Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Computer Applications in Biotechnology

      • 1st Edition
      • May 23, 2014
      • A. Munack + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 0 4 2 3 7 7 7
      • eBook
        9 7 8 1 4 8 3 2 9 6 9 0 6
      The 6th Computer Applications in Biotechnology (CAB6) conference was a continuation of 2 series of events: the IFAC symposia on Modelling and Control of Biotechnical Processes and the International Conferences on Computer Applications in Fermentation Technology. This conference provided the opportunity for both sides, leading researchers and industrial practitioners, in this interdisciplinary field to exchange new ideas and technology; concepts and solutions. This postprint volume contains all those papers which were presented at the conference.
    • Optimizing IEEE 802.11i Resource and Security Essentials

      • 1st Edition
      • December 5, 2014
      • Iraj Sadegh Amiri + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 2 2 2 1
      • eBook
        9 7 8 0 1 2 8 0 2 2 2 3 8
      In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.
    • Predictive Analytics and Data Mining

      • 1st Edition
      • November 27, 2014
      • Vijay Kotu + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 6 0 8
      • eBook
        9 7 8 0 1 2 8 0 1 6 5 0 3
      Put Predictive Analytics into ActionLearn the basics of Predictive Analysis and Data Mining through an easy to understand conceptual framework and immediately practice the concepts learned using the open source RapidMiner tool. Whether you are brand new to Data Mining or working on your tenth project, this book will show you how to analyze data, uncover hidden patterns and relationships to aid important decisions and predictions. Data Mining has become an essential tool for any enterprise that collects, stores and processes data as part of its operations. This book is ideal for business users, data analysts, business analysts, business intelligence and data warehousing professionals and for anyone who wants to learn Data Mining.You’ll be able to:1. Gain the necessary knowledge of different data mining techniques, so that you can select the right technique for a given data problem and create a general purpose analytics process.2. Get up and running fast with more than two dozen commonly used powerful algorithms for predictive analytics using practical use cases.3. Implement a simple step-by-step process for predicting an outcome or discovering hidden relationships from the data using RapidMiner, an open source GUI based data mining tool Predictive analytics and Data Mining techniques covered: Exploratory Data Analysis, Visualization, Decision trees, Rule induction, k-Nearest Neighbors, Naïve Bayesian, Artificial Neural Networks, Support Vector machines, Ensemble models, Bagging, Boosting, Random Forests, Linear regression, Logistic regression, Association analysis using Apriori and FP Growth, K-Means clustering, Density based clustering, Self Organizing Maps, Text Mining, Time series forecasting, Anomaly detection and Feature selection. Implementation files can be downloaded from the book companion site at www.LearnPredictiveA...
    • Control of Distributed Parameter Systems

      • 1st Edition
      • May 18, 2014
      • S. P. Banks + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 1 8 7 0 3
      • eBook
        9 7 8 1 4 8 3 1 5 1 1 2 0
      Control of Distributed Parameter Systems covers the proceedings of the Second IFAC Symposium, Coventry, held in Great Britain from June 28 to July 1, 1977. The book focuses on the methodologies, processes, and techniques in the control of distributed parameter systems, including boundary value control, digital transfer matrix, and differential equations. The selection first discusses the asymptotic methods in the optimal control of distributed systems; applications of distributed parameter control theory of a survey; and dual variational inequalities for external eigenvalue problems. The book also ponders on stochastic differential equations in Hilbert space and their application to delay systems and linear quadratic optimal control problem over an infinite time horizon for a class of distributed parameter systems. The manuscript investigates the semigroup approach to boundary value control and stability of nonlinear distributed parameter systems. Topics include boundary control action implemented through a dynamical system; classical boundary value controls; stability of nonlinear systems; and feedback control on the boundary. The text also focuses on the functional analysis interpretation of Lyapunov stability; method of multipliers for a class distributed parameter systems; and digital transfer matrix approach to distributed system simulation. The selection is a dependable source of data for readers interested in the control of distributed parameter systems.
    • Practical Predictive Analytics and Decisioning Systems for Medicine

