1 - 20
Next
1. A course in error-correcting codes [2017]
- Justesen, Jørn author.
- Second edition. - Zürich, Switzerland : European Mathematical Society, [2017]
- Description
- Book — 1 online resource.
- Summary
-
- 1. Block codes for error correction
- 2. Finite fields
- 3. Communication channels and error probability
- 4. Reed-Solomon codes and their decoding
- 5. Cyclic codes
- 6. Frames
- 7. Maximum likelihood decoding and convolutional codes
- 8. Combinations of several codes
- 9. Decoding Reed-Solomon and BCH codes
- 10. Iterative decoding
- 11. Algebraic geometry codes.
- Ryżko, Dominik, author.
- Hoboken, NJ : John Wiley & Sons, Inc., [2020]
- Description
- Book — 1 online resource : illustrations
- Summary
-
- List of Figures ix
- List of Tables xi
- Preface xiii
- Acknowledgments xv
- Acronyms xvii
- Chapter 1 Introduction 1
- 1.1 Motivation 1
- 1.2 Assumptions 3
- 1.3 For Whom is This Book? 4
- 1.4 Book Structure 4
- Chapter 2 Evolution of IT Architectures and Paradigms 7
- 2.1 Evolution of IT Architectures 7
- 2.1.1 Monolith 7
- 2.1.2 Service Oriented Architecture 9
- 2.1.3 Microservices 12
- 2.2 Actors and Agents 15
- 2.2.1 Actors 15
- 2.2.2 Agents 17
- 2.3 From ACID to BASE, CAP, and NoSQL - The Database (R)evolution 22
- 2.4 The Cloud 24
- 2.5 From Distributed Sensor Networks to the Internet of Things and Cyber-Physical Systems 27
- 2.6 The Rise of Big Data 28
- Chapter 3 Sources of Data 31
- 3.1 The Internet 32
- 3.1.1 The Semantic Web 32
- 3.1.2 Linked Data 35
- 3.1.3 Knowledge Graphs 36
- 3.1.4 Social Media 38
- 3.1.5 Web Mining 38
- 3.2 Scientific Data 40
- 3.2.1 Biomedical Data 40
- 3.2.2 Physics and Astrophysics Data 41
- 3.2.3 Environmental Sciences 44
- 3.3 Industrial Data 45
- 3.3.1 Smart Factories 45
- 3.3.2 SmartGrid 47
- 3.3.3 Aviation 47
- 3.4 Internet of Things 48
- Chapter 4 Big Data Tasks 51
- 4.1 Recommender Systems 51
- 4.2 Search 52
- 4.3 Ad-tech and RTB Algorithms 55
- 4.4 Cross-Device Graph Generation 57
- 4.5 Forecasting and Prediction Systems 58
- 4.6 Social Media Big Data 59
- 4.7 Anomaly and Fraud Detection 61
- 4.8 New Drug Discovery 63
- 4.9 Smart Grid Control and Monitoring 64
- 4.10 IoT and Big Data Applications 65
- Chapter 5 Cloud Computing 67
- 5.1 Cloud Enabled Architectures 67
- 5.1.1 Cloud Management Platforms 67
- 5.1.2 Efficient Cloud Computing 73
- 5.1.3 Distributed Storage Systems 75
- 5.2 Agents and the Cloud 82
- 5.2.1 Multi-agent Versus Cloud Paradigms 83
- 5.2.2 Agents in the Cloud 83
- Chapter 6 Big Data Architectures 87
- 6.1 Big Data Computation Models 87
- 6.1.1 MapReduce 87
- 6.1.2 Directed Acyclic Graph Models 89
- 6.1.3 All-Pairs 92
- 6.1.4 Very Large Bitmap Operations 93
- 6.1.5 Message Passing Interface 94
- 6.1.6 Graphical Processing Unit Computing 95
- 6.2 Publish-Subscribe Systems 97
- 6.3 Stream Processing 99
- 6.3.1 Information Flow Processing Concepts 99
- 6.3.2 Stream Processing Systems 101
- 6.4 Higer Level Big Data Architectures 110
- 6.4.1 Spark 110
- 6.4.2 Lambda 112
- 6.4.3 Multi-Agent View of the Lambda Architecture 113
- 6.4.4 Questioning the Lambda 115
- 6.5 Industry and Other Approaches 116
- 6.6 Actor and Agent-Based Big Data Architectures 118
- Chapter 7 Big Data Analytics, Mining, and Machine Learning 121
- 7.1 To SQL or Not to SQL 122
- 7.1.1 SQL Hadoop Interfaces 123
- 7.1.2 From Shark to SparkSQL 125
- 7.2 Big Data Mining and Machine Learning 128
- 7.2.1 Graph Mining 133
- 7.2.2 Agent Based Machine Learning and Data Mining 134
- Chapter 8 Physically Distributed Systems - Mobile Cloud, Internet of Things, Edge Computing 137
- 8.1 Mobile Cloud 138
- 8.2 Edge and Fog Computing 145
- 8.2.1 Business Case: Mobile Context Aware Recommender System 147
- 8.3 Internet of Things 148
- 8.3.1 IoT Fundamentals 148
- 8.3.2 IoT and the Cloud 151
- 8.3.3 MAS in IoT 156
- Chapter 9 Summary 159
- Bibliography 161
- Index 179.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Shankar, K. (Computer science researcher), author.
- Boca Raton : CRC Press, [2021]
- Description
- Book — 1 online resource
- Summary
-
- 1. Artificial Intelligence (AI) for IoHT - an Introduction.
- 2. Role of Internet of Things and Cloud Computing Technologies in the Healthcare Sector.
- 3. An Extensive Overview of Wearable Technologies in Healthcare Sector.
- 4. IoHT and Cloud-Based Disease Diagnosis Model Using Particle Swarm Optimization with Artificial Neural Networks.
- 5. IoHT-Based Improved Grey Optimization with Support Vector Machine for Gastrointestinal Hemorrhage Detection and Diagnosis Model.
