![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
Learn Windows 11 quickly, easily, and with expert help from a tech education master Windows 11 Simplified is your from-scratch beginner's guide to the ins and outs of the latest version of Windows. It's fully updated to include all the coolest new features of Windows 11 and offers a highly visual roadmap - complete with tons of screenshots and illustrations - to Windows 11 mastery. You'll get up to speed on the basic, and not-so-basic, features of Windows 11 with plain-English instructions and step-by-step screenshots that walk you through every technique you need to know to make Windows 11 do what you want it to do. You'll learn to navigate the user interface, work with and manage files, create user accounts, and practice using the tools that make Windows 11 the most user-friendly and powerful version of the famous operating system yet. You'll also discover how to: Master the basics, as well as a bunch of power-user tools, with easy-to-follow instructions Learn your way around the interface, File Explorer, the Settings app, and more Navigate the web, send emails, access online media, and chat with friends and family Customize windows to look and feel exactly the way you want it to With the right help, learning a new operating system can be fun, straightforward, and exciting. This book is perfect for everyone from those with no Windows experience at all to users of previous versions who just need a heads-up on the latest features. If you're ready to become a Windows 11 master, Windows 11 Simplified is the easiest and fastest way to do it.
This book discusses the digital design of integrated circuits under process variations, with a focus on design-time solutions. The authors describe a step-by-step methodology, going from logic gates to logic paths to the circuit level. Topics are presented in comprehensively, without overwhelming use of analytical formulations. Emphasis is placed on providing digital designers with understanding of the sources of process variations, their impact on circuit performance and tools for improving their designs to comply with product specifications. Various circuit-level "design hints" are highlighted, so that readers can use then to improve their designs. A special treatment is devoted to unique design issues and the impact of process variations on the performance of FinFET based circuits. This book enables readers to make optimal decisions at design time, toward more efficient circuits, with better yield and higher reliability.
Includes case studies illustrating the business processes that underlines the use of big data and health analytics to improve healthcare delivery Discusses AI based smart paradigms for reliable predictions of infectious disease dynamics which can help or prevent disease transmission Highlights the different aspects of using extended reality for diverse healthcare applications and aggregates the current state of research Offers intelligent models of the smart recommender system for personal well-being services and computer-aided drug discovery and design methods Presents novel innovative techniques for extracting user social behavior known as sentiment analysis for healthcare related purposes
Tackles a topic in a concise and accessible way that most believe too advanced to pick up easily. Author has over 40 years teaching and industry experience which they utilize in this book. Contains an appendix with extended code and examples of topics discussed in text.
Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.
Blockchain Supply Chain Use Cases. Distributed Ledger Technology Supply Chain Use Cases. Blockchain-Enabled Digital Transformation Use Cases. Blockchain Supply Chain Diffusion/Innovation Use Cases.
Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML, and deep learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires to provide more insights on the applicability of the theoretical similitudes, otherwise a rarity in many such books.
This book provides readers with insight into an alternative approach for enhancing the reliability, security, and low power features of integrated circuit designs, related to transient faults, hardware Trojans, and power consumption. The authors explain how the addition of integrated sensors enables the detection of ionizing particles and how this information can be processed at a high layer. The discussion also includes a variety of applications, such as the detection of hardware Trojans and fault attacks, and how sensors can operate to provide different body bias levels and reduce power costs. Readers can benefit from these sensors-based approaches through designs with fast response time, non-intrusive integration on gate-level and reasonable design costs.
The fundamental principles of electronic device and circuit design are discussed in a clear and detailed manner along with explanatory diagrams. Various IoT-based smart applications in different fields along with challenges and issues along with prospects of IoT for future applications have also been discussed. The chapters delve into myriad aspects of circuit design, including MOSFET structures depending on their low power applications for IoT-enabled systems, advanced sensor design and fabrication using MEMS, indirect bootstrap techniques, efficient CMOS comparators, various encryption-decryption algorithms, IoT video forensics applications, microstrip patch antennas in embedded IoT applications, real-time object detection using sound, IOT and nanotechnologies based wireless sensors, and much more. It also introduces logic BIST using BS-CFSR for electronic devices that can be part of many applications in many industries, such as defense, automotive, banking, computer, healthcare, networking, and telecommunication.
This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory. The field of proof-theoretic semantics has existed for almost 50 years, but the term itself was proposed by Schroeder-Heister in the 1980s. Proof-theoretic semantics explains the meaning of linguistic expressions in general and of logical constants in particular in terms of the notion of proof. This volume emerges from presentations at the Second International Conference on Proof-Theoretic Semantics in Tubingen in 2013, where contributing authors were asked to provide a self-contained description and analysis of a significant research question in this area. The contributions are representative of the field and should be of interest to logicians, philosophers, and mathematicians alike.
Modern Magnetooptics and Magnetooptical Materials provides a comprehensive account of the principles and applications of magnetooptics, bridging the gap between textbooks and specialist accounts in the research and review literature. The book is aimed at the graduate physicist and electrical engineer, but assumes no specialist knowledge of magnetooptics. Chapters have been designed to be reasonably independent, so that readers in search of information on a particular topic can go straight to the appropriate place in the book, with only occasional reference to material elsewhere. Divided into three main parts, the book begins with the principles of magnetooptics to provide the necessary theoretical background. This section's emphasis is on introducing practical considerations through examples taken from real-life situations. The next part surveys a wide range of magnetooptic materials, including metals, alloys, and granular structures. The final part explores applications of magnetooptics in practical devices, such as modulators, switches, memory devices, and waveguides. This book provides a thorough introduction for graduate students of physics and electrical engineering, and a useful reference for researchers.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.
- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
This book provides the details of developing a digital pedestrian map construction system over the intermittently connected mobile network. Over the past couple of decades, countries across the world, both developing and developed, have witnessed a significant number of disasters. Thus, it has become mandatory for each of the disaster-prone countries to equip themselves with appropriate measures to cope with the challenges of providing post-disaster services. Some of the serious challenges are incapacitated communication infrastructure, unstable power supply and inaccessible road networks. Out of these challenges, the destruction of road networks, especially in developing countries, acts as a major hindrance to effective disaster management. To be more specific, the success of a disaster response operation generally depends on the speed of evacuation and transportation of adequate amount of relief materials at the right time to the disaster-affected areas. Hence, map-based navigation support is a primary requirement for post-disaster relief operations. This book also provides the solution of the two other important post-disaster management services such as situational awareness and resource allocation. Both of these services are invariably dependent on the existence of navigation support. Finally, in order to offer such services, the other challenge is to address the problem of incapacitated communication infrastructure. This book also deals with such challenges in post-disaster scenarios and develops automated post-disaster management services.
Energy Autonomy of Batteryless and Wireless Embedded Systems covers the numerous new applications of embedded systems that are envisioned in the context of aeronautics, such as sensor deployment for flight tests or for structural health monitoring. However, the increasing burden of on-board cabling requires wireless solutions. Moreover, concerns such as safety or system lifetime preclude the use of electrochemical energy storage. Ambient energy capture, storage and management are therefore key topics. This book presents these concepts and illustrates them through actual implementations in airliners. With five years of experience within this specialist field, the authors present results from actual flight tests via a partnership with Airbus. Basic concepts are summarized, together with practical implementations in airliners, enriching the book through the very specific aspects related to embedded systems deployed in aircraft. This book will appeal to both students and practising engineers in the field.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.
A comprehensive look at the rapidly growing field of low-power VLSI design Low-power VLSI circuit design is a dynamic research area driven by the growing reliance on battery-powered portable computing and wireless communications products. In addition, it has become critical to the continued progress of high-performance and reliable microelectronic systems. This self-contained volume clearly introduces each topic, incorporates dozens of illustrations, and concludes chapters with summaries and references. VLSI circuit and CAD engineers as well as researchers in universities and industry will find ample information on tools and techniques for design and optimization of low-power electronic systems. Topics include:
Complete and comprehensive coverage of packet switching concepts and technologies The rapid growth of Internet traffic has spurred a new concentration on IP routers and ATM, MPLS, and optical switches. This book addresses the basics, theory, architectures, and technologies for implementing ATM switches and IP routers. It focuses on the architecture for the next generation of broadband switches and routers and provides detailed treatment of both theoretical and practical topics for professionals and students alike. Broadband Packet Switching Technologies is written with engineers and industry researchers in mind. It describes the basic concepts and fundamentals of ATM switches and IP routers, then divides the switches into different categories. In each category, the authors discuss the operations, problems, strengths, and weaknesses of the switches in performance and implementation. Detailed solutions and algorithms are also provided. The authors also extend fundamental packet-switching concepts to wireless and fiber-optic networks. Broadband Packet Switching Technologies fills the need for a textbook and reference dedicated to high-speed networking technologies that serves the specific needs of professionals in the telecommunications industry and provides expert material for students in related fields.
Presenting a reference model architecture for the design of intelligent systems Engineering of Mind presents the foundations for a computational theory of intelligence. It discusses the main streams of investigation that will eventually converge in a scientific theory of mind and proposes an avenue of research that might best lead to the development of truly intelligent systems. This book presents a model of the brain as a hierarchy of massive parallel computational modules and data structures interconnected by information pathways. Using this as the basic model on which intelligent systems should be based, the authors propose a reference model architecture that accommodates concepts from artificial intelligence, control theory, image understanding, signal processing, and decision theory. Algorithms, procedures, and data embedded within this architecture would enable the analysis of situations, the formulation of plans, the choice of behaviors, and the computation of uncertainties. The computational power to implement the model can be achieved in practical systems in the foreseeable future through hierarchical and parallel distribution of computational tasks. The authors’ reference model architecture is expressed in terms of the Real-time Control System (RCS) that has been developed primarily at the National Institute of Standards and Technology. Suitable for engineers, computer scientists, researchers, and students, Engineering of Mind blends current theory and practice to achieve a coherent model for the design of intelligent systems.
This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
Technology Innovation discusses the fundamental aspects of processes and structures of technology innovation. It offers a new perspective concerning fundamentals aspects not directly involved in the complex relations existing between technology and the socio-economic system. By considering technology and its innovation from a scientific point of view, the book presents a novel definition of technology as a set of physical, chemical, and biological phenomena, producing an effect exploitable for human purposes. Expanding on the general model of technology innovation by linking the model of technology, based on a structure of technological operations, with the models of the structures for technology innovation, based on organization of fluxes of knowledge and capitals, the book considers various technological processes and the stages of the innovation process. Offers a perspective on the evolution of technology in the frame of an industrial platform network Explains a novel definition of technology as a set of physical, chemical, and biological phenomena producing an effect exploitable for human purposes Discusses technology innovation as result of structures organizing fluxes of knowledge and capitals Provides a technology model simulating the functioning of technology with its optimization Presents a technology innovation model explaining the territorial technology innovation process The book is intended for academics, graduate students, technology developers who are involved in operations management and research, innovation, and technology development.
The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions. |
You may like...
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
|