- Table View
- List View
A Software Development Approach for Driving Competitiveness in Small Firms
by Delroy CheversThe COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However, for decades, managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software, software flaws can also raisesecurity concerns, as hackers can gain complete control of various devices and data, such as mobile phones, computers, or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products, in many cases the promised benefits of user satisfaction, efficiency, productivity and profitability are not realized. In more severe circumstances, software development firms have failed and face the threat of going bankrupt, being acquired or suffering closure, because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software, the book outlines how mobilizing people, processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.
A Software Engineer’s Guide to Seniority: A Guide to Technical Leadership
by Jocelyn HarperThere are few books in the market that talk about the effort within and outside of the job that helps software engineers advance in their careers. This book is a truthful and introspective look at technical careers and a consolidation of that information and advice for engineers that are looking to elevate their career to the senior level. While charting a path to becoming a senior software engineer you'll study how to handle the obligations and complexities involved in that role. While most of the software engineer job is exploratory and involves learning new things nearly every day, this book will show you how to be a manager, a leader, and to achieve seniority in your tech role. From learning how to optimize your resume to knowing how to interview for positions on your team to helping your team grow and develop their own skills and career, this is a book that all software engineers need. What You'll LearnOptimize your resume for applicationsStandard tips for interviewing in software engineer positionsBecome a mentor and leader at your jobWho This Book Is ForEntry to mid-level software engineers working in a corporate environment
A Software Framework for Mobile Apps in the Museum Application Domain (Gabler Theses)
by Tobias BaumgärtnerThis book is concerned with “How to provide guidance for small cultural heritage institutions to govern digital transformation, and how to align the possibilities with the available capabilities by creating a Software Framework for Mobile Apps in the Museum Application Domain?”. The role of the museum has shifted from a keeper of artifacts to a provider of information. In this context mobile applications are intended to generate added value for the museum visitor. However, the tension between the application’s creator, its content, and the consumer operating the app needs to be examined holistically. As it is not trivial to create an integrated user experience, the unique usability-centered perspective on the requirements engineering pursued throughout, allows for the suggested data-driven solution to address the specific domain issues and serve the intended audience. Based on the insights gained during this examination and under the utilization of design science research, human-centered design, and domain-driven design “A Software Framework for Mobile Apps in the Museum Application Domain” is created and implemented using web technologies.
A Standard for Enterprise Project Management (Esi International Project Management)
by Michael ZambruskiFrom enterprise vision and mission to business requirements to project initiation and management to operations, this practical guide explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It includes a decision tree for determining the most appropriate level of project documentation, describes an integrated risk management and escalation policy, and contains more than two dozen templates and completed samples of key project management tools, such as a comprehensive statement of work template. The author offers a color version of the book.
A Startup Field Guide in the Age of Robots and AI
by Oliver MitchellLaunching a startup is like climbing a mountain, just maybe more treacherous. I say this as I have spent years as a backpacker and entrepreneur. While hiking through the Alaskan Tundra, I feared brown bears and crevasses. Yet, nothing prepared me for the responsibility of payroll for over 200 families relying on my business plan to feed their children.Unlike traditional software, the mere smell of hardware sensors and robot gearing sends shivers through most investors, with red flags arising from the perceived capital inefficiencies and intense research and development. This is coupled with a high talent requirement before launching even a minimum viable product, as these inventions demand a cross-section of skills: mechanical, electrical, and software engineering. To set out on the trail of uncrewed success, machine inventors and founders require a detailed field guide to meet customer demand and financing objectives.My goal for this book is to help you at a pivotal point in your ideation process and, at the same time, introduce you to a cadre of potential mentors. Through interviews with some of the most respected luminaries in this field, I aim to help fortify your resolve to follow your passions and build a billion-dollar company. The chapters of this book have been organized like a field guide, as if you are setting out on a trip in the wild. Just like it’s essential to satiate yourself before scaling mountains, fast-tracking your innovation into the hands of early adopters is vital for achieving success on Main Street.