- 6. An Effective-Based Personalized Medicine Recommendation System Using Ensemble of Extreme Learning Machine Model.
- 7. A Novel Map Reduce-Based Hybrid Decision Tree with TFIDF Algorithm for Public Sentiment Mining of Diabetes Mellitus.
- 8. IoHT with Artificial Intelligence-Based Breast Cancer Diagnosis Model.
- 9. Artificial Intelligence with Cloud-Based Medical Image Retrieval System Using Deep Neural Network.
- 10. IoHT with Cloud-Based Brain Tumor Detection Using Particle Swarm Optimization with Support Vector Machine.
- 11. Artificial Intelligence-Based Hough Transform with an Adaptive Neuro-Fuzzy Inference System for a Diabetic Retinopathy Classification Model.
- 12. An IoHT-Based Intelligent Skin Lesion Detection and Classification Model in Dermoscopic Images.
- 13. An IoHT-Based Image Compression Model Using Modified Cuckoo Search Algorithm with Vector Quantization.
- 14. An Effective Secure Medical Image Transmission Using Improved Particle Swarm Optimization and Wavelet Transform.
- 15. IoHT with Wearable Devices-Based Feature Extraction and Deep Neural Networks Classification Model for Heart Disease Diagnosis.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
4. The designer's guide to the Cortex-M processor family [electronic resource] : a tutorial approach [2013]
- Martin, Trevor.
- Oxford : Elsevier Science, c2013.
- Description
- Book — 1 online resource (331 p.)
- Summary
-
- Introduction to ARM Cortex Processors
- Developing with Cortex M Processors
- Cortex-M Architecture
- Debugging with CoreSight
- Cortex Microcontroller Interface Standard
- Advanced Architecture Features
- Developing with an RTOS
- Practical DSP for Cortex-M4
- Future Trends.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Tourlakis, George J.
- Hoboken, N.J. : Wiley, 2012.
- Description
- Book — 1 online resource.
- Summary
-
- Preface xi 1. Mathematical Foundations 1 1.1 Sets and Logic
- Naively 1 1.2 Relations and Functions 40 1.3 Big and Small Infinite Sets
- Diagonalization 52 1.4 Induction from a User's Perspective 61 1.5 Why Induction Ticks 68 1.6 Inductively Defined Sets 1.7 Recursive Definitions of Functions 1.8 Additional Exercises 85 2. Algorithms, Computable Functions and Computations 91 2.1 A Theory of Computability 91 2.2 A programming Formalism for the Primitive Recursive Functions Function Class 147 2.3 URM Computations and their Arithmetization 141 2.4 A double-recursion that leads outside the Primitive Recursive Function Class 2.5 Semi-computable Relations: Unsolvability 2.6 The Iteration Theorem of Kleene 172 2.7 Diagonalization Revisited
- Unsolvability via Reductions 175 2.8 Productive and Creative Sets 209 2.9 The Recursion Theorem 214 2. 10 Completeness 217 2.11 Unprovability from Unsolvability 221 2.12 Additional Exercises 234 3. A Subset of the URM Language
- FA and NFA 241 3.1 Deterministic Finite Automata and their Languages 243 3.2 Nondeterministic Finite Automata 3.3 Regular Expressions 266 3.4 Regular Grammars and Languages 277 3.5 Additional Exercises 287 4. Adding a stack of a NFA: Pushdown Automata 4.1 The PDA 294 4.2 PDA Computations 294 4.3 The PDA-acceptable Languages are the Context Free Languages 305 4.4 Non-Context Free Languages
- Another Pumping Lemma 312 4.5 Additional Exercise 322 5. Computational Complexity 325 5.1 Adding a second stack
- Turning Machines 325 5.2 Axt, loop program, and Grzegorczyk hierarchies 5.3 Additional Exercised.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Rajinikanth, Venkatesan, author.
- First edition - Boca Raton, FL : CRC Press, 2021
- Description
- Book — 1 online resource (xii, 183 pages)
- Summary
-
- 1. Introduction.
- 2. Image Examination.
- 3. Image Thresholding.
- 4. Image Segmentation.
- 5. Medical Image Processing with Hybrid Image Processing Method.
- 6. Deep Learning for Medical Image Processing.
- 7. Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Boswarthick, David.
- Hoboken : John Wiley & Sons, 2012.
- Description
- Book — 1 online resource (334 p.)
