0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (572)
  • R250 - R500 (2,112)
  • R500+ (29,844)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

The End of the Future - Governing Consequence in the Age of Digital Sovereignty (Hardcover): Stephanie Polsky The End of the Future - Governing Consequence in the Age of Digital Sovereignty (Hardcover)
Stephanie Polsky
R3,523 Discovery Miles 35 230 Ships in 18 - 22 working days

We are now entering an era where the human world assumes recognition of itself as data. Much of humanity's basis for existence is becoming subordinate to software processes that tabulate, index, and sort the relations that comprise what we perceive as reality. The acceleration of data collection threatens to relinquish ephemeral modes of representation to ceaseless processes of computation. This situation compels the human world to form relations with non-human agencies, to establish exchanges with software processes in order to allow a profound upgrade of our own ontological understanding. By mediating with a higher intelligence, we may be able to rediscover the inner logic of the age of intelligent machines. In The End of the Future, Stephanie Polsky conceives an understanding of the digital through its dynamic intersection with the advent and development of the nation-state, race, colonization, navigational warfare, mercantilism, and capitalism, and the mathematical sciences over the past five centuries, the era during which the world became "modern." The book animates the twenty-first century as an era in which the screen has split off from itself and proliferated onto multiple surfaces, allowing an inverted image of totalitarianism to flash up and be altered to support our present condition of binary apperception. It progresses through a recognition of atomized political power, whose authority lies in the control not of the means of production, but of information, and in which digital media now serves to legitimize and promote a customized micropolitics of identity management. On this new apostolate plane, humanity may be able to shape a new world in which each human soul is captured and reproduced as an autonomous individual bearing affects and identities. The digital infrastructure of the twenty-first century makes it possible for power to operate through an esoteric mathematical means, and for factual material to be manipulated in the interest of advancing the means of control. This volume travels a course from Elizabethan England, to North American slavery, through cybernetic Social Engineering, Cold War counterinsurgency, and the (neo)libertarianism of Silicon Valley in order to arrive at a place where an organizing intelligence that started from an ambition to resourcefully manipulate physical bodies has ended with their profound neutralization.

Python for Beginners - Learn It as Easy as Pie (Hardcover): Yatin Bayya Python for Beginners - Learn It as Easy as Pie (Hardcover)
Yatin Bayya
R524 Discovery Miles 5 240 Ships in 10 - 15 working days
Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis... Python Programming - The Easiest Python Crash Course to go Deep Through the Main Application as Web Development, Data Analysis and Data Science Including Machine Learning (Hardcover)
Alan Grid
R707 Discovery Miles 7 070 Ships in 10 - 15 working days
My Hardcover Book (Hardcover): Lasse Smith My Hardcover Book (Hardcover)
Lasse Smith
R846 Discovery Miles 8 460 Ships in 18 - 22 working days

Learn SEO - Search Engine Optimization and how to get traffic from Google and the other big search engines. Achieve high rankings - Get long term value and rank the right way!

Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback): Michael Harrington,... Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback)
Michael Harrington, Michael Cross
R837 Discovery Miles 8 370 Ships in 10 - 15 working days

"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways.

As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools.

Written for investigators and forensic practitioners, "Google Earth Forensics" is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth program or app on computers and mobile devicesCovers the basics of GPS systems, the usage of Google Earth, and helps sort through data imported from external evidence sourcesIncludes tips on presenting evidence in compelling, easy-to-understand formats

Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover): John Slavio Machine Learning for Beginners - An Introduction to Artificial Intelligence and Machine Learning (Hardcover)
John Slavio
R828 Discovery Miles 8 280 Ships in 18 - 22 working days
Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover): Mark Riddle Solving the Riddle of Microsoft and Your Computer - 2Nd Edition (Hardcover)
Mark Riddle
R574 Discovery Miles 5 740 Ships in 18 - 22 working days
Handbook of Reconfigurable Computing: Volume II (Hardcover): Akira Hanako Handbook of Reconfigurable Computing: Volume II (Hardcover)
Akira Hanako
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
Dynamic Fuzzy Machine Learning (Hardcover): Fanzhang Li, Li Zhang, Zhao Zhang Dynamic Fuzzy Machine Learning (Hardcover)
Fanzhang Li, Li Zhang, Zhao Zhang
R4,702 Discovery Miles 47 020 Ships in 10 - 15 working days