A Statistical Mechanical Interpretation of Algorithmic Information Theory (SpringerBriefs in Mathematical Physics #36)
by Kohtaro TadakiThis book is the first one that provides a solid bridge between algorithmic information theory and statistical mechanics. Algorithmic information theory (AIT) is a theory of program size and recently is also known as algorithmic randomness. AIT provides a framework for characterizing the notion of randomness for an individual object and for studying it closely and comprehensively. In this book, a statistical mechanical interpretation of AIT is introduced while explaining the basic notions and results of AIT to the reader who has an acquaintance with an elementary theory of computation.A simplification of the setting of AIT is the noiseless source coding in information theory. First, in the book, a statistical mechanical interpretation of the noiseless source coding scheme is introduced. It can be seen that the notions in statistical mechanics such as entropy, temperature, and thermal equilibrium are translated into the context of noiseless source coding in a natural manner. Then, the framework of AIT is introduced. On this basis, the introduction of a statistical mechanical interpretation of AIT is begun. Namely, the notion of thermodynamic quantities, such as free energy, energy, and entropy, is introduced into AIT. In the interpretation, the temperature is shown to be equal to the partial randomness of the values of all these thermodynamic quantities, where the notion of partial randomness is a stronger representation of the compression rate measured by means of program-size complexity. Additionally, it is demonstrated that this situation holds for the temperature itself as a thermodynamic quantity. That is, for each of all the thermodynamic quantities above, the computability of its value at temperature T gives a sufficient condition for T to be a fixed point on partial randomness.In this groundbreaking book, the current status of the interpretation from both mathematical and physical points of view is reported. For example, a total statistical mechanical interpretation of AIT that actualizes a perfect correspondence to normal statistical mechanics can be developed by identifying a microcanonical ensemble in the framework of AIT. As a result, the statistical mechanical meaning of the thermodynamic quantities of AIT is clarified. In the book, the close relationship of the interpretation to Landauer's principle is pointed out.
A Step Towards Society 5.0: Research, Innovations, and Developments in Cloud-Based Computing Technologies (Demystifying Technologies for Computational Excellence)
by Shahnawaz KhanThis book serves the need for developing an insight and understanding of the cutting-edge innovation in Cloud technology. It provides an understanding of cutting-edge innovations, paradigms, and security by using real-life applications, case studies, and examples. This book provides a holistic view of cloud technology theories, practices, and future applications with real-life examples. It comprehensively explains cloud technology, design principles, development trends, maintaining state-of-the-art cloud computing and software services. It describes how cloud technology can transform the operating contexts of business enterprises. It exemplifies the potential of cloud computing for next-generation computational excellence and the role it plays as a key driver for the 4th industrial revolution in Industrial Engineering and a key driver for manufacturing industries. Researchers, academicians, postgraduates, and industry specialists will find this book of interest.
A Step by Step Approach to the Modeling of Chemical Engineering Processes
by Liliane Maria Ferrareso LonaThis book treats modeling and simulation in a simple way, that builds on the existing knowledge and intuition of students. They will learn how to build a model and solve it using Excel.Most chemical engineering students feel a shiver down the spine when they see a set of complex mathematical equations generated from the modeling of a chemical engineering system. This is because they usually do not understand how to achieve this mathematical model, or they do not know how to solve the equations system without spending a lot of time and effort.Trying to understand how to generate a set of mathematical equations to represent a physical system (to model) and solve these equations (to simulate) is not a simple task. A model, most of the time, takes into account all phenomena studied during a Chemical Engineering course. In the same way, there is a multitude of numerical methods that can be used to solve the same set of equations generated from the modeling, and many different computational languages can be adopted to implement the numerical methods. As a consequence of this comprehensiveness and combinatorial explosion of possibilities, most books that deal with this subject are very extensive and embracing, making need for a lot of time and effort to go through this subject. It is expected that with this book the chemical engineering student and the future chemical engineer feel motivated to solve different practical problems involving chemical processes, knowing they can do that in an easy and fast way, with no need of expensive software.
A Student's Guide to Coding and Information Theory
by Stefan M. Moser Po-ning ChenThis easy-to-read guide provides a concise introduction to the engineering background of modern communication systems, from mobile phones to data compression and storage. Background mathematics and specific engineering techniques are kept to a minimum so that only a basic knowledge of high-school mathematics is needed to understand the material covered. The authors begin with many practical applications in coding, including the repetition code, the Hamming code and the Huffman code. They then explain the corresponding information theory, from entropy and mutual information to channel capacity and the information transmission theorem. Finally, they provide insights into the connections between coding theory and other fields. Many worked examples are given throughout the book, using practical applications to illustrate theoretical definitions. Exercises are also included, enabling readers to double-check what they have learned and gain glimpses into more advanced topics, making this perfect for anyone who needs a quick introduction to the subject.
