Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer programming
Key Features: This work aims to be the most approachable book about UX. Many books on the topic are highly specialized and are not easy to read for people who just want to understand it better. This book is easy to read and aims to popularize the UX mindset while debunking its main misconceptions. Small format size makes it easy to carry around. Includes content relatable and meaningful to the readers by taking many examples from everyday life with a conversational and light writing style. It tackles the psychology, design, research, process, strategy, and ethics behind offering the best experience with products, systems, or services. Includes a glossary.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
1) The book provides a basic understanding to readers who want to start their career in web application development. The book develops an understanding of the basics concepts and then takes a broader turn to enlighten the readers about the horizons which can be accessed using JavaScript. 2) JavaScript is exhaustively used in almost all kinds of application development, be it the web applications, cross platform mobile applications, server backend applications. JavaScript is now being used for full stack development and is thus used to write independent applications. Since the need for JavaScript web developers is high, the numbers of students should be high as well. 3) As compared to other books in the market, the proposed book would cover more topics (or, better, levels) in a single volume.
1) Focuses on the concepts and implementation strategies of various Deep Learning algorithms through properly curated examples. 2) The subject area will be valid for the next 10 years or so, as Deep Learning theory/algorithms and their applications will not be outdated easily. Hence there will be demand for such a book in the market. 3) In comparison to other titles, this book rigorously covers mathematical and conceptual details of relevant topics.
Provides a comprehensive introduction to multi-robot systems planning and task allocation; Explores multi robot aerial planning, flight planning, orienteering and coverage, and deployment, patrolling, and foraging; Includes real-world case studies; Treats different aspects of cooperation in multi-agent systems.
This is a how-to book for solving geometric problems robustly or error free in actual practice. The contents and accompanying source code are based on the feature requests and feedback received from industry professionals and academics who want both the descriptions and source code for implementations of geometric algorithms. The book provides a framework for geometric computing using several arithmetic systems and describes how to select the appropriate system for the problem at hand. Key Features: A framework of arithmetic systems that can be applied to many geometric algorithms to obtain robust or error-free implementations Detailed derivations for algorithms that lead to implementable code Teaching the readers how to use the book concepts in deriving algorithms in their fields of application The Geometric Tools Library, a repository of well-tested code at the Geometric Tools website, https://www.geometrictools.com, that implements the book concepts
Nature-based algorithms play an important role among artificial intelligence algorithms. Among them are global optimization algorithms called swarm intelligence algorithms. These algorithms that use the behavior of simple agents and various ways of cooperation between them, are used to solve specific problems that are defined by the so-called objective function. Swarm intelligence algorithms are inspired by the social behavior of various animal species, e.g. ant colonies, bird flocks, bee swarms, schools of fish, etc. The family of these algorithms is very large and additionally includes various types of modifications to enable swarm intelligence algorithms to solve problems dealing with areas other than those for which they were originally developed. This book presents 24 swarm algorithms together with their modifications and practical applications. Each chapter is devoted to one algorithm. It contains a short description along with a pseudo-code showing the various stages of its operation. In addition, each chapter contains a description of selected modifications of the algorithm and shows how it can be used to solve a selected practical problem. This book should also be useful for undergraduate and postgraduate students studying nature-based optimization algorithms, and can be a helpful tool for learning these algorithms, along with their modifications and practical applications. In addition, it can be a useful source of knowledge for scientists working in the field of artificial intelligence, as well as for engineers interested in using this type of algorithms in their work. If the reader wishes to expand his knowledge beyond the basics of swarm intelligence algorithms presented in this book and is interested in more detailed information, we recommend the book "Swarm Intelligence Algorithms: A Tutorial" (Edited by A. Slowik, CRC Press, 2020). It contains a detailed explanation of how each algorithm works, along with relevant program codes in Matlab and the C ++ programming language, as well as numerical examples illustrating step-by-step how individual algorithms work.
