451 results (0,20214 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Computer Architecture Fundamentals and Principles of Computer Design Second Edition

Not only does almost everyone in the civilized world use a personal computer smartphone and/or tablet on a daily basis to communicate with others and access information but virtually every other modern appliance vehicle or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile for example without several computers on board to do everything from monitoring exhaust emissions to operating the anti-lock brakes to telling the transmission when to shift and so on. Appliances such as clothes washers and dryers microwave ovens refrigerators etc. are almost all digitally controlled. Gaming consoles like Xbox PlayStation and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere even when we don’t see them as such and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture and suitable for use in an undergraduate CS EE or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course the reader should be familiar with computer programming concepts in at least one language such as C C++ or Java. Previous courses in operating systems assembly language and/or systems programming would be helpful but are not essential. | Computer Architecture Fundamentals and Principles of Computer Design Second Edition

GBP 56.99
1

Computer Algebra Concepts and Techniques

International e-Conference on Computer Science (IeCCS 2005)

Computer Access for People with Disabilities A Human Factors Approach

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security Cybersecurity Laws Internet of Things (IoT) and Mobile Devices is an introductory text addressing current technology trends and security issues. While many books on the market cover investigations forensic recovery and presentation of evidence and others explain computer and network security this book explores both explaining the essential principles governing computers wireless and mobile devices the Internet of Things cloud systems and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered investigated and adjudicated unless they are understood. The legal portion of the book is an overview of the legal system in the United States including cyberlaw standards and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances. Key Features: Provides a strong foundation of cybercrime knowledge along with the core concepts of networking computer security Internet of Things (IoTs) and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices cloud computing Software-as-a-Service (SaaS) VMware and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security concepts that are often glossed over in many textbooks and includes the study of cybercrime as critical forward-looking cybersecurity challenges. Cybercrime and Information Technology is a welcome addition to the literature particularly for those professors seeking a more hands-on forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum and is relevant to those studying Security Administration Public Administrations Police Studies Business Administration Computer Science and Information Systems. A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction. | Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

GBP 62.99
1

Statistical Methods in Computer Security

Intelligent Systems and Applications in Computer Vision

Intelligent Systems and Applications in Computer Vision

The book comprehensively covers a wide range of evolutionary computer vision methods and applications feature selection and extraction for training and classification and metaheuristic algorithms in image processing. It further discusses optimized image segmentation its analysis pattern recognition and object detection. Features: Discusses machine learning-based analytics such as GAN networks autoencoders computational imaging and quantum computing Covers deep learning algorithms in computer vision Showcases novel solutions such as multi-resolution analysis in imaging processing and metaheuristic algorithms for tackling challenges associated with image processing Highlight optimization problems such as image segmentation and minimized feature design vector Presents platform and simulation tools for image processing and segmentation The book aims to get the readers familiar with the fundamentals of computational intelligence as well as the recent advancements in related technologies like smart applications of digital images and other enabling technologies from the context of image processing and computer vision. It further covers important topics such as image watermarking steganography morphological processing and optimized image segmentation. It will serve as an ideal reference text for senior undergraduate graduate students and academic researchers in fields including electrical engineering electronics communications engineering and computer engineering. | Intelligent Systems and Applications in Computer Vision

GBP 140.00
1

Computer Vision and Image Processing Fundamentals and Applications

CoCo The Colorful History of Tandy’s Underdog Computer

CoCo The Colorful History of Tandy’s Underdog Computer

CoCo: The Colorful History of Tandy‘s Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo) a popular 8-bit PC series from the 1980s that competed against the era‘s biggest names including the Apple II IBM PC and Commodore 64. The book takes you inside the interesting stories and people behind this unique underdog computer. Both noted computer science and technology advocates authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy‘s CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo from the original Tandy executives and engineers to today‘s active product creators and information keepers. The CoCo impacted many lives and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges it covers all the aspects that made the CoCo a truly personal useful computing experience in as small and inexpensive a package as possible. | CoCo The Colorful History of Tandy’s Underdog Computer