A Student's Guide to Python for Physical Modeling: Second Edition
by Jesse M. Kinder Philip NelsonA fully updated tutorial on the basics of the Python programming language for science studentsPython is a computer programming language that has gained popularity throughout the sciences. This fully updated second edition of A Student's Guide to Python for Physical Modeling aims to help you, the student, teach yourself enough of the Python programming language to get started with physical modeling. You will learn how to install an open-source Python programming environment and use it to accomplish many common scientific computing tasks: importing, exporting, and visualizing data; numerical analysis; and simulation. No prior programming experience is assumed.This guide introduces a wide range of useful tools, including:Basic Python programming and scriptingNumerical arraysTwo- and three-dimensional graphicsAnimationMonte Carlo simulationsNumerical methods, including solving ordinary differential equationsImage processingNumerous code samples and exercises—with solutions—illustrate new ideas as they are introduced. This guide also includes supplemental online resources: code samples, data sets, tutorials, and more. This edition includes new material on symbolic calculations with SymPy, an introduction to Python libraries for data science and machine learning (pandas and sklearn), and a primer on Python classes and object-oriented programming. A new appendix also introduces command line tools and version control with Git.
A Study into the Design of Steerable Microphone Arrays (SpringerBriefs in Electrical and Computer Engineering)
by Chiong Ching Lai Sven Erik Nordholm Yee Hong LeungThe book covers the design formulations for broadband beamformer targeting nearfield and farfield sources. The book content includes background information on the acoustic environment, including propagation medium, the array geometries, signal models and basic beamformer designs. Subsequently it introduces design formulation for nearfield, farfield and mixed nearfield-farfield beamformers and extends the design formulation into electronically steerable beamformers. In addition, a robust formulation is introduced for all the designs mentioned.
A Study on Radio Access Technology Selection Algorithms (SpringerBriefs in Electrical and Computer Engineering)
by Leijia Wu Kumbesan SandrasegaranThis book discusses the basic idea of Common Radio Resource Management (CRRM), especially on the Radio Access Technologies selection part of CRRM. It introduces two interaction functions (information reporting function and RRM decision support function) and four interaction degrees (from low to very high) of CRRM. Four possible CRRM topologies (CRRM server, integrated CRRM, Hierarchical CRRM, and CRRM in user terminals) are described. The book presents different Radio Access Technologies selection algorithms, including single criterion and multiple criteria based algorithms are presented and compares them. Finally, the book analyses the advantages and disadvantages of the different selection algorithms.
A Study on the Creation, Impact and Legal Issues of Crypto Special Drawing Rights (Modern China and International Economic Law)
by Leo ZengThis book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a feasibility analysis of the combination of blockchain technology and SDRs. It explores and summarizes the possibility of solving problems such as the inherent defects of the current international monetary system and creatively suggests that the birth of Crypto-SDR will have a positive impact on countries and industries and fields around the world, especially in anti-money laundering, cross-border asset recovery, international payments, banking, insurance, financial auditing, Fintech regulation, etc.
A Survey of Characteristic Engine Features for Technology-Sustained Pervasive Games (SpringerBriefs in Computer Science)
by Kim J.L. NevelsteenThis book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games. Since the computer game industry is already rich with game engines, this book investigates: (i) if a game engine can be repurposed to stage pervasive games; (ii) if features describing a would-be pervasive game engine can be identified; (iii) using those features, if an architecture be found in the same 'product line' as an existing engine and that can be extended to stage pervasive games (iv) and, finally, if there any challenges and open issues that remain. The approach to answering these questions is twofold. First, a survey of pervasive games is conducted, gathering technical details and distilling a component feature set that enables pervasive games. Second, a type of game engine is chosen as candidate in the same product line as a would-be pervasive game engine, supporting as much of the feature set as possible. The architecture is extended to support the entire feature set and used to stage a pervasive game called Codename: Heroes, validating the architecture, highlighting features of particular importance and identifying any open issues. The conclusion of this book is also twofold: the resulting feature set is verified to coincide with the definition of pervasive games and related work. And secondly, a virtual world engine is selected as candidate in the same product line as a would-be pervasive game engine. Codename: Heroes was successfully implemented, reaping the benefits of using the selected engine; development time was low, spanning just a few months. Codename: Heroes was staged twice, with no stability issues or down time.