Machine learning is widely used for data analysis. Dynamic fuzzy data are one of the most difficult types of data to analyse in the field of big data, cloud computing, the Internet of Things, and quantum information. At present, the processing of this kind of data is not very mature. The authors carried out more than 20 years of research, and show in this book their most important results. The seven chapters of the book are devoted to key topics such as dynamic fuzzy machine learning models, dynamic fuzzy self-learning subspace algorithms, fuzzy decision tree learning, dynamic concepts based on dynamic fuzzy sets, semi-supervised multi-task learning based on dynamic fuzzy data, dynamic fuzzy hierarchy learning, examination of multi-agent learning model based on dynamic fuzzy logic. This book can be used as a reference book for senior college students and graduate students as well as college teachers and scientific and technical personnel involved in computer science, artificial intelligence, machine learning, automation, data analysis, mathematics, management, cognitive science, and finance. It can be also used as the basis for teaching the principles of dynamic fuzzy learning.

The Silence of Slime Mould (Hardcover): Andrew Adamatzky The Silence of Slime Mould (Hardcover)
Andrew Adamatzky
R584 Discovery Miles 5 840 Ships in 10 - 15 working days
Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.): Jan... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Hardcover, 2014 ed.)
Jan Schaffner
R2,953 R1,782 Discovery Miles 17 820 Save R1,171 (40%) Ships in 10 - 15 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover):... Special Applications of ICTs in Digital Government and the Public Sector - Emerging Research and Opportunities (Hardcover)
Manuel Pedro Rodriguez-Bolivar, Maria Elicia Cortes Cediel
R5,299 Discovery Miles 52 990 Ships in 18 - 22 working days

The development of social technologies has brought about a new era of political planning and government interactions. In addition to reducing costs in city resource management, ICT and social media can be used in emergency situations as a mechanism for citizen engagement, to facilitate public administration communication, etc. In spite of all these advantages, the application of technologies by governments and the public sector has also fostered debate in terms of cyber security due to the vulnerabilities and risks that can befall different stakeholders. It is necessary to review the most recent research about the implementation of ICTs in the public sector with the aim of understanding both the strengths and the vulnerabilities that the management models can entail. Special Applications of ICTs in Digital Government and the Public Sector: Emerging Research and Opportunities is a collection of innovative research on the methods and applications of ICT implementation in the public sector that seeks to allow readers to understand how ICTs have forced public administrations to undertake reforms to both their workflow and their means of interacting with citizens. While highlighting topics including e-government, emergency communications, and urban planning, this book is ideally designed for government officials, public administrators, public managers, policy holders, policymakers, public consultants, professionals, academicians, students, and researchers seeking current research on the digital communication channels between elected officials and the citizens they represent.

The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition): Michael Blundell, Damian Harty The Multibody Systems Approach to Vehicle Dynamics (Paperback, 2nd edition)
Michael Blundell, Damian Harty
R1,910 Discovery Miles 19 100 Ships in 10 - 15 working days

Filling the gaps between subjective vehicle assessment, classical vehicle dynamics and computer-based multibody approaches, "The Multibody Systems Approach to Vehicle Dynamics" offers unique coverage of both the virtual and practical aspects of vehicle dynamics from concept design to system analysis and handling development.

The book provides valuable foundation knowledge of vehicle dynamics as well as drawing on laboratory studies, test-track work, and finished vehicle applications to gel theory with practical examples and observations. Combined with insights into the capabilities and limitations of multibody simulation, this comprehensive mix provides the background understanding, practical reality and simulation know-how needed to make and interpret useful models.

New to this edition you will find coverage of the latest tire models, changes to the modeling of light commercial vehicles, developments in active safety systems, torque vectoring, and examples in AView, as well as updates to theory, simulation, and modeling techniques throughout.
Unique gelling of foundational theory, research findings, practical insights, and multibody systems modeling know-how, reflecting the mixed academic and industrial experience of this expert author teamDownloadable models, code, and data sets, available from the book s companion website, enable readers to explore the material in the book interactivelyCoverage of the latest models, safety developments, simulation methods, and features bring the new edition up to date with advances in this critical and evolving field"

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover): Bryan Jeffrey Parno Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover)
Bryan Jeffrey Parno
R1,996 Discovery Miles 19 960 Ships in 18 - 22 working days

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

Scheduling in Real-Time Systems (Hardcover): F. Cottet Scheduling in Real-Time Systems (Hardcover)
F. Cottet
R4,101 Discovery Miles 41 010 Ships in 18 - 22 working days

Real-time computing plays a vital role in ultra-reliable and safety-critical applications in fields as diverse as flight control, telecommunication systems, nuclear plant supervision and surgical operation monitoring. Providing a comprehensive overview, this book examines the most significant real-time scheduling policies in use today.

