Browse Results

Showing 10,851 through 10,875 of 53,245 results

Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings (Lecture Notes in Computer Science #11127)

by Khalid Saeed Władysław Homenda

This book constitutes the proceedings of the 17th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2018, held in Olomouc, Czech Republic, in September 2018. The 42 full papers presented together with 4 keynotes were carefully reviewed and selected from 69 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, and industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; and various aspects of computer security.

Computer Intensive Methods in Statistics

by Silvelyn Zwanzig Behrang Mahjani

This textbook gives an overview of statistical methods that have been developed during the last years due to increasing computer use, including random number generators, Monte Carlo methods, Markov Chain Monte Carlo (MCMC) methods, Bootstrap, EM algorithms, SIMEX, variable selection, density estimators, kernel estimators, orthogonal and local polynomial estimators, wavelet estimators, splines, and model assessment. Computer Intensive Methods in Statistics is written for students at graduate level, but can also be used by practitioners. Features Presents the main ideas of computer-intensive statistical methods Gives the algorithms for all the methods Uses various plots and illustrations for explaining the main ideas Features the theoretical backgrounds of the main methods. Includes R codes for the methods and examples Silvelyn Zwanzig is an Associate Professor for Mathematical Statistics at Uppsala University. She studied Mathematics at the Humboldt- University in Berlin. Before coming to Sweden, she was Assistant Professor at the University of Hamburg in Germany. She received her Ph.D. in Mathematics at the Academy of Sciences of the GDR. Since 1991, she has taught Statistics for undergraduate and graduate students. Her research interests have moved from theoretical statistics to computer intensive statistics. Behrang Mahjani is a postdoctoral fellow with a Ph.D. in Scientific Computing with a focus on Computational Statistics, from Uppsala University, Sweden. He joined the Seaver Autism Center for Research and Treatment at the Icahn School of Medicine at Mount Sinai, New York, in September 2017 and was formerly a postdoctoral fellow at the Karolinska Institutet, Stockholm, Sweden. His research is focused on solving large-scale problems through statistical and computational methods.

Computer Investigation (Solving Crimes With Science: Forensics #12)

by Elizabeth Bauchner

The digital age we entered in the twenty-first century has rapidly become an age of digital crime. Cybercrimes like spoofing, phishing, and hacking are on the rise, and computer forensic technicians are on the case. Even "traditional" crimes like murder, fraud, and child abuse can be both facilitated by computers--and solved through computer investigation. Computer Investigation helps readers understand how cybercrimes are committed, and how investigators help solve them and bring the perpetrators to justice. Readers will also gain a few tips for protecting themselves online and protecting their computers from intrusions and hacks.

Computer Literacy Basics: A Comprehensive Guide to IC3

by Ann Ambrose Marly Bergerud Donald Busche Connie Morrison Dolores Wells-Pusins

Computer Literacy BASICS provides an introduction to computer technology and concepts. This text maps to the IC3 standards and is organized into three key components: Computing Fundamentals, Key Applications, and Living Online. It provides thorough instruction on the various uses of the computer, important accessories, networking principles and covers key applications such as word processing, spreadsheets, and presentation applications. In addition, Computer Literacy BASICS covers e-mail and Internet principles such as managing e-mail and contacts, searching for a topic online, and how computers affect every day life. Strong end-of-chapter exercises and review material reinforce important topics covered in the lesson and allow students to demonstrate their knowledge of the material.

Computer Literacy Basics: Microsoft Office 2007 Companion

by Jennifer T. Campbell

Computer Literacy BASICS: Microsoft Office 2007 Companion is designed to accompany Computer Literacy BASICS, Second Edition, providing updated coverage on Office 2007. Step-by-step instructions provide students with an overview of the Office 2007 software and will help them gain the skills necessary to pass the IC3 certification exam.

Computer Literacy Basics: A Comprehensive Guide to IC3

by Connie Morrison Dolores Wells

COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 covers Computing Fundamentals, Key Applications, and Living Online - everything your students need to pass the IC3 exam, and finish the course as confident computer users.

Computer Literacy BASICS: A Comprehensive Guide to IC3

by Connie Morrison Dolores Wells

Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Computing Core Certification (IC3) standards. Designed with new learners in mind, this text covers Computing Fundamentals, Key Applications, and Living Online - everything your students need to ace the IC3 exam, and finish the course as confident computer users.

Computer Literacy Basics: A Comprehensive Guide to IC³

by Connie Morrison Dolores Wells Lisa Ruffolo

Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Computing Core Certification (IC3) standards. Designed with new learners in mind, this text covers Computing Fundamentals, Key Applications, and Living Online - everything students need to pass the IC3 exam, and finish the course as confident computer users.