- Summary
-
- Foreword List of Contributors List of Acronyms
- 1 Introduction to M2M 1.1 What is M2M? 1.2 The Business of M2M 1.3 Accelerating M2M Maturity 1.3.1 High-Level M2M Frameworks 1.3.2 Policy and Government Incentives 1.4 M2M Standards 1.4.1 Which Standards for M2M? 1.5 Roadmap of the Book References Part I M2M CURRENT LANDSCAPE
- 2 The Business of M2M 2.1 The M2M Market 2.1.1 Healthcare 2.1.2 Transportation 2.1.3 Energy 2.2 The M2M Market Adoption: Drivers and Barriers 2.3 The M2M Value Chain 2.4 Market Size Projections 2.5 Business Models 2.5.1 Network Operator- or CSP-Led Model 2.5.2 MVNO-Led Model 2.5.3 Corporate Customer-Led Model 2.6 M2M Business Metrics 2.7 Market Evolution Reference
- 3 Lessons Learned from Early M2M Deployments 3.1 Introduction 3.2 Early M2M Operational Deployments 3.2.1 Introduction 3.2.2 Early M2M Operational Deployment Examples 3.2.3 Common Questions in Early M2M Deployments 3.2.4 Possible Optimization of M2M Deployments 3.3 Chapter Conclusion Reference Part II M2M ARCHITECTURE AND PROTOCOLS
- 4 M2M Requirements and High-Level Architectural Principles 4.1 Introduction 4.2 Use-Case-Driven Approach to M2M Requirements 4.2.1 What is a Use Case? 4.2.2 ETSI M2M Work on Use Cases 4.2.3 Methodology for Developing Use Cases 4.3 Smart Metering Approach in ETSI M2M 4.3.1 Introduction 4.3.2 Typical Smart Metering Deployment Scenario 4.4 eHealth Approach in ETSI M2M 4.4.1 Introduction 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design 4.6.1 Why Focus on Wireless Networks? 4.7 Description of M2M Market Segments/Applications 4.7.1 Automotive 4.7.2 Smart Telemetry 4.7.3 Surveillance and Security 4.7.4 Point of Sale (PoS) 4.7.5 Vending Machines 4.7.6 eHealth 4.7.7 Live Video 4.7.8 Building Automation 4.7.9 M2M Industrial Automation 4.8 M2M Traffic Characterization 4.8.1 Detailed Traffic Characterization for Smart Metering 4.8.2 Global Traffic Characterization 4.9 High-Level Architecture Principles for M2M Communications 4.10 Chapter Conclusions References
- 5 ETSI M2M Services Architecture 5.1 Introduction 5.2 High-Level System Architecture 5.3 ETSI TC M2M Service Capabilities Framework 5.4 ETSI TC M2M Release 1 Scenarios 5.5 ETSI M2M Service Capabilities 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) 5.5.2 Remote Entity Management Capability (x REM) 5.5.3 Security Capability (xSEC) 5.6 Introducing REST Architectural Style for M2M 5.6.1 Introduction to REST 5.6.2 Why REST for M2M? 5.6.3 REST Basics 5.6.4 Applying REST to M2M 5.6.5 Additional Functionalities 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures 5.7.1 Introduction 5.7.2 Definitions Used in this Section 5.7.3 Resource Structure 5.7.4 Interface Procedures 5.8 Chapter Conclusion References
- 6 M2M Optimizations in Public Mobile Networks 6.1 Chapter Overview 6.2 M2M over a Telecommunications Network 6.2.1 Introduction 6.2.2 M2M Communication Scenarios 6.2.3 Mobile or Fixed Networks 6.2.4 Data Connections for M2M Applications 6.3 Network Optimizations for M2M 6.3.1 Introduction 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications 6.3.3 Cost Reduction 6.3.4 M2M Value-Added Services 6.3.5 Numbering, Identifiers, and Addressing 6.3.6 Triggering Optimizations 6.3.7 Overload and Congestion Control References
- 7 The Role of IP in M2M 7.1 Introduction 7.1.1 IPv6 in Brief 7.1.2 Neighbor Discovery Protocol 7.2 IPv6 for M2M 7.3 6LoWPAN 7.3.1 Framework 7.3.2 Header Compression 7.3.3 Neighbor Discovery 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL) 7.4.1 RPL Topology 7.5 CoRE 7.5.1 Message Formats 7.5.2 Transport Protocol 7.5.3 REST Architecture References
- 8 M2M Security 8.1 Introduction 8.1.1 Security Characteristics of Cellular M2M 8.2 Trust Relationships in the M2M Ecosystem 8.3 Security Requirements 8.3.1 Customer/M2M Device User 8.3.2 Access Network Provider 8.3.3 M2M Service Provider 8.3.4 Application Provider 8.3.5 Bootstrapping Requirements 8.4 Which Types of Solutions are Suitable? 8.4.1 Approaches Against Hijacking 8.4.2 Public Key Solutions 8.4.3 Smart Card-Based Solutions 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption 8.4.6 Security for Groups of M2M Devices 8.5 Standardization Efforts on Securing M2M and MTC Communications 8.5.1 ETSI M2M Security 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications References
- 9 M2M Terminals and Modules 9.1 M2M Module Categorization 9.1.1 Access Technology 9.1.2 Physical Form Factors 9.2 Hardware Interfaces 9.2.1 Power Interface 9.2.2 USB (Universal Serial Bus) Interface 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface 9.2.4 Antenna Interface 9.2.5 UICC (Universal Integrated Circuit Card) Interface 9.2.6 GPIO (General-Purpose Input/Output Port) Interface 9.2.7 SPI (Serial Peripheral Interface) Interface 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface 9.2.9 ADC (Analog-to-Digital Converter) Interface 9.2.10 PCM (Pulse Code Modulation) Interface 9.2.11 PWM (Pulse Width Modulation) Interface 9.2.12 Analog Audio Interface 9.3 Temperature and Durability 9.4 Services 9.4.1 Application Execution Environment 9.4.2 Connectivity Services 9.4.3 Management Services 9.4.4 Application Services 9.5 Software Interface 9.5.1 AT Commands 9.5.2 SDK Interface 9.6 Cellular Certification 9.6.1 Telecom Industry Certification 9.6.2 MNO Certification
- 10 Smart Cards in M2M Communication 10.1 Introduction 10.2 Security and Privacy Issues in M2M Communication 10.3 The Grounds for Hardware-Based Security Solutions 10.4 Independent Secure Elements and Trusted Environments 10.4.1 Trusted Environments in M2M Devices 10.4.2 Trusting Unknown Devices: The Need for Security Certification 10.4.3 Advantages of the Smart Card Model 10.5 Specific Smart Card Properties for M2M Environments 10.5.1 Removable Smart Cards versus Embedded Secure Elements 10.5.2 UICC Resistance to Environmental Constraints 10.5.3 Adapting the Card Application Toolkit to Unattended Devices 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands 10.5.5 Confidential Remote Management of Third-Party Applications 10.6 Smart Card Future Evolutions in M2M Environments 10.6.1 UICC-Based M2M Service Identity Module Application 10.6.2 Internet Protocol Integration of the UICC 10.7 Remote Administration of M2M Secure Elements 10.7.1 Overview 10.7.2 Late Personalization of Subscription 10.7.3 Remote Management of Subscriptions on the Field References Part III BOOK CONCLUSIONS AND FUTURE VISION
- 11 Conclusions Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- BOCA RATON : CHAPMAN & HALL CRC, 2021
- Description
- Book — 1 online resource
- Summary
-
- Preface. Acknowledgements. Editors. Contributors.
