Skip to main content

Books in Applications general

    • Fixed Point Optimization Algorithms and Their Applications

      • 1st Edition
      • November 23, 2024
      • Watcharaporn Cholamjiak
      • English
      • Paperback
        9 7 8 0 4 4 3 3 3 5 8 6 0
      • eBook
        9 7 8 0 4 4 3 3 3 5 8 7 7
      Fixed Point Optimization Algorithms and Their Applications discusses how the relationship between fixed point algorithms and optimization problems is connected and demonstrates hands-on applications of the algorithms in fields such as image restoration, signal recovery, and machine learning. The book is divided into nine chapters beginning with foundational concepts of normed linear spaces, Banach spaces, and Hilbert spaces, along with nonlinear operators and useful lemmas and theorems for proving the book’s main results. The author presents algorithms for nonexpansive and generalized nonexpansive mappings in Hilbert space, and presents solutions to many optimization problems across a range of scientific research and real-world applications. From foundational concepts, the book proceeds to present a variety of optimization algorithms, including fixed point theories, convergence theorems, variational inequality problems, minimization problems, split feasibility problems, variational inclusion problems, and equilibrium problems. Fixed Point Optimization Algorithms and Their Applications equips readers with the theoretical mathematics background and necessary tools to tackle challenging optimization problems involving a range of algebraic methods, empowering them to apply these techniques in their research, professional work, or academic pursuits.
    • Nature-Inspired Computation and Swarm Intelligence

      • 1st Edition
      • April 9, 2020
      • Xin-She Yang
      • English
      • Paperback
        9 7 8 0 1 2 8 1 9 7 1 4 1
      • eBook
        9 7 8 0 1 2 8 2 2 6 0 9 4
      Nature-inspired computation and swarm intelligence have become popular and effective tools for solving problems in optimization, computational intelligence, soft computing and data science. Recently, the literature in the field has expanded rapidly, with new algorithms and applications emerging. Nature-Inspired Computation and Swarm Intelligence: Algorithms, Theory and Applications is a timely reference giving a comprehensive review of relevant state-of-the-art developments in algorithms, theory and applications of nature-inspired algorithms and swarm intelligence. It reviews and documents the new developments, focusing on nature-inspired algorithms and their theoretical analysis, as well as providing a guide to their implementation. The book includes case studies of diverse real-world applications, balancing explanation of the theory with practical implementation. Nature-Inspired Computation and Swarm Intelligence: Algorithms, Theory and Applications is suitable for researchers and graduate students in computer science, engineering, data science, and management science, who want a comprehensive review of algorithms, theory and implementation within the fields of nature inspired computation and swarm intelligence.
    • Data Architecture: A Primer for the Data Scientist

      • 2nd Edition
      • April 30, 2019
      • W.H. Inmon + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 6 9 1 6 2
      • eBook
        9 7 8 0 1 2 8 1 6 9 1 7 9
      Over the past 5 years, the concept of big data has matured, data science has grown exponentially, and data architecture has become a standard part of organizational decision-making. Throughout all this change, the basic principles that shape the architecture of data have remained the same. There remains a need for people to take a look at the "bigger picture" and to understand where their data fit into the grand scheme of things. Data Architecture: A Primer for the Data Scientist, Second Edition addresses the larger architectural picture of how big data fits within the existing information infrastructure or data warehousing systems. This is an essential topic not only for data scientists, analysts, and managers but also for researchers and engineers who increasingly need to deal with large and complex sets of data. Until data are gathered and can be placed into an existing framework or architecture, they cannot be used to their full potential. Drawing upon years of practical experience and using numerous examples and case studies from across various industries, the authors seek to explain this larger picture into which big data fits, giving data scientists the necessary context for how pieces of the puzzle should fit together.
    • How Information Systems Can Help in Alarm/Alert Detection