Computer Meets Theoretical Physics: The New Frontier of Molecular Simulation (The Frontiers Collection)

by Giovanni Battimelli Giovanni Ciccotti Pietro Greco

This book provides a vivid account of the early history of molecular simulation, a new frontier for our understanding of matter that was opened when the demands of theoretical physicists were met by the availability of the modern computers. Since their inception, electronic computers have enormously increased their performance, thus making possible the unprecedented technological revolution that characterizes our present times. This obvious technological advancement has brought with it a silent scientific revolution in the practice of theoretical physics. In particular, in the physics of matter it has opened up a direct route from the microscopic physical laws to observable phenomena. One can now study the time evolution of systems composed of millions of molecules, and simulate the behaviour of macroscopic materials and actually predict their properties. Molecular simulation has provided a new theoretical and conceptual tool that physicists could only dream of when the foundations of statistical mechanics were laid. Molecular simulation has undergone impressive development, both in the size of the scientific community involved and in the range and scope of its applications. It has become the ubiquitous workhorse for investigating the nature of complex condensed matter systems in physics, chemistry, materials and the life sciences. Yet these developments remain largely unknown outside the inner circles of practitioners, and they have so far never been described for a wider public. The main objective of this book is therefore to offer a reasonably comprehensive reconstruction of the early history of molecular simulation addressed to an audience of both scientists and interested non-scientists, describing the scientific and personal trajectories of the main protagonists and discussing the deep conceptual innovations that their work produced.

Computer Methods, Imaging and Visualization in Biomechanics and Biomedical Engineering: Selected Papers from the 16th International Symposium CMBBE and 4th Conference on Imaging and Visualization, August 14-16, 2019, New York City, USA (Lecture Notes in Computational Vision and Biomechanics #36)

by João Manuel R. S. Tavares Gerard A. Ateshian Kristin M. Myers

This book gathers selected, extended and revised contributions to the 16th International Symposium on Computer Methods in Biomechanics and Biomedical Engineering, and the 4th Conference on Imaging and Visualization (CMBBE 2019), held on August 14-16, 2019, in New York City, USA. It reports on cutting-edge models and algorithms for studying various tissues and organs in normal and pathological conditions; innovative imaging and visualization techniques; and the latest diagnostic tools. Further topics addressed include: numerical methods, machine learning approaches, FEM models, and high-resolution imaging and real-time visualization methods applied for biomedical purposes. Given the scope of its coverage, the book provides graduate students and researchers with a timely and insightful snapshot of the latest research and current challenges in biomedical engineering, computational biomechanics and biological imaging, as well as a source of inspiration for future research and cross-disciplinary collaborations.

Computer Methods, Imaging and Visualization in Biomechanics and Biomedical Engineering II: Selected Papers from the 17th International Symposium CMBBE and 5th Conference on Imaging and Visualization, September 7-9, 2021 (Lecture Notes in Computational Vision and Biomechanics #38)

by João Manuel R. S. Tavares Christoph Bourauel Liesbet Geris Jos Vander Slote

This book gathers selected, extended and revised contributions to the 17th International Symposium on Computer Methods in Biomechanics and Biomedical Engineering and the 5th Conference on Imaging and Visualization (CMBBE 2021), held online on September 7-9, 2021, from Bonn, Germany. It reports on cutting-edge models, algorithms and imaging techniques for studying cells, tissues and organs in normal and pathological conditions. It covers numerical and machine learning methods, finite element modeling and virtual reality techniques, applied to understand biomechanics of movement, fluid and soft tissue biomechanics. It also reports on related advances in rehabilitation, surgery and diagnosis. All in all, this book offers a timely snapshot of the latest research and current challenges at the interface between biomedical engineering, computational biomechanics and biological imaging. Thus, it is expected to provide a source of inspiration for future research and cross-disciplinary collaborations.

Computer Modeling Applications for Environmental Engineers

by Isam Mohammed Abdel-Magid Ahmed Mohammed Isam Mohammed Abdel-Magid

Computer Modeling Applications for Environmental Engineers in its second edition incorporates changes and introduces new concepts using Visual Basic.NET, a programming language chosen for its ease of comprehensive usage. This book offers a complete understanding of the basic principles of environmental engineering and integrates new sections that address Noise Pollution and Abatement and municipal solid-waste problem solving, financing of waste facilities, and the engineering of treatment methods that address sanitary landfill, biochemical processes, and combustion and energy recovery. Its practical approach serves to aid in the teaching of environmental engineering unit operations and processes design and demonstrates effective problem-solving practices that facilitate self-teaching. A vital reference for students and professional sanitary and environmental engineers this work also serves as a stand-alone problem-solving text with well-defined, real-work examples and explanations.

