UofL Interlibrary loan is a FREE service that will assist you in obtaining articles and books that UofL doesn't normally have access to. Use your ULINK ID & password to login.
Search the University of Louisville Catalog
A Sample of Computer Engineering and Computer Science Books
At the Nexus of Cybersecurity and Public Policy by David Clark (Editor); Thomas Berson (Editor); Herbert S. Lin (Editor); Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work Committee; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council StaffWe depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.
ISBN: 9780309303187
Publication Date: 2014-07-16
Computational Biology and Bioinformatics by Ka-Chun Wong (Editor)The advances in biotechnology such as the next generation sequencing technologies are occurring at breathtaking speed. Advances and breakthroughs give competitive advantages to those who are prepared. However, the driving force behind the positive competition is not only limited to the technological advancement, but also to the companion data analytical skills and computational methods which are collectively called computational biology and bioinformatics. Without them, the biotechnology-output data by itself is raw and perhaps meaningless. To raise such awareness, we have collected the state-of-the-art research works in computational biology and bioinformatics with a thematic focus on gene regulation in this book. This book is designed to be self-contained and comprehensive, targeting senior undergraduates and junior graduate students in the related disciplines such as bioinformatics, computational biology, biostatistics, genome science, computer science, applied data mining, applied machine learning, life science, biomedical science, and genetics. In addition, we believe that this book will serve as a useful reference for both bioinformaticians and computational biologists in the post-genomic era.
ISBN: 9781498724975
Publication Date: 2016-05-09
Distributed Control Methods and Cyber Security Issues in Microgrids by Wenchao Meng (Editor); Xiaoyu Wang (Editor); Shichao Liu (Editor)Distributed Control and Cyber Security Issues in Microgrids presents a thorough treatment of distributed control methods and cyber security issues for power system researchers and engineers. With the help of mathematical tools, this reference gives a deep understanding of microgrids and new research directions, addressing emerging concepts, methodologies and applications of monitoring, control and protection in smart microgrids with large-scale renewables. With the integration of more distributed or aggregated renewables and the wide utilization of power electronic devices, the smart microgrid is facing new stability and security challenges. Includes global case studies to demonstrate distributed control success stories Offers detailed illustrations and flowcharts to address challenges and technical solutions for those working in power systems in utilities and industry Showcases new challenges faced in the stability and security of smart microgrids
ISBN: 9780128169476
Publication Date: 2020-03-22
Evolutionary Algorithms for Mobile Ad Hoc Networks by Pascal Bouvry; Patricia Ruiz; Gregoire Danoy; Yoann Pigne; Bernabé DorronsoroDescribes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks--each of these require a designer's keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process--allowing designers to put some "intelligence" or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms, topology management, and mobility models to address challenges in the field. Evolutionary Algorithms for Mobile Ad Hoc Networks: Instructs on how to identify, model, and optimize solutions to problems that arise in daily research Presents complete and up-to-date surveys on topics like network and mobility simulators Provides sample problems along with solutions/descriptions used to solve each, with performance comparisons Covers current, relevant issues in mobile networks, like energy use, broadcasting performance, device mobility, and more Evolutionary Algorithms for Mobile Ad Hoc Networks is an ideal book for researchers and students involved in mobile networks, optimization, advanced search techniques, and multi-objective optimization.
ISBN: 9781118832011
Publication Date: 2014-04-08
Fundamentals of Computational Intelligence by James M. Keller; Derong Liu; David B. FogelProvides an in-depth and even treatment of the three pillars of computational intelligence and how they relate to one another This book covers the three fundamental topics that form the basis of computational intelligence: neural networks, fuzzy systems, and evolutionary computation. The text focuses on inspiration, design, theory, and practical aspects of implementing procedures to solve real-world problems. While other books in the three fields that comprise computational intelligence are written by specialists in one discipline, this book is co-written by current former Editor-in-Chief of IEEE Transactions on Neural Networks and Learning Systems, a former Editor-in-Chief of IEEE Transactions on Fuzzy Systems, and the founding Editor-in-Chief of IEEE Transactions on Evolutionary Computation. The coverage across the three topics is both uniform and consistent in style and notation. Discusses single-layer and multilayer neural networks, radial-basis function networks, and recurrent neural networks Covers fuzzy set theory, fuzzy relations, fuzzy logic interference, fuzzy clustering and classification, fuzzy measures and fuzzy integrals Examines evolutionary optimization, evolutionary learning and problem solving, and collective intelligence Includes end-of-chapter practice problems that will help readers apply methods and techniques to real-world problems Fundamentals of Computational intelligence is written for advanced undergraduates, graduate students, and practitioners in electrical and computer engineering, computer science, and other engineering disciplines.
