![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
This book provides a comprehensive review of complex networks from three different domains, presents novel methods for analyzing them, and highlights applications with accompanying case studies. Special emphasis is placed on three specific kinds of complex networks of high technological and scientific importance: software networks extracted from the source code of computer programs, ontology networks describing semantic web ontologies, and co-authorship networks reflecting collaboration in science. The book is primarily intended for researchers, teachers and students interested in complex networks and network data analysis. However, it will also be valuable for researchers dealing with software engineering, ontology engineering and scientometrics, as it demonstrates how complex network analysis can be used to address important research issues in these three disciplines.
This book presents original, peer-reviewed research papers from the 4th Purple Mountain Forum -International Forum on Smart Grid Protection and Control (PMF2019-SGPC), held in Nanjing, China on August 17-18, 2019. Addressing the latest research hotspots in the power industry, such as renewable energy integration, flexible interconnection of large scale power grids, integrated energy system, and cyber physical power systems, the papers share the latest research findings and practical application examples of the new theories, methodologies and algorithms in these areas. As such book a valuable reference for researchers, engineers, and university students.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
Describing the technologies to combine language resources flexibly as web services, this book provides valuable case studies for those who work in services computing, language resources, human-computer interaction (HCI), computer-supported cooperative work (CSCW), and service science. The authors have been operating the Language Grid, which wraps existing language resources as atomic language services and enables users to compose new services by combining them. From architecture level to service composition level, the book explains how to resolve infrastructural and operational difficulties in sharing and combining language resources, including interoperability of language service infrastructures, various types of language service policies, human services, and service failures.The research based on the authors' operating experiences of handling complicated issues such as intellectual property and interoperability of language resources contributes to exploitation of language resources as a service. On the other hand, both the analysis based on using services and the design of new services can bring significant results. A new style of multilingual communication supported by language services is worthy of analysis in HCI/CSCW, and the design process of language services is the focus of valuable case studies in service science. By using language resources in different ways based on the Language Grid, many activities are highly regarded by diverse communities. This book consists of four parts: (1) two types of language service platforms to interconnect language services across service grids, (2) various language service composition technologies that improve the reusability, efficiency, and accuracy of composite services, (3) research work and activities in creating language resources and services, and (4) various applications and tools for understanding and designing language services that well support intercultural collaboration.
Today's enterprises are increasingly going global by becoming more distributed, leveraging resource bases in all parts of the world. Whether through offshore relationships, global support or application development programs, or linking disparate parts of organizations, enterprises are reducing costs by managing applications centrally, boosting security, and assuring network uptime. The Handbook of Research on Global Information Technology Management in the Digital Economy provides comprehensive coverage and definitions of the most important issues, concepts, trends and technologies in the field of the emerging sub-discipline of global information technology management, covering topics such as the technical platform for global IS applications, information systems projects spanning cultures, managing information technology in multidomestic/ international/global/transnational corporations, and global information technology systems and socioeconomic development in developing countries. With 25 authoratative contributions from 34 of the world's leading experts, this publication is a must-have for academic and research libraries.
As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social contexts for knowledge, learning, and human development. ""Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies"" explores the potential of Web 2.0 and its synergies with the Semantic Web and provides state-of-the-art theoretical foundations and technological applications. A reference edition for academicians, practitioners, policy makers, and government officers eager for knowledge on Web 2.0 and social Web, this book emphasizes practical aspects of the integration of semantic applications into social Web technologies.
This book focuses on the design, implementation and applications of embedded systems and advanced industrial controls with microcontrollers. It combines classical and modern control theories as well as practical control programming codes to help readers learn control techniques easily and effectively. The book covers both linear and nonlinear control techniques to help readers understand modern control strategies. The author provides a detailed description of the practical considerations and applications in linear and nonlinear control systems. They concentrate on the ARM (R) Cortex (R)-M4 MCU system built by Texas Instruments (TM) called TM4C123GXL, in which two ARM (R) Cortex (R)-M4 MCUs, TM4C123GH6PM, are utilized. In order to help the reader develop and build application control software for a specified microcontroller unit. Readers can quickly develop and build their applications by using sample project codes provided in the book to access specified peripherals. The book enables readers to transfer from one interfacing protocol to another, even if they only have basic and fundamental understanding and basic knowledge of one interfacing function. Classical and Modern Controls with Microcontrollers is a powerful source of information for control and systems engineers looking to expand their programming knowledge of C, and of applications of embedded systems with microcontrollers. The book is a textbook for college students majored in CE, EE and ISE to learn and study classical and modern control technologies. The book can also be adopted as a reference book for professional programmers working in modern control fields or related to intelligent controls and embedded computing and applications. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
There are many different approaches to understanding human consciousness. By conducting research to better understand various biological mechanisms, these can be redefined and utilized for technological purposes. Advanced Research on Biologically Inspired Cognitive Architectures is an essential reference source for the latest scholarly research on the biological elements of human cognition and examines the applications of consciousness within computing environments. Featuring exhaustive coverage on a broad range of innovative topics and perspectives, such as artificial intelligence, bio-robotics, and human-computer interaction, this publication is ideally designed for academics, researchers, professionals, graduate students, and practitioners seeking current research on the exploration of the intricacies of consciousness and different approaches of perception.