A Survey of Computational Physics: Introductory Computational Science
by Cristian C. Bordeianu José Páez Rubin LandauComputational physics is a rapidly growing subfield of computational science, in large part because computers can solve previously intractable problems or simulate natural processes that do not have analytic solutions. The next step beyond Landau's First Course in Scientific Computing and a follow-up to Landau and Páez's Computational Physics, this text presents a broad survey of key topics in computational physics for advanced undergraduates and beginning graduate students, including new discussions of visualization tools, wavelet analysis, molecular dynamics, and computational fluid dynamics. By treating science, applied mathematics, and computer science together, the book reveals how this knowledge base can be applied to a wider range of real-world problems than computational physics texts normally address. Designed for a one- or two-semester course, A Survey of Computational Physics will also interest anyone who wants a reference on or practical experience in the basics of computational physics. Accessible to advanced undergraduates Real-world problem-solving approach Java codes and applets integrated with text Companion Web site includes videos of lectures
A Survey of Core Research in Information Systems (SpringerBriefs in Computer Science)
by Anna Sidorova Nicholas Evangelopoulos Russell Torres Vess JohnsonThe Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of research on topics ranging from database design and the strategic role of IT to website design and online consumer behavior. In this book, the authors provide an introduction to the discipline, its development, and the structure of IS research, at a level that is appropriate for emerging and current IS scholars. Guided by a bibliometric study of all research articles published in eight premier IS research journals over a 20-year period, the authors identify and present the top 51 IS research topics. For each topic, they provide a brief overview, time trends, and references to related influential research works. The topics are organized into an IS research framework that includes research on the IT artifact and IS development, IT and organizations, IT and individuals, IT and markets, and IT for teamwork and collaboration.
A Survey of Data Leakage Detection and Prevention Solutions (SpringerBriefs in Computer Science)
by Yuval Elovici Asaf Shabtai Lior RokachSpringerBriefs present concise summaries of cutting-edge research and practical applications across a wide spectrum of fields. Featuring compact volumes of 50 to 100 pages (approximately 20,000- 40,000 words), the series covers a range of content from professional to academic. Briefs allow authors to present their ideas and readers to absorb them with minimal time investment. As part of Springer's eBook collection, SpringBriefs are published to millions of users worldwide. Information/Data Leakage poses a serious threat to companies and organizations, as the number of leakage incidents and the cost they inflict continues to increase. Whether caused by malicious intent, or an inadvertent mistake, data loss can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reputation. This book aims to provide a structural and comprehensive overview of the practical solutions and current research in the DLP domain. This is the first comprehensive book that is dedicated entirely to the field of data leakage and covers all important challenges and techniques to mitigate them. Its informative, factual pages will provide researchers, students and practitioners in the industry with a comprehensive, yet concise and convenient reference source to this fascinating field. We have grouped existing solutions into different categories based on a described taxonomy. The presented taxonomy characterizes DLP solutions according to various aspects such as: leakage source, data state, leakage channel, deployment scheme, preventive/detective approaches, and the action upon leakage. In the commercial part we review solutions of the leading DLP market players based on professional research reports and material obtained from the websites of the vendors. In the academic part we cluster the academic work according to the nature of the leakage and protection into various categories. Finally, we describe main data leakage scenarios and present for each scenario the most relevant and applicable solution or approach that will mitigate and reduce the likelihood and/or impact of the leakage scenario.
A Survey of Fractal Dimensions of Networks (SpringerBriefs in Computer Science)
by Eric RosenbergMany different fractal dimensions have been proposed for networks. In A Survey of Fractal Dimensions of Networks the theory and computation of the most important of these dimensions are reviewed, including the box counting dimension, the correlation dimension, the mass dimension, the transfinite fractal dimension, the information dimension, the generalized dimensions (which provide a way to describe multifractals), and the sandbox method (for approximating the generalized dimensions). The book describes the use of diameter-based and radius-based boxes, and presents several heuristic methods for box counting, including greedy coloring, random sequential node burning, and a method for computing a lower bound. We also discuss very recent results on resolving ambiguity in the calculation of the information dimension and the generalized dimensions, and on the non-monotonicity of the generalized dimensions. Anyone interested in the theory and application of networks will want to read this Brief. This includes anyone studying, e.g., social networks, telecommunications networks, transportation networks, ecological networks, food chain networks, network models of the brain, or financial networks.
