Filter
(found 444 products)
Book cover image
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected ...
Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan
Smart Science, Design & Technology represents the proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), which was held in Fukuoka, Japan, April 12-18, 2019. The conference received more than 300 submitted papers from at least 20 different countries, whereby one third of these papers was selected by the committees and invited to present at ICASI 2019. The resulting book aims to provide an integrated communication platform for researchers active in a wide range of fields including information technology, communication science, applied mathematics, computer science, advanced material science, and engineering. Major breakthroughs are being made by interdisciplinary collaborations between science and engineering technologists in academia and industry within this unique international network. Smart Science has emerged as a separate discipline, involving innovative practices, methodologies and processes.
https://magrudy-assets.storage.googleapis.com/9780367178673.jpg
210.000000 USD

Smart Science, Design & Technology: Proceedings of the 5th International Conference on Applied System Innovation (ICASI 2019), April 12-18, 2019, Fukuoka, Japan

Hardback
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery ...
Hybrid Computational Intelligence: Research and Applications
Hybrid computational intelligent techniques are efficient in dealing with the real-world problems encountered in engineering fields. The primary objective of this book is to provide an exhaustive introduction as well as review of the hybrid computational intelligent paradigm, with supportive case studies. In addition, it aims to provide a gallery of engineering applications where this computing paradigm can be effectively use. Finally, it focuses on the recent quantum inspired hybrid intelligence to develop intelligent solutions for the future. The book also incorporates video demonstrations of each application for better understanding of the subject matter.
https://magrudy-assets.storage.googleapis.com/9781138320253.jpg
260.36 USD

Hybrid Computational Intelligence: Research and Applications

Hardback
Book cover image
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to ...
Intelligent Technologies for Web Applications
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to focus on providing vital fundamental and advanced guidance in the area of Web intelligence for beginners and researchers. The book covers techniques from diverse areas of research, including: Natural language processing Information extraction, retrieval, and filtering Knowledge representation and management Machine learning Databases Data, web, and text mining Human-computer interaction Semantic web technologies To develop effective and intelligent web applications and services, it is critical to discover useful knowledge through analyzing large amounts of content, hidden content structures, or usage patterns of web data resources. Intended to improve and reinforce problem-solving methods in this area, this book delves into the hybridization of artificial intelligence (AI) and web technologies to help simplify complex Web operations. It introduces readers to the state-of-the art development of web intelligence techniques and teaches how to apply these techniques to develop the next generation of intelligent Web applications. The book lays out presented projects, case studies, and innovative ideas, which readers can explore independently as standalone research projects. This material facilitates experimentation with the book's content by including fundamental tools, research directions, practice questions, and additional reading.
https://magrudy-assets.storage.googleapis.com/9780367381363.jpg
78.700000 USD

Intelligent Technologies for Web Applications

by Rajendra Akerkar, Priti Srinivas Sajja
Paperback / softback
Book cover image
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to ...
Project Management Tools and Techniques for Success
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.
https://magrudy-assets.storage.googleapis.com/9780367384036.jpg
78.700000 USD
Paperback / softback
Book cover image
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Placing a software system into a production environment is elegantly simplified and sped up with the use of MSA development platforms, runtime environments, acceleration engines, design ...
Essentials of Microservices Architecture: Paradigms, Applications, and Techniques
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner. Placing a software system into a production environment is elegantly simplified and sped up with the use of MSA development platforms, runtime environments, acceleration engines, design patterns, integrated frameworks, and related tools. The MSA ecosystem is expanding with third-party products that automate as many tasks as possible. MSA is being positioned as the enterprise-grade and agile-application design method. This book covers in-depth the features and facilities that make up the MSA ecosystem. Beginning with an overview of Service-Oriented Architecture (SOA) that covers the Common Object Request Broker Architecture (CORBA), Distributed Component Object Model (DCOM), and Remote Method Invocation (RMI), the book explains the basic essentials of MSA and the continuous delivery of applications to customers. The book gives software developers insight into: Current and emerging communication models Key architectural elements of MSA-based applications Designing efficient APIs for microservices MSA middleware platforms such as REST, SOAP, Apache Thrift, and gRPC Microservice discovery and the API gateway Service orchestration and choreography for composing individual services to achieve a useful business process Database transactions in MSA-centric applications Design, composition, security, and deployment patterns MSA security Modernizing legacy applications The book concludes with a chapter on composing and building powerful microservices. With the exponential growth of IoT devices, microservices are being developed and deployed on resource-constrained but resource-intensive devices in order to provide people-centric applications. The book discusses the challenges of these applications. Finally, the book looks at the role of microservices in smart environments and upcoming trends including ubiquitous yet disappearing microservices.
https://magrudy-assets.storage.googleapis.com/9780367249953.jpg
107.85 USD

