![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
In light of the emerging global information infrastructure, information technology standards are becoming increasingly important. At the same time, however, the standards setting process has been criticized as being slow, inefficient and out of touch with market needs. What can be done to resolve this situation? To provide a basis for an answer to this question, Information Technology Standards and Standardization: A Global Perspective paints as full a picture as possible of the varied and diverse aspects surrounding standards and standardization. This book will serve as a foundation for research, discussion and practice as it addresses trends, problems and solutions for and by numerous disciplines, such as economics, social sciences, management studies, politics, computer science and, particularly, users.
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.
a) Provides basic concepts of Natural Language Processing for getting started from scratch. b) Introduces advanced concepts for scaling, deep learning and real-world issues seen in the industry. c) Provides applications of Natural Language Processing over a diverse set of 15 industry verticals. d) Shares practical implementation including Python code, tools and techniques for a variety of Natural Language Processing applications and industrial products for a hands-on experience. e) Gives readers a sense of all there is to build successful Natural Language Processing projects: the concepts, applications, opportunities and hands-on material.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
Strategists describe networking and being able to access knowledge as the leading path to gaining a competitive advantage. ""Cultural Implications of Knowledge Sharing, Management and Transfer: Identifying Competitive Advantage"" gathers contributions of scholars from multi-disciplinary fields to illustrate, compare, and discuss models, perspectives, and approaches involved in the distribution, administration, and transmission of knowledge across organizations. Containing research from leading international experts, this defining reference collection offers diverse viewpoints and depicts possible trajectories of future development in achieving competitive advantage.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
"Advances in Imaging and Electron Physics" merges two long-running
serials-Advances in Electronics and Electron Physics and Advances
in Optical and Electron Microscopy. This series features extended
articles on the physics of electron devices (especially
semiconductor devices), particle optics at high and low energies,
microlithography, image science and digital image processing,
electromagnetic wave propagation, electron microscopy, and the
computing methods used in all these domains.
Mathematical optimization is used in nearly all computer graphics
applications, from computer vision to animation. This book teaches
readers the core set of techniques that every computer graphics
professional should understand in order to envision and expand the
boundaries of what is possible in their work.
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.
Offering a structured approach to handling and recovering from a
catastrophic data loss, this book will help both technical and
non-technical professionals put effective processes in place to
secure their business-critical information and provide a roadmap of
the appropriate recovery and notification steps when calamity
strikes.
As the applications of data mining, the non-trivial extraction of implicit information in a data set, have expanded in recent years, so has the need for techniques that are tolerable to imprecision, uncertainty, and approximation. Intelligent Soft Computation and Evolving Data Mining: Integrating Advanced Technologies is a compendium that addresses this need. It integrates contrasting techniques of conventional hard computing and soft computing to exploit the tolerance for imprecision, uncertainty, partial truth, and approximation to achieve tractability, robustness and low-cost solution. This book provides a reference to researchers, practitioners, and students in both soft computing and data mining communities, forming a foundation for the development of the field.
Congruences are ubiquitous in computer science, engineering, mathematics, and related areas. Developing techniques for finding (the number of) solutions of congruences is an important problem. But there are many scenarios in which we are interested in only a subset of the solutions; in other words, there are some restrictions. What do we know about these restricted congruences, their solutions, and applications? This book introduces the tools that are needed when working on restricted congruences and then systematically studies a variety of restricted congruences. Restricted Congruences in Computing defines several types of restricted congruence, obtains explicit formulae for the number of their solutions using a wide range of tools and techniques, and discusses their applications in cryptography, information security, information theory, coding theory, string theory, quantum field theory, parallel computing, artificial intelligence, computational biology, discrete mathematics, number theory, and more. This is the first book devoted to restricted congruences and their applications. It will be of interest to graduate students and researchers across computer science, electrical engineering, and mathematics.
The primary aim of this volume is to provide researchers and engineers from both academic and industry with up-to-date coverage of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2019 International Workshop on Intelligentized Welding Manufacturing (IWIWM'2019) in USA. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.
As organizations, businesses, and other institutions work to move forward during a new era of ubiquitous modern technology, new computing and technology implementation strategies are necessary to harness the shared knowledge of individuals to advance their organizations as a whole. Intelligent and Knowledge-Based Computing for Business and Organizational Advancements examines the emerging computing paradigm of Collective Intelligence (CI). The global contributions contained in this publication will prove to be essential to both researchers and practitioners in the computer and information science communities as these populations move toward a new period of fully technology-integrated business.
Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have been adopted into new tools or systems. This reference is essential to researchers, educators, professionals, and students interested in the future of IR.
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably. ""Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems"" discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of urban crimes, taking an interdisciplinary approach by combining criminology, computer simulation, and geographic information systems into one comprehensive resource.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in finance (banking, brokerage, and insurance), marketing (customer relationships, retailing, logistics, and travel), as well as in manufacturing, health care, fraud detection, homeland security, and law enforcement.
Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology. |
You may like...
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
R3,950
Discovery Miles 39 500
|