Scheduling in Real-Time Systems presents:

  • Rigorous discussions of the main scheduling algorithms.

  • In-depth analyses of centralised and distributed computing systems.

  • Detailed coverage of symmetric multiprocessor systems sharing a common memory.

  • A complete appraisal of packet scheduling in networks.

  • Three relevant case studies including the control system of the robot that the Pathfinder space vehicle landed on Planet Mars.
Offering end-of-chapter exercises and solutions, Scheduling in Real-time Systems will prove an invaluable textbook for university students in computer, software, electronics and control systems engineering. This book will also be an excellent reference to practising engineers and developers in the systems and communications industry.
Semigroups, Algebras and Operator Theory - Kochi, India, February 2014 (Hardcover, 1st ed. 2015): P. G. Romeo, John C. Meakin,... Semigroups, Algebras and Operator Theory - Kochi, India, February 2014 (Hardcover, 1st ed. 2015)
P. G. Romeo, John C. Meakin, A R Rajan
R3,859 R3,328 Discovery Miles 33 280 Save R531 (14%) Ships in 10 - 15 working days

This book discusses recent developments in semigroup theory and its applications in areas such as operator algebras, operator approximations and category theory. All contributing authors are eminent researchers in their respective fields, from across the world. Their papers, presented at the 2014 International Conference on Semigroups, Algebras and Operator Theory in Cochin, India, focus on recent developments in semigroup theory and operator algebras. They highlight current research activities on the structure theory of semigroups as well as the role of semigroup theoretic approaches to other areas such as rings and algebras. The deliberations and discussions at the conference point to future research directions in these areas. This book presents 16 unpublished, high-quality and peer-reviewed research papers on areas such as structure theory of semigroups, decidability vs. undecidability of word problems, regular von Neumann algebras, operator theory and operator approximations. Interested researchers will find several avenues for exploring the connections between semigroup theory and the theory of operator algebras.

Pattern Recognition on Oriented Matroids (Hardcover): Andrey O Matveev Pattern Recognition on Oriented Matroids (Hardcover)
Andrey O Matveev
R3,635 Discovery Miles 36 350 Ships in 10 - 15 working days

Pattern Recognition on Oriented Matroids covers a range of innovative problems in combinatorics, poset and graph theories, optimization, and number theory that constitute a far-reaching extension of the arsenal of committee methods in pattern recognition. The groundwork for the modern committee theory was laid in the mid-1960s, when it was shown that the familiar notion of solution to a feasible system of linear inequalities has ingenious analogues which can serve as collective solutions to infeasible systems. A hierarchy of dialects in the language of mathematics, for instance, open cones in the context of linear inequality systems, regions of hyperplane arrangements, and maximal covectors (or topes) of oriented matroids, provides an excellent opportunity to take a fresh look at the infeasible system of homogeneous strict linear inequalities - the standard working model for the contradictory two-class pattern recognition problem in its geometric setting. The universal language of oriented matroid theory considerably simplifies a structural and enumerative analysis of applied aspects of the infeasibility phenomenon. The present book is devoted to several selected topics in the emerging theory of pattern recognition on oriented matroids: the questions of existence and applicability of matroidal generalizations of committee decision rules and related graph-theoretic constructions to oriented matroids with very weak restrictions on their structural properties; a study (in which, in particular, interesting subsequences of the Farey sequence appear naturally) of the hierarchy of the corresponding tope committees; a description of the three-tope committees that are the most attractive approximation to the notion of solution to an infeasible system of linear constraints; an application of convexity in oriented matroids as well as blocker constructions in combinatorial optimization and in poset theory to enumerative problems on tope committees; an attempt to clarify how elementary changes (one-element reorientations) in an oriented matroid affect the family of its tope committees; a discrete Fourier analysis of the important family of critical tope committees through rank and distance relations in the tope poset and the tope graph; the characterization of a key combinatorial role played by the symmetric cycles in hypercube graphs. Contents Oriented Matroids, the Pattern Recognition Problem, and Tope Committees Boolean Intervals Dehn-Sommerville Type Relations Farey Subsequences Blocking Sets of Set Families, and Absolute Blocking Constructions in Posets Committees of Set Families, and Relative Blocking Constructions in Posets Layers of Tope Committees Three-Tope Committees Halfspaces, Convex Sets, and Tope Committees Tope Committees and Reorientations of Oriented Matroids Topes and Critical Committees Critical Committees and Distance Signals Symmetric Cycles in the Hypercube Graphs

