![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Data mining is often referred to by real-time users and software
solutions providers as knowledge discovery in databases (KDD). Good
data mining practice for business intelligence (the art of turning
raw software into meaningful information) is demonstrated by the
many new techniques and developments in the conversion of fresh
scientific discovery into widely accessible software solutions.
This book has been written as an introduction to the main issues
associated with the basics of machine learning and the algorithms
used in data mining.
Modelling and Control in Biomedical Systems (including Biological
Systems) was held in Reims, France, 20-22 August 2006. This
Symposium was organised by the University of Reims Champagne
Ardenne and the Societe de l Electricite, de l Electronique et des
TIC (SEE).
Low cost Internet technology has transformed library services by
allowing libraries to play a creative and dynamic role in the
delivery of information to their users. This book helps managers,
systems personnel, and graduate students understand the challenges
of providing digital library services with a number disparate
content providers and software systems. It also helps readers
understand what libraries must do to deliver a user experience
customized to the needs of individual institutions.
Almost every organization seeks a simple means of managing,
publishing and/or providing searchable web access to information.
Written by a knowledgeable web developer, this book demonstrates
the simplicity, cost-effectiveness, and versatility of designing
database driven web applications with Open Source resources. Case
studies of real world implementations address both theoretical
aspects and practical considerations of developing applications
with the easy-to-use PHP scripting language and powerful MySQL
relational database. Project organization and design issues are
considered along with basic coding examples, accessibility
standards and implementation advice.
Wikis as information sources, as a form of publishing, and as tools
for collaboration, are discussed in this book. The applications of
wikis in library and information services, education and business
are explored, with examples. Provides an overview of wikis, in the
context of the increasing use of social software and the trend
towards a more interactive World Wide Web. The different kinds of
wikis are identified and described. The advantages and problems
associated with using wikis in information work and collaboration
are discussed. One of the problems is simply that of finding wikis
that deal with a particular topic or activity, and this is
addressed through a discussion of directories, search engines and
other finding tools. Later chapters cover the options for creating
wikis and the management of a wiki. The book concludes with lists
of resources related to wikis.
Real-Time Systems Development introduces computing students and professional programmers to the development of software for real-time applications. Based on the academic and commercial experience of the author, the book is an ideal companion to final year undergraduate options or MSc modules in the area of real-time systems design and implementation. Assuming a certain level of general systems design and programming experience, this text will extend students' knowledge and skills into an area of computing which has increasing relevance in a modern world of telecommunications and 'intelligent' equipment using embedded microcontrollers. This book takes a broad, practical approach in discussing real-time systems. It covers topics such as basic input and output; cyclic executives for bare hardware; finite state machines; task communication and synchronization; input/output interfaces; structured design for real-time systems; designing for multitasking; UML for real-time systems; object oriented approach to real-time systems; selecting languages for RTS development; Linux device drivers; and hardware/software co-design. Programming examples using GNU/Linux are included, along with a supporting website containing slides; solutions to problems; and software examples. This book will appeal to advanced undergraduate Computer Science students; MSc students; and, undergraduate software engineering and electronic engineering students.
This unique books looks at a cost-efficient, fast and accurate
means of facial reconstruction--from segmented, decomposed, or
skeletal remains--using computer-graphic and computational means.
The objective of this book is to outline the best practice in
designing, installing, commissioning and troubleshooting industrial
data communications systems. In any given plant, factory or
installation there are a myriad of different industrial
communications standards used and the key to successful
implementation is the degree to which the entire system integrates
and works together.
A uniquely practical DSP text, this book gives a thorough
understanding of the principles and applications of DSP with a
minimum of mathematics, and provides the reader with an
introduction to DSP applications in telecoms, control engineering
and measurement and data analysis systems.
Infinite Words is an important theory in both Mathematics and
Computer Sciences. Many new developments have been made in the
field, encouraged by its application to problems in computer
science. Infinite Words is the first manual devoted to this topic.
SCADA (Supervisory Control and Data Acquisition) systems are at the
heart of the modern industrial enterprise ranging from mining
plants, water and electrical utility installations to oil and gas
plants. In a market that is crowded with high-level monographs and
reference guides, more practical information for professional
engineers is required. This book covers the essentials of SCADA
communication systems focussing on DNP3, the IEC 60870.5 standard
and other new developments in this area. It commences with a brief
review of the fundamentals of SCADA systems' hardware, software and
the communications systems (such as RS-232, RS-485, Ethernet and
TCP/IP) that connect the SCADA Modules together. A solid review is
then done on the DNP3 and IEC 60870.5 protocols where its features,
message structure, practical benefits and applications are
discussed. This book provides you with the knowledge to design your
next SCADA system more effectively with a focus on using the latest
communications technologies available.