Computer Modelling for Nutritionists

by Mark Tomás Mc Auley

This book draws on Mark Mc Auley’s wealth of experience to provide an intuitive step-by-step guide to the modelling process. It also provides case studies detailing the creation of biological process models. Mark Mc Auley has over 15 years’ experience of applying computing to challenges in bioscience. Currently he is employed as a Senior Lecturer in Chemical Engineering at the University of Chester. He has published widely on the use of computer modelling in nutrition and uses computer modelling to both enhance and enrich the learning experience of the students that he teaches. He has taught computer modelling to individuals at a wide variety of levels and from different backgrounds, from undergraduate nutrition students to PhD and medical students.

Computer Models of Process Dynamics: From Newton to Energy Fields

by Olis Harold Rubin

COMPUTER MODELS OF PROCESS DYNAMICS Comprehensive overview of techniques for describing physical phenomena by means of computer models that are determined by mathematical analysis Computer Models of Process Dynamics covers everything required to do computer based mathematical modeling of dynamic systems, including an introduction to a scientific language, its use to program essential operations, and methods to approximate the integration of continuous signals. From a practical standpoint, readers will learn how to build computer models that simulate differential equations. They are also shown how to model physical objects of increasing complexity, where the most complex objects are simulated by finite element models, and how to follow a formal procedure in order to build a valid computer model. To aid in reader comprehension, a series of case studies is presented that covers myriad different topics to provide a view of the challenges that fall within this discipline. The book concludes with a discussion of how computer models are used in an engineering project where the readers would operate in a team environment. Other topics covered in Computer Models of Process Dynamics include: Computer hardware and software, covering algebraic expressions, math functions, computation loops, decision-making, graphics, and user-defined functions Creative thinking and scientific theories, covering the Ancients, the Renaissance, Galileo, Newton, electricity and magnetism, and newer sciences Uncertainty and softer science, covering random number generators, statistical analysis of data, the method of least squares, and state/velocity estimators Flight simulators, covering the motion of an aircraft, the equations of motion, short period pitching motion, and phugoid motion Established engineers and programmers, along with students and academics in related programs of study, can harness the comprehensive information in Computer Models of Process Dynamics to gain mastery over the subject and be ready to use their knowledge in many practical applications in the field.

The Computer Music Tutorial, second edition

by Curtis Roads

Expanded, updated, and fully revised—the definitive introduction to electronic music is ready for new generations of students.Essential and state-of-the-art, The Computer Music Tutorial, second edition is a singular text that introduces computer and electronic music, explains its motivations, and puts topics into context. Curtis Roads&’s step-by-step presentation orients musicians, engineers, scientists, and anyone else new to computer and electronic music.The new edition continues to be the definitive tutorial on all aspects of computer music, including digital audio, signal processing, musical input devices, performance software, editing systems, algorithmic composition, MIDI, and psychoacoustics, but the second edition also reflects the enormous growth of the field since the book&’s original publication in 1996. New chapters cover up-to-date topics like virtual analog, pulsar synthesis, concatenative synthesis, spectrum analysis by atomic decomposition, Open Sound Control, spectrum editors, and instrument and patch editors. Exhaustively referenced and cross-referenced, the second edition adds hundreds of new figures and references to the original charts, diagrams, screen images, and photographs in order to explain basic concepts and terms.FeaturesNew chapters: virtual analog, pulsar synthesis, concatenative synthesis, spectrum analysis by atomic decomposition, Open Sound Control, spectrum editors, instrument and patch editors, and an appendix on machine learningTwo thousand references support the book&’s descriptions and point readers to further studyMathematical notation and program code examples used only when necessaryTwenty-five years of classroom, seminar, and workshop use inform the pace and level of the material

Computer Network Security

by Ali Sadiqui

Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration. This book is intended for students preparing for the CCNA Security Exam (210-260 IINS) ? whether at professional training centers, technical faculties, or training centers associated with the "Cisco Academy" program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security.

Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings (Lecture Notes in Computer Science #10446)

by Krzysztof Szczypiorski Jacek Rak John Bay Igor Kotenko Leonard Popyack Victor Skormin

This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St. Petersburg in May 2001. The 24 revised full papers presented together with five invited contributions were carefully reviewed and selected from 36 submissions. The papers are organized in topical sections on network security systems: foundations, models and architectures; intrusion detection: foundations and models; access control, authentication, and authorization; and cryptography and steganography: mathematical basis, protocols, and applied methods.