Build and use systems that safely automate software delivery from testing through release with this jargon-busting guide to Continuous Delivery pipelines. In Grokking Continuous Delivery you will learn how to: Design effective CD pipelines for new and legacy projects Keep your software projects release-ready Maintain effective tests Scale CD across multiple applications Ensure pipelines give the right signals at the right time Use version control as the source of truth Safely automate deployments with metrics Describe CD in a way that makes sense to your colleagues Grokking Continuous Delivery teaches you the design and purpose of continuous delivery systems that you can use with any language or stack. You'll learn directly from your mentor Christie Wilson, Google engineer and co-creator of the Tekton CI/CD framework. Using crystal-clear, well-illustrated examples, Christie lays out the practical nuts and bolts of continuous delivery for developers and pipeline designers. In each chapter, you'll uncover the proper approaches to solve the real-world challenges of setting up a CD pipeline. With this book as your roadmap, you'll have a clear plan for bringing CD to your team without the need for costly trial-and-error experimentation. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Keep your codebase release-ready. A continuous delivery pipeline automates version control, testing, and deployment with minimal developer intervention. Master the tools and practices of continuous delivery, and you'll be able to add features and push updates quickly and consistently. About the book Grokking Continuous Delivery is a friendly guide to setting up and working with a continuous delivery pipeline. Each chapter takes on a different scenario you'll face when setting up a CD system, with real-world examples like automated scaling and testing legacy applications. Taking a tool-agnostic approach, author Christie Wilson guides you each step of the way with illustrations, crystal-clear explanations, and practical exercises to lock in what you're learning. What's inside Design effective CD pipelines for new and legacy projects Ensure your pipelines give the right signals at the right times Version control as the source of truth Safely automate deployments About the reader For software engineers who want to add CD to their development process. About the author Christie Wilson is a software engineer at Google, where she co-created Tekton, a cloud-native CI/CD platform built on Kubernetes. Table of Contents PART 1 Introducing continuous delivery 1 Welcome to Grokking Continuous Delivery 2 A basic pipeline PART 2 Keeping software in a deliverable state at all times 3 Version control is the only way to roll 4 Use linting effectively 5 Dealing with noisy tests 6 Speeding up slow test suites 7 Give the right signals at the right times PART 3 Making delivery easy 8 Easy delivery starts with version control 9 Building securely and reliably 10 Deploying confidently PART 4 CD design 11 Starter packs: From zero to CD 12 Scripts are code, too 13 Pipeline design
Presents original method of enhanced ant colony optimization in feature selection, based on mathematical experiments and modelling. Provides a theoretical concept in iris features searching and detection as part of feature extraction process. Demonstrates the iris features selection and detection using the proposed design methodology with enhanced ant colony optimization for iris recognition.
Covers deep learning fundamentals; Focuses on applications; Covers human emotion analysis and deep learning; Explains how to use web based techniques for deep learning applications; Includes coverage of autonomous vehicles and deep learning
Do you have creative ideas that you wish you could transform into code? Do you want to boost your problem solving and logic skills? Do you want to enhance your career by adopting an algorithmic mindset? In our increasingly digital world, coding is an essential skill. Communicating an algorithm to a machine to perform a set of tasks is vital. Beginner's Guide to Code Algorithms: Experiments to Enhance Productivity and Solve Problems written by Deepankar Maitra teaches you how to think like a programmer. The author unravels the secret behind writing code - building a good algorithm. Algorithmic thinking leads to asking the right question and enables a shift from issue resolution to value creation. Having this mindset will make you more marketable to employers. This book takes you on a problem-solving journey to expand your mind and increase your willingness to experiment with code. You will: Learn the art of building an algorithm through hands-on exercises Understand how to develop code for inspiring productivity concepts Build a mentality of developing algorithms to solve problems Develop, test, review, and improve code through guided experimentation This book is designed to develop a culture of logical thinking through intellectual stimulation. It will benefit students and teachers of programming, business professionals, as well as experienced users of Microsoft Excel who wish to become proficient with macros.
