0323~0325_新天鵝堡
0325~0326_時報全書系

英文書 > 全部商品

Conceptual Design and Analysis of Service Oriented Architecture for Command And Control of Space Assets

2025/07/31 出版

The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly reinventing established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis used to classify a set of generic C2 services. By assessing the candidate services' suitability through a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis, several C2 functionalities are shown to be more ready than others to be presented as services in the short term. Lastly, key enablers are identified, pinpointing the necessary steps for a full and complete transition from the paradigm of costly mission-unique implementations to the common, interoperable, and reusable space C2 SOA called for by DoD senior leaders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Symmetry in Nonlinear Dynamics and Chaos II

Mdpi AG 出版
2025/07/31 出版

This compilation provides a thorough review of recent advancements in nonlinear dynamical systems and chaotic behavior. The contents of this reprint are especially pertinent for graduate students and researchers in a variety of fields, including physics, chemistry, biomedicine, social sciences, economic sciences, engineering, etc.

9 特價8842
立即代訂
下次再買

Barriers to Electronic Records Management

2025/07/31 出版

Corporate and government organizations can use electronic records as an important strategic resource, if the records are managed properly. In addition to meeting legal requirements, electronic records can play a vital role in the management and operation of an organization's activities. Corporate America is facing challenges in managing electronic records, and so too is the U.S. Air Force (USAF). The deployed environment is particularly problematic for electronic records management (ERM). This research, thus, investigates ERM in the deployed environment to identify and characterize the barriers faced by USAF personnel who deployed to locations supporting Operations Enduring Freedom and Iraqi Freedom. This investigation was conducted through a qualitative approach, drawing much of its rich data from in-depth interviews. An exploratory case study was designed using a socio-technical framework and inductive analysis was used to proceed from particular facts to general conclusions. The analysis revealed 15 barriers to ERM. All 15 barriers were determined to exist throughout the entire records lifecycle and were categorized based on common overarching themes. This research reveals some unique barriers contained within the context of a deployed location, while also showing that the barriers are similar to known ERM challenges.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

If You Don't Know Where You Are Going, You Probably Will End Up Somewhere Else

2025/07/31 出版

The purpose of this research was to determine if computer network operations force presentation determination could benefit from studying examples from how functional combatant commands presented other forces and capabilities to the geographic combatant commands. Specifically, this study researched how the US Strategic Command presented space capabilities, how US Transportation Command presented logistics capabilities and how US Special Operations Command presented special operations forces. The research objective was achieved through a literature review of joint doctrine. The key topics examined in the literature review include: how do functional combatant commands interrelate with geographic combatant commands, how do combatant commands command and control cross-domain dependencies, and how do combatant commands manage cross-title relationships. The survey first looked for overarching lessons learned but determined each example (space, logistics, and special operations) necessarily used different force presentation models based upon resource allocation. This literature review of joint doctrine indicates US Strategic Command should consider implementing the following three actions in order to enact a strategy of developing organic CNO forces within each GCC. US Strategic Command should: (a) adapt the space SCA and proponent concepts. (b) use the logistics force presentation model as an intermediary step towards organic force presentation. (c) endorse a strategy of organic CNO force presentation within each GCC.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

An Update on Analyzing Differences Between Public and Private Sector Information Resource Management

2025/07/31 出版

Change is a constant within our contemporary IRM environment. The rapid development of information and communication technologies has been the most predominant among the many agents of change that are forcing a reevaluation of the role of the IRM professional. Few studies to date have compared public and private sector CIO perceptions concerning the IRM challenges and critical technologies faced by their organization. An earlier study concluded that the sectors' CIOs do perceive to be faced with many of the same challenges and also view many of the same technologies as critical to the organization's operations. A limiting factor identified in that study was the temporal separation of sector sampling. Any conclusions comparing the public and private sectors were based on survey responses separated by almost one year. The goal of this research is to validate if public and private sector senior IRM managers perceive to still be faced with the same challenges and view the same technologies as being critical to an organization's IRM requirements.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

Executable Model Development From Architectural Description With Application to the Time Sensitive Target Problem

2025/07/31 出版

As the Department of Defense (DoD) moves to a capability based approach for requirements definition and system development, it has become necessary to conceptualize and evaluate our needs at the System of System (SoS) level. Desired capabilities are often achievable only through seamless integration of many different systems. As the classical system engineering approaches are not suited to effectively handle the complexity of SoS level concepts, an architectures-driven approach has emerged as a way of defining and evaluating these new concepts. While the use of architectures for documenting and tracking interfaces and interoperability concerns is generally understood, architectural analysis and the use of executable models for evaluation of architectures remain an open area of research. With this purpose in mind, this thesis will apply architectural-based analysis to the proposed Time Sensitive Effect Operation (TSEO2012) scenario. This scenario will become the baseline for architectural analysis, and an excursion to this baseline will add a Weapon Born Battle Damage Assessment (WBBDA) capability. By creating an executable model, the two architectural concepts can be compared against each other. The addition of a WBBDA capability to the TSEO architecture improves the efficiency of the time sensitive target operations by shortening the decision cycle for target re-strike. While this effort was successful in obtaining an executable model directly from the architecture description, it highlighted the importance of having sufficient and correct information contained in the architecture products.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Edge Intelligence