Condition - The Geometry of Numerical Algorithms (Hardcover, 2013 ed.): Peter Burgisser, Felipe Cucker Condition - The Geometry of Numerical Algorithms (Hardcover, 2013 ed.)
Peter Burgisser, Felipe Cucker
R4,357 Discovery Miles 43 570 Ships in 10 - 15 working days

This book gathers threads that have evolved across different mathematical disciplines into seamless narrative. It deals with condition as a main aspect in the understanding of the performance ---regarding both stability and complexity--- of numerical algorithms. While the role of condition was shaped in the last half-century, so far there has not been a monograph treating this subject in a uniform and systematic way. The book puts special emphasis on the probabilistic analysis of numerical algorithms via the analysis of the corresponding condition. The exposition's level increases along the book, starting in the context of linear algebra at an undergraduate level and reaching in its third part the recent developments and partial solutions for Smale's 17th problem which can be explained within a graduate course. Its middle part contains a condition-based course on linear programming that fills a gap between the current elementary expositions of the subject based on the simplex method and those focusing on convex programming.

Applications of Sliding Mode Control (Hardcover, 1st ed. 2017): Nabil Derbel, Jawhar Ghommam, Quanmin Zhu Applications of Sliding Mode Control (Hardcover, 1st ed. 2017)
Nabil Derbel, Jawhar Ghommam, Quanmin Zhu
R4,769 Discovery Miles 47 690 Ships in 10 - 15 working days

This book presents essential studies and applications in the context of sliding mode control, highlighting the latest findings from interdisciplinary theoretical studies, ranging from computational algorithm development to representative applications. Readers will learn how to easily tailor the techniques to accommodate their ad hoc applications. To make the content as accessible as possible, the book employs a clear route in each paper, moving from background to motivation, to quantitative development (equations), and lastly to case studies/illustrations/tutorials (simulations, experiences, curves, tables, etc.). Though primarily intended for graduate students, professors and researchers from related fields, the book will also benefit engineers and scientists from industry.

Optimization, Volume 1 (Hardcover): George L. Nemhauser Optimization, Volume 1 (Hardcover)
George L. Nemhauser
R2,019 Discovery Miles 20 190 Ships in 10 - 15 working days

Collected together in this book are ten state-of-the-art expository articles on the most important topics in optimization, written by leading experts in the field. The book therefore provides a primary reference for those performing research in some area of optimization or for those who have some basic knowledge of optimization techniques but wish to learn the most up-to-date and efficient algorithms for particular classes of problems. The first sections of each chapter are expository and therefore accessible to master's level graduate students. However, the chapters also contain advanced material on current topics of interest to researchers. For instance there are chapters which describe the polynomial-time linear programming algorithms of Khachian and Karmarkar and the techniques used to solve combinatorial and integer programming problems, an order of magnitude larger than was possible just a few years ago. Overall a comprehensive yet lively and up-to-date discussion of the state-of-the-art in optimization is presented in this book.

Cases on Technology Enhanced Learning Through Collaborative Opportunities (Hardcover): Cases on Technology Enhanced Learning Through Collaborative Opportunities (Hardcover)
R4,613 Discovery Miles 46 130 Ships in 18 - 22 working days

An increasing number of global institutions look to advancements in technology to enhance access to learning and development and, in doing so, seek collaborative opportunities to maximize the benefits of educational technology. Cases on Technology Enhanced Learning through Collaborative Opportunities analyzes and evaluates how organizations and institutions of learning in the developing and developed world are adapting to technology enhanced learning environments and exploring transnational collaborative opportunities, providing prospects for learning, growth and development through a blend of traditional and technological methods.

Reversible Logic Synthesis Methodologies with Application to Quantum Computing (Hardcover, 1st ed. 2016): Saleem Mohammed Ridha... Reversible Logic Synthesis Methodologies with Application to Quantum Computing (Hardcover, 1st ed. 2016)
Saleem Mohammed Ridha Taha
R3,541 R3,281 Discovery Miles 32 810 Save R260 (7%) Ships in 10 - 15 working days

This book opens the door to a new interesting and ambitious world of reversible and quantum computing research. It presents the state of the art required to travel around that world safely. Top world universities, companies and government institutions are in a race of developing new methodologies, algorithms and circuits on reversible logic, quantum logic, reversible and quantum computing and nano-technologies. In this book, twelve reversible logic synthesis methodologies are presented for the first time in a single literature with some new proposals. Also, the sequential reversible logic circuitries are discussed for the first time in a book. Reversible logic plays an important role in quantum computing. Any progress in the domain of reversible logic can be directly applied to quantum logic. One of the goals of this book is to show the application of reversible logic in quantum computing. A new implementation of wavelet and multiwavelet transforms using quantum computing is performed for this purpose. Researchers in academia or industry and graduate students, who work in logic synthesis, quantum computing, nano-technology, and low power VLSI circuit design, will be interested in this book.