      • 1st Edition
      • September 23, 2014
      • Gary D. Miner + 7 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 6 4 3 6
      • Paperback
        9 7 8 0 1 2 8 1 0 0 6 2 2
      • eBook
        9 7 8 0 1 2 4 1 1 6 4 0 5
      With the advent of electronic medical records years ago and the increasing capabilities of computers, our healthcare systems are sitting on growing mountains of data. Not only does the data grow from patient volume but the type of data we store is also growing exponentially. Practical Predictive Analytics and Decisioning Systems for Medicine provides research tools to analyze these large amounts of data and addresses some of the most pressing issues and challenges where data integrity is compromised: patient safety, patient communication, and patient information. Through the use of predictive analytic models and applications, this book is an invaluable resource to predict more accurate outcomes to help improve quality care in the healthcare and medical industries in the most cost–efficient manner.Practical Predictive Analytics and Decisioning Systems for Medicine provides the basics of predictive analytics for those new to the area and focuses on general philosophy and activities in the healthcare and medical system. It explains why predictive models are important, and how they can be applied to the predictive analysis process in order to solve real industry problems. Researchers need this valuable resource to improve data analysis skills and make more accurate and cost-effective decisions.
    • Service Computing: Concept, Method and Technology

      • 1st Edition
      • December 6, 2014
      • Zhaohui Wu
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 3 3 0 3
      • eBook
        9 7 8 0 1 2 8 0 2 5 9 7 0
      Service computing is a cross-disciplinary field that covers science and technology, and represents a promising direction for distributed computing and software development methodologies. It aims to bridge the gap between business services and IT services by supporting the whole lifecycle of services innovation. Over the last ten years applications in industry and academic research have produced considerable progress and success Service Computing: Concept, Method and Technology presents the concept of service computing and a proposed reference architecture for service computing research before proceeding to introduce two underlying technologies: Web services and service-oriented architecture. It also presents the authors’ latest research findings on hot topics such as service discovery, recommendation, composition, verification, service trust, dynamic configuration and big data service. Some new models and methods are proposed including three service discovery methods based on semantics and skyline technologies, two service recommendation methods using graph mining and QoS prediction, two service composition methods with graph planning and one service verification method using π calculus and so on. Moreover, this book introduces JTang, an underlying platform supporting service computing, which is a product of the authors’ last ten years of research and development.
    • Interaction Flow Modeling Language

      • 1st Edition
      • November 17, 2014
      • Marco Brambilla + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 0 8 0
      • eBook
        9 7 8 0 1 2 8 0 0 5 3 2 3
      Interaction Flow Modeling Language describes how to apply model-driven techniques to the problem of designing the front end of software applications, i.e., the user interaction. The book introduces the reader to the novel OMG standard Interaction Flow Modeling Language (IFML). Authors Marco Brambilla and Piero Fraternali are authors of the IFML standard and wrote this book to explain the main concepts of the language. They effectively illustrate how IFML can be applied in practice to the specification and implementation of complex web and mobile applications, featuring rich interactive interfaces, both browser based and native, client side components and widgets, and connections to data sources, business logic components and services. Interaction Flow Modeling Language provides you with unique insight into the benefits of engineering web and mobile applications with an agile model driven approach. Concepts are explained through intuitive examples, drawn from real-world applications. The authors accompany you in the voyage from visual specifications of requirements to design and code production. The book distills more than twenty years of practice and provides a mix of methodological principles and concrete and immediately applicable techniques.
    • Cyber Reconnaissance, Surveillance and Defense

      • 1st Edition
      • October 16, 2014
      • Robert Shimonski
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 0 8 3
      • eBook
        9 7 8 0 1 2 8 0 1 4 6 8 4
      At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gatherin... and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
    • Data Acquisition Techniques Using PC

      • 1st Edition
      • June 28, 2014
      • Howard Austerlitz
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 0 0 5
      • eBook
        9 7 8 1 4 8 3 2 9 4 7 3 5
      Data Acquisition Techniques Using Personal Computers contains all the information required by a technical professional (engineer, scientist, technician) to implement a PC-based acquisition system. Including both basic tutorial information as well as some advanced topics, this work is suitable as a reference book for engineers or as a supplemental text for engineering students. It gives the reader enough understanding of the topics to implement a data acquisition system based on commercial products. A reader can alternatively learn how to custom build hardware or write his or her own software. Featuring diverse information, this book will be useful to both the technical professional and the hobbyist.
    • Social Data Analytics

      • 1st Edition
      • November 10, 2014
      • Krish Krishnan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 7 1 8 6 9
      • eBook
        9 7 8 0 1 2 3 9 7 7 8 0 9
      Social Data Analytics is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media and get an overview of the leading vendors in a crowded space of BI applications. By the end of this book, you will be well prepared for your organization’s next social data analytics project.