Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
7,952,657
result(s) for
"Computers and IT."
Sort by:
Essential algorithms : a practical approach to computer algorithms using Python and C#
The revised and updated second edition of 'Essential Algorithms' offers an accessible introduction to computer algorithms. The book contains a description of important classical algorithms and explains when each is appropriate. The author shows how to analyse algorithms in order to understand their behaviour and teaches techniques that the can be used to create new algorithms to meet future needs. The text includes useful algorithms such as: methods for manipulating common data structures, advanced data structures, network algorithms, and numerical algorithms. It also offers a variety of general problem-solving techniques. In addition to describing algorithms and approaches, the author offers details on how to analyse the performance of algorithms.
Introduction to EEG- and speech-based emotion recognition
by
Mehrotra, Suresh C.
,
Gawali, Bharti W.
,
Abhang, Priyanka A
in
Brain-computer interfaces
,
Electroencephalography
,
Emotions
2016
Introduction to EEG- and Speech-Based Emotion Recognition Methods examines the background, methods, and utility of using electroencephalograms (EEGs) to detect and recognize different emotions.By incorporating these methods in brain-computer interface (BCI), we can achieve more natural, efficient communication between humans and computers.
Face with tears of joy : a natural history of emoji
2025
We are surrounded by emoji. They appear in politics, movies, drug deals, our sex lives and more. But emoji's impact has never been explored in full. Named for the world's most popular pictogram, 'Face with Tears of Joy' tells the whole story of emoji for the first time. In this rollicking tech and pop culture history, Keith Houston follows emoji from their birth in 1990s Japan, traces their Western explosion in the 2000s and considers emoji's ever-expanding lexicon. Along the way, Houston explores vital developments in tech history and reveals the body of technocrats governing this 3,600-character language. He also addresses the eggplants in the room: risqué emojis, controversy and accusations of 'selling out'. Finally, readers learn about the future of emoji as some of the language's pioneers consider what comes next.
Connected Code
by
Yasmin B. Kafai
,
Quinn Burke
in
Computer programming
,
Computer programming -- Study and teaching (Secondary)
,
Computers and children
2014
Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage \"computational thinking\" -- which has now become the umbrella term for understanding what computer science has to contribute to reasoning and communicating in an ever-increasingly digital world.InConnected Code,Yasmin Kafai and Quinn Burke argue that although computational thinking represents an excellent starting point, the broader conception of \"computational participation\" better captures the twenty-first-century reality. Computational participation moves beyond the individual to focus on wider social networks and a DIY culture of digital \"making.\" Kafai and Burke describe contemporary examples of computational participation: students who code not for the sake of coding but to create games, stories, and animations to share; the emergence of youth programming communities; the practices and ethical challenges of remixing (rather than starting from scratch); and the move beyond stationary screens to programmable toys, tools, and textiles.
Introduction to modern cryptography
by
Katz, Jonathan, 1974- author
,
Lindell, Yehuda, author
in
Computer security.
,
Cryptography.
,
Computers and IT.
2021
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. This book provides a rigorous yet accessible treatment of this fascinating subject.
Research methods in human-computer interaction
by
Lazar, Jonathan
,
Hochheiser, Harry
,
Feng, Jinjuan Heidi
in
Human-computer interaction -- Research
2017
Research Methods in Human-Computer Interaction is a comprehensive guide to performing research and is essential reading for both quantitative and qualitative methods.Since the first edition was published in 2009, the book has been adopted for use at leading universities around the world, including Harvard University, Carnegie-Mellon University.
AI chatbots : the good, the bad, and the ugly
by
Crowder, James, author
,
Carbone, John, contributor
in
Chatbots.
,
Artificial intelligence.
,
Computers and IT.
2024
This volume explores the subject of artificial psychology from the standpoint of how online Chatbots have infiltrated and affected societies and the world in general. The book explores the psychological effects of depending on an online entity for our needs - even if it's a reminder of scheduled events. The author provides insight into the notion of human-Chatbot exchanges, understanding, and false emotions both from the Chatbot and from the human. He goes on to investigate and discuss the dangers of too much reliance on technology that learns from a variety of sources and how some sources can negatively influence Chatbots, and by doing so, negatively affect people.
Practical Industrial Internet of Things Security
by
Bhattacharjee, Sravani
in
Computer networks
,
COMPUTERS / Computer Architecture
,
Internet of things
2018,2024
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.
Generative AI
'Generative AI For Dummies' is your roadmap to using the world of artificial intelligence to enhance your personal and professional lives. You'll learn how to identify the best platforms for your needs and write the prompts that coax out the content you want.
Network routing: algorithms, protocols, and architectures
by
Ramasamy, Karthik
,
Medhi, Deep
in
Computer network architectures
,
Computer networks
,
Routers (Computer networks)
2017
Network Routing: Algorithms, Protocols, and Architectures, Second Edition explores network routing and how it can be broadly categorized into Internet routing, PSTN routing, and telecommunication transport network routing. The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing. Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive. Bridges the gap between theory and practice in network routing, including the fine points of implementation and operational experienceRouting in a multitude of technologies discussed in practical detail, including, IP/MPLS, PSTN, and optical networkingPresents routing protocols such as OSPF, IS-IS, BGP in detailDetails various router and switch architecturesDiscusses algorithms on IP-lookup and packet classificationAccessible to a wide audience with a vendor-neutral approach