ISBN: 9781119214359
Publication Date: 2016-07-12
Future Crimes by Marc GoodmanNEW YORK TIMES and WALL STREET JOURNAL BESTSELLER One of the world's leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you--and how this makes everyone more vulnerable than ever imagined. Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims' every move. We all know today's criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that's just the beginning. To date, no computer has been created that could not be hacked--a sobering fact given our radical dependence on these machines for everything from our nation's power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today's Internet is the size of a golf ball, tomorrow's will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car's brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology's tremendous power for the betterment of humanity--before it's too late.
ISBN: 9780385539005
Publication Date: 2015-02-24
Handbook of Computational Intelligence in Biomedical Engineering and Healthcare by Janmenjoy Nayak (Editor); Bighnaraj Naik (Editor); Danilo Pelusi (Editor); Asit Kumar Das (Editor)Handbook of Computational Intelligence in Biomedical Engineering and Healthcare helps readers analyze and conduct advanced research in specialty healthcare applications surrounding oncology, genomics and genetic data, ontologies construction, bio-memetic systems, biomedical electronics, protein structure prediction, and biomedical data analysis. The book provides the reader with a comprehensive guide to advanced computational intelligence, spanning deep learning, fuzzy logic, connectionist systems, evolutionary computation, cellular automata, self-organizing systems, soft computing, and hybrid intelligent systems in biomedical and healthcare applications. Sections focus on important biomedical engineering applications, including biosensors, enzyme immobilization techniques, immuno-assays, and nanomaterials for biosensors and other biomedical techniques. Other sections cover gene-based solutions and applications through computational intelligence techniques and the impact of nonlinear/unstructured data on experimental analysis. Presents a comprehensive handbook that covers an Introduction to Computational Intelligence in Biomedical Engineering and Healthcare, Computational Intelligence Techniques, and Advanced and Emerging Techniques in Computational Intelligence Helps readers analyze and do advanced research in specialty healthcare applications Includes links to websites, videos, articles and other online content to expand and support primary learning objectives
ISBN: 9780128222614
Publication Date: 2021-04-08
Modeling and Optimization of Parallel and Distributed Embedded Systems by Arslan Munir; Ann Gordon-Ross; Sanjay RankaThis book introduces the state-of-the-art in research in parallel and distributed embedded systems, which have been enabled by developments in silicon technology, micro-electro-mechanical systems (MEMS), wireless communications, computer networking, and digital electronics. These systems have diverse applications in domains including military and defense, medical, automotive, and unmanned autonomous vehicles. The emphasis of the book is on the modeling and optimization of emerging parallel and distributed embedded systems in relation to the three key design metrics of performance, power and dependability. Key features: Includes an embedded wireless sensor networks case study to help illustrate the modeling and optimization of distributed embedded systems. Provides an analysis of multi-core/many-core based embedded systems to explain the modeling and optimization of parallel embedded systems. Features an application metrics estimation model; Markov modeling for fault tolerance and analysis; and queueing theoretic modeling for performance evaluation. Discusses optimization approaches for distributed wireless sensor networks; high-performance and energy-efficient techniques at the architecture, middleware and software levels for parallel multicore-based embedded systems; and dynamic optimization methodologies. Highlights research challenges and future research directions. The book is primarily aimed at researchers in embedded systems; however, it will also serve as an invaluable reference to senior undergraduate and graduate students with an interest in embedded systems research.