Yuezhi,Zhou  著
Mdpi AG 出版
2025/07/31 出版

This reprint provides an overview of the state of edge intelligence research and practice, including innovative programming frameworks, intelligent resource orchestration, secure communication protocols, and healthcare applications. It highlights how edge intelligence can revolutionize network infrastructure, enable innovative applications, and address technical challenges facing 5G and the IoT. This reprint aims to provide opportunities for academic researchers and industry practitioners to exchange creative ideas and then inspire further innovation and foster progress in academia and industry.

9 特價5069
立即代訂
下次再買

Data Privacy and Cybersecurity in Mobile Crowdsensing

Chuan,Zhang  著
Mdpi AG 出版
2025/07/31 出版

Mobile crowdsensing (MCS) has emerged as a pivotal element in contemporary communication technology, witnessing substantial growth recently. The advent of 5G, the Internet of Things (IoT), and edge computing has propelled MCS researchers to achieve enhanced sensing efficiency and broaden its application spectrum across various domains such as environmental monitoring, traffic management, and healthcare. However, despite these advantages, MCS confronts significant security and privacy challenges due to its open and diverse nature. Critical concerns encompass data leakage, unauthorized access, data tampering, and cross-network attacks. These issues can severely compromise the stability, privacy, and security of MCS systems. Furthermore, the dynamic mobility of users and devices within MCS introduces additional complexity to conventional security measures, particularly concerning communication and cross-domain access control. To tackle these challenges, researchers have devised several strategies aimed at bolstering the security and privacy of MCS systems. These novel protection mechanisms offer distinct benefits over traditional approaches. They are capable of securing data even with constrained computational and communication resources, enhancing system flexibility, and effectively thwarting sophisticated cyberattacks. These strategies provide both theoretical and practical underpinnings for fortifying MCS security and lay a robust foundation for the field's future evolution.

9 特價8842
立即代訂
下次再買

Conceptual Design and Analysis of Service Oriented Architecture for Command And Control of Space Assets

2025/07/31 出版

The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly reinventing established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis used to classify a set of generic C2 services. By assessing the candidate services' suitability through a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis, several C2 functionalities are shown to be more ready than others to be presented as services in the short term. Lastly, key enablers are identified, pinpointing the necessary steps for a full and complete transition from the paradigm of costly mission-unique implementations to the common, interoperable, and reusable space C2 SOA called for by DoD senior leaders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

The Need for Censorship on the Internet Exists at the Air Command and Staff College

2025/07/31 出版

The researcher will survey the untilization characteristics of both faculty and students to support or refute the need for Internet censorship at ACSC. Internet censorship will be approached from the perspective of "according to Air University commander's intent". Not from a pornography or indecent perspective.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

The Need for Censorship on the Internet Exists at the Air Command and Staff College

2025/07/31 出版

The researcher will survey the untilization characteristics of both faculty and students to support or refute the need for Internet censorship at ACSC. Internet censorship will be approached from the perspective of "according to Air University commander's intent". Not from a pornography or indecent perspective.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Design principles of service-oriented architectures (SOA)

2025/07/31 出版

Motivated by problems in the healthcare system, many projects have already been working on a uniform telemedicine system. Telemedicine is seen as a source of hope and is already being used successfully in many projects and other countries. In Germany, however, there is no uniform, comprehensive solution, and expansion is stalling due to the large number of individual projects. The most promising approach is based on a TM-SOA design and the development of a telemedicine repository. However, this and other SOA projects all have in common that they provide design principles for the uniform design of technical functions, but not for person-oriented services. However, as the medical field is highly person-oriented, the next step will be to formulate uniform principles for person-oriented services in addition to uniform principles for technical functions. Within the scope of this paper, principles for the design of person-oriented services within a telemedicine SOA solution will be developed from the SOA design principles.