- Chapter 1 Another Set of Eyes in Anesthesiology.
- Chapter 2 Dermatological Machine Learning Clinical Decision Support System.
- Chapter 3 Vision and AI.
- Chapter 4 Thermal Dose Modeling for Thermal Ablative Cancer Treatments by Cellular Neural Networks.
- Chapter 5 Ensembles of Convolutional Neural Networks with Different Activation Functions for Small to Medium-Sized Biomedical Datasets.
- Chapter 6 Analysis of Structural MRI Data for Epilepsy Diagnosis Using Machine Learning Techniques.
- Chapter 7 Artificial Intelligence-Powered Ultrasound for Diagnosis and Improving Clinical Workflow.
- Chapter 8 Machine Learning for E/MEG-Based Identification of Alzheimer's Disease.
- Chapter 9 Some Practical Challenges with Possible Solutions for Machine Learning in Medical Imaging.
- Chapter 10 Detection of Abnormal Activities Stemming from Cognitive Decline Using Deep Learning.
- Chapter 11 Classification of Left Ventricular Hypertrophy and NAFLD through Decision Tree Algorithm.
- Chapter 12 The Cutting Edge of Surgical Practice: Applications of Machine Learning to Neurosurgery.
- Chapter 13 A Novel MRA-Based Framework for the Detection of Cerebrovascular Changes and Correlation to Blood Pressure.
- Chapter 14 Early Classification of Renal Rejection Types: A Deep Learning Approach. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Berlin ; New York : Springer, c2013.
- Description
- Book — 1 online resource (351 p.)
- Summary
-
- Foreword Gregory Chaitin Part I Mechanisms in Programs and Nature 1. Hyperbolic Cellular Automata Maurice Margenstern 2. A Lyapunov View on the Stability of Cellular Automata Jan M. Baetens & Bernard De Baets 3. On the Necessity of Complexity Joost J. Joosten 4. Computational Technosphere and Cellular Engineering Mark Burgin
- Part II The World of Numbers & Simple Programs 5. Cellular Automata: Models of the Physical World Herbert W. Franke 6. Symmetry and Complexity of Cellular Automata: Towards an Analytical Theory of Dynamical System Klaus Mainzer 7. A New Kind of Science: Ten Years Later David H. Bailey
- Part III Everyday Systems 8. A New Kind of Finance Philip Z. Maymin 9. The Relevance and Importance of Computation Universality in Economics Kumaraswamy Velupillai 10. Exploring the Sources of and Nature of Computational Irreducibility Brian Beckage, Stuart Kauffman, Louis Gross, Asim Zia, Gabor Vattay and Chris Koliba
- Part IV Fundamental Physics 11. The Principle of a Finite Density of Information Gilles Dowek and Pablo Arrighi 12. Artificial Cosmogenesis: A New Kind of Cosmology Clement Vidal 13. Do Particles Evolve? Tommaso Bolognesi
- Part V The Behavior of Systems & the Notion of Computation 14. An Incompleteness Theorem for the Natural World Rudy Rucker 15. Pervasiveness of Universalities of Cellular Automata: Fascinating Life-like Behaviours Emmanuel Sapin 16. Wolfram's Classification and Computation in Cellular Automata Classes III and IV Genaro J. Martinez, Juan Carlos Seck Tuoh Mora and Hector Zenil
- Part VI Irreducibility & Computational Equivalence 17. Exploring the Computational Limits of Haugeland's Game as a Two-Dimensional Cellular Automaton Drew Reisinger, Taylor Martin, Mason Blankenship, Christopher Harrison, Jesse Squires and Anthony Beavers 18. Irreducibility and Computational Equivalence Herve Zwrin and Jean-Paul Delahaye 19. Computational Equivalence and Classical Recursion Theory Klaus Sutner
- Part VII Deliberations and Philosophical Implications 20. Wolfram and the Computing Nature Gordana Dodig-Crnkovic 21. A New Kind of Philosophy. Manifesto for a Digital Ontology Jacopo Tagliabue 22. Free Will For Us, not For Robots Selmer Bringsjord
- Afterword Cristian Calude.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Lusa, John.
- Milton : Auerbach Publications, 2018.
- Description
- Book — 1 online resource (587 p.)
- Summary
-
- 1.Introduction
- 2. The Management Team
- 3. Maintaining the Network
- 4. The Network Providers
- 5. The Data Network
- 6. The Voice Network
- 7. New Technologies
- 8. Support for the Network Manager
- 9. Education Support for the Network Manager.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kumar, Neeraj (Computer scientist), author.
- Boca Raton : CRC Press, 2020.
- Description
- Book — 1 online resource
- Summary
-
- Part I-Background:
- 1. Overview of Internet of Things. 2 Smart applications.
- 3. IoT challenges. Part II- Blockchain overview. 4 Python Basics.
- 5. Cryptography primitives.
- 6. Blockchain technology and technical foundations.
- 7. Verification and validation methods used by Blockchain.
- 8. Data structures for Blockchain. Part III-Probabilistic data structures: An overview.
- 9. Introduction to probabilistic data structures.
- 10. Membership Query Probabilistic Data Structures.
- 11. Cardinality Estimation Probabilistic Data Structures.
- 12. Frequency Count Query Probabilistic Data Structures.
- 13. Approximate Similarity Search Query Probabilistic Data Structures. Part IV-Integration of Probabilistic Data Structures with Blockchain.
- 14. Applicability of membership query PDS with Blockchain.
- 15. Applicability of cardinality estimation PDS with Blockchain.
- 16. Applicability of frequency estimation PDS with Blockchain.
- 17. Applicability of approximate similarity search PDS with Blockchain.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
12. Trustworthy cloud computing [2017]
- Safonov, V. O. (Vladimir Olegovich), author.
- Hoboken, New Jersey : John Wiley & Sons, Inc., [2017]
- Description
- Book — 1 online resource.