Essentials of Microservices Architecture: Paradigms, Applications, and Techniques

by Raj Pethuru, Gopinath Ganapathy, Chellammal Surianarayanan
Hardback
Book cover image
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social ...
Cyber-Enabled Intelligence
The book provides an advanced vision and trends of computational intelligence in cyberspace and cyber-enabled spaces. It reviews architectures and models, as well as state-of-the-art computational and interpretation capabilities for social, industrial, and multimedia applications. Cyber-enabled intelligence involves the design and development of intelligent and innovative application scenarios in social networks, computer vision, multimedia, and image processing. Application scenarios can also cover the applicability of intelligent sensing, data collection and predictive analysis in Internet of Things.
https://magrudy-assets.storage.googleapis.com/9780367184872.jpg
178.53 USD

Cyber-Enabled Intelligence

Hardback
Book cover image
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, ...
The Cloud in IoT-enabled Spaces
The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era, scheduling and routing, medium access, data caching, secure access, uncertainty, home automation, machine learning in wearable devices, energy monitoring, and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas.
https://magrudy-assets.storage.googleapis.com/9780367278144.jpg
178.53 USD

The Cloud in IoT-enabled Spaces

by Fadi Al-Turjman
Hardback
Book cover image
The field of artificial intelligence (AI) has grown dramatically in recent decades from niche expert systems to the current myriad of deep machine learning applications that include personal assistants, natural-language interfaces, and medical, financial, and traffic management systems. This boom in AI engineering masks the fact that all current AI ...
AI and Human Thought and Emotion
The field of artificial intelligence (AI) has grown dramatically in recent decades from niche expert systems to the current myriad of deep machine learning applications that include personal assistants, natural-language interfaces, and medical, financial, and traffic management systems. This boom in AI engineering masks the fact that all current AI systems are based on two fundamental ideas: mathematics (logic and statistics, from the 19th century), and a grossly simplified understanding of biology (mainly neurons, as understood in 1943). This book explores other fundamental ideas that have the potential to make AI more anthropomorphic. Most books on AI are technical and do not consider the humanities. Most books in the humanities treat technology in a similar manner. AI and Human Thought and Emotion, however is about AI, how academics, researchers, scientists, and practitioners came to think about AI the way they do, and how they can think about it afresh with a humanities-based perspective. The book walks a middle line to share insights between the humanities and technology. It starts with philosophy and the history of ideas and goes all the way to usable algorithms. Central to this work are the concepts of introspection, which is how consciousness is viewed, and consciousness, which is accessible to humans as they reflect on their own experience. The main argument of this book is that AI based on introspection and emotion can produce more human-like AI. To discover the connections among emotion, introspection, and AI, the book travels far from technology into the humanities and then returns with concrete examples of new algorithms. At times philosophical, historical, and technical, this exploration of human emotion and thinking poses questions and provides answers about the future of AI.
https://magrudy-assets.storage.googleapis.com/9780367029296.jpg
185.97 USD

