- Table View
- List View
Introduction to the Smart Court System-of-Systems Engineering Project of China
by Jianfeng Xu Fuhui Sun Qiwei ChenThis book discusses the overall development and use of smart courts from the perspective of system-of-systems engineering (SoSE) and its methodology, analyzes the relationships between the components, structures, environments, and functions of various systems, and illustrates the basic approaches to system design, specification, integration, operation and management. As the general introductory book of the China Smart Court Development Series, this book provides an overview of the development of Chinese people's courts in the application of information technology over the past two decades and outlines the key areas of exploration in the Smart Court SoSe project centered on the development practices during the 13th Five-Year Plan period. It also forecasts the future development and evolution of the smart court information system. The key topics introduced in the book, including the overall design of complex information systems, integrated interconnection networks-based system integration, judicial big data quality control and analytics services, various types of AI-enabled judicial services, quality and efficiency-oriented operation and maintenance services for large-scale information systems, etc., all came from the basic research of information science and theories, as well as the systems engineering practices of the Smart Court SoSe project. They not only reflect the latest findings on systems engineering and architecture methods in China and overseas, but also reveal many innovative approaches to SoSE methods and paradigms, which can be used for the design and continued development of smart courts at a new and higher starting point. It is believed that they can also serve as good examples and reference points for the development in IT application and complex information systems engineering in other sectors.
Introduction to the Theory of Computation (Third Edition)
by Michael SipserReaders embark on the study of a fascinating and important subject: the theory of computation. It comprises the fundamental mathematical properties of computer hardware, software, and certain applications thereof. This book is intended as an upper-level undergraduate or introductory graduate text in computer science theory. It contains a mathematical treatment of the subject, designed around theorems and proofs.
Introduction to the Theory of Programming Languages
by Jean-Jacques Lévy Gilles DowekThe design and implementation of programming languages, from Fortran and Cobol to Caml and Java, has been one of the key developments in the management of ever more complex computerized systems. Introduction to the Theory of Programming Languages gives the reader the means to discover the tools to think, design, and implement these languages. It proposes a unified vision of the different formalisms that permit definition of a programming language: small steps operational semantics, big steps operational semantics, and denotational semantics, emphasising that all seek to define a relation between three objects: a program, an input value, and an output value. These formalisms are illustrated by presenting the semantics of some typical features of programming languages: functions, recursivity, assignments, records, objects, ... showing that the study of programming languages does not consist of studying languages one after another, but is organized around the features that are present in these various languages. The study of these features leads to the development of evaluators, interpreters and compilers, and also type inference algorithms, for small languages.
Introduction to the Theory of Quantum Information Processing
by Mark Hillery János A. BergouIntroduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.
Introduction to the Theory of Radiopolarimetric Navigation Systems (Springer Aerospace Technology)
by Shatrakov Y.G. Zavalishin O.I. Kozlov A.I. Logvin A.I. Sarychev V.A.The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties.The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.
Introductory Applied Statistics: With Resampling Methods & R
by Bruce BlaineThis book offers an introduction to applied statistics through data analysis, integrating statistical computing methods. It covers robust and non-robust descriptive statistics used in each of four bivariate statistical models that are commonly used in research: ANOVA, proportions, regression, and logistic. The text teaches statistical inference principles using resampling methods (such as randomization and bootstrapping), covering methods for hypothesis testing and parameter estimation. These methods are applied to each statistical model introduced in preceding chapters.Data analytic examples are used to teach statistical concepts throughout, and students are introduced to the R packages and functions required for basic data analysis in each of the four models. The text also includes introductory guidance to the fundamentals of data wrangling, as well as examples of write-ups so that students can learn how to communicate findings. Each chapter includes problems for practice or assessment. Supplemental instructional videos are also available as an additional aid to instructors, or as a general resource to students. This book is intended for an introductory or basic statistics course with an applied focus, or an introductory analytics course, at the undergraduate level in a two-year or four-year institution. This can be used for students with a variety of disciplinary backgrounds, from business, to the social sciences, to medicine. No sophisticated mathematical background is required.
Introductory Circuit Analysis
by Robert L. BoylestadFor courses in DC/AC circuits: conventional flow The Latest Insights in Circuit Analysis Introductory Circuit Analysis, the number one acclaimed text in the field for over three decades, is a clear and interesting information source on a complex topic. The Thirteenth Edition contains updated insights on the highly technical subject, providing readers with the most current information in circuit analysis. With updated software components and challenging review questions at the end of each chapter, this text engages readers in a profound understanding of Circuit Analysis.
