0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (603)
  • R250 - R500 (2,172)
  • R500+ (29,951)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Virtual Teams - Projects, Protocols and Processes (Hardcover): David Pauleen Virtual Teams - Projects, Protocols and Processes (Hardcover)
David Pauleen
R2,144 Discovery Miles 21 440 Ships in 18 - 22 working days

Virtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters featuring practical research, insight and recommendations on how virtual team projects can be better managed, as well as in depth discussion on issues critical to virtual team success, including the place of virtual teams in organizations, leadership, trust and relationship building, best use of technology, and knowledge sharing.

Designing the Mobile User Experience (Hardcover): B. Ballard Designing the Mobile User Experience (Hardcover)
B. Ballard
R1,792 Discovery Miles 17 920 Ships in 18 - 22 working days

Gain the knowledge and tools to deliver compelling mobile phone applications.

Mobile and wireless application design is complex and challenging. Selecting an application technology and designing a mobile application require an understanding of the benefits, costs, context, and restrictions of the development company, end user, target device, and industry structure.

"Designing the Mobile User Experience" provides the experienced product development professional with an understanding of the users, technologies, devices, design principles, techniques and industry players unique to the mobile and wireless space. Barbara Ballard describes the different components affecting the user experience and principles applicable to the mobile environment, enabling the reader to choose effective technologies, platforms, and devices, plan appropriate application features, apply pervasive design patterns, and choose and apply appropriate research techniques.

"Designing the Mobile User Experience: "

Provides a comprehensive guide to the mobile user experience, offering guidance to help make appropriate product development and design decisions. Gives product development professionals the tools necessary to understand development in the mobile environment. Clarifies the components affecting the user experience and principles uniquely applicable to the mobile application field. Explores industry structure and power dynamics, providing insight into how mobile technologies and platforms become available on current and future phones. Provides user interface design patterns, design resources, and user research methods for mobile user interface design. Illustrates concepts with example photographs, explanatory tables and charts, and an example application.

"Designing the Mobile User Experience" is an invaluable resource for information architects, user experience planners and designers, interaction designers, human factors specialists, ergonomists, product marketing specialists, and brand managers. Managers and directors within organizations entering the mobile space, advanced students, partnership managers, software architects, solution architects, development managers, graphic designers, visual designers, and interface designers will also find this to be an excellent guide to the topic.

Parallelism in Matrix Computations (Hardcover, 1st ed. 2016): Efstratios Gallopoulos, Bernard Philippe, Ahmed H Sameh Parallelism in Matrix Computations (Hardcover, 1st ed. 2016)
Efstratios Gallopoulos, Bernard Philippe, Ahmed H Sameh
R3,621 Discovery Miles 36 210 Ships in 10 - 15 working days

This book is primarily intended as a research monograph that could also be used in graduate courses for the design of parallel algorithms in matrix computations. It assumes general but not extensive knowledge of numerical linear algebra, parallel architectures, and parallel programming paradigms. The book consists of four parts: (I) Basics; (II) Dense and Special Matrix Computations; (III) Sparse Matrix Computations; and (IV) Matrix functions and characteristics. Part I deals with parallel programming paradigms and fundamental kernels, including reordering schemes for sparse matrices. Part II is devoted to dense matrix computations such as parallel algorithms for solving linear systems, linear least squares, the symmetric algebraic eigenvalue problem, and the singular-value decomposition. It also deals with the development of parallel algorithms for special linear systems such as banded ,Vandermonde ,Toeplitz ,and block Toeplitz systems. Part III addresses sparse matrix computations: (a) the development of parallel iterative linear system solvers with emphasis on scalable preconditioners, (b) parallel schemes for obtaining a few of the extreme eigenpairs or those contained in a given interval in the spectrum of a standard or generalized symmetric eigenvalue problem, and (c) parallel methods for computing a few of the extreme singular triplets. Part IV focuses on the development of parallel algorithms for matrix functions and special characteristics such as the matrix pseudospectrum and the determinant. The book also reviews the theoretical and practical background necessary when designing these algorithms and includes an extensive bibliography that will be useful to researchers and students alike. The book brings together many existing algorithms for the fundamental matrix computations that have a proven track record of efficient implementation in terms of data locality and data transfer on state-of-the-art systems, as well as several algorithms that are presented for the first time, focusing on the opportunities for parallelism and algorithm robustness.