AI and Human Thought and Emotion

by Sam Freed
Hardback
Book cover image
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's ...
Digital Transformation of Enterprise Architecture
In this book, Vivek Kale makes an important contribution to the theory and practice of enterprise architecture ... this book captures the breadth and depth of information that a modern enterprise architecture must address to effectively support an agile enterprise. This book should have a place in every practicing architect's library. -John D. McDowall, Author of Complex Enterprise Architecture Digital Transformation of Enterprise Architecture is the first book to propose Enterprise Architecture (EA) as the most important element (after Business Models) for digital transformation of enterprises. This book makes digital transformation more tangible by showing the rationale and typical technologies associated with it, and these technologies in turn reveal the essence of digital transformation. This book would be useful for analysts, designers and developers of future-ready agile application systems. This book proposes that it is the perennial quest for interoperability & portability, scalability, availability, etc., that has directed and driven the evolution of the IT/IS industry in the past 50 years. It is this very quest that has led to the emergence of technologies like service-oriented, cloud, and big data computing. In addition to the conventional attributes of EA like interoperability, scalability and availability, this book identifies additional attributes of mobility, ubiquity, security, analyticity, and usability. This pragmatic book: Identifies three parts effort for any digital transformation: Business Models, Enterprise Architectures and Enterprise Processes. Describes eight attributes of EA: interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability. Explains the corresponding technologies of service-oriented, cloud, big data, context-aware, Internet of Things (IoT), blockchain, soft, and interactive computing. Briefs on auxiliary technologies like integration, virtualization, replication, spatio-temporal databases, embedded systems, cryptography, data mining, and interactive interfaces that are essential for digital transformation of enterprise architecture. Introduces interactive interfaces like voice, gaze, gesture and 3D interfaces. Provides an overview of blockchain computing, soft computing, and customer interaction systems. Digital Transformation of Enterprise Architecture proposes that to withstand the disruptive digital storms of the future, enterprises must bring about digital transformation, i.e. a transformation that affects an exponential change (amplification or attenuation) in any aspect of the constituent attributes of EA. It proposes that each of these technologies (service-oriented, cloud, big data, context-aware, IoT, blockchain, soft, and interactive computing) bring about digital transformation of the corresponding EA attribute viz. interoperability, scalability, availability, mobility, ubiquity, security, analyticity, and usability.
https://magrudy-assets.storage.googleapis.com/9781138553781.jpg
247.34 USD

Digital Transformation of Enterprise Architecture

by Vivek Kale
Hardback
Book cover image
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE). Technology has enabled the development of innovations in GSE. The literature on GSE has emphasized the role of the organization at the expense of technology. This book explores the ...
Global Software Engineering: Virtualization and Coordination
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE). Technology has enabled the development of innovations in GSE. The literature on GSE has emphasized the role of the organization at the expense of technology. This book explores the role of technology in the evolution of globally distributed software engineering. To date, the role of the organization has been examined in coordinating GSE activities because of the prevalence of the logic of rationality (i.e., the efficiency ethos, mechanical methods, and mathematical analysis) and indeterminacy (i.e., the effectiveness ethos, natural methods, and functional analysis). This logic neglects the coordination role of ICT. However, GSE itself is an organizational mode that is technology-begotten, technology-dominated, and technology-driven, as is its coordination. GSE is a direct reflection of ICT innovation, change, and use, yet research into the role technology of GSE has been neglected. Global Software Engineering: Virtualization and Coordination considers existing fragmented explanations and perspectives in GSE research, poses new questions about GSE, and proposes a framework based on the logic of virtuality (i.e., creativity ethos, electrical methods, and technological analysis) rather than of rationality and indeterminacy. Virtuality is the primary perspective in this book's comprehensive study of GSE. The book concludes with an integrated explanation of GSE coordination made possible through ICT connectivity and capitalization.
https://magrudy-assets.storage.googleapis.com/9780367184810.jpg
185.97 USD

Global Software Engineering: Virtualization and Coordination

by Gamel O. Wiredu
Hardback
Book cover image
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages ...
Introduction to Software for Chemical Engineers, Second Edition
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages for chemical engineering applications. It covers a range of software applications from Excel and general mathematical packages such as MATLAB and MathCAD to process simulators, CHEMCAD and ASPEN, equation-based modeling languages, gProms, optimization software such as GAMS and AIMS, and specialized software like CFD or DEM codes. The different packages are introduced and applied to solve typical problems in fluid mechanics, heat and mass transfer, mass and energy balances, unit operations, reactor engineering, process and equipment design and control. This new edition offers a wider view of packages including open source software such as R, Python and Julia. It also includes complete examples in ASPEN Plus, adds ANSYS Fluent to CFD codes, Lingo to the optimization packages, and discusses Engineering Equation Solver. It offers a global idea of the capabilities of the software used in the chemical engineering field and provides examples for solving real-world problems. Written by leading experts, this book is a must-have reference for chemical engineers looking to grow in their careers through the use of new and improving computer software. Its user-friendly approach to simulation and optimization as well as its example-based presentation of the software, makes it a perfect teaching tool for both undergraduate and master levels.
https://magrudy-assets.storage.googleapis.com/9781138324213.jpg
139.46 USD