9 特價1881
立即代訂
下次再買

Mathematical Modeling and Data Science for Biology and Medicine

Mdpi AG 出版
2025/07/31 出版

This reprint contains all of the articles that were accepted and published in the Special Issue of Mathematics titled "Mathematical Modeling and Data Science for Biology and Medicine ". This Special Issue aims to highlight the development and growing application of mathematical models and data science in medicine, as well as their role in enhancing the understanding and clinical management of various diseases. The articles included in this Issue explore a diverse array of topics, such as cell differentiation, blood flow, tumor growth under virotherapy, chemotherapy treatment sequences for triple-negative locally advanced breast cancer, incidence-dependent management strategies against an SEIRS epidemic, important measures for the prevention and control of the COVID-19 epidemic, invadopodia formation in cancer cells, fitting parameters for multi-exponential diffusion-weighted MRI, and oncolytic virotherapy. These studies employ a variety of mathematical tools, including graph theory, transport equation, systems of ordinary differential equations, systems of nonlinear diffusion equations, free boundary problems, center manifold theory, and optimization techniques, to model a wide range of biological processes. In addition, medical applications are presented based on their mathematical analyses and numerical simulations. Through these articles, readers will gain valuable insights into the latest trends and applications of mathematical modeling in medicine.

9 特價5544
立即代訂
下次再買

Knowledge Based Operations

2025/07/31 出版

With the right knowledge at the right place at the right time, an effects based approach to the employment of airpower can truly be implemented. Sensor fusion, increased bandwidth, reach-back capability, and a common operating picture, have allowed the Combined Joint Force Air Component Commander (CJFACC) and the Combined Air Operations Center (CAOC) to be more connected with more real time information than ever. Emerging today are concepts for managing not only information, but its interrelated meaning in methods to fuel action. Knowledge Management concepts seek to act on information by creating knowledge where it can and interconnecting those who possess knowledge where it can not. Knowledge Based Operations (KBO) is the procedures, tools and organization used to implement Knowledge Management concepts. What are the implications of these concepts on the processes of a CAOC?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Telecommunications and Remote Sensing

Springer 出版
2025/07/31 出版

This book constitutes the revised selected papers of 13th International Conference on Telecommunications and Remote Sensing, ICTRS 2024, held as a virtual event, during December 19-20, 2024. The 7 full papers and one short paper included in this book were carefully reviewed and selected from 19 submissions. They focus on topics such as Wireless Telecommunications and Networking, Electromagnetic Waves and Fields, Electronics and Photonics, Remote Sensing and Data Interpretation, Remote Sensing and Internet-of-Things and Societal Impact.

9 特價3392
立即代訂
下次再買

Barriers to Electronic Records Management

2025/07/31 出版

Corporate and government organizations can use electronic records as an important strategic resource, if the records are managed properly. In addition to meeting legal requirements, electronic records can play a vital role in the management and operation of an organization's activities. Corporate America is facing challenges in managing electronic records, and so too is the U.S. Air Force (USAF). The deployed environment is particularly problematic for electronic records management (ERM). This research, thus, investigates ERM in the deployed environment to identify and characterize the barriers faced by USAF personnel who deployed to locations supporting Operations Enduring Freedom and Iraqi Freedom. This investigation was conducted through a qualitative approach, drawing much of its rich data from in-depth interviews. An exploratory case study was designed using a socio-technical framework and inductive analysis was used to proceed from particular facts to general conclusions. The analysis revealed 15 barriers to ERM. All 15 barriers were determined to exist throughout the entire records lifecycle and were categorized based on common overarching themes. This research reveals some unique barriers contained within the context of a deployed location, while also showing that the barriers are similar to known ERM challenges.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

New Advances in Algebra, Ring Theory and Homological Algebra, 2nd Edition

Mdpi AG 出版
2025/07/30 出版

The development of associative algebra during the last century has resulted in the emergence of numerous theories or specialties that have offered solutions to many of the needs of the society in which we live, increasingly developed from a technological point of view.These needs fall into two broad groups: purely technological needs and theoretical needs associated with developments in both applied algebra and other branches of mathematics. After all, it is not unreasonable to think that algebra is something like the "mathematics of mathematics".There are many branches of algebra whose contributions solve problems posed by the scientific challenges arising from the advancement of technology. Two of them also stand out for their popularity in society: cryptography and coding theory.In addition, from a theoretical point of view, the momentum that some disciplines have experienced in the last 20 years is remarkable. Thus, homological algebra has been given a big push with the emergence of the different classes of Gorenstein modules and, in recent years, in particular, the relative Gorenstein modules. Moreover, the emergence of C*-algebras has had a huge impact on many branches of mathematics and physics, and, of course, one cannot forget the very active branches of modules over non-commutative rings and derivations in algebras, with immense applications at all times.We are therefore pleased to present this Special Issue of Mathematics as a tool to share recent and compelling advancements in the branches of homological algebra, module theory, C*-algebras, coding theory, and derivations in algebras.

