- Table View
- List View
Computational Optimization of Internal Combustion Engines presents the state of the art of computational models and optimization methods for internal combustion engine development using multi-dimensional computational fluid dynamics (CFD) tools and genetic algorithms. Strategies to reduce computational cost and mesh dependency are discussed, as well as regression analysis methods. Several case studies are presented in a section devoted to applications, including assessments of: spark-ignition engines,dual-fuel engines,heavy duty and light duty diesel engines.Through regression analysis, optimization results are used to explain complex interactions between engine design parameters, such as nozzle design, injection timing, swirl, exhaust gas recirculation, bore size, and piston bowl shape. Computational Optimization of Internal Combustion Engines demonstrates that the current multi-dimensional CFD tools are mature enough for practical development of internal combustion engines. It is written for researchers and designers in mechanical engineering and the automotive industry.
A comprehensive manual on the efficient modeling and analysis of photonic devices through building numerical codes, this book provides graduate students and researchers with the theoretical background and MATLAB programs necessary for them to start their own numerical experiments. Beginning by summarizing topics in optics and electromagnetism, the book discusses optical planar waveguides, linear optical fiber, the propagation of linear pulses, laser diodes, optical amplifiers, optical receivers, finite-difference time-domain method, beam propagation method and some wavelength division devices, solitons, solar cells and metamaterials. Assuming only a basic knowledge of physics and numerical methods, the book is ideal for engineers, physicists and practising scientists. It concentrates on the operating principles of optical devices, as well as the models and numerical methods used to describe them.
Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities. This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems. Topics and Features: Provides an overview social network tools, and explores methods for discovering key players in social networks, designing self-organizing search systems, and clustering blog sites, surveys techniques for exploratory analysis and text mining of social networks, approaches to tracking online community interaction, and examines how the topological features of a system affects the flow of information, reviews the models of network evolution, covering scientific co-citation networks, nature-inspired frameworks, latent social networks in e-Learning systems, and compound communities, examines the relationship between the intent of web pages, their architecture and the communities who take part in their usage and creation, discusses team selection based on members' social context, presents social network applications, including music recommendation and face recognition in photographs, explores the use of social networks in web services that focus on the discovery stage in the life cycle of these web services. This useful and comprehensive volume will be indispensible to senior undergraduate and postgraduate students taking courses in Social Intelligence, as well as to researchers, developers, and postgraduates interested in intelligent-social-networks research and related areas.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
This book is the first of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on practical tools, applications, and open avenues for further research (the other two volumes review issues of Security and Privacy, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, the representation and analysis of social networks, and the use of semantic networks in knowledge discovery and visualization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
The increased level of activity on structural health monitoring (SHM) in various universities and research labs has resulted in the development of new methodologies for both identifying the existing damage in structures and predicting the onset of damage that may occur during service. Designers often have to consult a variety of textbooks, journal papers and reports, because many of these methodologies require advanced knowledge of mechanics, dynamics, wave propagation, and material science. Computational Techniques for Structural Health Monitoring gives a one-volume, in-depth introduction to the different computational methodologies available for rapid detection of flaws in structures. Techniques, algorithms and results are presented in a way that allows their direct application. A number of case studies are included to highlight further the practical aspects of the selected topics. Computational Techniques for Structural Health Monitoring also provides the reader with numerical simulation tools that are essential to the development of novel algorithms for the interpretation of experimental measurements, and for the identification of damage and its characterization. Upon reading Computational Techniques for Structural Health Monitoring, graduate students will be able to begin research-level work in the area of structural health monitoring. The level of detail in the description of formulation and implementation also allows engineers to apply the concepts directly in their research.
Despite a strong commitment to delivering quality health care, persistent problems involving medical errors and ineffective treatment continue to plague the industry. Many of these problems are the consequence of poor information and technology (IT) capabilities, and most importantly, the lack cognitive IT support. Clinicians spend a great deal of time sifting through large amounts of raw data, when, ideally, IT systems would place raw data into context with current medical knowledge to provide clinicians with computer models that depict the health status of the patient. Computational Technology for Effective Health Care advocates re-balancing the portfolio of investments in health care IT to place a greater emphasis on providing cognitive support for health care providers, patients, and family caregivers; observing proven principles for success in designing and implementing IT; and accelerating research related to health care in the computer and social sciences and in health/biomedical informatics. Health care professionals, patient safety advocates, as well as IT specialists and engineers, will find this book a useful tool in preparation for crossing the health care IT chasm.
