- Table View
- List View
Computational Social Science: Proceedings of the 2nd International Conference on New Computational Social Science (ICNCSS 2021), October 15-17, 2021, Suzhou, Jiangsu, China
by Dan Dobrota Roshan Chitrakar Ciurea Maria Liliana Mâţâ Wei LuoThe proceedings publish selected papers from the 2nd International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools. With the rapid development of information technology, especially sweeping progress in the Internet of things, cloud computing, social networks, social media and big data, social computing, as a data-intensive science, is an emerging field that leverages the capacity to collect and analyze data with an unprecedented breadth, depth and scale. It represents a new computing paradigm and an interdisciplinary field of research and application. A broad comprehension of major topics involved in social computing is important for both scholars and practitioners. This proceedings presents and discusses key concepts and analyzes the state-of-the-art of the field. The conference not only gave insights on social computing, but also affords conduit for future research in the field. Social computing has two distinct trends: One is on the social science issues, such as computational social science, computational sociology, social network analysis, etc; the other is on the use of computational techniques. Finally, some new challenges ahead are summarized, including interdisciplinary cooperation and training, big data sharing for scientific data mashups, and privacy protect.
Computational Statistics Handbook with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)
by Wendy L. Martinez Angel R. MartinezA Strong Practical Focus on Applications and AlgorithmsComputational Statistics Handbook with MATLAB, Third Edition covers today's most commonly used techniques in computational statistics while maintaining the same philosophy and writing style of the bestselling previous editions. The text keeps theoretical concepts to a minimum, emphasizing the i
The Computational Structure Of Life Cycle Assessment (Eco-efficiency In Industry And Science Series #Vol. 11)
by Reinout Heijungs Sangwon SuhLife Cycle assessment (LCA) is a tool for environmental decision-support in relation to products from the cradle to the grave. Until now, more emphasis has been put on the inclusion quantitative models and databases and on the design of guidebooks for applying LCA than on the integrative aspect of combining these models and data. <P><P>This is a remarkable thing, since LCA in practice deals with thousands of quantitative data items that have to be combined in the correct manner. For this, one needs mathematical rules and algorithmic principles for carrying out an LCA. <P><P>This book presents the first coherent treatment of the mathematical and algorithmic aspects of LCA. These computational aspects are presented in matrix form, so that a concise and elegant formulation is achieved. This form, moreover, provides a platform for further extension of analysis using perturbation theory, structural theory and economic input-output analysis.
Computational Techniques for Smart Manufacturing in Industry 5.0: Methods and Applications
by Zhenglei HeWe are witnessing rapid development in computational technologies and its applications in industry, leading to the 5th industrial revolution. Industry 5.0 is characterized by the synergies between machines and humans, with an aim to add value to production by creating personalized products able to meet customers' requirements. These intelligent manufacturing systems have been sought in various sectors (e.g. automobiles, power supplying, chemistry) to realize data-driven innovations for delivering highly customizable products and services faster, cheaper, better, and greener.This book presents recent advancements in research, new methods and techniques, and applications of advanced computational technologies in intelligent manufacturing for modeling, simulating, optimization, decision making, and other typical issues in manufacturing processes. It stimulates the scientific exchange of ideas and experiences in the field of intelligent manufacturing applications. Researchers and practitioners alike will benefit from this book to enhance their understanding of Industry 5.0, which focuses on combining human creativity and craftsmanship with the speed, productivity, and consistency of AI systems. Real-world case studies in various fields and practical applications are provided in each chapter.
Computational Thinking: A Beginner's Guide to Problem-Solving and Programming
by Karl BeecherComputational thinking is a timeless, transferable skill that enables you to think more clearly and logically, as well as a way to solve specific problems. <p><p> Beginning with the core ideas of computational thinking, with this book you'll build up an understanding of the practical problem-solving approach and explore how computational thinking aids good practice in programming, complete with a full guided example.
Computer Accounting with QuickBooks Online
by Donna KayGain a competitive advantage – learn a leading online financial app for entrepreneurs with Computer Accounting with QuickBooks Online. Designed using the most effective way to learn QuickBooks Online, this text streamlines learning QuickBooks Online because it focuses on you―the learner. Proven instructional techniques are incorporated throughout the text to make your mastery of QuickBooks Online as effortless as possible. Using a hands-on approach, this text integrates understanding accounting with mastery of QuickBooks Online. Designed for maximum flexibility to meet your needs, Computer Accounting with QuickBooks Online can be used either in a QuickBooks Online course or independently at your own pace.
