Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Managing the Web of Things

      Linking the Real World to the Web
      • 1st Edition
      • Michael Sheng + 3 more
      • English
      Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things). With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact. Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research.
    • Discrete-Time Neural Observers

      Analysis and Applications
      • 1st Edition
      • Alma Y Alanis + 1 more
      • English
      Discrete-Time Neural Observers: Analysis and Applications presents recent advances in the theory of neural state estimation for discrete-time unknown nonlinear systems with multiple inputs and outputs. The book includes rigorous mathematical analyses, based on the Lyapunov approach, that guarantee their properties. In addition, for each chapter, simulation results are included to verify the successful performance of the corresponding proposed schemes. In order to complete the treatment of these schemes, the authors also present simulation and experimental results related to their application in meaningful areas, such as electric three phase induction motors and anaerobic process, which show the applicability of such designs. The proposed schemes can be employed for different applications beyond those presented. The book presents solutions for the state estimation problem of unknown nonlinear systems based on two schemes. For the first one, a full state estimation problem is considered; the second one considers the reduced order case with, and without, the presence of unknown delays. Both schemes are developed in discrete-time using recurrent high order neural networks in order to design the neural observers, and the online training of the respective neural networks is performed by Kalman Filtering.
    • Big Data Analytics for Sensor-Network Collected Intelligence

      • 1st Edition
      • Hui-Huang Hsu + 2 more
      • English
      Big Data Analytics for Sensor-Network Collected Intelligence explores state-of-the-art methods for using advanced ICT technologies to perform intelligent analysis on sensor collected data. The book shows how to develop systems that automatically detect natural and human-made events, how to examine people’s behaviors, and how to unobtrusively provide better services. It begins by exploring big data architecture and platforms, covering the cloud computing infrastructure and how data is stored and visualized. The book then explores how big data is processed and managed, the key security and privacy issues involved, and the approaches used to ensure data quality. In addition, readers will find a thorough examination of big data analytics, analyzing statistical methods for data analytics and data mining, along with a detailed look at big data intelligence, ubiquitous and mobile computing, and designing intelligence system based on context and situation. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
    • Path Planning for Vehicles Operating in Uncertain 2D Environments

      • 1st Edition
      • Viacheslav Pshikhopov
      • English
      Path Planning for Vehicles Operating in Uncertain 2D-environments presents a survey that includes several path planning methods developed using fuzzy logic, grapho-analytical search, neural networks, and neural-like structures, procedures of genetic search, and unstable motion modes.
    • Cellular Actuators

      Modularity and Variability in Muscle-inspired Actuation
      • 1st Edition
      • Jun Ueda + 2 more
      • English
      Cellular Actuators: Modularity and Variability in Muscle-Inspired Actuation describes the roles actuators play in robotics and their insufficiency in emerging new robotic applications, such as wearable devices and human co-working robots where compactness and compliance are important. Piezoelectric actuators, the topic of this book, provide advantages like displacement scale, force, reliability, and compactness, and rely on material properties to provide displacement and force as reactions to electric stimulation. The authors, renowned researchers in the area, present the fundamentals of muscle-like movement and a system-wide study that includes the design, analysis, and control of biologically inspired actuators. This book is the perfect guide for researchers and practitioners who would like to deploy this technology into their research and products.
    • Securing the Internet of Things

      • 1st Edition
      • Shancang Li + 1 more
      • English
      Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
    • Wheeled Mobile Robotics

      From Fundamentals Towards Autonomous Systems
      • 1st Edition
      • Gregor Klancar + 3 more
      • English
      Wheeled Mobile Robotics: From Fundamentals Towards Autonomous Systemscovers the main topics from the wide area of mobile robotics, explaining all applied theory and application. The book gives the reader a good foundation, enabling them to continue to more advanced topics. Several examples are included for better understanding, many of them accompanied by short MATLAB® script code making it easy to reuse in practical work. The book includes several examples of discussed methods and projects for wheeled mobile robots and some advanced methods for their control and localization. It is an ideal resource for those seeking an understanding of robotics, mechanics, and control, and for engineers and researchers in industrial and other specialized research institutions in the field of wheeled mobile robotics. Beginners with basic math knowledge will benefit from the examples, and engineers with an understanding of basic system theory and control will find it easy to follow the more demanding fundamental parts and advanced methods explained.
    • Human Recognition in Unconstrained Environments

      Using Computer Vision, Pattern Recognition and Machine Learning Methods for Biometrics
      • 1st Edition
      • Maria De Marsico + 2 more
      • English
      Human Recognition in Unconstrained Environments provides a unique picture of the complete ‘in-the-wild’ biometric recognition processing chain; from data acquisition through to detection, segmentation, encoding, and matching reactions against security incidents. Coverage includes: Data hardware architecture fundamentals Background subtraction of humans in outdoor scenes Camera synchronization Biometric traits: Real-time detection and data segmentation Biometric traits: Feature encoding / matching Fusion at different levels Reaction against security incidents Ethical issues in non-cooperative biometric recognition in public spaces With this book readers will learn how to: Use computer vision, pattern recognition and machine learning methods for biometric recognition in real-world, real-time settings, especially those related to forensics and security Choose the most suited biometric traits and recognition methods for uncontrolled settings Evaluate the performance of a biometric system on real world data
    • Federal Cloud Computing

      The Definitive Guide for Cloud Service Providers
      • 2nd Edition
      • Matthew Metheny
      • English
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.
    • Creativity in Computing and DataFlow SuperComputing

      • 1st Edition
      • Volume 104
      • English
      Creativity in Computing and DataFlow Supercomputing, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore topics in greater depth and breadth than journal articles typically allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.