Semigroups, Algebras and Operator Theory - Kochi, India, February 2014 (Hardcover, 1st ed. 2015): P. G. Romeo, John C. Meakin,... Semigroups, Algebras and Operator Theory - Kochi, India, February 2014 (Hardcover, 1st ed. 2015)
P. G. Romeo, John C. Meakin, A R Rajan
R3,859 R3,328 Discovery Miles 33 280 Save R531 (14%) Ships in 10 - 15 working days

This book discusses recent developments in semigroup theory and its applications in areas such as operator algebras, operator approximations and category theory. All contributing authors are eminent researchers in their respective fields, from across the world. Their papers, presented at the 2014 International Conference on Semigroups, Algebras and Operator Theory in Cochin, India, focus on recent developments in semigroup theory and operator algebras. They highlight current research activities on the structure theory of semigroups as well as the role of semigroup theoretic approaches to other areas such as rings and algebras. The deliberations and discussions at the conference point to future research directions in these areas. This book presents 16 unpublished, high-quality and peer-reviewed research papers on areas such as structure theory of semigroups, decidability vs. undecidability of word problems, regular von Neumann algebras, operator theory and operator approximations. Interested researchers will find several avenues for exploring the connections between semigroup theory and the theory of operator algebras.

Align Client and Provider Perspectives - Best Practices in IT Outsourcing (Hardcover, 1st ed. 2018): Lionel Haas Align Client and Provider Perspectives - Best Practices in IT Outsourcing (Hardcover, 1st ed. 2018)
Lionel Haas
R2,002 R1,777 Discovery Miles 17 770 Save R225 (11%) Ships in 10 - 15 working days

This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.

Exploring Critical Approaches of Evolutionary Computation (Hardcover): Muhammad Sarfraz Exploring Critical Approaches of Evolutionary Computation (Hardcover)
Muhammad Sarfraz
R5,395 Discovery Miles 53 950 Ships in 18 - 22 working days

Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.

Advances and Applications in Chaotic Systems (Hardcover, 1st ed. 2016): Sundarapandian Vaidyanathan, Christos Volos Advances and Applications in Chaotic Systems (Hardcover, 1st ed. 2016)
Sundarapandian Vaidyanathan, Christos Volos
R4,121 Discovery Miles 41 210 Ships in 18 - 22 working days

This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.

Compressed Sensing & Sparse Filtering (Hardcover, 2014 ed.): Avishy Y. Carmi, Lyudmila Mihaylova, Simon J. Godsill Compressed Sensing & Sparse Filtering (Hardcover, 2014 ed.)
Avishy Y. Carmi, Lyudmila Mihaylova, Simon J. Godsill
R6,057 R4,925 Discovery Miles 49 250 Save R1,132 (19%) Ships in 10 - 15 working days

This book is aimed at presenting concepts, methods and algorithms ableto cope with undersampled and limited data. One such trend that recently gained popularity and to some extent revolutionised signal processing is compressed sensing. Compressed sensing builds upon the observation that many signals in nature are nearly sparse (or compressible, as they are normally referred to) in some domain, and consequently they can be reconstructed to within high accuracy from far fewer observations than traditionally held to be necessary. Apart from compressed sensing this book contains other related approaches. Each methodology has its own formalities for dealing with such problems. As an example, in the Bayesian approach, sparseness promoting priors such as Laplace and Cauchy are normally used for penalising improbable model variables, thus promoting low complexity solutions. Compressed sensing techniques and homotopy-type solutions, such as the LASSO, utilise l1-norm penalties for obtaining sparse solutions using fewer observations than conventionally needed. The book emphasizes on the role of sparsity as a machinery for promoting low complexity representations and likewise its connections to variable selection and dimensionality reduction in various engineering problems. This book is intended for researchers, academics and practitioners with interest in various aspects and applications of sparse signal processing.