- Summary
-
- Preface ix Acknowledgments xiii Introduction xv 1 Principles and Concepts of Cloud Computing 1 1.1 Kinds of Modern Software Architectures 1 1.2 Characteristic Features of Modern Software 3 1.3 Basic Concepts of Modern Software Architecture 4 1.4 Service-Oriented Architecture (SOA) 6 1.5 Software as A Service (SaaS) 8 1.6 Key Ideas and Principles of Cloud Computing 8 1.7 Components of Cloud Platforms and Kinds of Cloud Servicing 11 1.8 Layers of the Cloud Architecture 14 1.9 Scheme of Architecture of the Cloud 15 1.10 Roles of People in Cloud Computing 16 1.11 Standards of Cloud Computing 17 1.12 How the Clouds Come True: Organization of Datacenters and Cloud Hardware 20 1.13 Specifics and Components of Software for Cloud Computing 22 1.14 Cloud Computing-Related Trends Activities and Resources 25 Exercises to
- Chapter 1 29 2 Platforms of Cloud Computing 33 2.1 A Variety of Cloud Platforms: The First Impression 33 2.2 Amazon AWS Cloud Platform A Pioneer of Cloud Computing 36 2.3 IBM Cloud 49 2.4 Oracle Cloud 58 2.5 Google Cloud Platform 64 2.6 HP Helion Cloud Platform 70 2.7 Salesforce Cloud Platform 79 Exercises to
- Chapter 2 88 3 Principles and Pillars of Trustworthy Computing 91 3.1 Vital Issues of Trustworthy Computing 91 3.2 The Trustworthy Computing Initiative by Microsoft 93 3.3 The Security Pillar 94 3.4 The Reliability Pillar 99 3.5 The Privacy Pillar 101 3.6 The Business Integrity Pillar 103 3.7 Tools and Software Lifecycle Models to Support Trustworthy Computing 106 Exercises to
- Chapter 3 110 4 Making Cloud Computing Trustworthy 113 4.1 Psychological Barriers Between the Customers and the Cloud and the Ways to Overcome Them 113 4.2 User Interface for Cloud Computing Its Convenience Usability and Functionality for Trustworthy Cloud Computing 116 4.3 Threats and Attacks to Clouds 120 4.4 Trustworthy Cloud Computing from Hardware Side: Datacenter Architecture Servers Clusters Hypervisors 124 4.5 Trustworthy Cloud Computing from Operating System Side: Desirable OS Features to Implement Clouds and Datacenters 126 4.6 Using Aspect-Oriented Programming for Refactoring Cloud Services and Making Them Trustworthy: The Contribution of St. Petersburg University 129 Exercises to
- Chapter 4 142 5 Example of a Trustworthy Cloud Computing Platform in Detail: Microsoft Azure 147 5.1 Overview of Microsoft Azure Architecture and its Evolution 147 5.2 User Interface and the Management Portal of Microsoft Azure 152 5.3 The Compute Component: Managing and Operating Cloud Services 161 5.4 The Storage Component: Managing and Operating Cloud Storage 178 5.5 The SQL Azure Component: The Cloud Database 187 5.6 Networking in the Azure Cloud: Network-as-a-Service (NaaS) Content Delivery Network (CDN) Virtual Network Traffic Manager 196 5.7 Active Directory in the Cloud: A Way of Structuring User Accounts 202 5.8 Development of Microsoft Azure Cloud Services with Microsoft Visual Studio 206 5.9 Visual Studio Online and its Relation to Microsoft Azure 215 5.10 Developing Mobile Services and Connected Mobile Applications for Microsoft Azure 220 5.11 Media Services 234 5.12 The .NET Platform The Basis of Azure Implementation 237 5.13 Azure Tools 252 5.14 Machine Learning in the Cloud: Azure Machine Learning Studio 257 5.15 Parallel Processing of Big Data in the Cloud: Using Apache Hadoop in Microsoft Azure 261 5.16 Perspectives of Microsoft Azure 265 Exercises to
- Chapter 5 266 6 Conclusions: Perspectives of Trustworthy Cloud Computing 271 6.1 Integration of Clouds. The Intercloud IEEE Standard 271 6.2 The TCLOUDS Project by the European Union 280 6.3 Further Developments and Trends of Trustworthy Cloud Computing 291 Exercises to Conclusions 296 Appendix A Example of Microsoft Azure Cloud Service: Filemanager 299 References 309 Index 317.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Faynberg, Igor.
- Chichester, West Sussex, UK : John Wiley & Sons, Ltd., [2016]
- Description
- Book — 1 online resource.
