|
Books > Computing & IT > General theory of computing > Systems analysis & design
This book examines the interplay between IT solutions and specific
management methods in organizations. In particular, it assesses the
impact of IT reliability on factors like employees' commitment and
organizational performance. After developing the necessary
theoretical foundation, the book presents a framework for aligning
IT solutions with a number of specific management methods in
organizations. In addition, it demonstrates the extent to which IT
reliability can be an indicator for this alignment, and discusses
the impact on employees' commitment and organizational performance
under various management methods. Case studies from organizations
in Switzerland and Poland help to illustrate the findings. In
closing, the book presents roadmaps for improving IT and business
alignment so as to achieve higher commitment and better results.
![Tools for High Performance Computing 2016 - Proceedings of the 10th International Workshop on Parallel Tools for High...](//media.loot.co.za/images/x80/141858017587179215.jpg) |
Tools for High Performance Computing 2016
- Proceedings of the 10th International Workshop on Parallel Tools for High Performance Computing, October 2016, Stuttgart, Germany
(Hardcover, 1st ed. 2017)
Christoph Niethammer, Jose Gracia, Tobias Hilbrich, Andreas Knupfer, Michael M Resch, …
|
R4,215
R3,357
Discovery Miles 33 570
Save R858 (20%)
|
Ships in 12 - 17 working days
|
|
This book presents the proceedings of the 10th International
Parallel Tools Workshop, held October 4-5, 2016 in Stuttgart,
Germany - a forum to discuss the latest advances in parallel tools.
High-performance computing plays an increasingly important role for
numerical simulation and modelling in academic and industrial
research. At the same time, using large-scale parallel systems
efficiently is becoming more difficult. A number of tools
addressing parallel program development and analysis have emerged
from the high-performance computing community over the last decade,
and what may have started as collection of small helper script has
now matured to production-grade frameworks. Powerful user
interfaces and an extensive body of documentation allow easy usage
by non-specialists.
Artificial Intelligence Techniques in IoT Sensor Networks is a
technical book which can be read by researchers, academicians,
students and professionals interested in artificial intelligence
(AI), sensor networks and Internet of Things (IoT). This book is
intended to develop a shared understanding of applications of AI
techniques in the present and near term. The book maps the
technical impacts of AI technologies, applications and their
implications on the design of solutions for sensor networks. This
text introduces researchers and aspiring academicians to the latest
developments and trends in AI applications for sensor networks in a
clear and well-organized manner. It is mainly useful for research
scholars in sensor networks and AI techniques. In addition,
professionals and practitioners working on the design of real-time
applications for sensor networks may benefit directly from this
book. Moreover, graduate and master's students of any departments
related to AI, IoT and sensor networks can find this book
fascinating for developing expert systems or real-time
applications. This book is written in a simple and easy language,
discussing the fundamentals, which relieves the requirement of
having early backgrounds in the field. From this expectation and
experience, many libraries will be interested in owning copies of
this work.
This book offers an accessible guide to ubiquitous computing, with
an emphasis on pervasive networking. It addresses various technical
obstacles, such as connectivity, levels of service, performance,
reliability and fairness. The focus is on describing currently
available off-the-shelf technologies, novel algorithms and
techniques in areas such as: underwater sensor networks, ant colony
based routing, heterogeneous networks, agent based distributed
networks, cognitive radio networks, real-time WSN applications,
machine translation, intelligent computing and ontology based bit
masking. By introducing the core topics and exploring assistive
pervasive systems that draw on pervasive networking, the book
provides readers with a robust foundation of knowledge on this
growing field of research. Written in a straightforward style, the
book is also accessible to a broad audience of researchers and
designers who are interested in exploring pervasive computing
further.
Unleashing the Art of Digital Forensics is intended to describe and
explain the steps taken during a forensic examination, with the
intent of making the reader aware of the constraints and
considerations that apply during a forensic examination in law
enforcement and in the private sector. Key Features: * Discusses
the recent advancements in Digital Forensics and Cybersecurity *
Reviews detailed applications of Digital Forensics for real-life
problems * Addresses the challenges related to implementation of
Digital Forensics and Anti-Forensic approaches * Includes case
studies that will be helpful for researchers * Offers both
quantitative and qualitative research articles, conceptual papers,
review papers, etc. * Identifies the future scope of research in
the field of Digital Forensics and Cybersecurity. This book is
aimed primarily at and will be beneficial to graduates,
postgraduates, and researchers in Digital Forensics and
Cybersecurity.