Computer-Aided Design, Engineering, and Manufacturing: Systems Techniques and Applications, Volume II, Computer-Integrated Manufacturing
by Cornelius T. LeondesIn the competitive business arena companies must continually strive to create new and better products faster, more efficiently, and more cost effectively than their competitors to gain and keep the competitive advantage. Computer-aided design (CAD), computer-aided engineering (CAE), and computer-aided manufacturing (CAM) are now the industry standa
Computer-Aided Econometrics
by David E. A. GilesEmphasizing the impact of computer software and computational technology on econometric theory and development, this text presents recent advances in the application of computerized tools to econometric techniques and practices—focusing on current innovations in Monte Carlo simulation, computer-aided testing, model selection, and Bayesian methodology for improved econometric analyses.
Computer Aided Fraud Prevention and Detection
by David CoderrePraise for Computer-Aided Fraud Prevention and Detection: A Step-by-Step Guide "A wonderful desktop reference for anyone trying to move from traditional auditing to integrated auditing. The numerous case studies make it easy to understand and provide a how-to for those?seeking to implement automated tools including continuous assurance. Whether you are just starting down the path or well on your way, it is a valuable resource." -Kate M. Head, CPA, CFE, CISA Associate Director, Audit and Compliance University of South Florida "I have been fortunate enough to learn from Dave's work over the last fifteen years, and this publication is no exception. Using his twenty-plus years of experience, Dave walks through every aspect of detecting fraud with a computer from the genesis of the act to the mining of data for its traces and its ultimate detection. A complete text that first explains how one prevents and detects fraud regardless of technology and then shows how by automating such procedures, the examiners' powers become superhuman." -Richard B. Lanza, President, Cash Recovery Partners, LLC "Computer-Aided Fraud Prevention and Detection: A Step-by-Step Guide helps management and auditors answer T. S. Eliot's timeless question, 'Where is the knowledge lost in information?' Data analysis provides a means to mine the knowledge hidden in our information. Dave Coderre has long been a leader in educating auditors and others about Computer Assisted Audit Techniques. The book combines practical approaches with unique data analysis case examples that compel the readers to try the techniques themselves." -Courtenay Thompson Jr. Consultant, Courtenay Thompson & Associates
Computer Aided Fraud Prevention and Detection
by David Coderrebecome superhuman." -Richard B. Lanza, President, Cash Recovery Partners, LLC "Computer-Aided Fraud Prevention and Detection: A Step-by-Step Guide helps management and auditors answer T. S. Eliot's timeless question, 'Where is the knowledge lost in information?' Data analysis provides a means to mine the knowledge hidden in our information. Dave Coderre has long been a leader in educating auditors and others about Computer Assisted Audit Techniques. The book combines practical approaches with unique data analysis case examples that compel the readers to try the techniques themselves." -Courtenay Thompson Jr. Consultant, Courtenay Thompson & Associates
Computer-Aided Inspection Planning: Theory and Practice (Advanced and Additive Manufacturing Series)
by Abdulrahman Al-Ahmari Emad Abouel Nasr Osama AbdulhameedThe inspection process is one of the most important steps in manufacturing industries because it safeguards high quality products and customer satisfaction. Manual inspection may not provide the desired accuracy. This book introduces and implements a new methodology and develops the supporting technologies for automated inspection planning based on Computer Aided Design (CAD) models. It also provides and implements an efficient link for automated operation based on Coordinate Measuring Machine (CMM). The link’s output is a DMIS code programming file based on the inspection planning table that is executed on CMM.
Computer Algebra in Scientific Computing: 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings (Lecture Notes in Computer Science #11661)
by Matthew England Wolfram Koepf Timur M. Sadykov Werner M. Seiler Evgenii V. VorozhtsovThis book constitutes the refereed proceedings of the 21st International Workshop on Computer Algebra in Scientific Computing, CASC 2019, held in Moscow, Russia, in August 2019.The 28 full papers presented together with 2 invited talks were carefully reviewed and selected from 44 submissions. They deal with cutting-edge research in all major disciplines of computer algebra. The papers cover topics such as polynomial algebra, symbolic and symbolic-numerical computation, applications of symbolic computation for investigating and solving ordinary differential equations, applications of CASs in the investigation and solution of celestial mechanics problems, and in mechanics, physics, and robotics.