- Summary
-
- About the Authors ix Acknowledgments xi
- 1 Introduction 1 References 6
- 2 The Business of Cloud Computing 7 2.1 IT Industry Transformation through Virtualization and Cloud 7 2.2 The Business Model Around Cloud 13 2.2.1 Cloud Providers 14 2.2.2 Software and Service Vendors 15 2.3 Taking Cloud to the Network Operators 15 References 18
- 3 CPU Virtualization 19 3.1 Motivation and History 20 3.2 A Computer Architecture Primer 21 3.2.1 CPU, Memory, and I/O 21 3.2.2 How the CPU Works 23 3.2.3 In-program Control Transfer: Jumps and Procedure Calls 25 3.2.4 Interrupts and Exceptions the CPU Loop Refined 28 3.2.5 Multi-processing and its Requirements The Need for an Operating System 34 3.2.6 Virtual Memory Segmentation and Paging 38 3.2.7 Options in Handling Privileged Instructions and the Final Approximation of the CPU Loop 42 3.2.8 More on Operating Systems 44 3.3 Virtualization and Hypervisors 48 3.3.1 Model, Requirements, and Issues 49 3.3.2 The x86 Processor and Virtualization 52 3.3.3 Dealing with a Non-virtualizable CPU 55 3.3.4 I/O Virtualization 57 3.3.5 Hypervisor Examples 60 3.3.6 Security 65 References 69
- 4 Data Networks The Nervous System of the Cloud 71 4.1 The OSI Reference Model 74 4.1.1 Host-to-Host Communications 74 4.1.2 Interlayer Communications 76 4.1.3 Functional Description of Layers 79 4.2 The Internet Protocol Suite 85 4.2.1 IP The Glue of the Internet 87 4.2.2 The Internet Hourglass 98 4.3 Quality of Service in IP Networks 102 4.3.1 Packet Scheduling Disciplines and Traffic Specification Models 103 4.3.2 Integrated Services 105 4.3.3 Differentiated Services 109 4.3.4 Multiprotocol Label Switching (MPLS) 112 4.4 WAN Virtualization Technologies 117 4.5 Software-Defined Network 120 4.6 Security of IP 125 References 129
- 5 Networking Appliances 131 5.1 Domain Name System 131 5.1.1 Architecture and Protocol 134 5.1.2 DNS Operation 140 5.1.3 Top-Level Domain Labels 142 5.1.4 DNS Security 145 5.2 Firewalls 149 5.2.1 Network Perimeter Control 153 5.2.2 Stateless Firewalls 155 5.2.3 Stateful Firewalls 158 5.2.4 Application-Layer Firewalls 161 5.3 NAT Boxes 163 5.3.1 Allocation of Private IP Addresses 165 5.3.2 Architecture and Operation of the NAT Boxes 168 5.3.3 Living with NAT 172 5.3.4 Carrier-Grade NAT 180 5.4 Load Balancers 184 5.4.1 Load Balancing in a Server Farm 185 5.4.2 A Practical Example: A Load-Balanced Web Service 187 5.4.3 Using DNS for Load Balancing 188 References 191
- 6 Cloud Storage and the Structure of a Modern Data Center 193 6.1 Data Center Basics 195 6.1.1 Compute 196 6.1.2 Storage 196 6.1.3 Networking 198 6.2 Storage-Related Matters 198 6.2.1 Direct-Attached Storage 200 6.2.2 Network-Attached Storage 208 6.2.3 Storage Area Network 215 6.2.4 Convergence of SAN and Ethernet 221 6.2.5 Object Storage 230 6.2.6 Storage Virtualization 233 6.2.7 Solid-State Storage 236 References 242
- 7 Operations, Management, and Orchestration in the Cloud 245 7.1 Orchestration in the Enterprise 247 7.1.1 The Service-Oriented Architecture 253 7.1.2 Workflows 255 7.2 Network and Operations Management 259 7.2.1 The OSI Network Management Framework and Model 261 7.2.2 Policy-Based Management 264 7.3 Orchestration and Management in the Cloud 267 7.3.1 The Life Cycle of a Service 268 7.3.2 Orchestration and Management in OpenStack 274 7.4 Identity and Access Management 287 7.4.1 Implications of Cloud Computing 289 7.4.2 Authentication 291 7.4.3 Access Control 295 7.4.4 Dynamic Delegation 299 7.4.5 Identity Federation 302 7.4.6 OpenStack Keystone (A Case Study) 303 References 309 Appendix: Selected Topics 313 A.1 The IETF Operations and Management Standards 313 A.1.1 SNMP 313 A.1.2 COPS 316 A.1.3 Network Configuration (NETCONF) Model and Protocol 319 A.2 Orchestration with TOSCA 324 A.3 The REST Architectural Style 329 A.3.1 The Origins and Development of Hypermedia 329 A.3.2 Highlights of the World Wide Web Architecture 332 A.3.3 The Principles of REST 334 A.4 Identity and Access Management Mechanisms 336 A.4.1 Password Management 336 A.4.2 Kerberos 338 A.4.3 Access Control Lists 341 A.4.4 Capability Lists 342 A.4.5 The Bell LaPadula Model 343 A.4.6 Security Assertion Markup Language 345 A.4.7 OAuth 2.0 347 A.4.8 OpenID Connect 349 A.4.9 Access Control Markup Language 351 References 353 Index 355.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- New York : Nova Science Publishers, 2016.
- Description
- Book — 1 online resource.
- Summary
-
This book presents original results on the leading edge of computer science research. The first chapter begins by presenting several supervised machine learning methods and their applications in analysing microarray and genotyping data to classify and predict sample phenotypes. Chapter two presents the design and implementation of the EstiNet cloud, and evaluates its performance. Chapter three proposes a simple high switching power supply designed especially for large battery charging. Chapter four studies the constant control of temperature, with the microcontroller PIC, by iterative adjustments of the temperature on a thermal sensor from the heat source. Chapter five proposes two types of pinning control protocols to ensure group consensus regardless of the magnitude of the coupling strengths among the agents. Chapter six describes how point clouds are constructed, and provides a brief discussion on the currently available software that is used for the processing of point clouds. The final chapter reviews the metamodels used to approximate computationally expensive simulations.
(source: Nielsen Book Data)
15. Lean computing for the cloud [2016]
- Bauer, Eric, author.
- [Princeton, NJ] : IEEE Press/Wiley, 2016.