GBP 180.00
1

Brain–Computer Interfaces Handbook Technological and Theoretical Advances

Brain–Computer Interfaces Handbook Technological and Theoretical Advances

Brain–Computer Interfaces Handbook: Technological and Theoretical Advances provides a tutorial and an overview of the rich and multi-faceted world of Brain–Computer Interfaces (BCIs). The authors supply readers with a contemporary presentation of fundamentals theories and diverse applications of BCI creating a valuable resource for anyone involved with the improvement of people’s lives by replacing restoring improving supplementing or enhancing natural output from the central nervous system. It is a useful guide for readers interested in understanding how neural bases for cognitive and sensory functions such as seeing hearing and remembering relate to real-world technologies. More precisely this handbook details clinical therapeutic and human-computer interfaces applications of BCI and various aspects of human cognition and behavior such as perception affect and action. It overviews the different methods and techniques used in acquiring and pre-processing brain signals extracting features and classifying users’ mental states and intentions. Various theories models and empirical findings regarding the ways in which the human brain interfaces with external systems and environments using BCI are also explored. The handbook concludes by engaging ethical considerations open questions and challenges that continue to face brain–computer interface research. Features an in-depth look at the different methods and techniques used in acquiring and pre-processing brain signals extracting features and classifying the user's intention Covers various theories models and empirical findings regarding ways in which the human brain can interface with the systems or external environments Presents applications of BCI technology to understand various aspects of human cognition and behavior such as perception affect action and more Includes clinical trials and individual case studies of the experimental therapeutic applications of BCI Provides human factors and human-computer interface concerns in the design development and evaluation of BCIs Overall this handbook provides a synopsis of key technological and theoretical advances that are directly applicable to brain–computer interfacing technologies and can be readily understood and applied by individuals with no formal training in BCI research and development. | Brain–Computer Interfaces Handbook Technological and Theoretical Advances

GBP 99.99
1

Computer-Aided Glaucoma Diagnosis System

Computer-Aided Glaucoma Diagnosis System

Glaucoma is the second leading cause of blindness globally. Early detection and treatment can prevent its progression to avoid total blindness. This book discusses and reviews current approaches for detection and examines new approaches for diagnosing glaucoma using CAD system. Computer-Aided Glaucoma Diagnosis System Chapter 1 provides a brief introduction of the disease and current methodology used to diagnose it today. Chapter 2 presents a review of the medical background of the disease followed by a theoretical and mathematical background used in fundus image processing. Chapter 3 is a literature review about segmentation and feature extraction. Chapter 4 describes the formulation of the proposed methodology. In Chapter 5 the results of optic disc and optic cup segmentation algorithm are presented the feature extraction and selection method experimental results and performance evaluations of the classifier are given. Chapter 6 presents the conclusions and discussion of the future potential for the diagnostic system. This book is intended for biomedical engineers computer science students ophthalmologists and radiologists looking to develop a reliable automated computer-aided diagnosis system (CAD) for detecting glaucoma and improve diagnosis of the disease. Key Features Discusses a reliable automated computer-aided diagnosis system (CAD) for detecting glaucoma and presents an algorithm that detects optic disc and optic cup Assists ophthalmologists and researchers to test a new diagnostic method that reduces the effort and time of the doctors and cost to the patients Discusses techniques to reduce human error and minimize the miss detection rate and facilitate early diagnosis and treatment Presents algorithms to detect cup and disc color shape features and RNFL texture features Dr. Arwa Ahmed Gasm Elseid is an assistant professor Department of Biomedical Engineering Sudan University of Science and Technology Khartoum Sudan. Dr. Alnazier Osman Mohammed Hamza is professor of Medical Imaging College of Engineering Sudan University of Sciences and Technology Khartoum Sudan.

GBP 105.00
1

Deep Learning in Computer Vision Principles and Applications

Brain Computer Interface EEG Signal Processing

Introduction to Mechanism Design with Computer Applications

Human-Computer Interaction and Cybersecurity Handbook

Encyclopedia of Computer Science and Technology Volume 39 - Supplement 24 - Entity Identification to Virtual Reality in Driving Simulation

Computer Methods in Structural Analysis

Real-World Software Projects for Computer Science and Engineering Students

Real-Time Expert Systems Computer Architecture

Behavioral Cybersecurity Applications of Personality Psychology and Computer Science

Behavioral Cybersecurity Applications of Personality Psychology and Computer Science

Since the introduction and proliferation of the Internet problems involved with maintaining cybersecurity has grown exponentially and have evolved into many forms of exploitation. Yet Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years has been done by those with computer science electrical engineering and mathematics backgrounds. However many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science engineering and mathematics but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science such as psychology behavioral economics and other aspects of brain science. The authors one a computer scientist and the other a psychologist have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call behavioral cybersecurity. The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity and also psychological and human factors approaches as well. Features Discusses profiling approaches and risk management Includes case studies of major cybersecurity events and Fake News Presents analyses of password attacks and defenses Addresses game theory behavioral economics and their application to cybersecurity Supplies research into attacker/defender personality and motivation traits Techniques for measuring cyber attacks/defenses using crypto and stego | Behavioral Cybersecurity Applications of Personality Psychology and Computer Science

GBP 84.99
1

Introduction to Computer Graphics with OpenGL ES

Chemotaxis Modeling of Autoimmune Inflammation PDE Computer Analysis in R