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
by Brij B. GuptaThis is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Computer and Information Science (Studies in Computational Intelligence #791)
by Roger LeeThis book presents the outcomes of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2018), which was held in Singapore on June 6–8, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference’s most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will make to the field of computer and information science.
Computer and Information Science (Studies in Computational Intelligence #849)
by Roger LeeThis book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2019), which was held on June 12–14, 2019 in Beijing, China. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them.The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference’s most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.
Computer and Information Science (Studies in Computational Intelligence #1055)
by Roger LeeThis book presents scientific results of the 22nd IEEE/ACIS International Conference on Computer and Information Science (ICIS 2022) held on June 26-28, 2022 in Zhuhai China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications, and tools) of computer and information science and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 14 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
Computer and Information Science 2021 - Fall (Studies in Computational Intelligence #1003)
by Roger LeeThis edited book presents scientific results of the 21th IEEE/ACIS International Fall Virtual Conference on Computer and Information Science (ICIS 2021-Fall) held on October 13-15, 2021, in Xi’an China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications, and tools) of computer and information science and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 13 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
The Computer and the Clerk (Routledge Library Editions: The Economics and Business of Technology #32)
by Enid Mumford Olive BanksOriginally published in 1967 and the result of extensive interviews and case studies, this book examines the implications of technical change. Although focussed on the early introduction of computers the kinds of problems discussed in this book are found in technical change more widely and the book therefore continues to have enduring relevance. The book is divided into three parts - an attitude survey of the administrative staff in departments affected by the introduction of computers, a study of the mechanisms of change and a second survey and re-examination of departmental organisation and work flow.
Computer Assisted Mass Appraisal: An International Review (Routledge Revivals)
by William J. McCluskey Alastair AdairFirst published in 1997, this volume emerged in response to the need for material on the research, development, use and application of mass appraisal techniques for ad valorem property tax systems. The primary paradigms discussed include regression, base home technique, adaptive estimation procedure and artificial neural networks. Intending to address a wide range of property types, the authors explored residential, condominiums, retail, office and industrial property as well as agricultural and forestry land.
Computer, Communication and Electrical Technology: Proceedings of the International Conference on Advancement of Computer Communication and Electrical Technology (ACCET 2016), West Bengal, India, 21-22 October 2016
by Debatosh Guha; Badal Chakraborty; Himadri Sekhar DuttaThe First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors & transducers, etc. Topics in this conference include: Computer ScienceThis conference encompassed relevant topics in computer science such as computer vision & intelligent system, networking theory, and application of information technology. Communication EngineeringTo enhance the theory & technology of communication engineering, ACCET 2016 highlighted the state-of the-art research work in the field of VLSI, optical communication, and signal processing of various data formatting. Research work in the field of microwave engineering, cognitive radio and networks are also included. Electrical TechnologyThe state-of-the-art research topic in the field of electrical & instrumentation engineering is included in this conference such as power system stability & protection, non-conventional energy resources, electrical drives, and biomedical engineering. Research work in the area of optimization and application in control, measurement & instrumentation are included as well.