Introductory Circuit Theory
by D. SundararajanThis textbook for a one-semester course in Electrical Circuit Theory is written to be concise, understandable, and applicable. Matlab is used throughout, for coding the programs and simulation of the circuits. Every new concept is illustrated with numerous examples and figures, in order to facilitate learning. The simple and clear style of presentation, along with comprehensive coverage, enables students to gain a solid foundation in the subject, along with the ability to apply techniques to real circuit analysis. Written to be accessible to students of varying backgrounds, this textbook presents the analysis of realistic, working circuitsPresents concepts in a clear, concise and comprehensive manner, such as the difficult problem of setting up the equilibrium equations of circuits using a systematic approach in a few distinct stepsIncludes worked examples of functioning circuits, throughout every chapter, with an emphasis on real applicationsIncludes numerous exercises at the end of each chapter Provides program scripts and circuit simulations, using the popular and widely used Matlab software, as supplementary material online
Introductory Computer Forensics: A Hands-on Practical Approach
by Xiaodong LinThis textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book’s 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students’ understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.
Introductory Programs with the 32-bit PIC Microcontroller: A Line-by-Line Code Analysis and Reference Guide for Embedded Programming in C
by Hubert WardEmbark on a journey into the world of embedded programming. This book introduces you to the 32bit PIC and will teach you how the main functions of C programming work and can be used with a PIC micro.A one-stop reference for the would-be embedded programmer, you'll explore the electronics needed for a variety of programs as well as how to use different devices with the PIC. The book starts with downloading the environment and creating a simple project, one that uses different oscillators, Phase Lock Loop, and circuitry needed to create the different system clocks—an easy entry point to this exciting environment. You'll also review the MPLABX integrated development environment (IDE) and see how to program the 32Bit PIC, which can be adapted to different PICs. Throughout subsequent chapters, you’ll learn how to use a range of programs that use PIC modules such as the SPI, I2C, UART communication modules, the ADC module, the Capture, Compare, and Pulse Width Modulation module, and the RTCC, Real Time Clock and Calendar Module. What You'll Learn Create a project in MPLABX Configure the different clock frequencies that are used in the 32bit PICBuild a variable delay subroutine to be used in a simple traffic lights programUse the MAX 7219 driver IC to control the 8by8 matrix displayProgram an I2C expander module to control the display on a LCD Who This Book Is For Readers who want to try their hand at embedded programming, newcomers to programming the PIC 32, programmers who want to look into using MPLAB Harmony 3, and programmers who want to understand how C instructions work with respect to 32bit PIC. Also students who are studying for an engineering qualification.
Introductory Relational Database Design for Business, with Microsoft Access
by Jonathan Eckstein Bonnie R. SchultzA hands-on beginner’s guide to designing relational databases and managing data using Microsoft Access Relational databases represent one of the most enduring and pervasive forms of information technology. Yet most texts covering relational database design assume an extensive, sophisticated computer science background. There are texts on relational database software tools like Microsoft Access that assume less background, but they focus primarily on details of the user interface, with inadequate coverage of the underlying design issues of how to structure databases. Growing out of Professor Jonathan Eckstein’s twenty years’ experience teaching courses on management information systems (MIS) at Rutgers Business School, this book fills this gap in the literature by providing a rigorous introduction to relational databases for readers without prior computer science or programming experience. Relational Database Design for Business, with Microsoft Access helps readers to quickly develop a thorough, practical understanding of relational database design. It takes a step-by-step, real-world approach, using application examples from business and finance every step the way. As a result, readers learn to think concretely about database design and how to address issues that commonly arise when developing and manipulating relational databases. By the time they finish the final chapter, students will have the knowledge and skills needed to build relational databases with dozens of tables. They will also be able to build complete Microsoft Access applications around such databases. This text: Takes a hands-on approach using numerous real-world examples drawn from the worlds of business, finance, and more Gets readers up and running, fast, with the skills they need to use and develop relational databases with Microsoft Access Moves swiftly from conceptual fundamentals to advanced design techniques Leads readers step-by-step through data management and design, relational database theory, multiple tables and the possible relationships between them, Microsoft Access features such as forms and navigation, formulating queries in SQL, and normalization Introductory Relational Database Design for Business, with Microsoft Access is the definitive guide for undergraduate and graduate students in business, finance, and data analysis without prior experience in database design. While Microsoft Access is its primary “hands-on” learning vehicle, most of the skills in this text are transferrable to other relational database software such as MySQL.
Introductory Statistics with R, (Statistics and Computing Series)
by Peter DalgaardThe statistical methodology covered includes statistical standard distributions, one- and two-sample tests with continuous data, regression analysis, one-and two-way analysis of variance, regression analysis, analysis of tabular data, and sample size calculations. In addition, the last four chapters contain introductions to multiple linear regression analysis, linear models in general, logistic regression, and survival analysis.
