0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (38)
  • R500+ (3,074)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Grid Computing - The Savvy Manager's Guide (Paperback): Pawel Plaszczak, Richard Wellner Jr. Grid Computing - The Savvy Manager's Guide (Paperback)
Pawel Plaszczak, Richard Wellner Jr.
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.
Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company s culture.
Grid Computing has an Online Companion at www.savvygrid.com with contents, details, community forum, and latest updates for the material.
* Sketches the history of grid computing, showing how it made the leap from academia to business.
* Examines the criteria you'll need to meet to make your network "grid-enabled."
* Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.
* Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition."

Explainable Artificial Intelligence for Smart Cities (Hardcover): Mohamed Lahby, Utku Kose, Akash Kumar Bhoi Explainable Artificial Intelligence for Smart Cities (Hardcover)
Mohamed Lahby, Utku Kose, Akash Kumar Bhoi
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.

Cyberspace, Data Analytics, and Policing (Hardcover): David Skillicorn Cyberspace, Data Analytics, and Policing (Hardcover)
David Skillicorn
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,091 Discovery Miles 30 910 Ships in 10 - 15 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

Internet of Things - Energy, Industry, and Healthcare (Hardcover): Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma,... Internet of Things - Energy, Industry, and Healthcare (Hardcover)
Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma, Shubham Tayal, Swati Gupta
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform

Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover): Soumya Ranjan Nayak, Biswa... Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover)
Soumya Ranjan Nayak, Biswa Mohan Sahoo, Muthukumaran Malarvel, Jibitesh Mishra
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.

Digital Twin Technology (Paperback): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Paperback)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R1,461 Discovery Miles 14 610 Ships in 10 - 15 working days
Digital Twin Technology (Hardcover): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Hardcover)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R3,364 Discovery Miles 33 640 Ships in 18 - 22 working days

Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Time & Logic - A Computational Approach (Paperback): Leonard Bolc, Andrzej Szalas Time & Logic - A Computational Approach (Paperback)
Leonard Bolc, Andrzej Szalas
R1,171 Discovery Miles 11 710 Ships in 10 - 15 working days

Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.

Voice Technology in Healthcare - Leveraging Voice to Enhance Patient and Provider Experiences (Paperback): David Metcalf, Teri... Voice Technology in Healthcare - Leveraging Voice to Enhance Patient and Provider Experiences (Paperback)
David Metcalf, Teri Fisher, Sandhya Pruthi, Harry P. Pappas
R1,138 Discovery Miles 11 380 Ships in 10 - 15 working days

The healthcare industry is on the cutting edge of voice-user interface (VUI) design and making great progress to improve patient care through developing technologies, literally transforming the voice of the industry. The advantages of VUI extend far beyond simple conveniences for patients or a healthcare employee's saved phone call. VUI has a profound impact on care improvement. Just like a person, a well-designed VUI can use tone of voice, inflection and other elements in conversation to shape behaviors or calm nerves. With VUI, physicians and patients become empowered to make informed decisions about healthcare. The use of voice technology across smart speakers, IoT, clinical and home devices, and wearables for improving the patient experience and clinical outcomes was recently identified as one of most significant emerging technologies in healthcare. Smart speakers are the #1 selling consumer item in the world and major competition is heating up between Amazon Alexa, Apple Siri, Microsoft Cortana, Google Voice Assistant, and a host of other specialty platforms specific to healthcare. From Orbita and Macadamia to voice-enabled robotics from Pillo, Intuitive, Vivify, and RealView Imaging, voice technology is pervasive across the gamut of levels of devices. Voice technology is not just pervasive in smart speakers and smart phones - it is finding its way into wearables, vehicles, homes, and even consumer and clinical medical devices. We even have smart jewelry emerging with health, wellness, and safety features built in. Best of all, this trend spans intergenerational health and wellness that goes beyond clinical care into long term health and wellbeing and the potential for increased patient engagement. In this book, the editors review information from the top thought-leaders in this space and examine real-world case studies of the outcomes and potential of voice technology in healthcare. Topics include a market survey, clinical use cases, home health use cases, health and wellness topics - fitness, nutrition, and wellbeing; next generation fitness facilities; voice and wearables in smart, connected communities; voice technology in social companions/robots; voice technology in the future surgical suites; a roadmap for the future from top technology; standards in voice technology; and the future of voice technology and artificial intelligence.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R1,244 Discovery Miles 12 440 Ships in 10 - 15 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R4,214 Discovery Miles 42 140 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback)
Stephen Ashurst, Stefano Tempesta
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover)
Stephen Ashurst, Stefano Tempesta
R4,224 Discovery Miles 42 240 Ships in 10 - 15 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover): Jinling Liang, Zidong Wang, Fan... Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover)
Jinling Liang, Zidong Wang, Fan Wang
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight. Features:- Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,366 Discovery Miles 33 660 Ships in 18 - 22 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover): R. Sujatha, S. L. Aarthy, R.... Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover)
R. Sujatha, S. L. Aarthy, R. Vettriselvan
R3,649 Discovery Miles 36 490 Ships in 10 - 15 working days

Provides insight into the skill set that requires leveraging strength to move further to act as a good data analyst Discusses how big data along with deep learning holds the potential to significantly increase data understanding and in turn, helps to make decisions Covers the numerous potential applications in healthcare, education, communications, media, and the entertainment industry Offers innovative platforms for integrating big data and deep learning Presents issues related to adequate data storage, sematic indexing, data tagging, and fast information retrieval from big data

Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback): Liviu Gabriel Cretu, Florin... Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback)
Liviu Gabriel Cretu, Florin Dumitriu
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,937 Discovery Miles 39 370 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover): Anshul Verma, Pradeepika Verma, Sanjay... Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover)
Anshul Verma, Pradeepika Verma, Sanjay Kumar Dhurandher, Isaac Woungang
R4,088 Discovery Miles 40 880 Ships in 10 - 15 working days

The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,594 Discovery Miles 25 940 Ships in 10 - 15 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Learn Quantum Computing with Python and…
Robert Loredo Paperback R1,022 Discovery Miles 10 220
Heterogeneous Computing - Hardware and…
Mohamed Zahran Hardcover R1,517 Discovery Miles 15 170
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,315 Discovery Miles 53 150
Applying Integration Techniques and…
Gabor Kecskemeti Hardcover R6,050 Discovery Miles 60 500
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Novel Approaches to Information Systems…
Naveen Prakash, Deepika Prakash Hardcover R5,924 Discovery Miles 59 240
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810

 

Partners