9 特價5544
立即代訂
下次再買

Implementation of Speech Recognition Software for Text Processing

Sean P,Abell  著
2025/07/30 出版

In recent years, information technology has advanced at an incredible pace. One new technology that has recently become available to the average computer user is speech recognition software for text processing. The rationale behind implementing such new technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text-processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number of errors generated using both methods of text input. The empirical data offer somewhat mixed results. While users initially entered text faster using speech recognition software (p greater than .05), they generated more errors and consequently performed proofreading and error corrections slower using speech. These results suggest that, in terms of accurate text processing, speech recognition software is still not a practical alternative to the keyboard. Therefore, implementation of speech recognition software is unlikely to result in any gains in productivity that would serve to justify its cost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Robustness of Multiple Clustering Algorithms on Hyperspectral Images

2025/07/30 出版

By clustering data into homogeneous groups, analysts can accurately detect anomalies within an image. This research was conducted to determine the most robust algorithm and settings for clustering hyperspectral images. Multiple images were analyzed, employing a variety of clustering algorithms under numerous conditions to include distance measurements for the algorithms and prior data reduction techniques. Various clustering algorithms were employed, including a hierarchical method, ISODATA, K-means, and X-means, and were used on a simple two dimensional dataset in order to discover potential problems with the algorithms. Subsequently, the lessons learned were applied to a subset of a hyperspectral image with known clustering, and the algorithms were scored on how well they performed as the number of outliers was increased. The best algorithm was then used to cluster each of the multiple images using every variable combination tested, and the clusters were input into two global anomaly detectors to determine and validate the most robust algorithm settings.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Mission Impact Analysis Visualization for Enhanced Situational Awareness

2025/07/30 出版

This research effort examines the creation of mission impact analysis visualizations to enhance situational awareness. It focuses on using prefuse to create a visualization that allows the user to quickly understand the impact of the failure of any element needed directly or indirectly for a mission. The visualization correctly identifies the direct or indirect impact on physical requirements such as network links and servers as well as non-physical elements such as the generation of a report, or ability to perform a task. The visualization provides an overview of the situation, as well as including enhancements to allow for greater detail on any element to be viewed. The result of this research is the foundation for a tool to allow commanders and others, at a glance, to understand the scope of mission impact when an outage occurs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

The Random Walk Path of P獺l R矇v矇sz in Probability

Mdpi AG 出版
2025/07/30 出版

P獺l R矇v矇sz was a world-renowned Hungarian probabilist and an extremely prolific mathematician, having written around 200 research papers and four books. A graduate of E繹tv繹s L籀r獺nd University, R矇v矇sz spent decades as the Head of the Probability Department of the R矇nyi Institute before heading the Department of Statistics and Probability of Vienna University of Technology. He was also a visiting professor at numerous universities across Europe and Canada. He was elected to be a member of the Hungarian Academy in 1982, and he served as the president of the Bernoulli Society of Mathematical Statistics and Probability from 1983 to 1985, as well as becoming a member of the Academy Europaea in 1991. He was beyond generous in his collaborations, always happy to talk about the problems he was working on. He listened with the same respect and curiosity whether talking to a famous professor or an eager student. He loved being able to help a new generation of mathematicians. Besides mathematics, he loved classical music, long walks, and the company of friends-but he admitted that he was still doing mathematics in his head during these concerts and long walks. In this volume, we have collected papers from his coworkers, friends, and colleagues to commemorate his life and everlasting impact on probability theory.

9 特價4896
立即代訂
下次再買

Detection of pathogenic infections in neurological disorders through recycling of gene expression data

Cuvillier 出版
2025/07/30 出版

For increasing the knowledge about small RNA an online platform was built in this thesis, homogenizing the analysis of sequencing data from over 4,000 samples collected in different laboratories worldwide from various organisms. Consequentially, tissue and disease specific biomarkers were detected and evidence was found for bacterial and viral infections of the sequenced tissues. This motivated the development of an algorithm for analyzing non-host RNA sequencing reads for detecting pathogenic abundance in the host. Focusing on neurological diseases, bacterial presence is suggested in brains of dementia patients. The platform and the algorithm can help scientists to add important leads to their own studies.

9 特價2638
立即代訂
下次再買

Dynamic Protocol Reverse Engineering

2025/07/30 出版

Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control ow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control ow of computer network protocols is comprised of mostly ad hoc approaches. We examine state-of-practice tools and techniques used in three open source projects: Pidgin, Samba, and rdesktop. We examine techniques proposed by computational learning researchers for grammatical inference. We propose to extend the state-of-art by inferring protocol control ow using grammatical inference inspired techniques to reverse engineer automata representations from captured data ows. We present evidence that grammatical inference is applicable to the problem domain under consideration.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1466
立即代訂
下次再買