The End of the Future - Governing Consequence in the Age of Digital Sovereignty (Hardcover): Stephanie Polsky The End of the Future - Governing Consequence in the Age of Digital Sovereignty (Hardcover)
Stephanie Polsky
R3,523 Discovery Miles 35 230 Ships in 18 - 22 working days

We are now entering an era where the human world assumes recognition of itself as data. Much of humanity's basis for existence is becoming subordinate to software processes that tabulate, index, and sort the relations that comprise what we perceive as reality. The acceleration of data collection threatens to relinquish ephemeral modes of representation to ceaseless processes of computation. This situation compels the human world to form relations with non-human agencies, to establish exchanges with software processes in order to allow a profound upgrade of our own ontological understanding. By mediating with a higher intelligence, we may be able to rediscover the inner logic of the age of intelligent machines. In The End of the Future, Stephanie Polsky conceives an understanding of the digital through its dynamic intersection with the advent and development of the nation-state, race, colonization, navigational warfare, mercantilism, and capitalism, and the mathematical sciences over the past five centuries, the era during which the world became "modern." The book animates the twenty-first century as an era in which the screen has split off from itself and proliferated onto multiple surfaces, allowing an inverted image of totalitarianism to flash up and be altered to support our present condition of binary apperception. It progresses through a recognition of atomized political power, whose authority lies in the control not of the means of production, but of information, and in which digital media now serves to legitimize and promote a customized micropolitics of identity management. On this new apostolate plane, humanity may be able to shape a new world in which each human soul is captured and reproduced as an autonomous individual bearing affects and identities. The digital infrastructure of the twenty-first century makes it possible for power to operate through an esoteric mathematical means, and for factual material to be manipulated in the interest of advancing the means of control. This volume travels a course from Elizabethan England, to North American slavery, through cybernetic Social Engineering, Cold War counterinsurgency, and the (neo)libertarianism of Silicon Valley in order to arrive at a place where an organizing intelligence that started from an ambition to resourcefully manipulate physical bodies has ended with their profound neutralization.

Social Interactive Television - Immersive Shared Experiences and Perspectives (Hardcover): Pablo Cesar, David Geerts,... Social Interactive Television - Immersive Shared Experiences and Perspectives (Hardcover)
Pablo Cesar, David Geerts, Konstantinos Chorianopoulos
R4,945 Discovery Miles 49 450 Ships in 18 - 22 working days

Television, since its invention, has been considered to be a social link between people. Continually enhanced by innovation, the next frontier for this technological phenomenon will focus on the actual natural capabilities of the medium. Social Interactive Television: Immersive Shared Experiences and Perspectives combines academic and industry research to provide the first publication of its kind to discuss the future emergence of experiences and services through interactive television. Concentrating on system and interaction design, as well as evaluation methods that focus on social experiences around interactive television, this book provides practitioners, academicians, researchers, and developers with the most relevant, current, and interesting findings on the topic.

Self-Aware Computing Systems (Hardcover, 1st ed. 2017): Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu Self-Aware Computing Systems (Hardcover, 1st ed. 2017)
Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.

Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R8,960 Discovery Miles 89 600 Ships in 18 - 22 working days
Making Money on the Mobile Internet (Hardcover): Jeff Yee, Will Dixon, Deanna Garcia Making Money on the Mobile Internet (Hardcover)
Jeff Yee, Will Dixon, Deanna Garcia
R745 Discovery Miles 7 450 Ships in 10 - 15 working days

In the United States, mobile commerce is a $1 billion industry and growing. More and more people are using their mobile phones everywhere to communicate, to get information, and to have fun. The technology for you to create, deliver, and market that content - and profit from it - is available now too. In Making Money on the Mobile Internet, the experts at Cingular Wireless show you how to harness the potential of the mobile marketplace in five simple steps. The business opportunities for mobile content providers are tremendous. From creating your application to getting it to market to tracking your success, Making Money on the Mobile Internet shows you how to create the next killer app. Let's get started!

Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015): Misty Blowers Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015)
Misty Blowers
R2,738 R2,212 Discovery Miles 22 120 Save R526 (19%) Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Python Programming Professional Made Easy (Hardcover): Sam Key Python Programming Professional Made Easy (Hardcover)
Sam Key
R783 Discovery Miles 7 830 Ships in 18 - 22 working days

Python Programming Professional Made Easy 2nd Edition! Sam Key back at it again with his upgraded version of Python Going from beginner to professional? Want to skip the learning curve? Need the jargon removed so you can understand in your terms? From various programming languages to statements and Basic Operators Everything you need to know with functions and flow controls! Don't waste anytime and jump on board of Python! Start your programming right now!