Introductory Technology in Action
by Alan Evans Kendall Martin Mary Anne PoatsyThe authors have adopted a practical and proven approach based on their vast experience, to make students focus on tasks that can be accomplished with their computing devices rather than loading them with history of devices. They emphasize on how these tasks can be applied immediately in the workplace, the classroom, and at home, making it a interesting read.
Intrusion Detection Networks: A Key to Collaborative Security
by Raouf Boutaba Carol FungThe rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy.Intrusion Detect
Intrusion Detection and Prevention for Mobile Ecosystems (Series in Security, Privacy and Trust)
by Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias and Dimitrios DamopoulosThis book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.
Intrusion Detection in Wireless Ad-Hoc Networks
by Nabendu Chaki Rituparna ChakiPresenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc
Intrusion Detection: A Data Mining Approach (Cognitive Intelligence and Robotics)
by Jaya Sil Nandita SenguptaThis book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
Intuit QuickBooks Enterprise Edition 12.0 Cookbook for Experts
by Jaime CampbellQuickBooks Enterprise Edition 12.0 Cookbook for Experts is written in a non-sequential, modular way which enables the reader to select any relevant and valuable technique and learn it. Each recipe in the cookbook includes illustrations to make the most difficult techniques straightforward. Furthermore, the expert reader's time is not wasted on any basic language and steps. This book is written for CPAs, consultants, CFOs, controllers, managers, or bookkeepers with extensive experience with QuickBooks. Prior experience with the Enterprise Edition, however, is not required. You should have a thorough understanding of accounting procedures and a mastery of the basics of the QuickBooks environment.
Intuition, Trust, and Analytics (Data Analytics Applications)
by Jerzy Gołuchowski Joanna Paliszkiewicz Jay LiebowitzIn order to make informed decisions, there are three important elements: intuition, trust, and analytics. Intuition is based on experiential learning and recent research has shown that those who rely on their “gut feelings” may do better than those who don’t. Analytics, however, are important in a data-driven environment to also inform decision making. The third element, trust, is critical for knowledge sharing to take place. These three elements—intuition, analytics, and trust—make a perfect combination for decision making. This book gathers leading researchers who explore the role of these three elements in the process of decision-making.
Intuitionistic Fuzziness and Other Intelligent Theories and Their Applications (Studies in Computational Intelligence #757)
by M Hadjiski K T AtanassovThis book gathers extended versions of the best papers presented at the 8th IEEE conference on Intelligent Systems, held in Sofia, Bulgaria on September 4–6, 2016, which are mainly related to theoretical research in the area of intelligent systems. The main focus is on novel developments in fuzzy and intuitionistic fuzzy sets, the mathematical modelling tool of generalized nets and the newly defined method of intercriteria analysis. The papers reflect a broad and diverse team of authors, including many young researchers from Australia, Bulgaria, China, the Czech Republic, Iran, Mexico, Poland, Portugal, Slovakia, South Korea and the UK.
Intuitionistic and Type-2 Fuzzy Logic Enhancements in Neural and Optimization Algorithms: Theory and Applications (Studies in Computational Intelligence #862)
by Oscar Castillo Patricia Melin Janusz KacprzykThis book describes the latest advances in fuzzy logic, neural networks, and optimization algorithms, as well as their hybrid intelligent combinations, and their applications in the areas such as intelligent control, robotics, pattern recognition, medical diagnosis, time series prediction, and optimization. The topic is highly relevant as most current intelligent systems and devices use some form of intelligent feature to enhance their performance. The book also presents new and advanced models and algorithms of type-2 fuzzy logic and intuitionistic fuzzy systems, which are of great interest to researchers in these areas. Further, it proposes novel, nature-inspired optimization algorithms and innovative neural models. Featuring contributions on theoretical aspects as well as applications, the book appeals to a wide audience.
