Innovative Applications Of Information Technology For The Developing World - Proceedings Of The 3rd Asian Applied Computing Conference (Aacc 2005)

Innovative Applications Of Information Technology For The Developing World - Proceedings Of The 3rd Asian Applied Computing Conference (Aacc 2005)
Author: Hirendra Man Pradhan
Publisher: World Scientific
Total Pages: 483
Release: 2007-07-02
Genre: Computers
ISBN: 1908979186

Information and communication technology (ICT) has become a generic and indispensable tool for addressing and solving problems in such diverse areas as management, social and health services, transportation, security and education. As the cost of equipment drops dramatically, it also becomes widely accessible in the developing countries. However, problems of high costs for adequate training of personnel, access to state-to-the-art software and the consultancies needed to facilitate access to ICT can constitute highly dissuasive factors in the dissemination of ICT in developing countries.This volume describes a series of successful initiatives for the insertion of ICT in developing economies. It also identifies significant problems that are likely to be encountered, and suggests useful solutions to these problems. It therefore serves as a useful tool for example applications, and for the successful assimilation of these technologies in developing societies and countries./a

Human Computer Interaction

Human Computer Interaction
Author: Panayiotis Zaphiris
Publisher: IGI Global
Total Pages: 2765
Release: 2009-01-01
Genre: Computers
ISBN: 1605660531

Penetrates the human computer interaction (HCI) field with breadth and depth of comprehensive research.

Intelligent Information and Database Systems

Intelligent Information and Database Systems
Author: Jeng-Shyang Pan
Publisher: Springer Science & Business Media
Total Pages: 593
Release: 2012-03-02
Genre: Computers
ISBN: 3642284892

The three-volume set LNAI 7196, LNAI 7197 and LNAI 7198 constitutes the refereed proceedings of the 4th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2012, held in Kaohsiung, Taiwan in March 2012. The 161 revised papers presented were carefully reviewed and selected from more than 472 submissions. The papers included cover the following topics: intelligent database systems, data warehouses and data mining, natural language processing and computational linguistics, semantic Web, social networks and recommendation systems, collaborative systems and applications, e-bussiness and e-commerce systems, e-learning systems, information modeling and requirements engineering, information retrieval systems, intelligent agents and multi-agent systems, intelligent information systems, intelligent internet systems, intelligent optimization techniques, object-relational DBMS, ontologies and knowledge sharing, semi-structured and XML database systems, unified modeling language and unified processes, Web services and semantic Web, computer networks and communication systems.

System Reliability and Security

System Reliability and Security
Author: Javaid Iqbal
Publisher: CRC Press
Total Pages: 273
Release: 2023-12-07
Genre: Computers
ISBN: 1003808107

Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques, cutting-edge research topics, and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed.

Applied Computing

Applied Computing
Author: Suresh Manandhar
Publisher: Springer
Total Pages: 345
Release: 2005-01-11
Genre: Computers
ISBN: 3540301763

The focus of the Asian Applied Computing Conference (AACC) is primarily to bring the research in computer science closer to practical applications. The conference is aimed primarily at topics that have immediate practical bene?ts. By hosting the conf- ence in the developingnations in Asia we aim to provide a forum for engagingboth the academic and the commercial sectors in that region. The ?rst conference “Information Technology Prospects and Challenges” was held in May 2003 in Kathmandu, Nepal. Thisyear theconferencenamewas changedto “Asian AppliedComputingConference” to re?ect both the regional- and the application-oriented nature of the conference. AACC is planned to be a themed conference with a primary focus on a small set of topics although other relevant applied topics will be considered. The theme in AACC 2004 was on the following topics: systems and architectures, mobile and ubiquitous computing, soft computing, man machine interfaces,and innovative applications for the developing world. AACC 2004 attracted 184 paper submissions from around the world, making the reviewing and the selection process tough and time consuming. The selected papers covered a wide range of topics: genetic algorithms and soft computing; scheduling, - timization andconstraintsolving; neuralnetworksandsupportvectormachines;natural language processing and information retrieval; speech and signal processing; networks and mobile computing; parallel, grid and high-performance computing; innovative - plications for the developing world; cryptography and security; and machine lea- ing. Papers were primarily judged on originality, presentation, relevance and quality of work. Papers that had clearly demonstrated results were given preference.

Architecting Secure Software Systems

Architecting Secure Software Systems
Author: Asoke K. Talukder
Publisher: CRC Press
Total Pages: 461
Release: 2008-12-17
Genre: Computers
ISBN: 1040169511

Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime, it has become imperative that security be an integral part of software engineering so tha

Mobile Computing

Mobile Computing
Author: Asoke K Talukder
Publisher: McGraw-Hill Education
Total Pages: 672
Release: 2006-10-26
Genre: Computers
ISBN: 9780071477338

The user in a mobile computing environment is able to access data from any device in a network while on the move, spread across wired and wireless media. The technology to deliver on this promise now exists, and is one of the key drivers for growth across the telecommunications industry. This book provides a detailed survery of the technologies delivering true mobile computing – on both the service creation and device fronts. This book guides communications professionals and students through the complex web of acronyms, standards that wireless data runs on. It also details hot button security issues and new emerging technologies.

Mobile Computing, 2E

Mobile Computing, 2E
Author: Asoke K. Talukdar
Publisher: Tata McGraw-Hill Education
Total Pages: 0
Release: 2010-07-10
Genre: Mobile computing
ISBN: 9780070144576

Mobile Computing technology addresses challenges that enable the realization of the global village concept where people can seamlessly access any information from anywhere through any device, while stationary or even at a state of mobility. This book covers all the communication technologies starting from First Generation to Third Generation cellular technology, wireless LAN(WiFi), and wireless broadband(WiMax). It covers intelligent networks (IN) and emerging technologies like mobile IP, IPv6, and VoIP (Voice over IP). Written by a professional who has worked on several technologies, the book is replete with illustrations, examples, programs, interesting asides and much more! A storehouse of the most recent developments in the world of wireless, the book aims to fulfill the growing information and knowledge needs of a vast segment of interested audience: students, professionals, teachers and even non-technical people. Since it provides the big picture of all the technologies from CTI (computer technology interface) to 3G (third generation) including Bluetooth, IN, WiFi and WiMax, as well as the service creation aspects, the book will be an indispensable repository of contemporary developments in the ever-expanding field of wireless services and mobile computing.