![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
Software has long been perceived as complex, at least within
Software Engineering circles. We have been living in a recognised
state of crisis since the first NATO Software Engineering
conference in 1968. Time and again we have been proven unable to
engineer reliable software as easily/cheaply as we imagined. Cost
overruns and expensive failures are the norm.
This book contains an edited selection of the papers accepted for presentation and discussion at the first International Symposium on Qualitative Research (ISQR2016), held in Porto, Portugal, July 12th-14th, 2016. The book and the symposium features the four main application fields Education, Health, Social Sciences and Engineering and Technology and seven main subjects: Rationale and Paradigms of Qualitative Research (theoretical studies, critical reflection about epistemological dimensions, ontological and axiological); Systematization of approaches with Qualitative Studies (literature review, integrating results, aggregation studies, meta -analysis, meta- analysis of qualitative meta- synthesis, meta- ethnography); Qualitative and Mixed Methods Research (emphasis in research processes that build on mixed methodologies but with priority to qualitative approaches); Data Analysis Types (content analysis , discourse analysis , thematic analysis , narrative analysis , etc.); Innovative processes of Qualitative Data Analysis (design analysis, articulation and triangulation of different sources of data - images, audio, video); Qualitative Research in Web Context (eResearch, virtual ethnography, interaction analysis , latent corpus on the internet, etc.); Qualitative Analysis with Support of Specific Software (usability studies, user experience, the impact of software on the quality of research.
"Managing Data in Motion" describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is
rapidly becoming one of the biggest concerns for business and IT
management. Data warehousing and conversion, real-time data
integration, and cloud and "big data" applications are just a few
of the challenges facing organizations and businesses today.
"Managing Data in Motion" tackles these and other topics in a style
easily understood by business and IT managers as well as
programmers and architects.
This book provides a self-study program on how mathematics, computer science and science can be usefully and seamlessly intertwined. Learning to use ideas from mathematics and computation is essential for understanding approaches to cognitive and biological science. As such the book covers calculus on one variable and two variables and works through a number of interesting first-order ODE models. It clearly uses MatLab in computational exercises where the models cannot be solved by hand, and also helps readers to understand that approximations cause errors - a fact that must always be kept in mind.
A collection of papers from ISCIS 27th Annual Symposium.
This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26- 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development.
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
In a fragment entitled Elementa Nova Matheseos Universalis (1683?) Leibniz writes "the mathesis [...] shall deliver the method through which things that are conceivable can be exactly determined"; in another fragment he takes the mathesis to be "the science of all things that are conceivable." Leibniz considers all mathematical disciplines as branches of the mathesis and conceives the mathesis as a general science of forms applicable not only to magnitudes but to every object that exists in our imagination, i.e. that is possible at least in principle. As a general science of forms the mathesis investigates possible relations between "arbitrary objects" ("objets quelconques"). It is an abstract theory of combinations and relations among objects whatsoever. In 1810 the mathematician and philosopher Bernard Bolzano published a booklet entitled Contributions to a Better-Grounded Presentation of Mathematics. There is, according to him, a certain objective connection among the truths that are germane to a certain homogeneous field of objects: some truths are the "reasons" ("Grunde") of others, and the latter are "consequences" ("Folgen") of the former. The reason-consequence relation seems to be the counterpart of causality at the level of a relation between true propositions. Arigorous proof is characterized in this context as a proof that shows the reason of the proposition that is to be proven. Requirements imposed on rigorous proofs seem to anticipate normalization results in current proof theory. The contributors of Mathesis Universalis, Computability and Proof, leading experts in the fields of computer science, mathematics, logic and philosophy, show the evolution of these and related ideas exploring topics in proof theory, computability theory, intuitionistic logic, constructivism and reverse mathematics, delving deeply into a contextual examination of the relationship between mathematical rigor and demands for simplification.
This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.
For almost four decades, Software Engineering: A Practitioner's Approach (SEPA) has been the world's leading textbook in software engineering. The ninth edition represents a major restructuring and update of previous editions, solidifying the book's position as the most comprehensive guide to this important subject.
This book addresses the basics of interval/fuzzy set theory, artificial neural networks (ANN) and computational methods. It presents step-by-step modeling for application problems along with simulation and numerical solutions. In general, every science and engineering problem is inherently biased by uncertainty, and there is often a need to model, solve and interpret problems in the world of uncertainty. At the same time, exact information about models and parameters of practical applications is usually not known and precise values do not exist. This book discusses uncertainty in both data and models. It consists of seven chapters covering various aspects of fuzzy uncertainty in application problems, such as shallow water wave equations, static structural problems, robotics, radon diffusion in soil, risk of invasive alien species and air quality quantification. These problems are handled by means of advanced computational and fuzzy theory along with machine intelligence when the uncertainties involved are fuzzy. The proposed computational methods offer new fuzzy computing methods that help other areas of knowledge construction where inexact information is present.