Introduction to Software for Chemical Engineers, Second Edition

Paperback / softback
Book cover image
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous ...
Anonymous Communication Networks: Protecting Privacy on the Web
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anonymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks. Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
https://magrudy-assets.storage.googleapis.com/9780367378738.jpg
78.700000 USD
Paperback / softback
Book cover image
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of ...
Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
https://magrudy-assets.storage.googleapis.com/9780367391720.jpg
78.700000 USD
Paperback / softback
Book cover image
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn ...
Client-Centered Software Development: The CO-FOSS Approach
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn the principles of software development while implementing a real-world software product. This book provides instructors, students, clients, and professional software developers with detailed guidance for developing a new CO-FOSS product from conceptualization to completion. Features Provides instructors, students, clients, and professional software developers with a roadmap for the development of a new CO-FOSS product from conceptualization to completion Motivates students with real-world projects and community service experiences Teaches all elements of the software process, including requirements gathering, design, collaboration, coding, testing, client communication, refactoring, and writing developer and user documentation Uses source code that can be reused and refitted to suit the needs of future projects, since each CO-FOSS product is free and open source software Provides links to a rich variety of resources for instructors and students to freely use in their own courses that develop new CO-FOSS products for other non-profits.
https://magrudy-assets.storage.googleapis.com/9781138583849.jpg
143.20 USD

Client-Centered Software Development: The CO-FOSS Approach

by Allen B. Tucker
Hardback
Book cover image
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. ...
Effective Processes for Quality Assurance
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
https://magrudy-assets.storage.googleapis.com/9780367172961.jpg
104.950000 USD

Effective Processes for Quality Assurance

by Boyd L. Summers
Hardback
Book cover image
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of ...
Practical Guide to Large Database Migration
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. There a very few books that provide practical tools and the methodology to migrate data from one vendor to another. This book introduces the concepts in database migration with large sample databases. It provides step by step guides and screenshots for database migration tools. Many examples are shown for migrating Oracle, SQL Server and MySQL databases.
https://magrudy-assets.storage.googleapis.com/9781138391628.jpg
178.450000 USD

Practical Guide to Large Database Migration

by Preston Zhang
Hardback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
139.46 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD ...
Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD neuronet, and allows reader to extend the techniques in the book to solve scientific and engineering problems. The book will be of interest to engineers, senior undergraduates, postgraduates, and researchers in the fields of neuronets, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, simulation and modeling, deep learning, and data mining. Features Focuses on neuronet models, algorithms, and applications Designs, constructs, develops, analyzes, simulates and compares various WASD neuronet models, such as single-input WASD neuronet models, two-input WASD neuronet models, three-input WASD neuronet models, and general multi-input WASD neuronet models for function data approximations Includes real-world applications, such as population prediction Provides complete mathematical foundations, such as Weierstrass approximation, Bernstein polynomial approximation, Taylor polynomial approximation, and multivariate function approximation, exploring the close integration of mathematics (i.e., function approximation theories) and computers (e.g., computer algorithms) Utilizes the authors' 20 years of research on neuronets
https://magrudy-assets.storage.googleapis.com/9781138387034.jpg
213.86 USD

Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications

by Chengxu Ye, Dechao Chen, Yunong Zhang
Hardback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
68.200000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside ...
Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
https://magrudy-assets.storage.googleapis.com/9781138197572.jpg
73.450000 USD

Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting

by Gavin Powell
Hardback
Book cover image
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to ...
Introduction to Self-Driving Vehicle Technology
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to functional safety and cybersecurity. It also passes on some practical know-how and discusses concrete SDV applications, along with a discussion of where this technology is heading. It will serve as a good starting point for software developers or professional engineers who are eager to pursue a career in this exciting field and want to learn more about the basics of SDV algorithms. Likewise, academic researchers, technology enthusiasts, and journalists will also find the book useful. Key Features: Offers a comprehensive technological walk-through of what really matters in SDV development: from hardware, software, to functional safety and cybersecurity Written by an active practitioner with extensive experience in series development and research in the fields of Advanced Driver Assistance Systems (ADAS) and Autonomous Driving Covers theoretical fundamentals of state-of-the-art SLAM, multi-sensor data fusion, and other SDV algorithms. Includes practical information and hands-on material with Robot Operating System (ROS) and Open Source Car Control (OSCC). Provides an overview of the strategies, trends, and applications which companies are pursuing in this field at present as well as other technical insights from the industry.
85.53 USD

Introduction to Self-Driving Vehicle Technology

by Hanky Sjafrie
Paperback / softback
Book cover image
The AI revolution is moving at a breakneck speed. Organizations are beginning to invest in innovative ways to monetize their data through the use of artificial intelligence. Businesses need to understand the reality of AI. To be successful it is imperative that organizations understand that augmented intelligence is the secret ...
Augmented Intelligence: The Business Power of Human-Machine Collaboration
The AI revolution is moving at a breakneck speed. Organizations are beginning to invest in innovative ways to monetize their data through the use of artificial intelligence. Businesses need to understand the reality of AI. To be successful it is imperative that organizations understand that augmented intelligence is the secret to success. Augmented Intelligence: The Business Power of Human-Machine Collaboration is about the process of combining human and machine intelligence. The book provides business leaders and AI data experts with an understanding of the value of augmented intelligence and its ability to help win competitive markets. The book focuses on the requirement to clearly manage the foundational data used for augmented intelligence. It focuses on the risks of improper data use and delves into the ethics and governance of data in the era of augmented intelligence. In this book we explore the difference between weak augmentation that is based on automating well understood processes and strong augmentation that is designed to rethink business processes through the inclusion of data, AI and machine learning. What experts are saying about Augmented Intelligence The book you are about to read is of great importance because we increasingly rely on machine learning and AI. Therefore, it is critical that we understand the ability to create an environment in which businesses can have the tools to understand data from a holistic perspective. What is imperative is to be able to make better decisions based on an understanding of the behavior and thinking of our customers so that we can take the best next action. This book provides a clear understanding of the impact of augmented intelligence on both society and business. -Tsvi Gal, Managing Director, Enterprise Technology and Services, Morgan Stanley Our mission has always been to help clients apply AI to better predict and shape future outcomes, empower higher value work, and automate how work gets done. I have always said, 'AI will not replace managers, but managers who use AI will replace managers who don't.' This book delves into the real value that AI promises, to augment existing human intelligence, and in the process, dispels some of the myths around AI and its intended purpose. -Rob Thomas, General Manager, Data and AI, IBM This book enables managers, data analysts, business leaders, and AI experts to speak a common language, cutting through the jargon and hype to effectively harness augmented intelligence techniques for business decision-making. The authors provide a systematic framework for considering the uses and potential pitfalls of AI and machine learning in supporting business decision-making - always informed and shaped with up-to-date business practices in mind, for the real world where data resources are inherently dynamic and very fast changing. -Stan Sclaroff, Boston University, Dean of the College of Arts & Sciences From my early days of commercializing IBM Watson, we realized that the real power of AI is not pitting humans against machines but pairing human and machine intelligence to unleash a new level of creativity and productivity at a scale we have never seen before. The authors of this book have done a wonderful job of articulating the real potential of AI - that of pairing human and machine intelligence to unleash a new level of creativity and productivity at a scale we have never seen before. I highly recommend reading this book to get a practical understanding of this complex and important subject. -Manoj Saxena, Chairman, CognitiveScale and AI Global; First General Manager, IBM Watson; Founder and Serial Entrepreneur
83.950000 USD