Data Privacy Games (Hardcover, 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Hardcover, 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

The VHDL Reference - A Practical Guide to Computer  -Aided Integrated Circuit Design Including VHDL-  AMS (Hardcover): U Heinkel The VHDL Reference - A Practical Guide to Computer -Aided Integrated Circuit Design Including VHDL- AMS (Hardcover)
U Heinkel
R4,758 Discovery Miles 47 580 Ships in 18 - 22 working days

The VHDL Reference: The essential guide for students and professionals working in computer hardware design and synthesis. The definitive guide to VHDL, this book combines a comprehensive reference of the VHDL syntax with tutorial and workshop materials that guide the reader through the principles of digital hardware design. The authors describe the concept of VHDL and VHDL-AMS for modelling and synthesis and explain how VHDL can be used for the design of digital systems. The CD-ROM features workshop and reference material to familiarise beginners with the use of VHDL for simulation and for synthesis. In-depth examples of VHDL construct are explained in compact and easy to follow form providing immediate help and answers to specific problems. The VHDL Reference is a highly accessible single source reference to the industry standard language for computer-aided electronic system design. It is not only an essential guide for undergraduate and postgraduate students in electrical engineering but also an indispensable aid to researchers and hardware designers and teachers using VHDL and logic synthesis. Features include:

  • Accompanying CD-ROM version of the VHDL Reference including demonstration tools and workshop material covering language aspects for digital systems.
  • Modelling tutorial featuring VHDL-AMS, the new standard for modelling and simulating mixed signal micro systems. Real-life examples enable the reader to test their knowledge and clarify their understanding of the concepts.
  • Design workshop format taking the reader through an entire circuit design using an actual design problem, allowing beginners to put their VHDL skills into practice.
  • A user friendly reference section providing in-depth coverage of the VHDL language for digital systems.
  • Includes tools, on CD-ROM, for editing VHDL source files, simulating and synthesising VHDL models.
ICT World - Development, Failure of Computer & Smartphone Technologies (Paperback): MD Fazle Mubin, MD Izhar Tahmid, MD Fathe... ICT World - Development, Failure of Computer & Smartphone Technologies (Paperback)
MD Fazle Mubin, MD Izhar Tahmid, MD Fathe Mubin
R294 Discovery Miles 2 940 Ships in 18 - 22 working days
Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback): Michael Harrington,... Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback)
Michael Harrington, Michael Cross
R837 Discovery Miles 8 370 Ships in 10 - 15 working days

"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways.

As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools.

Written for investigators and forensic practitioners, "Google Earth Forensics" is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth program or app on computers and mobile devicesCovers the basics of GPS systems, the usage of Google Earth, and helps sort through data imported from external evidence sourcesIncludes tips on presenting evidence in compelling, easy-to-understand formats

Design of Arithmetic Circuits in Quantum Dot Cellular Automata Nanotechnology (Hardcover, 2015 ed.): K. Sridharan, Vikramkumar... Design of Arithmetic Circuits in Quantum Dot Cellular Automata Nanotechnology (Hardcover, 2015 ed.)
K. Sridharan, Vikramkumar Pudi
R3,161 Discovery Miles 31 610 Ships in 18 - 22 working days

This research monograph focuses on the design of arithmetic circuits in Quantum Dot Cellular Automata (QCA). Using the fact that the 3-input majority gate is a primitive in QCA, the book sets out to discover hitherto unknown properties of majority logic in the context of arithmetic circuit designs. The pursuit for efficient adders in QCA takes two forms. One involves application of the new results in majority logic to existing adders. The second involves development of a custom adder for QCA technology. A QCA adder named as hybrid adder is proposed and it is shown that it outperforms existing multi-bit adders with respect to area and delay. The work is extended to the design of a low-complexity multiplier for signed numbers in QCA. Furthermore the book explores two aspects unique to QCA technology, namely thermal robustness and the role of interconnects. In addition, the book introduces the reader to QCA layout design and simulation using QCADesigner. Features & Benefits: This research-based book: *Introduces the reader to Quantum Dot Cellular Automata, an emerging nanotechnology. *Explores properties of majority logic. *Demonstrates application of the properties to design efficient arithmetic circuits. *Guides the reader towards layout design and simulation in QCADesigner.