Automatic Target Recognition User Interface Tool

2025/07/30 出版

A computer tool to aid in selecting the best Automatic Target Recognition (ATR) algorithm is developed. The program considers many quantifiers, accepts user-defined parameters, allows for changes in the operational environment and presents results in a meaningful way. It is written for Microsoft Excel. An ATR algorithm assigns a class label to a recognized target. General designations can include "Friend" and "Foe." The error of designating "Friend" as "Foe" as well as "Foe" as "Friend" comes with a high cost. Studying each algorithm's error can minimize this cost. Receiver Operating Characteristic (ROC) curves provide only information on the probabilities given a system state of declaring up to three class labels: "True," "False" or "Unknown." Other quantifiers, including an alternate ROC curve, are developed in this study to provide information on the probability of a system state given any of multiple declarations, which is more useful to the user. Sensitivity to prior probabilities, suggestions for user-defined parameters and areas for future research are identified as the User Interface Tool is described in detail in this thesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Information Technology and the Evolution of the Library

2025/07/30 出版

The purpose of this research is to examine the current state of the practice of information technology use among academic and research libraries in order to gain insight into the level of maturity of various emerging technologies such as the Institutional Repository (IR) to be used to provide descriptive guidance and context to other institutions considering them for application. This research uses a case study methodology involving a single case design with multiple units of analysis, and draws evidence from individual interviews of research and education libraries chosen from a range of sizes, foci, and jurisdictions.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Advances in Cancer Data and Statistics

Vesna,Zadnik  著
Mdpi AG 出版
2025/07/30 出版

Cancer registries-both population- and hospital-based-collect data on cancer patients, including diagnoses, treatments, and outcomes. These data serve not only to track the cancer burden and trends but also to evaluate the effectiveness of cancer control efforts. Beyond their traditional uses, registry data are increasingly being applied in cancer epidemiology, public health, healthcare research, and clinical practice. This broader application is driving improvements in data infrastructure, statistical methodologies, and analytical approaches. Expanding the linkages between cancer registries and non-health databases will present new opportunities to explore the risk and prognostic factors influencing cancer outcomes. This Special Issue highlights the current progress and emerging trends in cancer epidemiology, emphasizing innovative uses of cancer registry data as well as the development of new epidemiological and statistical approaches.

9 特價5544
立即代訂
下次再買

Leveraging ITIL/ITSM Into Network Operations

2025/07/30 出版

Air Force Network Operations (AFNetOps) controls the AF portion of the Global Information Grid (GIG). In order to do this efficiently, the USAF had to change the way it was operating and go away Centralized Control. Decentralized execution towards Centralized Control, Centralized Execution. This was done largely in part because the USAF was struggling in protection of critical information and the networks interconnection all of our installations. In the late 80's the United Kingdom created Information Technology Infrastructure Library (ITIL) whose purpose is to provide a practical no- nonsense framework for identifying, planning, delivering and supporting IT services for a business. Over the years, ITIL has become the defacto standard for all IT Service Management. In consolidating our Network Operations and Security Center operations, the USAF decided to take steps towards incorporating this standard. This research discovered how well ITSM was integrated into our AFNetOps posture and the collaborative efforts to standardize change management for the benefit of the Air Force. If indeed the USAF is to become another ITIL success story, it resides with the IT Service Management framework of guiding our NetOps.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Dynamic Protocol Reverse Engineering

2025/07/30 出版

Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control ow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control ow of computer network protocols is comprised of mostly ad hoc approaches. We examine state-of-practice tools and techniques used in three open source projects: Pidgin, Samba, and rdesktop. We examine techniques proposed by computational learning researchers for grammatical inference. We propose to extend the state-of-art by inferring protocol control ow using grammatical inference inspired techniques to reverse engineer automata representations from captured data ows. We present evidence that grammatical inference is applicable to the problem domain under consideration.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價869
立即代訂
下次再買

Mission Impact Analysis Visualization for Enhanced Situational Awareness

2025/07/30 出版

This research effort examines the creation of mission impact analysis visualizations to enhance situational awareness. It focuses on using prefuse to create a visualization that allows the user to quickly understand the impact of the failure of any element needed directly or indirectly for a mission. The visualization correctly identifies the direct or indirect impact on physical requirements such as network links and servers as well as non-physical elements such as the generation of a report, or ability to perform a task. The visualization provides an overview of the situation, as well as including enhancements to allow for greater detail on any element to be viewed. The result of this research is the foundation for a tool to allow commanders and others, at a glance, to understand the scope of mission impact when an outage occurs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Using Hierarchical Temporal Memory for Detecting Anomalous Network Activity

2025/07/30 出版

This research is motivated by the creation of intelligently autonomous cybercraft to reside in the intangible environment of cyberspace and maintain domain superiority. Specifically, this paper offers 7 challenges to the development of such a cybercraft. The focus is analysis of the claims Hierarchical Temporal Memory (HTM). In particular, HTM theory claims to facilitate intelligence in machines via accurate predictions. It further claims to be able to make accurate predictions of unusual worlds, like cyberspace. The primary objective is to provide evidence that HTM facilitates accurate predictions of unusual worlds. The second objective is to lend evidence that prediction is a good indication of intelligence. A commercial implementation of HTM theory is tested as an anomaly detection system and its ability to define network traffic (a major aspect of cyberspace) as benign or malicious is evaluated. Through the course of testing the performance of this implementation is poor. An independent algorithm is developed from a variant understanding of HTM theory. This alternate algorithm is independent of cyberspace and developed solely (but also in a contrived abstract world) to lend credibility to the use of prediction as a method of testing intelligence.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1466
立即代訂
下次再買