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures
'Work hard, have fun, make history' proclaims the slogan on the walls of Amazon's warehouses. This cheerful message hides a reality of digital surveillance, aggressive anti-union tactics and disciplinary layoffs. Reminiscent of the tumult of early industrial capitalism, the hundreds of thousands of workers who help Amazon fulfil consumers' desire are part of an experiment in changing the way we all work. In this book, Alessandro Delfanti takes readers inside Amazon's warehouses to show how technological advancements and managerial techniques subdue the workers rather than empower them, as seen in the sensors that track workers' every movement around the floor and algorithmic systems that re-route orders to circumvent worker sabotage. He looks at new technologies including robotic arms trained by humans and augmented reality goggles, showing that their aim is to standardise, measure and discipline human work rather than replace it. Despite its innovation, Amazon will always need living labour's flexibility and low cost. And as the warehouse is increasingly automated, worker discontent increases. Striking under the banner 'we are not robots', employees have shown that they are acutely aware of such contradictions. The only question remains: how long will it be until Amazon's empire collapses?
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.
a collection of interviews from renowned author, David L. Craddock
Game Dev Stories: Interviews About Game Development and Culture Volumes 1 and 2 are a collection of interviews from renowned author David L. Craddock as he explores all corners of the video game industry. Collected from the author's archives, Game Dev Stories gathers conversations with individuals from all corners of the industry: Who they are, the paths they paved, and their contributions to this multibillion-dollar industry. This text offers viewpoints from well-known individuals like John Romero, Tom Hall, and Matt Householder. From artists and writers to programmers and designers, Game Dev Stories offers amazing insights and understanding to what occurs behind the screens of your favorite games and may help inspire future game developers in pursuing their dreams. Author Bio David L. Craddock writes fiction, nonfiction, and grocery lists. He is the author of over a dozen nonfiction books about video game development and culture, including the bestselling Stay Awhile and Listen series, Arcade Perfect: How Pac-Man, Mortal Kombat, and Other Coin-Op Classics Invaded the Living Room, and fiction for young adults, including The Dumpster Club and Heritage: Book One of the Gairden Chronicles. Find him online @davidlcraddock on Twitter.
Design Your Organization for Maximum Agile Success at Scale "[A] unique view of organizational agility. Cesario and Ilia first describe the [foundational] tools and vocabulary to think about agile enterprise-level change. The second section is a practical approach to adoption. It marries the foundational elements into a people and customer centric approach to change. The book is epic in scope ... but it manages to present a cookbook for agile adoption and change." --From the Foreword by Dave West, CEO, Scrum.org "Cesario and Ilia ... understand that a key element of successful change to being adaptive at scale is Organizational Design (OD)--and that OD is something senior managers need to own, master, create, and lead, not delegate. ... [F]ast delivery and learning isn't enough at scale. Without other adaptive OD elements in place, there might not be any concrete change. ... [A] wonderful book from two passionate people with years in the trenches involved in large-scale adaptive development." --From the Foreword by Craig Larman, co-creator, Large-Scale Scrum (LeSS) For Agile to succeed at scale, strategy, structures, processes, reward systems, and people practices must align with and reinforce each other across the entire organization. Creating Agile Organizations is about making that happen. Whether you're a leader, Scrum Master, or trainer, this book will help you use effective Organizational Design (OD) to achieve successful Agile transformation at the enterprise level. Drawing on years of experience scaling Scrum, renowned Large-Scale Scrum (LeSS) experts Cesario Ramos and Ilia Pavlichenko present proven techniques for use with any technology, in any large environment. In the context of a true systems-thinking approach, they provide specific solutions for challenges such as preparing and facilitating large-scale Scrum meetings, honing newly relevant leadership skills, and addressing challenges that cut across the entire organization. This book includes a library of tested tools for effective Agile leadership, including Product Definition Guides for describing any new product and a Feature Heat Map for designing teams and entire organizations. Organizing for adaptability, making strategic optimization choices, and choosing informed tradeoffs Exploring and applying proven OD principles at the leadership level Taking a birds-eye view of the activities most crucial to large-scale adoption Coaching to make Agile transformation successful across your organization Planning, designing, and facilitating Agile workshops that work Preparing and launching highly effective, well-aligned Product Groups Coaching teams and guiding product ownership in large groups
This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.
