Computer Information Systems


Book Description

These case studies are part of an on-going curriculum and simulations development project between the College of Saint Scholastica's School of Business and Technology (SBT) and Learning-Games.net (www.learningames.net), and are designed to help students explore the field of information systems analysis through case simulations and role-playing game (RPG) scenarios. In addition, they can be used in combination with a queueing theory model and both continuous, as well as discrete-event simulations. The related RPG scenarios focus on real-life systems found in performance and management information systems. In short, through the case studies presented in this collection, students will explore mission critical computer information systems designed to teach and explore analytic thinking and best practices through operations research modeling methods and solution algorithms.




Computer Architecture


Book Description




Computer Science Programming Basics in Ruby


Book Description

If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you’ll quickly understand the difference between computer science and computer programming, and you’ll learn how algorithms help you solve computing problems. Each chapter builds on material introduced earlier in the book, so you can master one core building block before moving on to the next. You’ll explore fundamental topics such as loops, arrays, objects, and classes, using the easy-to-learn Ruby programming language. Then you’ll put everything together in the last chapter by programming a simple game of tic-tac-toe. Learn how to write algorithms to solve real-world problems Understand the basics of computer architecture Examine the basic tools of a programming language Explore sequential, conditional, and loop programming structures Understand how the array data structure organizes storage Use searching techniques and comparison-based sorting algorithms Learn about objects, including how to build your own Discover how objects can be created from other objects Manipulate files and use their data in your software




Case Computer John Lennon


Book Description

glancing at some documents online he's interrupted by the police investigation team trying to recover the lost computer. Trevor Rutledge shows them his computer, but before they tell him not to he's clicked on a picture where a warm haze surrounds them all. The computer recognises the crime and throws them all back to December 1980 before the murder takes place. Can they stop the inevitable from happening or simply stand by and watch history run its course?




Case Computer Marilyn Monroe


Book Description

Case Computer Marilyn Monroe is the story of a specially designed computer that was wrongly sold to a member of the general public.Gracie Holden invites her three friends round for an evening of discussing what really happened to Marilyn Monroe on that hot August night of 1962. Unfortunately for Gracie, Tommy, Mitch and Sheryl the case computer reacts to the crime scene and throws them back to two days before Marilyn died. They are now presented with the problem of knowing what's about to happen while wondering who will believe them when they tell them what's about to happen to the most famous and glamorous movie actress of all time. Will they be able to unravel a mystery that still remains to this day...find out in this latest installment in the case computer series!




Case Computer Michael Jackson


Book Description

Case Computer Michael Jackson is the story of a specially designed computer that was wrongly sold to a member of the general public by an electronics shop that was only meant to build the computer not sell it. The four people viewing a Michael Jackson picture on their new computer get a bit more than they bargain for when the computer suddenly reacts to the picture they are viewing and throws them back in time to June 2009 and to forty hours before Michael Jackson died. Will Melinda, John, Daisy and Martin do anything or just watch the days pass by...find out in the latest installment of the Case Computer series.




The Case of the Clever Computer Crooks


Book Description

Sketches provide the crucial clues for solving the mysteries of stolen computers, a disappearing prince, and a jewelry theft.




Global Dimensions of Intellectual Property Rights in Science and Technology


Book Description

As technological developments multiply around the globeâ€"even as the patenting of human genes comes under serious discussionâ€"nations, companies, and researchers find themselves in conflict over intellectual property rights (IPRs). Now, an international group of experts presents the first multidisciplinary look at IPRs in an age of explosive growth in science and technology. This thought-provoking volume offers an update on current international IPR negotiations and includes case studies on software, computer chips, optoelectronics, and biotechnologyâ€"areas characterized by high development cost and easy reproducibility. The volume covers these and other issues: Modern economic theory as a basis for approaching international IPRs. U.S. intellectual property practices versus those in Japan, India, the European Community, and the developing and newly industrializing countries. Trends in science and technology and how they affect IPRs. Pros and cons of a uniform international IPRs regime versus a system reflecting national differences.




Mobile Devices in Education: Breakthroughs in Research and Practice


Book Description

As technology advances, mobile devices have become more affordable and useful to countries around the world. The use of technology can significantly enhance educational environments for students. It is imperative to study new software, hardware, and gadgets for the improvement of teaching and learning practices. Mobile Devices in Education: Breakthroughs in Research and Practice is a collection of innovative research on the methods and applications of mobile technologies in learning and explores best practices of mobile learning in educational settings. Highlighting a range of topics such as educational technologies, curriculum development, and game-based learning, this publication is an ideal reference source for teachers, principals, curriculum developers, educational software developers, instructional designers, administrators, researchers, professionals, upper-level students, academicians, and practitioners actively involved in the education field.




Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation


Book Description

This book provides an overview of computer techniques and tools — especially from artificial intelligence (AI) — for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant area within the well-established field of AI & Law. An overview such as this one has never been attempted before. It offers a panoramic view of topics, techniques and tools. It is more than a survey, as topic after topic, the reader can get a closer view of approaches and techniques. One aim is to introduce practitioners of AI to the modelling legal evidence. Another aim is to introduce legal professionals, as well as the more technically oriented among law enforcement professionals, or researchers in police science, to information technology resources from which their own respective field stands to benefit. Computer scientists must not blunder into design choices resulting in tools objectionable for legal professionals, so it is important to be aware of ongoing controversies. A survey is provided of argumentation tools or methods for reasoning about the evidence. Another class of tools considered here is intended to assist in organisational aspects of managing of the evidence. Moreover, tools appropriate for crime detection, intelligence, and investigation include tools based on link analysis and data mining. Concepts and techniques are introduced, along with case studies. So are areas in the forensic sciences. Special chapters are devoted to VIRTOPSY (a procedure for legal medicine) and FLINTS (a tool for the police). This is both an introductory book (possibly a textbook), and a reference for specialists from various quarters.