The Automatic Identification of Text During the Disassembly of Binary Machine Language

2025/07/30 出版

The goal of the research presented was to find a way to effectively identify text data and instructions in a machine language program written for Intel's 80 x 86 architecture and Microsoft's Disk Operating System (MS-DOS) following the command (.com) file format. A review of disassembler technology suggested that a pattern matching technique could be an effective technique for identifying text data in a machine language file. A series of tests were conducted to determine the effectiveness of a pattern matching technique. Results from the tests suggest that using a pattern matching technique is effective at identifying text data in a binary machine language file. The pattern matching algorithm presented in this research was eighty-six percent effective at identifying text data in fifteen test machine language files written for MS-DOS following the .com format.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Internet Protocol Geolocation

John M,Roehl  著
2025/07/30 出版

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價869
立即代訂
下次再買

Implementation of Speech Recognition Software for Text Processing

Sean P,Abell  著
2025/07/30 出版

In recent years, information technology has advanced at an incredible pace. One new technology that has recently become available to the average computer user is speech recognition software for text processing. The rationale behind implementing such new technologies is often to gain productivity improvements associated with the substitution of machinery for labor. However, the literature shows little direct evidence of a positive relationship between information technology investment and subsequent productivity benefits. This thesis reports on the examination into the productivity implications of implementing speech recognition software in a text-processing environment. More specifically, research was conducted to compare text processing speeds and error rates using speech recognition software versus the keyboard and mouse. Of interest was the time required to input and proofread text processing tasks as well as the number of errors generated using both methods of text input. The empirical data offer somewhat mixed results. While users initially entered text faster using speech recognition software (p greater than .05), they generated more errors and consequently performed proofreading and error corrections slower using speech. These results suggest that, in terms of accurate text processing, speech recognition software is still not a practical alternative to the keyboard. Therefore, implementation of speech recognition software is unlikely to result in any gains in productivity that would serve to justify its cost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

The de Gruyter Handbook on Law and Digital Technologies

de Gruyter 出版
2025/07/29 出版

The De Gruyter Handbook on Law and Digital Technologies provides a comprehensive, accessible and thought-provoking guide to the current and future regulation of digital technologies. It addresses key legal challenges such as reconceptualizing crucial, deep-rooted notions, including those of person, autonomy, democracy, the rule of law, sovereignty, constitutionalism and governance. The handbook proposes critical explorations of the potential impact of digital technologies on new and traditional forms of governance and regulation across different and competitive normative perspectives such as law, economy, social norms and legal design. In this framework, it addresses the societal transformations brought about by digital technologies, the legal means for regulating the field, and the impact of governance in areas such as fintech, sustainability, outer space, or healthcare.

9 特價9057
立即代訂
下次再買

Enhancing Aspect-Oriented Software Metrics

K R,Martin  著
Scholars' Press 出版
2025/07/28 出版

Software development is a complex process that requires precise measurement techniques to assess quality, maintainability, and efficiency. Traditional object-oriented programming (OOP) metrics, while useful, struggle to fully capture the crosscutting concerns in modern software systems. Aspect-Oriented Programming (AOP) addresses these limitations by modularizing crosscutting concerns (e.g., logging, security, transactions) into reusable aspects. However, measuring the complexity and maintainability of AOP systems remains challenging.This research focuses on empirically validating coupling metrics in AOP, introducing cognitive-weighted versions of existing metrics to better reflect human comprehension effort. The study also employs fuzzy logic to assess overall complexity, providing a more nuanced evaluation of aspect-oriented software.This research aims to: - Enhance existing AOP metrics by incorporating cognitive weights. - Empirically validate these metrics through controlled experiments. - Use fuzzy logic to compute an aggregated complexity score.