Computational Intelligence for Wireless Sensor Networks: Principles
and Applications provides an integrative overview of the
computational intelligence (CI) in wireless sensor networks and
enabled technologies. It aims to demonstrate how the paradigm of
computational intelligence can benefit Wireless Sensor Networks
(WSNs) and sensor-enabled technologies to overcome their existing
issues. This book provides extensive coverage of the multiple
design challenges of WSNs and associated technologies such as
clustering, routing, media access, security, mobility, and design
of energy-efficient network operations. It also describes various
CI strategies such as fuzzy computing, evolutionary computing,
reinforcement learning, artificial intelligence, swarm
intelligence, teaching learning-based optimization, etc. It also
discusses applying the techniques mentioned above in wireless
sensor networks and sensor-enabled technologies to improve their
design. The book offers comprehensive coverage of related topics,
including: Emergence of intelligence in wireless sensor networks
Taxonomy of computational intelligence Detailed discussion of
various metaheuristic techniques Development of intelligent MAC
protocols Development of intelligent routing protocols Security
management in WSNs This book mainly addresses the challenges
pertaining to the development of intelligent network systems via
computational intelligence. It provides insights into how
intelligence has been pursued and can be further integrated in the
development of sensor-enabled applications.
This book discusses the technological aspects for the
implementation of Society 5.0. The foundation and recent advances
of emerging technologies such as artificial intelligence, data
science, Internet of Things, and Big Data for the realization of
Society 5.0 are covered. Practical solutions to existing problems,
examples, and case studies are also offered. Society 5.0 and the
Future of Emerging Computational Technologies: Practical Solutions,
Examples, and Case Studies discusses technologies such as machine
learning, artificial intelligence, and Internet of Things for the
implementation of Society 5.0. It offers a firm foundation and
understanding of the recent advancements in various domains such as
data analytics, neural networks, computer vision, and robotics,
along with practical solutions to existing problems in fields such
as healthcare, manufacturing industries, security, and
infrastructure management. Applications and implementations are
highlighted along with the correlation between technologies.
Examples and case studies are presented throughout the book to
augment text. This book can be used by research scholars in the
engineering domain who wish to gain knowledge and contribute
towards a modern and secure future society. The book will also be
useful as a reference at universities for postgraduate students who
are interested in technological advancements.
This volume in the Business Analysis Professional Development
Series by leading expert Eugenia Schmidt is for experienced
business analysis practitioners and others conducting business
analysis activities at an intermediate level who wish to master the
essential art of versatility and develop other advanced
capabilities and leadership skills needed to further their careers
to the expert competency level. Practitioners will learn to develop
the enterprise-level mindset required to accurately identify an
organization's needs; determine the best solutions; and adapt the
best approach, tools, and techniques to fit the project, culture,
risks, and ever-changing situations that may arise. This guide will
provide practitioners with the skills to perform successfully on
virtually any project, in any organization and industry, and lead
others to achieve desired results. Key Features: Examines business
analysis leadership from numerous perspectives, such as tactical,
strategic, perceived role, positional, credibility-based, and
relationship-based, and supplies tips for leading up and down the
organization Presents examples of which business analysis assets
should be included in an approach based on different criteria, and
explains how techniques can be adjusted based on the focus of the
initiative (data, process, or technology) Identifies various
constraints and risks that can impact the business analysis
approach and explains how to create and manage a business analysis
risk management plan Describes various tools and techniques and how
they can help mitigate specific business analysis risks
Demonstrates how value can be managed in different ways and at
various levels (enterprise, program, project, and requirements)
Furnishes real-world examples and various fictitious scenarios to
facilitate group discussion and more advanced business analysis
discovery learning Provides coaching and mentoring recommendations
with supplemental tools that enable business analysts to transfer
their expertise to others Reinforces learning with key summary
points and end-of-chapter questions WAV offers downloadable BA
templates, checklists, and competency assessment and development
tools
Exploring the interrelations between generalized metric spaces,
lattice-ordered groups, and order statistics, the book contains a
new algebraic approach to Signal Processing Theory. It describes
mathematical concepts and results important in the development,
analysis, and optimization of signal processing algorithms intended
for various applications. The book offers a solution of large-scale
Signal Processing Theory problems of increasing both signal
processing efficiency under prior uncertainty conditions and signal
processing rate that is provided by multiplication-free signal
processing algorithms based on lattice-ordered group operations.
