![]() |
![]() |
Your cart is empty |
||
Showing 1 - 24 of 24 matches in All Departments
This textbook introduces major topics that include quantum bits, superposition, entanglement, logic gates, quantum search algorithm, quantum Fourier transform, inverse quantum Fourier transform, Shor's order-finding algorithm and phase estimation. Everyone can write algorithms and programs in the cloud making using IBM's quantum computers that support IBM Q Experience which contains the composer, open quantum assembly language, simulators and real quantum devices. Furthermore, this book teaches you how to use open quantum assembly language to write quantum programs for dealing with complex problems. Through numerous examples and exercises, readers will learn how to write a quantum program with open quantum assembly language for solving any problem from start to complete. This book includes six main chapters: *Quantum Bits and Quantum Gates-learn what quantum bits are, how to declare and measure them, what quantum gates are and how they work on a simulator or a real device in the cloud. *Boolean Algebra and its Applications-learn how to decompose CCNOT gate into six CNOT gates and nine gates of one bit and how to use NOT gates, CNOT gates and CCNOT gates to implement logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR). *Quantum Search Algorithm and its Applications-learn core concepts of quantum search algorithm and how to write quantum programs to implement core concepts of quantum search algorithm for solving two famous NP-complete problems that are the satisfiability problem in n Boolean variables and m clauses and the clique problem in a graph with n vertices and q edges. *Quantum Fourier Transform and its Applications-learn core concepts of quantum Fourier transform and inverse quantum Fourier transform and how to write quantum programs to implement them for solving two real applications that are to compute the period and the frequency of two given oracular functions. *Order-Finding and Factoring-learn core concepts of Shor's order-finding algorithm and how to write quantum programs to implement Shor's order-finding algorithm for completing the prime factorization to 15. Phase Estimation and its Applications-learn core concepts of phase estimation and quantum counting and how to write quantum programs to implement them to compute the number of solution(s) in the independent set problem in a graph with two vertices and one edge.
This book provides a comprehensive overview of computational intelligence methods for semantic knowledge management. Contrary to popular belief, the methods for semantic management of information were created several decades ago, long before the birth of the Internet. In fact, it was back in 1945 when Vannevar Bush introduced the idea for the first protohypertext: the MEMEX (MEMory + indEX) machine. In the years that followed, Bush's idea influenced the development of early hypertext systems until, in the 1980s, Tim Berners Lee developed the idea of the World Wide Web (WWW) as it is known today. From then on, there was an exponential growth in research and industrial activities related to the semantic management of the information and its exploitation in different application domains, such as healthcare, e-learning and energy management. However, semantics methods are not yet able to address some of the problems that naturally characterize knowledge management, such as the vagueness and uncertainty of information. This book reveals how computational intelligence methodologies, due to their natural inclination to deal with imprecision and partial truth, are opening new positive scenarios for designing innovative semantic knowledge management architectures.
This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services.
This textbook introduces a concise approach to the design of molecular algorithms for students or researchers who are interested in dealing with complex problems. Through numerous examples and exercises, you will understand the main difference of molecular circuits and traditional digital circuits to manipulate the same problem and you will also learn how to design a molecular algorithm of solving any a problem from start to finish. The book starts with an introduction to computational aspects of digital computers and molecular computing, data representation of molecular computing, molecular operations of molecular computing and number representation of molecular computing and provides many molecular algorithm to construct the parity generator and the parity checker of error-detection codes on digital communication, to encode integers of different formats, single precision and double precision of floating-point numbers, to implement addition and subtraction of unsigned integers, to construct logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR), to implement comparators, shifters, increase, decrease, and to complete two specific operations that are to find the maximum number of "1" and to find the minimum number of "1." The book is also a useful reference source to people new for the field of molecular computing.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
Foundations of Computational Intelligence Volume 1: Learning and Approximation: Theoretical Foundations and Applications Learning methods and approximation algorithms are fundamental tools that deal with computationally hard problems and problems in which the input is gradually disclosed over time. Both kinds of problems have a large number of applications arising from a variety of fields, such as algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approxi- tion and online algorithms, randomization techniques, real-world applications, scheduling problems and so on. The past years have witnessed a large number of interesting applications using various techniques of Computational Intelligence such as rough sets, connectionist learning; fuzzy logic; evolutionary computing; artificial immune systems; swarm intelligence; reinforcement learning, intelligent multimedia processing etc. . In spite of numerous successful applications of C- putational Intelligence in business and industry, it is sometimes difficult to explain the performance of these techniques and algorithms from a theoretical perspective. Therefore, we encouraged authors to present original ideas dealing with the inc- poration of different mechanisms of Computational Intelligent dealing with Lea- ing and Approximation algorithms and underlying processes. This edited volume comprises 15 chapters, including an overview chapter, which provides an up-to-date and state-of-the art research on the application of Computational Intelligence for learning and approximation.
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.
A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. Written for a broad audience of researchers and practitioners, it supplies useful reference material for graduate students and senior undergraduate students in courses of networking, wireless, and mobile communications. Starting with an accessible introduction to DTNs, their architecture, bundle protocols, and routing schemes, the book provides authoritative coverage of:
Reporting on the latest developments in these domains, the distinguished panel of contributors supplies a realistic look into the future of networking. Complete with sections that summarize open issues in each domain, this book arms you with the understanding and methods required to make an impact on the advancement of these emerging networks that continue to grow in importance.
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.
New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. In order to realize such advanced systems, approaches should become task- and knowledge-driven, enabling a service-oriented, requirement, and trust-driven development of communication networks. The networking and seamless integration of concepts, technologies and devices in a dynamically changing environment poses many challenges to the research community, including interoperability, programmability, management, openness, reliability, performance, context awareness, intelligence, autonomy, security, privacy, safety, and semantics. This edited volume explores the challenges of technologies to realize the vision where devices and applications seamlessly interconnect, intelligently cooperate, and autonomously manage themselves, and as a result, the borders of virtual and real world vanish or become significantly blurred.
Foundations of Computational Intelligence Volume 1: Learning and Approximation: Theoretical Foundations and Applications Learning methods and approximation algorithms are fundamental tools that deal with computationally hard problems and problems in which the input is gradually disclosed over time. Both kinds of problems have a large number of applications arising from a variety of fields, such as algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approxi- tion and online algorithms, randomization techniques, real-world applications, scheduling problems and so on. The past years have witnessed a large number of interesting applications using various techniques of Computational Intelligence such as rough sets, connectionist learning; fuzzy logic; evolutionary computing; artificial immune systems; swarm intelligence; reinforcement learning, intelligent multimedia processing etc. . In spite of numerous successful applications of C- putational Intelligence in business and industry, it is sometimes difficult to explain the performance of these techniques and algorithms from a theoretical perspective. Therefore, we encouraged authors to present original ideas dealing with the inc- poration of different mechanisms of Computational Intelligent dealing with Lea- ing and Approximation algorithms and underlying processes. This edited volume comprises 15 chapters, including an overview chapter, which provides an up-to-date and state-of-the art research on the application of Computational Intelligence for learning and approximation.
This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services.
This textbook introduces a concise approach to the design of molecular algorithms for students or researchers who are interested in dealing with complex problems. Through numerous examples and exercises, you will understand the main difference of molecular circuits and traditional digital circuits to manipulate the same problem and you will also learn how to design a molecular algorithm of solving any a problem from start to finish. The book starts with an introduction to computational aspects of digital computers and molecular computing, data representation of molecular computing, molecular operations of molecular computing and number representation of molecular computing and provides many molecular algorithm to construct the parity generator and the parity checker of error-detection codes on digital communication, to encode integers of different formats, single precision and double precision of floating-point numbers, to implement addition and subtraction of unsigned integers, to construct logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR), to implement comparators, shifters, increase, decrease, and to complete two specific operations that are to find the maximum number of “1” and to find the minimum number of “1”. The book is also a useful reference source to people new for the field of molecular computing.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
New paradigms for communication/networking systems are needed in order to tackle the emerging issues such as heterogeneity, complexity and management of evolvable infrastructures. In order to realize such advanced systems, approaches should become task- and knowledge-driven, enabling a service-oriented, requirement, and trust-driven development of communication networks. The networking and seamless integration of concepts, technologies and devices in a dynamically changing environment poses many challenges to the research community, including interoperability, programmability, management, openness, reliability, performance, context awareness, intelligence, autonomy, security, privacy, safety, and semantics. This edited volume explores the challenges of technologies to realize the vision where devices and applications seamlessly interconnect, intelligently cooperate, and autonomously manage themselves, and as a result, the borders of virtual and real world vanish or become significantly blurred.
Recent years have seen numerous applications across a variety of fields using various techniques of Computational Intelligence. This book, one of a series on the foundations of Computational Intelligence, is focused on learning and approximation.
A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. Written for a broad audience of researchers and practitioners, it supplies useful reference material for graduate students and senior undergraduate students in courses of networking, wireless, and mobile communications. Starting with an accessible introduction to DTNs, their architecture, bundle protocols, and routing schemes, the book provides authoritative coverage of: DTN Routing Energy-Aware Routing Protocol for DTNs A Routing-Compatible Credit-Based Incentive Scheme R-P2P: a Data-Centric Middleware for Delay Tolerant Applications Mobile Peer-to-Peer Systems over DTNs Delay-Tolerant Monitoring of Mobility-Assisted WSN Message Dissemination in Vehicular Networks DTN Protocols for Space Communications DTN for Satellite Communications Reporting on the latest developments in these domains, the distinguished panel of contributors supplies a realistic look into the future of networking. Complete with sections that summarize open issues in each domain, this book arms you with the understanding and methods required to make an impact on the advancement of these emerging networks that continue to grow in importance.
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.
This textbook introduces major topics that include quantum bits, superposition, entanglement, logic gates, quantum search algorithm, quantum Fourier transform, inverse quantum Fourier transform, Shor's order-finding algorithm and phase estimation. Everyone can write algorithms and programs in the cloud making using IBM's quantum computers that support IBM Q Experience which contains the composer, open quantum assembly language, simulators and real quantum devices. Furthermore, this book teaches you how to use open quantum assembly language to write quantum programs for dealing with complex problems. Through numerous examples and exercises, readers will learn how to write a quantum program with open quantum assembly language for solving any problem from start to complete. This book includes six main chapters: *Quantum Bits and Quantum Gates-learn what quantum bits are, how to declare and measure them, what quantum gates are and how they work on a simulator or a real device in the cloud. *Boolean Algebra and its Applications-learn how to decompose CCNOT gate into six CNOT gates and nine gates of one bit and how to use NOT gates, CNOT gates and CCNOT gates to implement logic operations including NOT, OR, AND, NOR, NAND, Exclusive-OR (XOR) and Exclusive-NOR (XNOR). *Quantum Search Algorithm and its Applications-learn core concepts of quantum search algorithm and how to write quantum programs to implement core concepts of quantum search algorithm for solving two famous NP-complete problems that are the satisfiability problem in n Boolean variables and m clauses and the clique problem in a graph with n vertices and q edges. *Quantum Fourier Transform and its Applications-learn core concepts of quantum Fourier transform and inverse quantum Fourier transform and how to write quantum programs to implement them for solving two real applications that are to compute the period and the frequency of two given oracular functions. *Order-Finding and Factoring-learn core concepts of Shor's order-finding algorithm and how to write quantum programs to implement Shor's order-finding algorithm for completing the prime factorization to 15. Phase Estimation and its Applications-learn core concepts of phase estimation and quantum counting and how to write quantum programs to implement them to compute the number of solution(s) in the independent set problem in a graph with two vertices and one edge.
These proceedings contain the papers presented at the Third International ICST C- ference on Autonomic Computing and Communication Systems, Autonomics 2009, held at the Cyprus University of Technology, Limassol, Cyprus, during September 9-11, 2009. As for the previous editions of the conference, this year too the primary goal of the event was to allow people working in the areas of communication, design, progr- ming, use and fundamental limits of autonomics pervasive systems to meet and - change their ideas and experiences in the aforementioned issues. In maintaining the tradition of excellence of Autonomics, this year we accepted 11 high-quality papers out of 26 submitted and had 5 invited talks, covering various aspects of autonomic computing including applications, middleware, networking protocols, and evaluation. The wide interest in the autonomic systems is shown by the broad range of topics covered in the papers presented at the conference. All papers presented at the conf- ence are published here and some of them, which are considered particularly intere- ing, will be considered for publication in a special issue of the International Journal of Autonomics and Adaptive Communications Systems (IJAACS). The conference also hosted the First International Workshop on Agent-Based Social Simulation and Au- nomic Systems (ABSS@AS).
The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.
|
![]() ![]() You may like...
Memory Landscapes of the Inka Carved…
Jessica Joyce Christie
Paperback
R1,454
Discovery Miles 14 540
Tourism in the Kyrgyz Republic - Social…
Sadyrbek Kozhokulov, Gulnura Issanova, …
Hardcover
R3,530
Discovery Miles 35 300
Tiwi Textiles - Design, Making, Process
Diana Wood Conroy, Bede Tungutalum
Paperback
R2,066
Discovery Miles 20 660
Maths Progress Second Edition Core…
Katherine Pate, Naomi Norman
Paperback
R688
Discovery Miles 6 880
|