PRO TOOLS 101 OFFICIAL COURSEWARE takes a comprehensive approach to learning the fundamentals of Pro Tools systems. Now updated for Pro Tools 9 software, this new edition from the definitive authority on Pro Tools covers everything you need to know to complete a Pro Tools project. Learn to build sessions that include multitrack recordings of live instruments, MIDI sequences, software synthesizers, and virtual instruments. Through hands-on tutorials, develop essential techniques for recording, editing, and mixing. The included DVD-ROM offers tutorial files and videos, additional documentation, and Pro Tools sessions to accompany the projects in the text. Developed as the foundation course of the official Avid Pro Tools Certification program, the guide can be used to learn on your own or to pursue formal Pro Tools certification through a an Avid Authorized Training Partner. Join the ranks of audio professionals around the world as you unleash the creative power of your Pro Tools system.
With almost every business application process being linked with a web portal, the website has become an integral part of any organization. Satisfying the end user's needs is one of the key principles of designing an effective website. Because there are different users for any given website, there are different criteria that users want. Thus, evaluating a website is a multi-criteria decision-making problem in which the decision maker's opinion should be considered for ranking the website. Multi-Criteria Decision-Making Models for Website Evaluation is a critical scholarly resource that covers the strategies needed to evaluate the navigability and efficacy of websites as promotional platforms for their companies. Featuring a wide range of topics including linguistic modelling, e-services, and site quality, this book is ideal for managers, executives, website designers, graphic artists, specialists, consultants, educationalists, researchers, and students.
In the age of increasing reliance on data and the importance of sensitive information, applications and technologies have arisen to appropriately deal with assuring the security of medical informatics and healthcare administration functions. In order for technology to progress, new systems are being installed globally to address this issue. Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology examines information security management systems for the facilitation of picture archiving and communication systems (PACS). This valuable contribution to data security and quality management literature provides a comprehensive guide for all aspects of the implementation of PACS for the enhancement of modern practices in radiology.
This book provides both a broad overview of the forecasting process, covering technological and human aspects alike, and deep insights into algorithms and platform functionalities in the IBP toolbox required to maximize forecast accuracy. Rich in technical and business explanations, it addresses short-, medium- and long-term forecasting processes using functionalities available in demand planning and demand sensing. There are also several theoretical concepts underpinning the algorithms discussed; these are explained with numerical examples to help demystify the IBP forecasting toolbox. Beyond standard procedures, the book also discusses custom approaches (e.g. new segmentation criteria, new outlier detection and correction methods) and new methods (e.g. the use of Markov chains for forecasting sporadic demands), etc. It subsequently benchmarks common practices using these innovative approaches and discusses the results. As measurement is an important precondition for improvement, an entire chapter is devoted to discussing process improvement and value using the Six Sigma methodology. In closing, the book provides several useful tips and tricks that should come in handy during project implementation.
Collecting the latest research results from the leading researchers in the field of fuzzy object-oriented databases, Advances in Fuzzy Object-Oriented Databases: Modeling and Applications provide a single source for current research and practical applications in fuzzy object-oriented databases. This book includes major aspects of fuzzy object-oriented database modeling - conceptual, logical and physical, as well as details of implementations and applications. Readers will benefit from a complete understanding of the notions, techniques, and methods related to the research and developments of fuzzy object-oriented databases. This book can act as a starting point and a reference for their research and developments and stimulate the interest in the field of fuzzy object-oriented databases and further promote the research in the field.
This book starts with the proposition that digital media invite play and indeed need to be played by their everyday users. Play is probably one of the most visible and powerful ways to appropriate the digital world. The diverse, emerging practices of digital media appear to be essentially playful: Users are involved and active, produce form and content, spread, exchange and consume it, take risks, are conscious of their own goals and the possibilities of achieving them, are skilled and know how to acquire more skills. They share a perspective of can-do, a curiosity of what happens next? Play can be observed in social, economic, political, artistic, educational and criminal contexts and endeavours. It is employed as a (counter) strategy, for tacit or open resistance, as a method and productive practice, and something people do for fun. The book aims to define a particular contemporary attitude, a playful approach to media. It identifies some common ground and key principles in this novel terrain. Instead of looking at play and how it branches into different disciplines like business and education, the phenomenon of play in digital media is approached unconstrained by disciplinary boundaries. The contributions in this book provide a glimpse of a playful technological revolution that is a joyful celebration of possibilities that new media afford. This book is not a practical guide on how to hack a system or to pirate music, but provides critical insights into the unintended, artistic, fun, subversive, and sometimes dodgy applications of digital media. Contributions from Chris Crawford, Mathias Fuchs, Rilla Khaled, Sybille Lammes, Eva and Franco Mattes, Florian 'Floyd' Mueller, Michael Nitsche, Julian Oliver, and others cover and address topics such as reflective game design, identity and people's engagement in online media, conflicts and challenging opportunities for play, playing with cartographical interfaces, player-emergent production practices, the re-purposing of data, game creation as an educational approach, the ludification of society, the creation of meaning within and without play, the internalisation and subversion of roles through play, and the boundaries of play.