I.T. Risk Management - 2011 Edition (Paperback): Andreas Sofroniou I.T. Risk Management - 2011 Edition (Paperback)
Andreas Sofroniou
R510 Discovery Miles 5 100 Ships in 10 - 15 working days

A risk is an uncertain event which may have an adverse effect on the project's objectives. This Risk Management book is based on a proven risk management methodology, which should be very effective in the quest for identifying risks throughout the project life-cycle. The I.T. Risk Management process commences by identifying the enterprises most important and risky projects, as these must be given priority. This I.T. Risk Management book/manual is essentially a method that permits the collection of knowledge and experience from those involved, in a form that facilitates the Systematic Interaction and Generic Methodology for Applications.

Cambridge Technicals Level 3 IT (Paperback): Victoria Ellis, Graham Manson, Saundra Middleton Cambridge Technicals Level 3 IT (Paperback)
Victoria Ellis, Graham Manson, Saundra Middleton; Edited by Maureen Everett
R1,174 Discovery Miles 11 740 Ships in 10 - 15 working days

Exam Board: Cambridge Level: Key Stage 4 Subject: IT First Teaching: September 2016 First Exam: June 207 Support your teaching of the new Cambridge Technicals 2016 suite with Cambridge Technical Level 3 IT, developed in partnership between OCR and Hodder Education; this textbook covers each specialist pathway and ensures your ability to deliver a flexible course that is both vocationally focused and academically thorough. Cambridge Technical Level 3 IT is matched exactly to the new specification and follows specialist pathways in IT Infrastructure Technician, Emerging Digital Technology Practitioner, Application Developer, and Data Analyst. - Ensures effective teaching of each specialist pathway offered within the qualification. - Focuses learning on the skills, knowledge and understanding demanded from employers and universities. - Provides ideas and exercises for the application of practical skills and knowledge. - Developed in partnership between Hodder Education and OCR, guaranteeing quality resources which match the specification perfectly Hodder Education have worked with OCR to make updates to our Cambridge Technicals textbooks to bring them more closely in line with the model assignment course requirements. We would like to let you know about a recent change to this textbook, updated pages which are now available free of charge as a PDF when you click on the 'Amended Pages' link on the left of this webpage.

Information and Communication Technologies in Support of the Tourism Industry (Hardcover): Wayne Pease, Michelle Rowe, Malcolm... Information and Communication Technologies in Support of the Tourism Industry (Hardcover)
Wayne Pease, Michelle Rowe, Malcolm Cooper
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. ""Information and Communication Technologies in Support of the Tourism Industry"" examines the process of transformation as it relates to the tourism industry, and the changes to that industry from modern electronic communications. ""Information and Communication Technologies in Support of the Tourism Industry"" covers not only geographically supportive technologies in communication, but also in terms of culture, economics, marketing, social, and regional issues. In-depth analyses range from the use of the Internet to supply information to the emerging patterns of tourist decision making and investments.

Python for Beginners - Learn It as Easy as Pie (Hardcover): Yatin Bayya Python for Beginners - Learn It as Easy as Pie (Hardcover)
Yatin Bayya
R524 Discovery Miles 5 240 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Element: Morning & Evening Yoga
Mia Togo DVD  (3)
R103 Discovery Miles 1 030
Nothing Like A Dame
Eileen Atkins, Judi Dench, … DVD  (2)
R240 Discovery Miles 2 400
Music in the Air - A History of…
Glenn Gould, Herbert Von Karajan, … DVD R305 Discovery Miles 3 050
The Tracy Anderson Method: Dance Cardio…
Tracy Anderson DVD R92 Discovery Miles 920
Scarlett's Superslim Me Plan
Scarlett Moffatt DVD  (1)
R92 Discovery Miles 920
The Great War Poets
Wilfred Owen, John McCrae, … DVD R320 Discovery Miles 3 200
Hotlegs Workout
Penny Lancaster DVD  (1)
R303 Discovery Miles 3 030
Apollo 11 Moon Landing - 50th…
DVD R462 Discovery Miles 4 620
Who The #?And% Is Jackson Pollock?
Harry Moses DVD  (1)
R103 Discovery Miles 1 030
10 Minute Solution
DVD R252 R229 Discovery Miles 2 290

 

Partners