      • 1st Edition
      • November 8, 2018
      • Florence Sedes
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 3 0 2 8
      • eBook
        9 7 8 0 0 8 1 0 2 9 3 0 5
      Alarm or alert detection remains an issue in various areas from nature, i.e. flooding, animals or earthquake, to software systems. Liveness, dynamicity, reactivity of alarm systems: how to ensure the warning information reach the right destination at the right moment and in the right location, still being relevant for the recipient, in spite of the various and successive filters of confidentiality, privacy, firewall policies, etc.? Also relevant in this context are to technical contingency issues: material failure, defect of connection, break of channels, independence of information routes and sources? Alarms with crowd media, (mis)information vs. rumours: how to make the distinction? The prediction of natural disasters (floods, avalanches, etc.), health surveillance (affectionate fevers of cattle, pollution by pesticides, etc.), air, sea and land transport, or space surveillance to prevent Risks of collisions between orbital objects involve more and more actors within Information Systems, one of whose purposes is the dissemination of alerts. By expanding the capabilities and functionality of such national or international systems, social networks are playing a growing role in dissemination and sharing, eg. with the support of systems like the Google Alert (https://www.google.... which concerns the publication of contents online. Recently, the Twitter microblogging platform announced a broadcast service, designed to help government organizations with alerts to the public. The proper functioning of such systems depends on fundamental properties such as resilience, liveliness and responsiveness: any alert must absolutely reach the right recipient at the right time and in the right place, while remaining relevant to him, despite the various constraints. on the one hand to external events, such as hardware failures, connection faults, breaks in communication channels, on the other hand to confidentiality, such as the collection and use of personal data (with or without the consent of the user), or the disparity of access policies (generation according to industrial, technological, security constraints, management of internal / external policies, etc.) between actors. This book opens the discussion on the "procrastination", the dynamics and the reactivity of the alert systems, but also the problems of confidentiality, filtering of information, and the means of distinguishing information and rumor.
    • Newnes Electronics Assembly Pocket Book

      • 1st Edition
      • July 26, 2017
      • Keith Brindley
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 1 9 3 2
      Produced in association with the Engineering Training Authority with contributions from dozens of people in the electronics industry. The material covers common skills in electrical and electronic engineering and concentrates mainly on wiring and assembly. 'Newnes Electronics Assembly Pocket Book' is for electronics technicians, students and apprentices.
    • PCs in the Factory

      • 1st Edition
      • January 22, 2016
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 0 4 9 9
      • eBook
        9 7 8 1 4 8 3 2 8 5 0 1 6
      Please note this is a short discount publication.PCs have become as essential to the factory environment as they are to the office environment.This in-depth report examines how specially adapted PCs and peripherals are being established in Factory Process Control and Reporting.The report covers:* Hardware and Software* Typical Applications* Implementation Issues* Case Studies and Real Applications
    • Passive and Discrete Circuits

      • 1st Edition
      • Volume 2
      • June 23, 2016
      • R M MARSTON
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 1 9 8 7
      Passive components and discrete devices form the bedrocks on which all modern electronic circuits are built. This Pocket Book is a single volume applications guide to the most popular and useful of these devices, containing 670 diagrams, tables and carefully selected practical circuits. Throughout the Pocket Book great emphasis is placed on practical user information and circuitry. All of the active devices used are modestly priced and readily available.The book is split into twenty chapters. The first three explain important practical features of the ranges of modern passive electrical components, including relays, meters, motors, sensors and transducers. Chapters 4 to 6 deal with the design ofpractical attenuators, filters, and 'bridge' circuits. The remaining fourteen chapters deal with specific types of discrete semiconductor device, including various types of diode, transistors, JFETs, MOSFETs, VMOS devices, UJTs, SCRs, TRIACs, and various optoelectronic devices. This easy-to-read, concise, highly practical and largely non-mathematical volume is aimed directly at engineers, technicians, students and competent experimenters who can build a design directly from a circuit diagram, and if necessary modify it to suit individual needs. Ray Marston is the author of the multi-volume series of Newnes Circuits Manuals. His magazine articles on circuit design appear regularly in a wide range of publications worldwide.
    • Cyber Guerilla

      • 1st Edition
      • June 13, 2016
      • Jelle Van Haaster + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 9 7 9
      • eBook
        9 7 8 0 1 2 8 0 5 2 8 4 6
      Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • Computer Programming and Architecture

      • 2nd Edition
      • June 28, 2014
      • Henry Levy + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 2 4 8
      • eBook
        9 7 8 1 4 8 3 2 9 9 3 7 2
      Takes a unique systems approach to programming and architecture of the VAXUsing the VAX as a detailed example, the first half of this book offers a complete course in assembly language programming. The second describes higher-level systems issues in computer architecture. Highlights include the VAX assembler and debugger, other modern architectures such as RISCs, multiprocessing and parallel computing, microprogramming, caches and translation buffers, and an appendix on the Berkeley UNIX assembler.