Compute-IT will help you deliver innovative lessons for the new Key Stage 3 Computing curriculum with confidence, using resources and meaningful assessment produced by expert educators. With Compute-IT you will be able to assess and record students' attainment and monitor progression all the way through to Key Stage 4. Developed by members of Computing at School, the national subject association for Computer Science, and a team of Master Teachers who deliver CPD through the Network of Excellence project funded by the Department for Education, Compute-IT provides a cohesive and supportive learning package structured around the key strands of Computing. Creative and flexible in its approach, Compute-IT makes Computing for Key Stage 3 easy to teach, and fun and meaningful to learn, so you can: Follow well-structured and finely paced lessons along a variety of suggested routes through Key Stage 3 Deliver engaging and interesting lessons using a range of files and tutorials provided for a range of different programming languages Ensure progression throughout Key Stage 3 with meaningful tasks underpinned by unparalleled teacher and student support Assess students' work with confidence, using ready-prepared formative and summative tasks that are mapped to meaningful learning outcomes and statements in the new Programme of Study Creative and flexible in its approach, Compute-IT makes Computing for Key Stage 3 easy to teach, and fun and meaningful to learn. This is the first title in the Compute-IT course, which comprises three Student's Books, three Teacher Packs and a range of digital teaching and learning resources delivered through Dynamic Learning.
Campbell-Kelly (University of Warwick) and Aspray (Indiana University) describe the way computing was handled before the arrival of electronic computers, and recount the development of the mainframe computer. They review the origins of office machinery, early failed attempts to build a calculating engine, scientific war programs, the IBM system/360 family of computers, and the importance of real time for common commercial applications. The second edition expands the later sections on CD-ROMs, the internet, and web commerce. Annotation ©2004 Book News, Inc. , Portland, OR (booknews. com)
Computer: A History of the Information Machine, Second Edition traces the story of the computer, and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers. This second edition now extends beyond the development of Microsoft Windows and the Internet, to include open source operating systems like Linux, and the rise again and fall and potential rise of the dot.com industries.
Computer: A History of the Information Machine traces the history of the computer and shows how business and government were the first to explore its unlimited, information-processing potential. Old-fashioned entrepreneurship combined with scientific know-how inspired now famous computer engineers to create the technology that became IBM. Wartime needs drove the giant ENIAC, the first fully electronic computer. Later, the PC enabled modes of computing that liberated people from room-sized, mainframe computers.This third edition provides updated analysis on software and computer networking, including new material on the programming profession, social networking, and mobile computing. It expands its focus on the IT industry with fresh discussion on the rise of Google and Facebook as well as how powerful applications are changing the way we work, consume, learn, and socialize. Computer is an insightful look at the pace of technological advancement and the seamless way computers are integrated into the modern world. Through comprehensive history and accessible writing, Computer is perfect for courses on computer history, technology history, and information and society, as well as a range of courses in the fields of computer science, communications, sociology, and management.
Computer-Aided Design of User Interfaces VI gathers the latest experience of experts, research teams and leading organisations involved in computer-aided design of user interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, deelopment, deployment, evaluation, and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive ubiquitous computing, and multi-device environments.
become superhuman." -Richard B. Lanza, President, Cash Recovery Partners, LLC "Computer-Aided Fraud Prevention and Detection: A Step-by-Step Guide helps management and auditors answer T. S. Eliot's timeless question, 'Where is the knowledge lost in information?' Data analysis provides a means to mine the knowledge hidden in our information. Dave Coderre has long been a leader in educating auditors and others about Computer Assisted Audit Techniques. The book combines practical approaches with unique data analysis case examples that compel the readers to try the techniques themselves." -Courtenay Thompson Jr. Consultant, Courtenay Thompson & Associates
A systematic computer-aided approach provides a versatile setting for the control engineer to overcome the complications of controller design for highly nonlinear systems. Computer-aided Nonlinear Control System Design provides such an approach based on the use of describing functions. The text deals with a large class of nonlinear systems without restrictions on the system order, the number of inputs and/or outputs or the number, type or arrangement of nonlinear terms. The strongly software-oriented methods detailed facilitate fulfillment of tight performance requirements and help the designer to think in purely nonlinear terms, avoiding the expedient of linearization which can impose substantial and unrealistic model limitations and drive up the cost of the final product. Design procedures are presented in a step-by-step algorithmic format each step being a functional unit with outputs that drive the other steps. This procedure may be easily implemented on a digital computer with example problems from mechatronic and aerospace design being used to demonstrate the techniques discussed. The author's commercial MATLAB®-based environment, available separately from insert URL here, can be used to create simulations showing the results of using the computer-aided control system design ideas characterized in the text. Academic researchers and graduate students studying nonlinear control systems and control engineers dealing with nonlinear plant, particularly mechatronic or aerospace systems will find Computer-aided Nonlinear Control System Design to be of great practical assistance adding to their toolbox of techniques for dealing with system nonlinearities. A basic knowledge of calculus, nonlinear analysis and software engineering will enable the reader to get the best from this book.
Lynne Bowker introduces the world of technology to the world of translation in this unique book, the first of its kind. Bowker reveals the role of technology in translation and how to use this ever developing tool.
This book provides a broad survey of advanced pattern recognition techniques for human behavior analysis. Clearly structured, the book begins with concise coverage of the major concepts, before introducing the most frequently used techniques and algorithms in detail, and then discussing examples of real applications. Features: contains contributions from an international selection of experts in the field; presents a thorough introduction to the fundamental topics of human behavior analysis; investigates methods for activity recognition, including gait and posture analysis, hand gesture analysis, and semantics of human behavior in image sequences; provides an accessible psychological treatise on social signals for the analysis of social behaviors; discusses voice and speech analysis, combined audiovisual cues, and social interactions and group dynamics; examines applications in different research fields; each chapter concludes with review questions, a summary of the topics covered, and a glossary.
Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.
Explains how computer animation is used to make entire films, indicates how it differs from traditional animation, and includes information on the development of that technology.
This book lays out the concepts necessary to understand how a computer works.For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choice helps to show how techniques, concepts and performances have evolved since the first computers.The book is divided into five parts. The first four, which are of increasing difficulty, are the core of the book: "Elements of a Basic Architecture", "Programming Model and Operation", "Memory Hierarchy", "Parallelism and Performance Enhancement". The final part provides hints and solutions to the exercises in the book as well as appendices. The reader may approach each part independently based on their prior knowledge and goals.
What is knowledge? How can it be successfully assessed? How can we best use the results? As questions such as these continue to be discussed and the learning sciences continue to deal with expanding amounts of data, the challenge of applying theory to diagnostic methods takes on more complexity. Computer-Based Diagnostics and Systematic Analysis of Knowledge meets this challenge head-on as an international panel of experts reviews current and emerging assessment methodologies in the psychological and educational arenas. Emphasizing utility, effectiveness, and ease of interpretation, contributors critically discuss practical innovations and intriguing possibilities (including mental representations, automated knowledge visualization, modeling, and computer-based feedback) across fields ranging from mathematics education to medicine. These contents themselves model the steps of systematic inquiry, from theoretical construct to real-world application: Historical and theoretical foundations for the investigation of knowledge Current opportunities for understanding knowledge empirically Strategies for the aggregation and classification of knowledge Tools and methods for comparison and empirical testing Data interfaces between knowledge assessment tools Guidance in applying research results to particular fields Researchers and professionals in education psychology, instructional technology, computer science, and linguistics will find Computer-Based Diagnostics and Systematic Analysis of Knowledge a stimulating guide to a complex present and a rapidly evolving future.
Computer Basics in Easy Steps explores the elements that make up a computer and tells readers how to perform important tasks. Whether it's communicating with friends and family across the world, writing reports, or taking advantage of the Internet, this book covers it all. Computer hardware and software functions are fully covered, with a special emphasis on the tasks savvy users want to perform to increase productivity and enhance satisfaction. The book also helps readers take full advantage of other devices such as iPods, PDAs, pocket PCs, digital cameras, printers, scanners, and cell phones. Whatever readers want to do, with this book they discover how to make their computer unlock powerful new ways to extend their knowledge and experience.
The Pee Wees are entering cyberspace! The scouts are earning their computer badges, and that means lots of fun--and lots of surprises--are in store. From surfing the Web to sending e-mail to going on a cyber treasure hunt, the online adventures keep getting better and better. And when Molly receives an e-mail message from a secret admirer, she and Mary Beth have an exciting computer mystery to solve.
The Pee Wees are entering cyberspace! The scouts are earning their computer badges, and that means lots of fun--and lots of surprises--are in store. From surfing the Web to sending e-mail to going on a cyber treasure hunt, the online adventures keep getting better and better. And when Molly receives an e-mail message from a secret admirer, she and Mary Beth have an exciting computer mystery to solve. The Pee Wees goof around, do good deeds, take on projects and have fun and adventures. Find out all about what scouts do in the other 38 Pee Wee Scout books you can get from Bookshare including: #1 Cookies and Crutches, #2 Camp Ghost-Away, #3 Lucky Dog Days, #4 Blue Skies, French Fries, #5 Grumpy Pumpkins, #6 Peanut-Butter Pilgrims, #7 A Pee Wee Christmas, #8 That Mushy Stuff, #9 Spring Sprouts, #10 The Pooped Troop, # 11 The Pee Wee Jubilee, #12 Bad, Bad, Bunnies, #13 Rosy Noses, Frozen Toes, #14 Sonny's Secret, #15 Sky Babies, #16 Trash Bash, # 17 Pee Wees On Parade, #18 Lights, Action, Land-ho!, # 19 Piles of Pets, #20 Fishy Wishes, #21 Pee Wees On skis, #22 Greedy Groundhogs, #23 All Dads on Deck, #24 Tricks and Treats, #25 Pee Wees on First, # 26 Super Duper Pee Wees, #27 Teeny Weeny Zucchinis, #28 Eggs With Legs, #29 Pee Wee Pool Party, #30 Bookworm Buddies, #31 Moans and Groans and Dinosaur Bones, #32 Stage Frightened, #33 Halloween Helpers, #34 Planet Pee Wee, #35 Pedal Power, #37 Wild, Wild West, #38 Here Come the Clowns, and #39 Molly For Mayor.
Everything you need for your Introduction to Computing course! COMPUTER CONCEPTS AND MICROSOFT OFFICE 2013 ILLUSTRATED delivers the most up-to-date computer concepts and Microsoft Office 2013 skills in an accessible, easy-to-follow format.
Offering a basic introduction to computers, this text covers computer hardware, software, input, applications skills, the Internet and Web page creation, careers, computer ethics and more. Step-by-step instructions along with numerous screen shots and illustrations help readers learn and master essential computer concepts and skills.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.