Augmented Intelligence: The Business Power of Human-Machine Collaboration

by Daniel Kirsch, Candace Sidner, Henry Morris, Judith Hurwitz
Hardback
Book cover image
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to ...
Introduction to Self-Driving Vehicle Technology
This book aims to teach the core concepts that make Self-driving vehicles (SDVs) possible. It is aimed at people who want to get their teeth into self-driving vehicle technology, by providing genuine technical insights where other books just skim the surface. The book tackles everything from sensors and perception to functional safety and cybersecurity. It also passes on some practical know-how and discusses concrete SDV applications, along with a discussion of where this technology is heading. It will serve as a good starting point for software developers or professional engineers who are eager to pursue a career in this exciting field and want to learn more about the basics of SDV algorithms. Likewise, academic researchers, technology enthusiasts, and journalists will also find the book useful. Key Features: Offers a comprehensive technological walk-through of what really matters in SDV development: from hardware, software, to functional safety and cybersecurity Written by an active practitioner with extensive experience in series development and research in the fields of Advanced Driver Assistance Systems (ADAS) and Autonomous Driving Covers theoretical fundamentals of state-of-the-art SLAM, multi-sensor data fusion, and other SDV algorithms. Includes practical information and hands-on material with Robot Operating System (ROS) and Open Source Car Control (OSCC). Provides an overview of the strategies, trends, and applications which companies are pursuing in this field at present as well as other technical insights from the industry.
125.950000 USD

Introduction to Self-Driving Vehicle Technology

by Hanky Sjafrie
Hardback
Book cover image
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in ...
Intelligence in IoT-enabled Smart Cities
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality. It focuses on both the design and implementation aspects of artificial intelligence approaches in smart cities and sensing applications that are enabled and supported by IoT paradigms, and mainly on data delivery approaches and their performability aspects.
https://magrudy-assets.storage.googleapis.com/9781138316843.jpg
136.450000 USD

Intelligence in IoT-enabled Smart Cities

by Fadi Al-Turjman
Hardback
Book cover image
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social ...
Security for Software Engineers
Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint. Features: Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry. This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user's information assets.
https://magrudy-assets.storage.googleapis.com/9781138583825.jpg
143.18 USD

Security for Software Engineers

by James N. Helfrich
Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
104.950000 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and ...
A First Course in Fuzzy Logic
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and a solid background for readers to pursue further studies and real-world applications. New in the Fourth Edition: Features new results on fuzzy sets of type-2 Provides more information on copulas for modeling dependence structures Includes quantum probability for uncertainty modeling in social sciences, especially in economics With its comprehensive updates, this new edition presents all the background necessary for students, instructors and professionals to begin using fuzzy logic in its many-applications in computer science, mathematics, statistics, and engineering. About the Authors: Hung T. Nguyen is a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. He is also an Adjunct Professor of Economics at Chiang Mai University, Thailand. Carol L. Walker is also a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. Elbert A. Walker is a Professor Emeritus, Department of Mathematical Sciences, New Mexico State University.
https://magrudy-assets.storage.googleapis.com/9781138585089.jpg
185.97 USD

A First Course in Fuzzy Logic

by Elbert a Walker, Carol L. Walker, Hung T. Nguyen
Hardback
Book cover image
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts ...
Configuration Management, Second Edition: Theory and Application for Engineers, Managers, and Practitioners
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.
124.58 USD

Configuration Management, Second Edition: Theory and Application for Engineers, Managers, and Practitioners

by Kim L Robertson, Jon M. Quigley
Paperback / softback
Book cover image
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors ...
Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors relating to the immediate context of the event (e.g. front-line workers, environment, and equipment). This book describes how to design a practical, usable incident reporting system based on this approach. The book contains all the information needed to effectively design and implement a new incident reporting system underpinned by systems thinking. It also provides guidance on how to evaluate and improve existing incident reporting systems so they are practical for users, collect good quality data, and reflect the principles of systems thinking. Features Highlights the key principles of systems thinking for designing incident reporting systems Outlines a process for developing and testing incident reporting systems Describes how to evaluate incident reporting systems to ensure they are practical, usable, and collect good quality data Provides detailed guidance on how to analyze incident data, and translate the findings into appropriate incident prevention strategies
https://magrudy-assets.storage.googleapis.com/9781472436917.jpg
213.86 USD

Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems

by Caroline Finch, Michael Lenne, Paul M. Salmon, Natassia Goode
Hardback
Page 1 of 15