From simple basic relationships to computer simulation, the text
covers a wide range of new mathematical techniques essential for
understanding the proposed signal processing algorithms developed
for solving the following problems: signal parameter and spectral
estimation, signal filtering, detection, classification, and
resolution; array signal processing; demultiplexing and
demodulation in multi-channel communication systems and
multi-station networks; wavelet analysis of 1D/ 2D signals. Along
with discussing mathematical aspects, each chapter presents
examples illustrating operation of signal processing algorithms
developed for various applications. The book helps readers
understand relations between known classic and obtained results as
well as recent research trends in Signal Processing Theory and its
applications, providing all necessary mathematical background
concerning lattice-ordered groups to prepare readers for
independent work in the marked directions including more advanced
research and development.
Integration of IoT (Internet of Things) with big data and cloud
computing has brought forward numerous advantages and challenges
such as data analytics, integration, and storage. This book
highlights these challenges and provides an integrating framework
for these technologies, illustrating the role of blockchain in all
possible facets of IoT security. Furthermore, it investigates the
security and privacy issues associated with various IoT systems
along with exploring various machine learning-based IoT security
solutions. This book brings together state-of-the-art innovations,
research activities (both in academia and in industry), and the
corresponding standardization impacts of 5G as well. Aimed at
graduate students, researchers in computer science and engineering,
communication networking, IoT, machine learning and pattern
recognition, this book Showcases the basics of both IoT and various
security paradigms supporting IoT, including Blockchain Explores
various machine learning-based IoT security solutions and
highlights the importance of IoT for industries and smart cities
Presents various competitive technologies of Blockchain, especially
concerned with IoT security Provides insights into the taxonomy of
challenges, issues, and research directions in IoT-based
applications Includes examples and illustrations to effectively
demonstrate the principles, algorithm, applications, and practices
of security in the IoT environment
This book contains all refereed papers that were accepted to the
second edition of the " Complex Systems Design & Management "
(CSDM 2011) international conference that took place in Paris
(France) from December 7 to December 9, 2011. (Website:
http://www.csdm2011.csdm.fr/). These proceedings cover the most
recent trends in the emerging field of complex systems sciences
& practices from an industrial and academic perspective,
including the main industrial domains (transport, defense &
security, electronics, energy & environment, e-services),
scientific & technical topics (systems fundamentals, systems
architecture& engineering, systems metrics & quality,
systemic tools) and system types (transportation systems, embedded
systems, software & information systems, systems of systems,
artificial ecosystems). The CSDM 2011 conference is organized under
the guidance of the CESAMES non-profit organization
(http://www.cesames.net/).
This book discusses IoT in healthcare and how it enables
interoperability, machine-to-machine communication, information
exchange, and data movement. It also covers how healthcare service
delivery automates patient care with the help of mobility
solutions, new technologies, and next-gen healthcare facilities
with challenges faced and suggested solutions prescribed.
Reinvention of Health Applications with IoT: Challenges and
Solutions presents the latest applications of IoT in healthcare
along with challenges and solutions. It looks at a comparison of
advanced technologies such as Deep Learning, Machine Learning, and
AI and explores the ways they can be applied to sensed data to
improve prediction and decision-making in smart health services. It
focuses on society 5.0 technologies and illustrates how they can
improve society and the transformation of IoT in healthcare
facilities to support patient independence. Case studies are
included for applications such as smart eyewear, smart jackets, and
smart beds. The book will also go into detail on wearable
technologies and how they can communicate patient information to
doctors in medical emergencies. The target audiences for this
edited volume is researchers, practitioners, students, as well as
key stakeholders involved in and working on healthcare engineering
solutions.
Managing Trade-Offs in Adaptable Software Architectures explores
the latest research on adapting large complex systems to changing
requirements. To be able to adapt a system, engineers must evaluate
different quality attributes, including trade-offs to balance
functional and quality requirements to maintain a well-functioning
system throughout the lifetime of the system. This comprehensive
resource brings together research focusing on how to manage
trade-offs and architect adaptive systems in different business
contexts. It presents state-of-the-art techniques, methodologies,
tools, best practices, and guidelines for developing adaptive
systems, and offers guidance for future software engineering
research and practice. Each contributed chapter considers the
practical application of the topic through case studies,
experiments, empirical validation, or systematic comparisons with
other approaches already in practice. Topics of interest include,
but are not limited to, how to architect a system for adaptability,
software architecture for self-adaptive systems, understanding and
balancing the trade-offs involved, architectural patterns for
self-adaptive systems, how quality attributes are exhibited by the
architecture of the system, how to connect the quality of a
software architecture to system architecture or other system
considerations, and more.
Explores the role of Artificial Intelligence and Smart Computing in
health informatics and healthcare with an emphasis on clinical data
management and analysis for precise prediction and prompt action
Presents cutting edge tracking, monitoring, real time assistance,
and security for IoT in healthcare Discusses broadly on wearable
sensors and IoT devices and their role in smart living assistance
and energy conservation Describes a system mode and architecture
for a clear picture of IoT in healthcare Explains the challenges
and opportunities with IoT based healthcare industries and includes
a study of threats, impacts, and the need of information security
![Internet of Things. Information Processing in an Increasingly Connected World - First IFIP International Cross-Domain...](//media.loot.co.za/images/x80/551203963651179215.jpg) |
Internet of Things. Information Processing in an Increasingly Connected World
- First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers
(Hardcover, 1st ed. 2019)
Leon Strous, Vinton G. Cerf
|
R2,314
Discovery Miles 23 140
|
Ships in 10 - 15 working days
|
|
This open access book constitutes the refereed post-conference
proceedings of the First IFIP International Cross-Domain Conference
on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World
Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
The 12 full papers presented were carefully reviewed and selected
from 24 submissions. Also included in this volume are 4 WCC 2018
plenary contributions, an invited talk and a position paper from
the IFIP domain committee on IoT. The papers cover a wide range of
topics from a technology to a business perspective and include
among others hardware, software and management aspects, process
innovation, privacy, power consumption, architecture, applications.
This book discusses risk management as it applies to
problem-solving for simple, complex and wicked problems faced by
policy creators and implementors, project managers and systems
engineers in the context of policies, large engineering projects
(LEPs), projects and systems. When applying systems thinking to
risk management, it can be seen that risk management applies to
almost every action taken in daily life. This book: Introduces the
systems approach of integrating risk management into policy
creation and implementation, project management and systems
engineering, such as the risk framework and the Firm Fixed Price
(FFP) contract with penalties and bonuses. Introduces a number of
out-of-the box concepts building on the application of the systems
thinking tools in the system thinker's toolbox. Points out that
integrating risk management into policy and project management and
systems engineering is just good management and engineering
practice. Discusses the flow of risk in a policy from creation
through implementation via LEPs and simpler projects, identifying
where risks arise and where they should be dealt with. Presents the
risks in the relationship between policy creation, implementation,
project management and systems engineering. Discusses risks
throughout the policy implementation process and shows how the
nature of risks changes from political to financial to
technological as implementation proceeds. Discusses managing
complexity and specifies the minimum number of elements in a system
for it to be defined as, and managed as, complex. Points out that
in most instances the traditionally ignored major implementation
risk is that of poor performance by personnel. Shows how to
proactively incorporate prevention into planning in order to
prevent risks, as well as how to mitigate them when they occur.