9 特價3534
立即代訂
下次再買

Cloud Application Security Essentials with Azure

Rouskov,Y R  著
2025/07/28 出版

Modern application development is deeply intertwined with cloud computing, making robust application security an absolute imperative for every professional. As applications increasingly leverage cloud components and services like Azure, understanding the security implications for both your app architecture and its underlying platform is critical to prevent breaches and ensure system integrity. This book starts by defining modern app security, outlining crucial security assertions and security metrics for cloud environments. It then dives into different clouds, including private vs. public cloud models and their impact on app security requirements, highlighting Azure examples and confidential computing. You will explore fundamental blockchain concepts and their relevance, then master app identity, app keys, and delegation concepts. This book aims to define metrics to help evaluate the application security level and establish security as a feature of the application.Upon completing this book, you will possess a strong foundational and practical understanding of how to secure modern applications across diverse cloud landscapes. You will be well-prepared to design, implement, and maintain secure applications, effectively mitigating risks and contributing confidently to your organization's cloud security posture, and evaluate it in other cases.WHAT YOU WILL LEARN● Explore common concepts related to security - using private clouds, encryption, authorization, etc. ● Define modern app security assertions, architecture, and cloud metrics.● Implement cloud app identity, app keys, and delegation securely.● Integrate app architectures, cloud services, and blockchain for security● Apply robust data encryption, Azure support, and secure key access.● Understand app monetization, blockchain economics, and security implications.WHO THIS BOOK IS FORThis book is ideal for application developers, owners, consumers, store owners, and cloud architects who want to learn about application security in cloud environments. It aims to equip these professionals with the knowledge to estimate and enhance an application's security level.

9 特價1833
立即代訂
下次再買

Management Information Systems in a Digitalized AI World

Eric,Tsui  著
Springer 出版
2025/07/27 出版
9 特價10439
貨到通知
下次再買

The Human Use of Human Beings

2025/07/27 出版

For the 75th anniversary, a new edition of The Human Use of Human Beings--the landmark book that delves into the relationship between humans and computers, and presciently anticipates many contemporary dilemmas surrounding AI technology. With a new introduction by Brian Christian, author of the bestselling Algorithms to Live By and The Alignment Problem.In 1950, mathematician-philosopher Norbert Wiener ended this classic book on the place of machines in society with a warning: "We shall never receive the right answers to our questions unless we ask the right questions.... The hour is very late, and the choice of good and evil knocks at our door."Wiener, the founder of the science of cybernetics--the study of the relationship between computers and the human nervous system--was widely mislabeled as an advocate for the automation of human life. As The Human Use for Human Beings reveals, his vision was much more complex and interesting, and is more relevant in today's world of AI than anyone could have anticipated.In his new introduction, Brian Christian aptly calls Wiener the "progenitor of contemporary AI-safety discourse." Wiener hoped that machines would release people from relentless and repetitive drudgery to achieve more creative pursuits, yet he anticipated the danger of dehumanizing and displacement. His pioneering views on the human-machine relationship as a "communicative process" are only more crucial now, as we carry in our pockets AI devices that we can literally speak to. His prescient warnings illuminate our contemporary relationships with language, art, and even social media.The Human Use of Human Beings examines the implications of cybernetics for education, law, language, science, technology, as Wiener anticipates the enormous impact--in effect, a third industrial revolution--that the computer has had on our lives.

9 特價649
立即代訂
下次再買

Bioinformatics and Computational Biology

Springer 出版
2025/07/25 出版

This book constitutes the refereed proceedings of the 17th International Conference on Bioinformatics and Computational Biology, BICOB 2025, held in San Francisco, CA, USA, on March 17, 2025.The 18 full papers presented in this book were carefully reviewed and selected from 38 submissions.The papers cover a wide range of bioinformatics and computational biology topics, including bioinformatics algorithms, genomics, machine learning applications in bioinformatics, and medical informatics.

9 特價6785
立即代訂
下次再買

Future-Proof

Cigdem,Kemi  著
Tredition Gmbh 出版
2025/07/25 出版

Mastering Career Adaptabilities, self improvement, mindset, workplace behavoir, seeing opportunities in the technological changes, teaching and guidance

9 特價1427
立即代訂
下次再買

Future-Proof

Cigdem,Kemi  著
Tredition Gmbh 出版
2025/07/25 出版

Mastering Career Adaptabilities, self improvement, mindset, workplace behavoir, seeing opportunities in the technological changes, teaching and guidance

9 特價988
立即代訂
下次再買

Advances in Computational Mathematics and Applied Mathematics

Tao,Liu  著
Mdpi AG 出版
2025/07/25 出版

The reprint contains 16 articles that have been published in the Special Issue "Advances in Computational Mathematics and Applied Mathematics". They cover a wide range of topics in the closely related fields of computational mathematics and applied mathematics, with keywords including nonlinear Schr繹dinger equations, Klein-Gordon equations, impulsive neutral differential equations, Kepler's equation, parabolic heat equations, nonlinear monotone equations, fractional differential equations, elliptic curves, inverse and ill-posed problems, the impulsive Runge-Kutta method, the Steffensen-type method without memory, reinforcement learning, the constrained Markov decision process, time series, financial mathematics, biomathematics, etc. Most research in the field of computational mathematics focuses on numerical analysis and scientific calculation methods, such as interpolation and approximation, numerical methods of differential equations, numerical integration, matrix computation, and linear equation systems. In applied mathematics, most research focuses on its practical applications in various fields, such as physics, engineering, finance, biology, and medicine. We hope that this reprint will be interesting and useful for those working in the areas of computational mathematics, applied mathematics, and artificial intelligence, in addition to those who have a mathematical background and want to become more familiar with recent advances in computational mathematics and applied mathematics, which have been widely applied in many fields of science and engineering.