- Description
- Book — 1 online resource
- Summary
-
- Introduction xi Acknowledgments xv Abbreviations xvii
- 1. Basics 1 1.1 Cloud Computing Fundamentals 1 1.2 Roles in Cloud Computing 6 1.3 Applications 9 1.3.1 Application Service Quality 11 1.4 Demand, Supply, Capacity, and Fungibility 13 1.5 Demand Variability 16 1.6 Chapter Review 18
- 2. Rethinking Capacity Management 19 2.1 Capacity Management 19 2.2 Demand Management 21 2.3 Performance Management 21 2.4 Canonical Capacity Management 23 2.4.1 Traditional Capacity Management 24 2.4.2 ITIL Capacity Management 27 2.4.3 eTOM Capacity Management 28 2.4.4 Discussion 30 2.5 Three Cloud Capacity Management Problems 30 2.5.1 Physical Resource Capacity Management 31 2.5.2 Virtual Resource Capacity Management 32 2.5.3 Application Capacity Management 33 2.6 Cloud Capacity Management as a Value Chain 36 2.7 Chapter Review 39
- 3. Lean Thinking on Cloud Capacity Management 41 3.1 Lean Thinking Overview 41 3.2 Goal 42 3.3 Seeing Waste (Nonvalue-Adding Activities) 43 3.3.1 Reserve Capacity 45 3.3.2 Excess Application Capacity 46 3.3.3 Excess Online Infrastructure Capacity 46 3.3.4 Excess Physical Infrastructure Capacity 46 3.3.5 Inadequate Capacity 47 3.3.6 Infrastructure Overhead 48 3.3.7 Capacity Management Overhead 48 3.3.8 Resource Overhead 49 3.3.9 Power Management Overhead 50 3.3.10 Workload Migration 50 3.3.11 Complexity Overhead 51 3.3.12 Resource Allocation Failure 51 3.3.13 Leaking and Lost Resources 53 3.3.14 Waste Heat 53 3.3.15 Carbon Footprint 54 3.4 Key Principles 54 3.4.1 Move toward Flow 55 3.4.2 Pull versus Push 55 3.4.3 Level the Workload 55 3.4.4 Stop and Fix Problems 55 3.4.5 Master Practices 56 3.4.6 Visual Management 57 3.4.7 Use Well-Tested Technology 57 3.4.8 Take a Long-Term Perspective 58 3.4.9 Grow, Learn, and Teach Others 58 3.4.10 Develop Exceptional People 58 3.4.11 Partners Help Each Other Improve 58 3.4.12 Go See 59 3.4.13 Implement Rapidly 59 3.4.14 Become a Learning Organization 59 3.5 Pillar: Respect 59 3.6 Pillar: Continuous Improvement 61 3.7 Foundation 62 3.8 Cadence 62 3.9 Lean Capacity Management Philosophy 63 3.10 Chapter Review 64
- 4. Lean Cloud Capacity Management Strategy 67 4.1 Lean Application Service Provider Strategy 68 4.1.1 User Workload Placement 71 4.1.2 Application Performance Management 73 4.2 Lean Infrastructure Service Provider Strategies 73 4.2.1 Physical Resource Capacity Management 76 4.3 Full Stream Optimization 77 4.4 Chapter Review 79
- 5. Electric Power Generation as Cloud Infrastructure Analog 81 5.1 Power Generation as a Cloud Infrastructure Analog 81 5.2 Business Context 83 5.3 Business Structure 86 5.4 Technical Similarities 88 5.5 Impedance and Fungibility 91 5.6 Capacity Ratings 94 5.7 Bottled Capacity 95 5.8 Location of Production Considerations 95 5.9 Demand Management 97 5.10 Demand and Reserves 98 5.11 Service Curtailment 99 5.12 Balance and Grid Operations 100 5.13 Chapter Review 103
- 6. Application Capacity Management as an Inventory Management Problem 105 6.1 The Application Capacity Management Service Delivery Chain 105 6.2 Traditional Application Service Production Chain 107 6.3 Elasticity and Demand-Driven Capacity Management 108 6.4 Application Service as Retail Analog 110 6.4.1 Locational Consideration 112 6.4.2 Inventory and Capacity 112 6.4.3 Service Level 113 6.4.4 Inventory Carrying Costs 114 6.4.5 Inventory Decision, Planning, and Ordering 115 6.4.6 Agility 118 6.4.7 Changing Consumption Patterns 118 6.5 Chapter Review 118
- 7. Lean Demand Management 119 7.1 Infrastructure Demand Management Techniques 120 7.1.1 Resource Scheduling 121 7.1.2 Resource Curtailment 121 7.1.3 Mandatory Demand Shaping 122 7.1.4 Voluntary Demand Shaping 123 7.1.5 Scheduling Maintenance Actions 123 7.1.6 Resource Pricing 123 7.2 Application Demand Management Techniques 124 7.2.1 Queues and Buffers 124 7.2.2 Load Balancers 124 7.2.3 Overload Controls 125 7.2.4 Explicit Demand Management Actions 125 7.2.5 Scheduling Maintenance Actions 125 7.2.6 User Pricing Strategies 126 7.3 Full Stream Analysis Methodology 126 7.3.1 Analyze Applications' Natural Demand Patterns 127 7.3.2 Analyze Applications' Tolerances 128 7.3.3 Create Attractive Infrastructure Pricing Models 129 7.3.4 Deploy Optimal Infrastructure Demand Management Models 130 7.4 Chapter Review 131
- 8. Lean Reserves 133 8.1 What Is Reserve Capacity? 133 8.2 Uses of Reserve Capacity 135 8.2.1 Random Demand Peaks 135 8.2.2 Component or Resource Failure 136 8.2.3 Infrastructure Element Failure 136 8.2.4 Infrastructure Resource Curtailment or Demand Management Action 137 8.2.5 Demand Exceeding Forecast 137 8.2.6 Lead Time Demand 137 8.2.7 Catastrophic Failures and Force Majeure Events 139 8.3 Reserve Capacity as a Feature 139 8.4 Types of Reserve Capacity 140 8.4.1 Automatic Infrastructure Power Management Controls 140 8.4.2 Utilize Application Reserve Capacity 141 8.4.3 Place/Migrate Demand into Underutilized Capacity 141 8.4.4 Grow Online Capacity 141 8.4.5 Service Curtailment/Degradation 141 8.4.6 Mandatory Demand Shaping 141 8.4.7 Voluntary Demand Shaping 142 8.4.8 Emergency Reserves 142 8.5 Limits of Reserve Capacity 144 8.6 Ideal Reserve 144 8.6.1 Normal (Co-located) Reserve 144 8.6.2 Emergency (Geographically Distributed) Reserve 146 8.7 Chapter Review 147