New Developments in Statistical Modeling, Inference and Application - Selected Papers from the 2014 ICSA/KISS Joint Applied... New Developments in Statistical Modeling, Inference and Application - Selected Papers from the 2014 ICSA/KISS Joint Applied Statistics Symposium in Portland, OR (Hardcover, 1st ed. 2016)
Zhezhen Jin, Mengling Liu, Xiaolong Luo
R4,614 Discovery Miles 46 140 Ships in 10 - 15 working days

The papers in this volume represent the most timely and advanced contributions to the 2014 Joint Applied Statistics Symposium of the International Chinese Statistical Association (ICSA) and the Korean International Statistical Society (KISS), held in Portland, Oregon. The contributions cover new developments in statistical modeling and clinical research: including model development, model checking, and innovative clinical trial design and analysis. Each paper was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe. It offered 3 keynote speeches, 7 short courses, 76 parallel scientific sessions, student paper sessions, and social events.

Evolutionary Algorithms, Swarm Dynamics and Complex Networks - Methodology, Perspectives and Implementation (Hardcover, 1st ed.... Evolutionary Algorithms, Swarm Dynamics and Complex Networks - Methodology, Perspectives and Implementation (Hardcover, 1st ed. 2018)
Ivan Zelinka, Guanrong Chen
R4,511 R3,441 Discovery Miles 34 410 Save R1,070 (24%) Ships in 10 - 15 working days

Evolutionary algorithms constitute a class of well-known algorithms, which are designed based on the Darwinian theory of evolution and Mendelian theory of heritage. They are partly based on random and partly based on deterministic principles. Due to this nature, it is challenging to predict and control its performance in solving complex nonlinear problems. Recently, the study of evolutionary dynamics is focused not only on the traditional investigations but also on the understanding and analyzing new principles, with the intention of controlling and utilizing their properties and performances toward more effective real-world applications. In this book, based on many years of intensive research of the authors, is proposing novel ideas about advancing evolutionary dynamics towards new phenomena including many new topics, even the dynamics of equivalent social networks. In fact, it includes more advanced complex networks and incorporates them with the CMLs (coupled map lattices), which are usually used for spatiotemporal complex systems simulation and analysis, based on the observation that chaos in CML can be controlled, so does evolution dynamics. All the chapter authors are, to the best of our knowledge, originators of the ideas mentioned above and researchers on evolutionary algorithms and chaotic dynamics as well as complex networks, who will provide benefits to the readers regarding modern scientific research on related subjects.

Handbook of Radio Frequency Identification (Hardcover): Kevin Merriman Handbook of Radio Frequency Identification (Hardcover)
Kevin Merriman
R2,121 Discovery Miles 21 210 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Subtle Art Of Not Giving A F*ck - A…
Mark Manson Paperback  (3)
R295 R264 Discovery Miles 2 640
Mathematical Handbook for Electrical…
Sergey A. Leonov, Alexander I Leonov Hardcover R3,879 Discovery Miles 38 790
The Domestic Abroad - Diasporas in…
Latha Varadarajan Hardcover R2,222 Discovery Miles 22 220
Die Seun Wat Drake Kweek - Boek 1
Andy Shepherd Paperback R170 Discovery Miles 1 700
Defiant Braceros - How Migrant Workers…
Mireya Loza Hardcover R2,674 Discovery Miles 26 740
Die Spaghettiboom
Jaco Jacobs Hardcover R220 Discovery Miles 2 200
Medical Medium Cleanse To Heal - Healing…
Anthony William Hardcover  (3)
R1,025 R862 Discovery Miles 8 620
The Man The Moment Demands - Master The…
Jason Wilson Paperback R399 R367 Discovery Miles 3 670
Ayahuasca - The Psychedelic Experience
Naomi Harper Hardcover R654 R583 Discovery Miles 5 830
Like Sodium In Water - A Memoir Of Home…
Hayden Eastwood Paperback  (1)
R734 Discovery Miles 7 340

 

Partners