Computer Forensics
by Nathan ClarkeHow would your organisation cope with a cyber attack? Pinpoint and close vulnerabilities using effective computer forensics!The primary purpose of computer forensics is to enable organisations to pinpoint where the malware has infected their computer systems and which files have been infected, so that they can close the vulnerability. More and more organisations have realised that they need to acquire a forensic capability to ensure they are ready to cope with an information security incident. This pocket guide illustrates the technical complexities involved in computer forensics, and shows managers what makes the discipline relevant to their organisation. For technical staff, the book offers an invaluable insight into the key processes and procedures that are required. Benefits to business include: * Defend your company effectively against attacks By developing a computer forensic capability, your organisation will be better prepared to defend itself in the event of a cyber attack. Surveys of the threat landscape have indicated a significant upswing of insider activity. Forensics within the organisation can be used to identify possible insider misuse of systems or information. In addition, this pocket guide looks at how you can optimise your IT infrastructure so as to enhance the efficiency of incident analysis. This will also minimise the operational impact on your computer systems in the event that a forensic analysis is required. * Be proactive Being proactive does not just mean making sure your organisation's IT infrastructure is one that can support forensic analysis of incidents. Forensics is now no longer merely a tool to identify what has gone wrong: it can also be used as a mechanism for alerting you to the fact that something has gone wrong. Being proactive therefore implies stepping up your organisation's ability to detect attacks. Detection of attacks is an extremely useful attribute for your organisation to have: the sooner you know about the problem, the sooner you can begin to deal with it. * Secure evidence that will stand up in court Undertaking forensics is not a simple task. It is not always possible to understand the true consequences of insider misuse until after completion of the investigation. Once the extent of the damage becomes clear, you may want to exercise the option of taking legal action against the perpetrator. This means that it is essential for you to follow correct procedure, so as to safeguard any evidence gathered. This book explains the key steps you need to take to maintain the integrity of the investigation and preserve the evidence. * Counter encryption Encryption is a double-edged sword. Encryption has a legitimate purpose as a tool deployed by information security professionals. However, the opportunity to conceal data has obvious attractions for the criminal, meaning that encryption is also a technique widely used by hackers. This book looks at how encryption is used to impede a forensic investigation, and examines ways of solving the problem. The most effective tactic for countering encryption is to locate the key material and crack the password that protects it, using a password cracker such as Cain & Abel. Tools, techniques and proceduresThe underground economy makes millions of pounds a year from cybercrime. Because no system or network can be completely secure, any sensible organisation will have mechanisms in place in advance to deal with the consequences of a cyber attack. Digital forensics assists companies and public sector organisations to identify how and where their computer systems have been abused. The purpose of this pocket guide is to provide an introduction to the tools, techniques and procedures utilised within computer forensics. It is an easy to understand, introductory text, which gives an overview of the digital forensics domain, discussing procedural, technical and human-related aspects, without confiusing readers with technical jargon.
Computer Forensics
by Michael SheetzWould your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes. If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
Computer Fraud Casebook: The Bytes that Bite
by Joseph T. WellsThis one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others.
Computer Hacking: Eine Einführung zur Verbesserung der Computersicherheit in komplexen IT-Infrastrukturen
by Udo KebschullTechnische Maßnahmen, die es Cyberangreifern schwer machen, dienen zur Abschreckung, weil Hacker immer nur so hoch springen, wie sie müssen. Bei komplexen und vor allem sicherheitsrelevanten IT-Infrastrukturen reichen diese technischen Maßnahmen allein jedoch oft nicht aus.Dieses Lehrbuch betrachtet alle Aspekte der IT-Sicherheit und effektive Maßnahmen, um Angriffe zu detektieren und sich erfolgreich dagegen zu wehren. Es behandelt allgemeine Angriffsmechanismen und Angriffsszenarien, die von Angreifern angewendet werden. Dabei soll klar werden, dass es nicht ausreichend ist, Firewall-Regeln sauber zu konfigurieren oder die aktuellsten Patches einzuspielen. Vielmehr muss ein ganzheitlicher Ansatz gewählt werden, der Nutzende einschließt (Awareness) und funktionierende Prozesse für den Fall eines konkreten Angriffs etabliert. Das Buch zeigt, wo die Schwachstellen liegen, wie man sie schließt, wie man Angriffe erkennt und wie man sie erfolgreich abwehrt.
Computer-Human Interaction Research and Applications: First International Conference, CHIRA 2017, Funchal, Madeira, Portugal, October 31 – November 2, 2017, Revised Selected Papers (Communications in Computer and Information Science #654)
by Andreas Holzinger Hugo Plácido Silva Markus HelfertThis book constitutes the refereed proceedings of the First International Conference on Computer-Human Interaction Research and Applications, CHIRA 2017, held in Funchal, Madeira, Portugal, in October/November 2017.The 8 full papers presented in this book were carefully reviewed and selected from 35 submissions. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on computer-human interaction, including Interaction design, human factors, entertainment, cognition, perception, user-friendly software and systems, pervasive technologies and interactive devices.