- 9. Lean Infrastructure Commitment 149 9.1 Unit Commitment and Infrastructure Commitment 150 9.2 Framing the Unit Commitment Problem 151 9.3 Framing the Infrastructure Commitment Problem 153 9.4 Understanding Element Startup Time 155 9.5 Understanding Element Shutdown Time 157 9.6 Pulling It All Together 160 9.7 Chapter Review 166
- 10. Lean Cloud Capacity Management Performance Indicators 167 10.1 Perfect Capacity Metrics 168 10.2 Capacity Management Metrics 172 10.3 Infrastructure Commitment Metrics 173 10.4 Waste Metrics 174 10.4.1 Reserve Capacity Waste Metrics 174 10.4.2 Excess Application Capacity Metrics 175 10.4.3 Excess Online Infrastructure Capacity Metrics 175 10.4.4 Excess Physical Infrastructure Capacity Metrics 175 10.4.5 Inadequate Capacity Metrics 175 10.4.6 Infrastructure Overhead Waste Metrics 176 10.4.7 Capacity Management Overhead Waste Metrics 176 10.4.8 Resource Overhead Waste Metrics 176 10.4.9 Power Management Overhead Waste Metrics 177 10.4.10 Workload Migration Metrics 177 10.4.11 Complexity Overhead Metrics 178 10.4.12 Resource Allocation Failure Metrics 178 10.4.13 Leaking and Lost Resources 179 10.4.14 Waste Heat Metrics 179 10.4.15 Carbon Footprint Metrics 180 10.5 Key Principle Indicators 180 10.6 Cost of Poor Quality 181 10.7 Metrics and Service Boundaries 182 10.8 Measurements and Maturity 183 10.9 Chapter Review 185
- 11. Summary 187 11.1 Cloud Computing as a Service Delivery Chain 187 11.2 Lean Cloud Computing 190 11.3 Reimagining Cloud Capacity 192 11.4 Lean Demand Management 195 11.5 Lean Reserves 197 11.6 Lean Infrastructure Service Provider Considerations 198 11.7 Lean Application Service Provider Considerations 198 11.8 Lean Infrastructure Commitment 199 11.9 Visualizing Perfect Capacity 201 11.10 Lean Cloud Computing Metrics 203 11.11 Concluding Remarks 204 References 207 About the Author 211 Index 213.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Verma, Dinesh C.
- Hoboken, New Jersey : John Wiley & Sons Inc., [2014]
- Description
- Book — 1 online resource.
- Summary
-
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers
17. Computer architecture technology trends [1991]
- Second edition. - Minneapolis, Minnesota : Architecture Technology Corporation, 1991. Oxford, United Kingdom : Distributed outside the USA/Canada by Elsevier Advanced Technology,
- Description
- Book — 1 online resource.
- Chebel-Morello, Brigitte, author.
- London, UK : ISTE, Ltd. ; Hoboken, NJ : Wiley, 2017.
- Description
- Book — 1 online resource.
- Summary
-
- Part 1. Traceability of Information and Knowledge Management 1. Intelligent Traceability of Equipment. 2. A Knowledge-orientedâ ¨ Maintenance Platform. 3. Intelligent Traceability Application.
- Part 2. Post-prognostic Decision 4. Position of Decision within the PHM Context. 5. Towards a Policy ofâ ¨ Predictive Maintenance. 6. Maintenance in Operational Conditions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
19. Horizons in computer science research [2017]
- New York : Nova Science Publishers, [2017]
- Description
- Book — 1 online resource.
- Summary
-
- Preface
- Trajectory Planning
- Mobile Technology: Advances, Applications & Challenges
- Accessibility Models of Cloud Services Based on a Distributed Cloud Architecture
- Parallel Dynamic Programming for Large-Scale Data Applications
- Ensemble of Both Texture & Color Features for Reliable Person Re-Identification
- Detecting Movement within Indoor Environments Using Passive & Active Tracking Technologies
- Quadratic Programming Formulation for Controlling the Emissions of Air Pollution Point Sources
- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Houndmills, Basingstoke, Hampshire ; New York : Palgrave Macmillan, 2016.
- Description
- Book — 1 online resource (viii, 298 pages.)
- Summary
-
- Introduction -Leslie Willcocks, Chris Sauer and Mary Lacity.- PART I. CRITICAL RESEARCH.- Chapter 1: Doolin, B. (1998), "Information technology as disciplinary technology: being critical in interpretive research on information systems, " JIT, Vol. 13, pp. 301-311.- Chapter 2: Brooke, C. (2002), "What does it mean to be 'critical' in IS research?" JIT, Vol. 17, pp. 49-57.- Chapter 3: Brook, C. (2002), "Critical perspectives on information systems-- an impression of the research landscape, " JIT, Vol. 17, pp. 271-283.- Chapter 4: Doolin, B. and Lowe, A. (2002), "To reveal is to critique: actor-network theory and critical information systems research, " JIT, Vol. 17, 69-78-. Chapter 5: Cecez-Kecmanovic, D., Janson, M., and Brown, A. (2002), "The rationality framework for a critical study of information systems, JIT, Vol. 17, pp. 215-227.- PART II. GROUNDED THEORY APPROACHES.- Chapter 6: Urquhart, C. and Fernandez, W. (2013), "Using grounded theory method in information systems: the researcher as blank slate and other myths, " JIT, Vol. 28, pp. 224-236.- Chapter 7: Seidel, S., and Urquhart, C. (2013), "On emergence and forcing in information systems grounded theory studies: the case of Strauss and Corbin, " JIT, Vol. 28, pp. 237-260.- PART III. HISTORICAL APPROACHES.- Chapter 8: Land, F. (2010), "The use of history in IS research: an opportunity missed?" JIT, Vol. 25, pp. 385-394.- Chapter 9: Mitev, N., de Vaujany, F.X. (2012), "Seizing the opportunity: towards a historiography of information systems, " JIT, Vol. 27, pp. 110-124-. Chapter 10: Bonner, W. (2013), "History and IS - Broadening our view and understanding: Actor-Network Theory as a methodology, " JIT, Vol. 28, pp. 111-123.
- .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.