Computer Network Simulation Using NS2

by Ajit Kumar Nayak Satyananda Champati Rai Rajib Mall

Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics. The book begins with a discussion of the evolution of data communication techniques and the fundamental issues associated with performance evaluation. After presenting a preliminary overview of simulation and other performance evaluation techniques, the authors: Describe a number of computer network protocols and TCP/IP and OSI models, highlighting the networking devices used Explain a socket and its use in network programming, fostering the development of network applications using C and socket API Introduce the NS2 network simulator, exhibiting its internal architecture, constituent software packages, and installation in different operating systems Delve into simulation using NS2, elaborating on the use of Tcl and OTcl scripts as well as AWK scripting and plotting with Gnuplot Show how to simulate wired and wireless network protocols step by step, layer by layer Explore the idea of simulating very large networks, identifying the challenges associated with measuring and graphing the various network parameters Include nearly 90 example programs, scripts, and outputs, along with several exercises requiring application of the theory and programming Computer Network Simulations Using NS2 emphasizes the implementation and simulation of real-world computer network protocols, affording readers with valuable opportunities for hands-on practice while instilling a deeper understanding of how computer network protocols work.

Computer, Network, Software, and Hardware Engineering with Applications

by Norman F. Schneidewind

There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in an integrative fashion when designing systems. On the other hand, books on computers and networks do not demonstrate a deep understanding of the intricacies of developing software. In this book you will learn, for example, how to quantitatively analyze the performance, reliability, maintainability, and availability of computers, networks, and software in relation to the total system. Furthermore, you will learn how to evaluate and mitigate the risk of deploying integrated systems. You will learn how to apply many models dealing with the optimization of systems. Numerous quantitative examples are provided to help you understand and interpret model results. This book can be used as a first year graduate course in computer, network, and software engineering; as an on-the-job reference for computer, network, and software engineers; and as a reference for these disciplines.

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

by David L. Mills

Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields—from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distribution, and synchronization—specifically the architecture, protocols, and algorithms of the NTP. This system has been active in one form or another for almost three decades on the Internet and numerous private networks on the nether side of firewalls. Just about everything today that can be connected to a network wire has support for NTP.This book: Describes the principal components of an NTP client and how it works with redundant servers and diverse network paths Provides an in-depth description of cryptographic and other critical algorithms Presents an overview of the engineering principles guiding network configuration Evaluating historic events that have taken place since computer network timekeeping started almost three decades ago, the author details a number of systems and drivers for current radio, satellites, and telephone modem dissemination and explains how we reckon the time, according to the stars and atoms. The original 16 chapters of the first edition have been rewritten, updated, and enhanced with new material. Four new chapters cover new algorithms and previously uncovered concepts, including timekeeping in space missions.Praise for the first edition:"… For those that need an exhaustive tome on all of the minutiae related to NTP and synchronization, this is the source. … definitive … this book should be considered the last word on the topic."—Ben Rothke on Slashdot.org"… the bible of the subject… contains enough information to take you just as far as you want to go….Dr. Mills is the original developer of NTP."—Books On-Line

Computer Networking: A Top-Down Approach (Sixth Edition)

by James F. Kurose Keith W. Ross

Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces (the top layer), encouraging a hands-on experience with protocols and networking concepts, before working down the protocol stack to more abstract layers. This book has become the dominant book for this course because of the authors' reputations, the precision of explanation, the quality of the art program, and the value of their own supplements.

Computer Networking: A Top-down Approach (5th Edition)

by James F. Kurose Keith W. Ross

Building on the successful top-down approach of previous editions, the Fifth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors-and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.

Computer Networking: A Top-down Approach

by James F. Kurose Keith W. Ross

Computer Networking builds on the authors' long tradition of teaching this complex subject through a layered approach in a “top-down manner.” Authors James Kurose and Keith Ross proceed from the application layer toward the physical layer, presenting important concepts early in your study of networking. Focusing on the fundamental issues of networking, the text provides an excellent foundation without requiring extensive prior knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and exciting recent advances in networking. These include including software-defined networking (SDN) and the rapid adoption of 4G/5G networks and the mobile applications they enable.

Computer Networking: A Top-down Approach

by James Kurose Keith Ross

Computer Networking: A Top-Down Approach Featuring the Internet

Computer Networks: Data Communications, Internet and Security

by Ata Elahi Alex Cushman

​The hands-on textbook covers both the theory and applications of data communications, the Internet, and network security technology, following the ACM guideline for courses in networking. The content is geared towards upper undergraduate and graduate students in information technology, communications engineering, and computer science. The book is divided into three sections: Data Communications, Internet Architecture, and Network Security. Topics covered include flow control and reliable transmission; modulation, DSL, cable modem, and FTTH; Ethernet and Fast Ethernet; gigabit and 10 gigabit Ethernet; and LAN interconnection devices, among others. The book also covers emerging topics such as IPv6 and software defined networks. The book is accompanied with a lab manual which uses Wireshark, Cisco Packet Tracer, and virtual machines to lead students through simulated labs.

Refine Search

Showing 10,851 through 10,875 of 53,245 results