaster Management. The book's audience includes all healthcare professionals, healthcare administrators, IT professionals, health informaticians, and students.
Efficiently and effectively prepare for the OCP Java SE 17 certification exam In OCP Oracle Certified Professional Java SE 17 Developer Practice Tests: Exam 1Z0-829, a team of veteran Java developers helps you gain the confidence and knowledge you need to take the Oracle Certified Professional Java SE 17 Developer exam. Hundreds of domain-by-domain questions accompany complimentary online access to bonus questions, providing you with over 1000 practice questions and answers. You'll also get: Access to Sybex's proven online interactive learning environment and test bank Comprehensive coverage of every domain included on the OCP Java SE 17 Developer exam Three complete bonus practice exams to help you gain confidence and develop proficiency in Java development This resource is perfect for anyone preparing to take Exam 1Z0-829. It also belongs on the bookshelves of novice and veteran Java programmers hoping to improve their on-the-job coding skills.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
Building Flickr Applications with PHP teaches you how to use today's most popular online photo management system. You'll learn to work with both your own photos and Flickr's enormous cache, and create new and compelling extensions to the Flickr platform. This book is a great pick because It's written by experienced developer Rob Kunkle and Phlickr developer Andrew Morton. You'll learn how to use the PHP API Phlickr to write and retrieve photos. Flicker is growing quickly in popularity in the online photo management world. Using the popular PHP-driven Phlickr API in conjunction with MySQL, you'll discover how to take advantage of open source tools like PHP, Apache, and MySQL, as well as the Flickr architecture, to manage, retrieve, and format photos in imaginative ways. You'll also learn how to build upon Flickr's photo collaboration features to create interfaces for working with others on photo album projects. And you'll learn how to format Flickr tags--taking advantage of RSS to distribute photo updates.
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies. |
![]() ![]() You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,366
Discovery Miles 13 660
Indexing - From Thesauri to the Semantic…
Piet de Keyser
Paperback
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav
Hardcover
R6,584
Discovery Miles 65 840
|