This is an examination of the various technical and organisational elements that impact services management, business management, risk management, and customer relationship management.
With the technology innovations dentistry has witnessed in all its branches over the past three decades, the need for more precise diagnostic tools and advanced imaging methods has become mandatory across the industry. Recent advancements to imaging systems are playing an important role in efficient diagnoses, treatments, and surgeries. Computational Techniques for Dental Image Analysis provides innovative insights into computerized methods for automated analysis. The research presented within this publication explores pattern recognition, oral pathologies, and diagnostic processing. It is designed for dentists, professionals, medical educators, medical imaging technicians, researchers, oral surgeons, and students, and covers topics centered on easier assessment of complex cranio-facial tissues and the accurate diagnosis of various lesions at early stages.
In today's society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
This book discusses various aspects of blockchains in economic systems and investment strategies in crypto markets. It first addresses the topic from a conceptual and theoretical point of view, and then analyzes it from an assessment and investment angle. Further, it examines the opportunities and limitations of the taxation of crypto currency, as well as the political implications, such as regulation of speculation with crypto currencies. The book is intended for academicians and students in the fields of economics and finance.
This book describes for readers various technical outcomes from the EU-project IoSense. The authors discuss sensor integration, including LEDs, dust sensors, LIDAR for automotive driving and 8 more, demonstrating their use in simulations for the design and fabrication of sensor systems. Readers will benefit from the coverage of topics such as sensor technologies for both discrete and integrated innovative sensor devices, suitable for high volume production, electrical, mechanical, security and software resources for integration of sensor system components into IoT systems and IoT-enabling systems, and IoT sensor system reliability. Describes from component to system level simulation, how to use the available simulation techniques for reaching a proper design with good performance; Explains how to use simulation techniques such as Finite Elements, Multi-body, Dynamic, stochastics and many more in the virtual design of sensor systems; Demonstrates the integration of several sensor solutions (thermal, dust, occupancy, distance, awareness and more) into large-scale system solutions in several industrial domains (Lighting, automotive, transport and more); Includes state-of-the-art simulation techniques, both multi-scale and multi-physics, for use in the electronic industry.
The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data
Technological advancements have created novel applications for image and video processing. With these developments, real-world processing problems can be solved more easily. The Handbook of Research on Advanced Concepts in Real-Time Image and Video Processing is a pivotal reference source for the latest research findings on the design, realization, and deployment of image and video processing systems meant for real-time environments. Featuring extensive coverage on relevant areas such as feature detection, reconfigurable computing, and stream processing, this publication is an ideal resource for academics, researchers, graduate students, and technology developers.
This book presents a selection of recently developed collective and computational intelligence techniques, which it subsequently applies to energy management problems ranging from performance analysis to economic analysis, and from strategic analysis to operational analysis, with didactic numerical examples. As a form of intelligence emerging from the collaboration and competition of individuals, collective and computational intelligence addresses new methodological, theoretical, and practical aspects of complex energy management problems. The book offers an excellent reference guide for practitioners, researchers, lecturers and postgraduate students pursuing research on intelligence in energy management. The contributing authors are recognized researchers in the energy research field.
The book describes an approach to the multi-agent systems (MAS) design for applications of robotic soccer in the MiroSot category. The described MAS is designed for dynamic, quickly changing environments, in which not only the actions of our MAS are observed, but also those of the opposing MAS. It actively tries to affect the environment to score goals faster than the opposing MAS. Multi-agent systems (MAS) are mostly applied in the environments in which they exist and act without an opposing system. The book also describes strategies based on a supervisor that makes decisions depending on behavior prediction of the opposing MAS and the ball movement in the working place. A sophisticated distribution of tasks was designed for each agent to cooperate in order score goals as fast as possible. Simultaneously, these agents try, by permitted means, to prevent the enemy agents from scoring goals. The approach described is an excellent guide to the constantly evolving abilities of mobile robotics, both for real-world applications, such as cooperation of multiple robots in life-saving activities, and for the steadily developing applications of mobile robots in various robotic competitions (e.g. Robocup, etc.). The book provides readers with high-level knowledge on how to design strategies and how to implement such systems, and the ideas presented enable them to further refine the approach utilizing the latest hardware and use it in new systems implementations of sophisticated intelligent engineering. |
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
|