Nature-Inspired Optimization Algorithms, a comprehensive work on
the most popular optimization algorithms based on nature, starts
with an overview of optimization going from the classical to the
latest swarm intelligence algorithm. Nature has a rich abundance of
flora and fauna that inspired the development of optimization
techniques, providing us with simple solutions to complex problems
in an effective and adaptive manner. The study of the intelligent
survival strategies of animals, birds, and insects in a hostile and
ever-changing environment has led to the development of techniques
emulating their behavior. This book is a lucid description of
fifteen important existing optimization algorithms based on swarm
intelligence and superior in performance. It is a valuable resource
for engineers, researchers, faculty, and students who are devising
optimum solutions to any type of problem ranging from computer
science to economics and covering diverse areas that require
maximizing output and minimizing resources. This is the crux of all
optimization algorithms. Features: Detailed description of the
algorithms along with pseudocode and flowchart Easy translation to
program code that is also readily available in Mathworks website
for some of the algorithms Simple examples demonstrating the
optimization strategies are provided to enhance understanding
Standard applications and benchmark datasets for testing and
validating the algorithms are included This book is a reference for
undergraduate and post-graduate students. It will be useful to
faculty members teaching optimization. It is also a comprehensive
guide for researchers who are looking for optimizing resources in
attaining the best solution to a problem. The nature-inspired
optimization algorithms are unconventional, and this makes them
more efficient than their traditional counterparts.
The author has spent approximately 50 years in the field of systems
engineering. This Focus book provides a "looking back" at his
50-year run and the lessons he learned and would like to share with
other engineers, so they can use these lessons in their day-to-day
work in systems engineering and related fields. The book is written
from a systems engineering perspective. It offers 50 lessons
learned working for a variety of different companies, which can be
used across many other engineering fields. The book will be of
interested to students and engineers across many fields, as well as
students and engineers working in business and management fields.
The Web of Things (WoT) is a concept that describes approaches,
programming tools and software architectural systems, which
interface networks of real-world objects with the World Wide Web.
The book is organized into 11 chapters, each focusing on a unique
wireless technological aspect of the Web of Things, and it aims to
comprehensively cover each of its various applications, including:
A strong emphasis on WoT problems and solutions, identifying the
main open issues, innovations and latest technologies behind WoT A
blend of theoretical and simulation-based problems for better
understanding of the concepts behind WoT Various exemplifying
applications in which the use of WoT is very attractive and an
inspiration for future applications The book will be useful to
researchers, software developers and undergraduate and postgraduate
students, as well as practitioners.
The next generation of computer system designers will be less
concerned about details of processors and memories, and more
concerned about the elements of a system tailored to particular
applications. These designers will have a fundamental knowledge of
processors and other elements in the system, but the success of
their design will depend on the skills in making system-level
tradeoffs that optimize the cost, performance and other attributes
to meet application requirements. This book provides a new
treatment of computer system design, particularly for
System-on-Chip (SOC), which addresses the issues mentioned above.
It begins with a global introduction, from the high-level view to
the lowest common denominator (the chip itself), then moves on to
the three main building blocks of an SOC (processor, memory, and
interconnect). Next is an overview of what makes SOC unique (its
customization ability and the applications that drive it). The
final chapter presents future challenges for system design and SOC
possibilities.
The theory and applications of Iteration Methods is a very
fast-developing field of numerical analysis and computer methods.
The second edition is completely updated and continues to present
the state-of-the-art contemporary theory of iteration methods with
practical applications, exercises, case studies, and examples of
where and how they can be used. The Theory and Applications of
Iteration Methods, Second Edition includes newly developed
iteration methods taking advantage of the most recent technology
(computers, robots, machines). It extends the applicability of
well-established methods by increasing the convergence domain and
offers sharper error tolerance. New proofs and ideas for handling
convergence are introduced along with a new variety of story
problems picked from diverse disciplines. This new edition is for
researchers, practitioners, and students in engineering, economics,
and computational sciences.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges
discusses the convergence of three powerful technologies that play
into the digital revolution and blur the lines between biological,
digital, and physical objects. This book covers novel algorithms,
solutions for addressing issues in applications, security,
authentication, and privacy. The book provides an overview of the
clinical scientific research enabling smart diagnosis equipment
through AI. It presents the role these technologies play in
augmented reality and blockchain, covers digital currency managed
with bitcoin, and discusses deep learning and how it can enhance
human thoughts and behaviors. Targeted audiences range from those
interested in the technical revolution of blockchain, big data and
the Internet of Things, to research scholars and the professional
market.
|
You may like...
Storm Tide
Wilbur Smith, Tom Harper
Hardcover
R477
Discovery Miles 4 770
Die Verevrou
Jan van Tonder
Paperback
R375
R322
Discovery Miles 3 220
Vier Susters
Gerda Taljaard
Paperback
R229
Discovery Miles 2 290
|