9 特價6840
立即代訂
下次再買

Fundamentals of Server Administration

2025/07/25 出版

As companies are increasingly moving IT resources to the cloud with technologies such as Amazon AWS and Microsoft Azure, there is an emerging knowledge gap for network administrators who still must deploy and manage on-site servers. Fundamentals of Server Administration provides both students and professionals with the knowledge and skills needed to administer servers in both on-premise and cloud-based environments. It covers topics and concepts for Windows and Linux server environments and includes graphical, as well as console-based administration activities. Fundamentals of Server Administration aligns to the CompTIA Server+ (SKO-005) certification as well as the CompTIA Network Infrastructure Professional stackable certification for those students who also obtain the Network+ certification. It is an invaluable tool for both students and professionals seeking the essential skills needed to meet today's rising demand for a highly skilled IT workforce.A clear focus on best practices for both on-premise and cloud-based deploymentsProvides a vendor-agnostic approach that addresses core server administration concepts for both Windows and Linux server environmentsCovers graphical as well as console-based server administration (i.e., PowerShell and Bash) activitiesServes as the first step in preparing students for the CompTIA Server+ certification examAvailable with Cybersecurity Cloud Labs, providing immersive mock IT infrastructures where students can practice and learn foundational skills

9 特價5478
貨到通知
下次再買

Pipe Flow

Mdpi AG 出版
2025/07/24 出版

This Special Issue presents cutting-edge research and practical advancements in pipe flow, covering both fundamental fluid dynamics and real-world engineering applications. With contributions from leading experts, this issue explores topics such as turbulence modeling, multiphase flow, pressure loss and pipeline design optimization. It is a valuable resource for researchers, engineers and professionals in fluid mechanics, mechanical engineering and related fields.

9 特價6193
立即代訂
下次再買

Computer Analysis of Diagnostic and Therapeutic Strategies

2025/07/24 出版

Computer Analysis of Diagnostic and Therapeutic Strategies explores the application of computer science to medical decision-making. Published in 1969, this work provides early insights into the potential of computers to aid in the analysis of complex medical problems. It discusses techniques for using computers to evaluate diagnostic procedures and therapeutic options. Authored by George Anthony Gorry, a pioneer in medical informatics, this book offers a valuable historical perspective on the intersection of computer science and medicine. While the specific technologies discussed may be outdated, the underlying principles remain relevant to contemporary efforts to improve healthcare through the use of data and algorithms. This book is a must-read for anyone interested in the history of medical informatics and the evolving role of computers in healthcare.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價639
立即代訂
下次再買

Trade-offs Between Depth and Width in Parallel Computation

U,Vishkin  著
2025/07/24 出版

This work explores the trade-offs between depth and width in parallel computation. It delves into the fundamental limitations and possibilities when designing parallel algorithms, examining how the degree of parallelism (width) relates to the computational time (depth). The study is highly relevant to theoretical computer science and provides insights applicable to algorithm design and analysis. It presents a rigorous examination of computational complexity within parallel systems, offering a valuable resource for researchers and practitioners interested in optimizing parallel performance.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Compilation Techniques for VLIW Architectures

2025/07/24 出版

"Compilation Techniques for VLIW Architectures" explores the intricate methods of optimizing code for Very Long Instruction Word (VLIW) processors. This technical study delves into the specific challenges and solutions encountered when translating high-level programming languages into efficient machine code for parallel execution on VLIW platforms.Ideal for computer scientists, compiler designers, and those interested in advanced computer architecture, this work provides insights into maximizing the performance of VLIW processors through sophisticated compilation strategies. It offers a valuable resource for understanding the principles behind parallel processing and compiler optimization.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Planning and Coding of Problems for an Electronic Computing Instrument ... Report on the Mathematical and Logical Aspects of an Electronic Computing Instrument, Part II

2025/07/24 出版

Planning and Coding of Problems for an Electronic Computing Instrument is a foundational document in the history of computer science. This report, stemming from the Electronic Computer Project at the Institute for Advanced Study in Princeton, details the mathematical and logical underpinnings of early electronic computing. A vital resource for understanding the conceptual groundwork of modern computing, it offers insights into the challenges and innovations of the pioneers in the field.Part II of the report delves into the specifics of problem-solving and coding for these novel machines. This historical document is invaluable for researchers, historians of science, and anyone interested in the intellectual origins of the digital age. It captures a pivotal moment when mathematics, logic, and engineering converged to create the first electronic computers.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價869
立即代訂
下次再買
頁數4/81
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing