![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 30 matches in All Departments
Engineering and science research can be difficult for beginners because scientific research is fraught with constraints and disciplines. Research and Technical Writing for Science and Engineering breakdowns the entire process of conducting engineering and scientific research. This book covers those fascinating guidelines and topics on conducting research, as well as how to better interact with your advisor. Key Features: advice on conducting a literature review, conducting experiments, and writing a good paper summarizing your findings. provides a tutorial on how to increase the impact of research and how to manage research resources. By reflecting on the cases discussed in this book, readers will be able to identify specific situations or dilemmas in their own lives, as the authors provide comprehensive suggestions based on their own experiences.
Engineering and science research can be difficult for beginners because scientific research is fraught with constraints and disciplines. Research and Technical Writing for Science and Engineering breakdowns the entire process of conducting engineering and scientific research. This book covers those fascinating guidelines and topics on conducting research, as well as how to better interact with your advisor. Key Features: advice on conducting a literature review, conducting experiments, and writing a good paper summarizing your findings. provides a tutorial on how to increase the impact of research and how to manage research resources. By reflecting on the cases discussed in this book, readers will be able to identify specific situations or dilemmas in their own lives, as the authors provide comprehensive suggestions based on their own experiences.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.
Mobile Applications Development with Android: Technologies and Algorithms presents advanced techniques for mobile app development, and addresses recent developments in mobile technologies and wireless networks. The book covers advanced algorithms, embedded systems, novel mobile app architecture, and mobile cloud computing paradigms. Divided into three sections, the book explores three major dimensions in the current mobile app development domain. The first section describes mobile app design and development skills, including a quick start on using Java to run an Android application on a real phone. It also introduces 2D graphics and UI design, as well as multimedia in Android mobile apps. The second part of the book delves into advanced mobile app optimization, including an overview of mobile embedded systems and architecture. Data storage in Android, mobile optimization by dynamic programming, and mobile optimization by loop scheduling are also covered. The last section of the book looks at emerging technologies, including mobile cloud computing, advanced techniques using Big Data, and mobile Big Data storage. About the Authors Meikang Qiu is an Associate Professor of Computer Science at Pace University, and an adjunct professor at Columbia University. He is an IEEE/ACM Senior Member, as well as Chair of the IEEE STC (Special Technical Community) on Smart Computing. He is an Associate Editor of a dozen of journals including IEEE Transactions on Computers and IEEE Transactions on Cloud Computing. He has published 320+ peer-reviewed journal/conference papers and won 10+ Best Paper Awards. Wenyun Dai is pursuing his PhD at Pace University. His research interests include high performance computing, mobile data privacy, resource management optimization, cloud computing, and mobile networking. His paper about mobile app privacy has been published in IEEE Transactions on Computers. Keke Gai is pursuing his PhD at Pace University. He has published over 60 peer-reviewed journal or conference papers, and has received three IEEE Best Paper Awards. His research interests include cloud computing, cyber security, combinatorial optimization, business process modeling, enterprise architecture, and Internet computing. .
Mobile Applications Development with Android: Technologies and Algorithms presents advanced techniques for mobile app development, and addresses recent developments in mobile technologies and wireless networks. The book covers advanced algorithms, embedded systems, novel mobile app architecture, and mobile cloud computing paradigms. Divided into three sections, the book explores three major dimensions in the current mobile app development domain. The first section describes mobile app design and development skills, including a quick start on using Java to run an Android application on a real phone. It also introduces 2D graphics and UI design, as well as multimedia in Android mobile apps. The second part of the book delves into advanced mobile app optimization, including an overview of mobile embedded systems and architecture. Data storage in Android, mobile optimization by dynamic programming, and mobile optimization by loop scheduling are also covered. The last section of the book looks at emerging technologies, including mobile cloud computing, advanced techniques using Big Data, and mobile Big Data storage. About the Authors Meikang Qiu is an Associate Professor of Computer Science at Pace University, and an adjunct professor at Columbia University. He is an IEEE/ACM Senior Member, as well as Chair of the IEEE STC (Special Technical Community) on Smart Computing. He is an Associate Editor of a dozen of journals including IEEE Transactions on Computers and IEEE Transactions on Cloud Computing. He has published 320+ peer-reviewed journal/conference papers and won 10+ Best Paper Awards. Wenyun Dai is pursuing his PhD at Pace University. His research interests include high performance computing, mobile data privacy, resource management optimization, cloud computing, and mobile networking. His paper about mobile app privacy has been published in IEEE Transactions on Computers. Keke Gai is pursuing his PhD at Pace University. He has published over 60 peer-reviewed journal or conference papers, and has received three IEEE Best Paper Awards. His research interests include cloud computing, cyber security, combinatorial optimization, business process modeling, enterprise architecture, and Internet computing. .
Ubiquitous in today's consumer-driven society, embedded systems use microprocessors that are hidden in our everyday products and designed to perform specific tasks. Effective use of these embedded systems requires engineers to be proficient in all phases of this effort, from planning, design, and analysis to manufacturing and marketing. Taking a systems-level approach, Real-Time Embedded Systems: Optimization, Synthesis, and Networking describes the field from three distinct aspects that make up the three major trends in current embedded system design. The first section of the text examines optimization in real-time embedded systems. The authors present scheduling algorithms in multi-core embedded systems, instruct on a robust measurement against the inaccurate information that can exist in embedded systems, and discuss potential problems of heterogeneous optimization. The second section focuses on synthesis-level approaches for embedded systems, including a scheduling algorithm for phase change memory and scratch pad memory and a treatment of thermal-aware multiprocessor synthesis technology. The final section looks at networking with a focus on task scheduling in both a wireless sensor network and cloud computing. It examines the merging of networking and embedded systems and the resulting evolution of a new type of system known as the cyber physical system (CPS). Encouraging readers to discover how the computer interacts with its environment, Real-Time Embedded Systems provides a sound introduction to the design, manufacturing, marketing, and future directions of this important tool.
This book constitutes the refereed proceedings of the 9thInternational Conference on Cloud Computing, CloudComp 2019, and the 4th International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019, both held in Beijing, China, in December 2019. The55 full papers of both conferences were selected from 113 submissions. CloudComp 2019 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. The papers are grouped thematically in tracks on cloud architecture and scheduling; cloud-based data analytics; cloud applications; and cloud security and privacy. SmartGIFT 2019 focus on all aspects of smart grids and telecommunications, broadly understood as the renewable generation and distributed energy resources integration, computational intelligence applications, information and communication technologies.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.
This book constitutes the refereed proceedings of the Second International Conference on Smart Computing and Communications, SmartCom 2017, held in Shenzhen, China, in December 2017.The 43 papers presented in this volume were carefully reviewed and selected from 116 submissions. They deal with topics from smart data to smart communications, smart cloud computing and smart security.
Ubiquitous in today's consumer-driven society, embedded systems use microprocessors that are hidden in our everyday products and designed to perform specific tasks. Effective use of these embedded systems requires engineers to be proficient in all phases of this effort, from planning, design, and analysis to manufacturing and marketing. Taking a systems-level approach, Real-Time Embedded Systems: Optimization, Synthesis, and Networking describes the field from three distinct aspects that make up the three major trends in current embedded system design. The first section of the text examines optimization in real-time embedded systems. The authors present scheduling algorithms in multi-core embedded systems, instruct on a robust measurement against the inaccurate information that can exist in embedded systems, and discuss potential problems of heterogeneous optimization. The second section focuses on synthesis-level approaches for embedded systems, including a scheduling algorithm for phase change memory and scratch pad memory and a treatment of thermal-aware multiprocessor synthesis technology. The final section looks at networking with a focus on task scheduling in both a wireless sensor network and cloud computing. It examines the merging of networking and embedded systems and the resulting evolution of a new type of system known as the cyber physical system (CPS). Encouraging readers to discover how the computer interacts with its environment, Real-Time Embedded Systems provides a sound introduction to the design, manufacturing, marketing, and future directions of this important tool.
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022, held in Singapore, during August 6-8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections: Volume I:Knowledge Science with Learning and AI (KSLA) Volume II:Knowledge Engineering Research and Applications (KERA) Volume III:Knowledge Management with Optimization and Security (KMOS)
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022, held in Singapore, during August 6-8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections: Volume I:Knowledge Science with Learning and AI (KSLA) Volume II:Knowledge Engineering Research and Applications (KERA) Volume III:Knowledge Management with Optimization and Security (KMOS)
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022, held in Singapore, during August 6-8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS)
This book constitutes the proceedings of the 6th International Conference on Smart Computing and Communication, SmartCom 2021, which took place in New York City, USA, during December 29-31, 2021.* The 44 papers included in this book were carefully reviewed and selected from 165 submissions. The scope of SmartCom 2021 was broad, from smart data to smart communications, from smart cloud computing to smart security. The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research. * Conference was held online due to the COVID-19 pandemic.
This three-volume set constitutes the refereed proceedings of the 14th International Conference on Knowledge Science, Engineering and Management, KSEM 2021, held in Tokyo, Japan, in August 2021.The 164 revised full papers were carefully reviewed and selected from 492 submissions. The contributions are organized in the following topical sections: knowledge science with learning and AI; knowledge engineering research and applications; knowledge management with optimization and security.
This three-volume set constitutes the refereed proceedings of the 14th International Conference on Knowledge Science, Engineering and Management, KSEM 2021, held in Tokyo, Japan, in August 2021.The 164 revised full papers were carefully reviewed and selected from 492 submissions. The contributions are organized in the following topical sections: knowledge science with learning and AI; knowledge engineering research and applications; knowledge management with optimization and security.
This three-volume set constitutes the refereed proceedings of the 14th International Conference on Knowledge Science, Engineering and Management, KSEM 2021, held in Tokyo, Japan, in August 2021.The 164 revised full papers were carefully reviewed and selected from 492 submissions. The contributions are organized in the following topical sections: knowledge science with learning and AI; knowledge engineering research and applications; knowledge management with optimization and security.
This book constitutes the proceedings of the 5th International Conference on Smart Computing and Communication, SmartCom 2020, which took place in Paris, France, during December 29-31, 2020.The 30 papers included in this book were carefully reviewed and selected from 162 submissions. The scope of SmartCom 2020 was broad, from smart data to smart communications, from smart cloud computing to smart security. The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research.
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020.The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.
This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field.
This book constitutes the refereed proceedings of the Second International Conference on Smart Blockchain, SmartBlock 2019, held in Birmingham, UK, in October 2019.The 13 papers presented in this volume were carefully reviewed and selected from 100 submissions. They focus on a broad range of topics in the area of blockchain, from privacy-preserving solutions to designing advanced blockchain mechanism, from empirical studies to practical manuals.
This book constitutes the refereed proceedings of the First International Conference on Smart Blockchain, SmartBlock 2018, held in Tokyo, Japan, in December 2018. The 17 papers presented in this volume were carefully reviewed and selected from 102 submissions. They focus on a broad range of topics in the area of blockchain, from privacy-preserving solutions to designing advanced blockchain mechanism, from empirical studies to practical manuals.
This book constitutes the refereed proceedings of the Third International Conference on Smart Computing and Communications, SmartCom 2018, held in Tokyo, Japan, in December 2018. The 45 papers presented in this volume were carefully reviewed and selected from 305 submissions. They focus on topics from smart data to smart communications, as well as smart cloud computing to smart security. |
![]() ![]() You may like...
Heart Of A Strong Woman - From Daveyton…
Xoliswa Nduneni-Ngema, Fred Khumalo
Paperback
|