There are many data communications titles covering design,
installation, etc, but almost none that specifically focus on
industrial networks, which are an essential part of the day-to-day
work of industrial control systems engineers, and the main focus of
an increasingly large group of network specialists.
Readers will use this knowledge to develop the required techniques
for design, installation and maintenance of their own fiber optic
systems.
Artificial intelligence (AI) is often discussed as something extraordinary, a dream-or a nightmare-that awakens metaphysical questions on human life. Yet far from a distant technology of the future, the true power of AI lies in its subtle revolution of ordinary life. From voice assistants like Siri to natural language processors, AI technologies use cultural biases and modern psychology to fit specific characteristics of how users perceive and navigate the external world, thereby projecting the illusion of intelligence. Integrating media studies, science and technology studies, and social psychology, Deceitful Media examines the rise of artificial intelligence throughout history and exposes the very human fallacies behind this technology. Focusing specifically on communicative AIs, Natale argues that what we call "AI" is not a form of intelligence but rather a reflection of the human user. Using the term "banal deception," he reveals that deception forms the basis of all human-computer interactions rooted in AI technologies, as technologies like voice assistants utilize the dynamics of projection and stereotyping as a means for aligning with our existing habits and social conventions. By exploiting the human instinct to connect, AI reveals our collective vulnerabilities to deception, showing that what machines are primarily changing is not other technology but ourselves as humans. Deceitful Media illustrates how AI has continued a tradition of technologies that mobilize our liability to deception and shows that only by better understanding our vulnerabilities to deception can we become more sophisticated consumers of interactive media.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the
suite of communications protocols used to connect hosts on the
Internet. TCP/IP uses several protocols, the two main ones being
TCP and IP. TCP/IP is built into the UNIX operating system and is
used by the Internet, making it the de facto standard for
transmitting data over networks. The TCP/IP suite of protocols has
become a dominant technology due to its widespread use and
reliability, while Ethernet is fast becoming a de facto industrial
networking standard.
New, updated and expanded topics in the fourth edition include:
EBCDIC, Grey code, practical applications of flip-flops, linear and
shaft encoders, memory elements and FPGAs. The section on
fault-finding has been expanded. A new chapter is dedicated to the
interface between digital components and analog voltages.
This book is a thoroughly practical way to explore the 8051 and
discover C programming through project work. Through graded
projects, Dogan Ibrahim introduces the reader to the fundamentals
of microelectronics, the 8051 family, programming in C, and the use
of a C compiler. The specific device used for examples is the
AT89C2051 - a small, economical chip with re-writable memory,
readily available from the major component suppliers. Microcontroller Projects in C for the 8051 is an ideal resource
for self-study as well as providing an interesting, enjoyable and
easily mastered alternative to more theoretical textbooks.
Because this is a book for engineers the practical coverage is
reinforced by use of the latest interanational standards, in
particular BICSI standards (USA and international) and EU
requirements. This will make the book ideal for the large number of
industry-based training courses. Coverage has also been matched to
the requirements of the revised City & Guilds 3466-04 course.
Essential Java serves as an introduction to the programming
language, Java, for scientists and engineers, and can also be used
by experienced programmers wishing to learn Java as an additional
language. The book focuses on how Java, and object-oriented
programming, can be used to solve science and engineering problems.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
Following on the success of his introductory text, "Digital
Evidence and Computer Crime," Eoghan Casey brings together a few
top experts to create the first detailed guide for professionals
who are already familiar with digital evidence. The Handbook of
Computer Crime Investigation helps readers master the forensic
analysis of computer systems with a three-part approach covering
tools, technology, and case studies. |
You may like...
Interactive Web-based Virtual Reality…
Chi Chung Ko, Chang Dong Cheng
Hardcover
R4,213
Discovery Miles 42 130
Long-Term Preservation of Digital…
Uwe M. Borghoff, Peter Roedig, …
Hardcover
R1,559
Discovery Miles 15 590
Artificial Intelligence Technologies and…
Tomayess Issa, Pedro Isaias
Hardcover
R5,697
Discovery Miles 56 970
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire
Hardcover
R6,154
Discovery Miles 61 540
|