Intuitive Interaction: Research and Application
by Alethea BlacklerThis book explores recent research in intuitive interaction worldwide by a range of leading academics and practitioners in the field. It builds on past work as it ventures into new areas, such as how users perceive intuitiveness of an interface, how people experience intuitive interaction subjectively, and how we can use such understanding to design more engaging experiences. The book addresses how intuitive interaction is understood in different academic disciplines and how it has been researched in various parts of the world over the last 18 years. It covers how intuitive interaction can be applied in different contexts, like large scale urban installations, the developing world, in older populations, and in various industry applications. <P><P>Features: <li>Presents varied approaches to intuitive interaction research and application <li>Illustrates how to understand and apply intuitive interaction to interfaces <li>Provides a mix of academic and industry perspectives <li>Explores a variety of contexts for application of intuitive interaction <li>Encompasses design, IT, business, and psychological approaches
Intuitive Understanding of Kalman Filtering with MATLAB®
by Francisco R. Ortega Armando Barreto Malek Adjouadi Nonnarit O-larnnithipongThe emergence of affordable micro sensors, such as MEMS Inertial Measurement Systems, are applied in embedded systems and Internet-of-Things devices. This has brought techniques such as Kalman Filtering, which are capable of combining information from multiple sensors or sources, to the interest of students and hobbyists. This book will explore the necessary background concepts, helping a much wider audience of readers develop an understanding and intuition that will enable them to follow the explanation for the Kalman Filtering algorithm. Key Features: Provides intuitive understanding of Kalman Filtering approach Succinct overview of concepts to enhance accessibility and appeal to a wide audience Interactive learning techniques with code examples Malek Adjouadi, PhD, is Ware Professor with the Department of Electrical and Computer Engineering at Florida International University, Miami. He received his PhD from the Electrical Engineering Department at the University of Florida, Gainesville. He is the Founding Director of the Center for Advanced Technology and Education funded by the National Science Foundation. His earlier work on computer vision to help persons with blindness led to his testimony to the U.S. Senate on the committee of Veterans Affairs on the subject of technology to help persons with disabilities. His research interests are in imaging, signal processing and machine learning, with applications in brain research and assistive technology. Armando Barreto, PhD, is Professor of the Electrical and Computer Engineering Department at Florida International University, Miami, as well as the Director of FIU’s Digital Signal Processing Laboratory, with more than 25 years of experience teaching DSP to undergraduate and graduate students. He earned his PhD in electrical engineering from the University of Florida, Gainesville. His work has focused on applying DSP techniques to the facilitation of human-computer interactions, particularly for the benefit of individuals with disabilities. He has developed human-computer interfaces based on the processing of signals and has developed a system that adds spatialized sounds to the icons in a computer interface to facilitate access by individuals with "low vision." With his research team, he has explored the use of Magnetic, Angular-Rate and Gravity (MARG) sensor modules and Inertial Measurement Units (IMUs) for human-computer interaction applications. He is a senior member of the Institute of Electrical and Electronics Engineers (IEEE) and the Association for Computing Machinery (ACM). Francisco R. Ortega, PhD, is an Assistant Professor at Colorado State University and Director of the Natural User Interaction Lab (NUILAB). Dr. Ortega earned his PhD in Computer Science (CS) in the field of Human-Computer Interaction (HCI) and 3D User Interfaces (3DUI) from Florida International University (FIU). He also held a position of Post-Doc and Visiting Assistant Professor at FIU. His main research area focuses on improving user interaction in 3DUI by (a) eliciting (hand and full-body) gesture and multimodal interactions, (b) developing techniques for multimodal interaction, and (c) developing interactive multimodal recognition systems. His secondary research aims to discover how to increase interest for CS in non-CS entry-level college students via virtual and augmented reality games. His research has resulted in multiple peer-reviewed publications in venues such as ACM ISS, ACM SUI, and IEEE 3DUI, among others. He is the first-author of the CRC Press book Interaction Design for 3D User Interfaces: The World of Modern Input Devices for Research, Applications and Game Development. Nonnarit O-larnnithipong, PhD, is an Instructor at Florida International University. Dr. O-larnnithipong earned his PhD in Electrical Engineering, majoring in Digital Signal Processing from Florida International Unive
Invariants of Behavior
by Mario NegrelloThe study of the brain and behavior is illuminated with the discovery of invariances. Experimental brain research uncovers constancies amidst variation, with respect to interventions and transformations prescribed by experimental paradigms. Place cells, mirror neurons, event related potentials and areas differentially active in fMRI, all illustrate the pervasive role of invariances in neural systems in relation to their function.
Invasive Tightly Coupled Processor Arrays
by Vahid LariThis book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. For the first time, such a configurable processor array architecture consisting of locally interconnected VLIW processing elements can be claimed by programs, either in full or in part, using the principle of invasive computing. Invasive TCPAs provide unprecedented energy efficiency for the parallel execution of nested loop programs by avoiding any global memory access such as GPUs and may even support loops with complex dependencies such as loop-carried dependencies that are not amenable to parallel execution on GPUs. For this purpose, the book proposes different invasion strategies for claiming a desired number of processing elements (PEs) or region within a TCPA exclusively for an application according to performance requirements. It not only presents models for implementing invasion strategies in hardware, but also proposes two distinct design flavors for dedicated hardware components to support invasion control on TCPAs.