ISBN: 9781119086390
Publication Date: 2015-12-28
Python for Data Analysis by Wes McKinneyPython for Data Analysis is concerned with the nuts and bolts of manipulating, processing, cleaning, and crunching data in Python. It is also a practical, modern introduction to scientific computing in Python, tailored for data-intensive applications. This is a book about the parts of the Python language and libraries you'll need to effectively solve a broad set of data analysis problems. This book is not an exposition on analytical methods using Python as the implementation language. Written by Wes McKinney, the main author of the pandas library, this hands-on book is packed with practical cases studies. It's ideal for analysts new to Python and for Python programmers new to scientific computing. Use the IPython interactive shell as your primary development environment Learn basic and advanced NumPy (Numerical Python) features Get started with data analysis tools in the pandas library Use high-performance tools to load, clean, transform, merge, and reshape data Create scatter plots and static or interactive visualizations with matplotlib Apply the pandas groupby facility to slice, dice, and summarize datasets Measure data by points in time, whether it's specific instances, fixed periods, or intervals Learn how to solve problems in web analytics, social sciences, finance, and economics, through detailed examples
ISBN: 9781449319793
Publication Date: 2012-11-01
Simulation by Sheldon M. RossSimulation, Sixth Edition continues to introduce aspiring and practicing actuaries, engineers, computer scientists and others to the practical aspects of constructing computerized simulation studies to analyze and interpret real phenomena. Readers will learn to apply the results of these analyses to problems in a wide variety of fields to obtain effective, accurate solutions and make predictions. By explaining how a computer can be used to generate random numbers and how to use these random numbers to generate the behavior of a stochastic model over time, this book presents the statistics needed to analyze simulated data and validate simulation models. Includes updated content throughout Offers a wealth of practice exercises as well as applied use of free software package R Features the author's well-known, award-winning and accessible approach to complex information
ISBN: 9780323899611
Publication Date: 2022-06-14
Software War Stories by Donald J. ReiferA comprehensive, practical book on software management that dispels real-world issues through relevant case studies Software managers inevitably will meet obstacles while trying to deliver quality products and provide value to customers, often with tight time restrictions. The result: Software War Stories. This book provides readers with practical advice on how to handle the many issues that can arise as a software project unfolds. It utilizes case studies that focus on what can be done to establish and meet reasonable expectations as they occur in government, industrial, and academic settings. The book also offers important discussions on both traditional and agile methods as well as lean development concepts. Software War Stories: Covers the basics of management as applied to situations ranging from agile projects to large IT projects with infrastructure problems Includes coverage of topics ranging from planning, estimating, and organizing to risk and opportunity management Uses twelve case studies to communicate lessons learned by the author in practice Offers end-of-chapter exercises, sample solutions, and a blog for providing updates and answers to readers' questions Software War Stories: Case Studies in Software Management mentors practitioners, software engineers, students and more, providing relevant situational examples encountered when managing software projects and organizations.
ISBN: 9781118650745
Publication Date: 2013-10-14
Working with Text by Emma Tonkin; Stephanie Taylor; Gregory J. L TourteWhat is text mining, and how can it be used? What relevance do these methods have to everyday work in information science and the digital humanities? How does one develop competences in text mining? Working with Text provides a series of cross-disciplinary perspectives on text mining and its applications. As text mining raises legal and ethical issues, the legal background of text mining and the responsibilities of the engineer are discussed in this book. Chapters provide an introduction to the use of the popular GATE text mining package with data drawn from social media, the use of text mining to support semantic search, the development of an authority system to support content tagging, and recent techniques in automatic language evaluation. Focused studies describe text mining on historical texts, automated indexing using constrained vocabularies, and the use of natural language processing to explore the climate science literature. Interviews are included that offer a glimpse into the real-life experience of working within commercial and academic text mining. Introduces text analysis and text mining tools Provides a comprehensive overview of costs and benefits Introduces the topic, making it accessible to a general audience in a variety of fields, including examples from biology, chemistry, sociology, and criminology