A Survey on 3D Cameras: Metrological Comparison of Time-of-Flight, Structured-Light and Active Stereoscopy Technologies (SpringerBriefs in Computer Science)
by Silvio Giancola Matteo Valenti Remo SalaThis book is a valuable resource to deeply understand the technology used in 3D cameras. In this book, the authors summarize and compare the specifications of the main 3D cameras available in the mass market. The authors present a deep metrological analysis of the main camera based on the three main technologies: Time-of-Flight, Structured-Light and Active Stereoscopy, and provide qualitative results for any user to understand the underlying technology within 3D camera, as well as practical guidance on how to get the most of them for a given application.
A Survey on Coordinated Power Management in Multi-Tenant Data Centers
by Thant Zin Oo Nguyen H. Tran Shaolei Ren Choong Seon HongThis book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.
A Survival Guide to the Misinformation Age: Scientific Habits of Mind
by David J. HelfandLearning how to tell news from fake news from fake fake news: An &“important and timely&” book on protecting ourselves, and society, from the infodemic (Library Journal). We have billions of bytes of data at our fingertips. But how much of it is misinformation—or even disinformation? A lot of it is, and your search engine can&’t tell the difference. As a result, an avalanche of misinformation threatens to overwhelm the discourse we so desperately need to address complex social problems such as climate change, the food and water crises, biodiversity collapse, and emerging threats to public health. This book provides an inoculation against the misinformation epidemic by cultivating scientific habits of mind. Anyone can do it—indeed, everyone must do it if our species is to survive on this crowded and finite planet. This survival guide supplies an essential set of apps for the prefrontal cortex while making science both accessible and entertaining. It will dissolve your fear of numbers, demystify graphs, and elucidate the key concepts of probability, all while celebrating the precise use of language and logic. David Helfand, one of our nation&’s leading astronomers and science educators, has taught scientific habits of mind to generations in the classroom, where he continues to wage a provocative battle against sloppy thinking and the encroachment of misinformation. &“Provides a vital antidote to the ills of misinformation by teaching systematic and rigorous scientific reasoning.&” —The Times Literary Supplement
A Synergistic Framework for Hardware IP Privacy and Integrity Protection
by Meng Li David Z. PanThis book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
A System Engineering Approach to Disaster Resilience: Select Proceedings of VCDRR 2021 (Lecture Notes in Civil Engineering #205)
by Sreevalsa Kolathayar Chandan GhoshThis book presents the select proceedings of the Virtual Conference on Disaster Risk Reduction (VCDRR 2021). It emphasizes on the role of civil engineering for a disaster resilient society. Various topics covered in this book are risk assessment, prevention, mitigation, preparedness and response, early warning system, hazard mapping, engineering innovations for hazard mitigation, and safe design of structures. This book is a comprehensive volume on disaster risk reduction (DRR) and its management for a sustainable built environment. This book will be useful for the students, researchers, policy makers and professionals working in the area of civil engineering, especially disaster management.
A Systematic Approach to Learning Robot Programming with ROS
by Wyatt Newman<p>A Systematic Approach to Learning Robot Programming with ROS provides a comprehensive, introduction to the essential components of ROS through detailed explanations of simple code examples along with the corresponding theory of operation. The book explores the organization of ROS, how to understand ROS packages, how to use ROS tools, how to incorporate existing ROS packages into new applications, and how to develop new packages for robotics and automation. It also facilitates continuing education by preparing the reader to better understand the existing on-line documentation. <p>The book is organized into six parts. It begins with an introduction to ROS foundations, including writing ROS nodes and ROS tools. Messages, Classes, and Servers are also covered. The second part of the book features simulation and visualization with ROS, including coordinate transforms. <p>The next part of the book discusses perceptual processing in ROS. It includes coverage of using cameras in ROS, depth imaging and point clouds, and point cloud processing. Mobile robot control and navigation in ROS is featured in the fourth part of the book <p>The fifth section of the book contains coverage of robot arms in ROS. This section explores robot arm kinematics, arm motion planning, arm control with the Baxter Simulator, and an object-grabber package. The last part of the book focuses on system integration and higher-level control, including perception-based and mobile manipulation. <p>This accessible text includes examples throughout and C++ code examples are also provided at https://github.com/wsnewman/learning_ros</p>
A Systemic Perspective on Cognition and Mathematics (Communications in Cybernetics, Systems Science and Engineering)
by Jeffrey Yi-Lin ForrestThis book is devoted to the study of human thought, its systemic structure, and the historical development of mathematics both as a product of thought and as a fascinating case analysis. After demonstrating that systems research constitutes the second dimension of modern science, the monograph discusses the yoyo model, a recent ground-breaking deve