This book concentrates on mining networks, a subfield within data science. Data science uses scientific and computational tools to extract valuable knowledge from large data sets. Once data is processed and cleaned, it is analyzed and presented to support decision-making processes. Data science and machine learning tools have become widely used in companies of all sizes. Networks are often large-scale, decentralized, and evolve dynamically over time. Mining complex networks aim to understand the principles governing the organization and the behavior of such networks is crucial for a broad range of fields of study. Here are a few selected typical applications of mining networks: Community detection (which users on some social media platforms are close friends). Link prediction (who is likely to connect to whom on such platforms). Node attribute prediction (what advertisement should be shown to a given user of a particular platform to match their interests). Influential node detection (which social media users would be the best ambassadors of a specific product). This textbook is suitable for an upper-year undergraduate course or a graduate course in programs such as data science, mathematics, computer science, business, engineering, physics, statistics, and social science. This book can be successfully used by all enthusiasts of data science at various levels of sophistication to expand their knowledge or consider changing their career path. Jupiter notebooks (in Python and Julia) accompany the book and can be accessed on https://www.ryerson.ca/mining-complex-networks/. These not only contain all the experiments presented in the book, but also include additional material. Bogumil Kaminski is the Chairman of the Scientific Council for the Discipline of Economics and Finance at SGH Warsaw School of Economics. He is also an Adjunct Professor at the Data Science Laboratory at Ryerson University. Bogumil is an expert in applications of mathematical modeling to solving complex real-life problems. He is also a substantial open-source contributor to the development of the Julia language and its package ecosystem. Pawel Pralat is a Professor of Mathematics in Ryerson University, whose main research interests are in random graph theory, especially in modeling and mining complex networks. He is the Director of Fields-CQAM Lab on Computational Methods in Industrial Mathematics in The Fields Institute for Research in Mathematical Sciences and has pursued collaborations with various industry partners as well as the Government of Canada. He has written over 170 papers and three books with 130 plus collaborators. Francois Theberge holds a B.Sc. degree in applied mathematics from the University of Ottawa, a M.Sc. in telecommunications from INRS and a PhD in electrical engineering from McGill University. He has been employed by the Government of Canada since 1996 where he was involved in the creation of the data science team as well as the research group now known as the Tutte Institute for Mathematics and Computing. He also holds an adjunct professorial position in the Department of Mathematics and Statistics at the University of Ottawa. His current interests include relational-data mining and deep learning.
provides a thorough understanding of the integration of computational intelligence with information retrieval includes discussion on protecting and analysing big data on cloud platforms provides a plethora of theoretical as well as experimental research, along with surveys and impact studies
Exploratory data analysis helps to recognize natural patterns hidden in the data. This book describes the tools for hypothesis generation by visualizing data through graphical representation and provides insight into advanced analytics concepts in an easy way. The book addresses the complete data visualization technologies workflow, explores basic and high-level concepts of computer science and engineering in medical science, and provides an overview of the clinical scientific research areas that enables smart diagnosis equipment. It will discuss techniques and tools used to explore large volumes of medical data and offers case studies that focus on the innovative technological upgradation and challenges faced today. The primary audience for the book includes specialists, researchers, graduates, designers, experts, physicians, and engineers who are doing research in this domain. |
You may like...
C++ How to Program: Horizon Edition
Harvey Deitel, Paul Deitel
Paperback
R1,857
Discovery Miles 18 570
Foundations of Software Testing - ISTQB…
Dorothy Graham, Rex Black, …
Paperback
Agile Retrospectives - Making Good Teams…
Esther Derby, Diana Larsen, …
Paperback
R758
Discovery Miles 7 580
|