Social networks have emerged as a major trend in computing and social paradigms in the past few years. The social network model helps to inform the study of community behavior, allowing qualitative and quantitative assessments of how people communicate and the rules that govern communication. Social Networking and Community Behavior Modeling: Qualitative and Quantitative Measures provides a clear and consolidated view of current social network models. This work explores new methods for modeling, characterizing, and constructing social networks. Chapters contained in this book study critical security issues confronting social networking, the emergence of new mobile social networking devices and applications, network robustness, and how social networks impact the business aspects of organizations.
The Semantic Web is characterized by the existence of a very large number of distributed semantic resources, which together define a network of ontologies. These ontologies in turn are interlinked through a variety of different meta-relationships such as versioning, inclusion, and many more. This scenario is radically different from the relatively narrow contexts in which ontologies have been traditionally developed and applied, and thus calls for new methods and tools to effectively support the development of novel network-oriented semantic applications. This book by Suarez-Figueroa et al. provides the necessary methodological and technological support for the development and use of ontology networks, which ontology developers need in this distributed environment. After an introduction, in its second part the authors describe the NeOn Methodology framework. The book's third part details the key activities relevant to the ontology engineering life cycle. For each activity, a general introduction, methodological guidelines, and practical examples are provided. The fourth part then presents a detailed overview of the NeOn Toolkit and its plug-ins. Lastly, case studies from the pharmaceutical and the fishery domain round out the work. The book primarily addresses two main audiences: students (and their lecturers) who need a textbook for advanced undergraduate or graduate courses on ontology engineering, and practitioners who need to develop ontologies in particular or Semantic Web-based applications in general. Its educational value is maximized by its structured approach to explaining guidelines and combining them with case studies and numerous examples. The description of the open source NeOn Toolkit provides an additional asset, as it allows readers to easily evaluate and apply the ideas presented."
M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development, deployment, and use of these applications. The objective of this book is to provide a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, research on the expected impact of this technology on businesses and consumers, and case studies describing state-of-the-art m-commerce applications and lessons learned.
Decades of research have shown that student collaboration in groups doesn't just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges. Computer-Supported Collaborative Learning: Best Practices & Principles for Instructors answers the demand for a thorough resource on techniques to facilitate effective collaborative learning in virtual environments. This book provides must-have information on the role of the instructor in computer-supported collaborative learning, real-world perspectives on virtual learning group collaboration, and supporting learning group motivation.
This book presents cutting-edge developments in the advanced mathematical theories utilized in computer graphics research - fluid simulation, realistic image synthesis, and texture, visualization and digital fabrication. A spin-off book from the International Symposium on Mathematical Progress in Expressive Image Synthesis in 2016 and 2017 (MEIS2016/2017) held in Fukuoka, Japan, it includes lecture notes and an expert introduction to the latest research presented at the symposium. The book offers an overview of the emerging interdisciplinary themes between computer graphics and driven mathematic theories, such as discrete differential geometry. Further, it highlights open problems in those themes, making it a valuable resource not only for researchers, but also for graduate students interested in computer graphics and mathematics.
This book is a compilation of Mark Pelczarski's "Graphically Speaking" tutorial columns that appeared in Softalk magazine. Using the included programs, you will be able to create art, do animation for games, and have a bunch of fun on your Apple II computer. Once you learn the fundamentals of creating hi-res, 3-D, and animation, you will be limited only by your imagination. Originally published in 1983, this Enhanced Edition features a new preface from the author and a refreshed design with a lot of art from Penguin Software. Mark taught computer science, programming, and mathematics at the high school and university levels. He founded Penguin Software and created such classic software as Graphics Magician, Complete Graphics System, and Special Effects. Penguin published over 45 popular titles such as: The Coveted Mirror, Expedition Amazon, Oo-Topos, The Quest, The Spy's Adventures Around the World, Spy's Demise, Sword of Kadash, Transylvania, and Xyphus.
The Turing/von Neumann model of computing is dominant today but is by no means the only one. This textbook explores an important subset of alternatives, including those such as quantum and neuromorphic, which receive daily news attention. The models are organized into distinct groups. After a review of the Turing/von Neumann model to set the stage, the author discusses those that have their roots in the Turing/von Neumann model but perform potentially large numbers of computations in parallel; models that do away with the preplanned nature of the classical model and compute from just a statement of the problem; others that are simply mathematically different, such as probabilistic and reversible computation; models based on physical phenomena such as neurons; and finally those that leverage unique physical phenomena directly, such as quantum, optical, and DNA-based computing. Suggested readings provide a jumping-off point for deeper learning. A supplemental website contains chapters that did not make it into the book, as well as exercises, projects, and additional resources that will be useful for more in-depth investigations. The Zen of Exotic Computing is intended for computer science students interested in understanding alternative models of computing. It will also be of interest to researchers and practitioners interested in emerging technology such as quantum computing, machine learning, and AI.
This book focuses on the use of AI/ML-based techniques to solve issues related to IoT-based environments, as well as their applications. It addresses, among others, signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction, software-defi ned networking, congestion control, communication network optimization, security, and anomaly detection. |
You may like...
Scientific Computing and Algorithms in…
Michael Griebel, Anton Schuller, …
Hardcover
R4,137
Discovery Miles 41 370
Basic Elements of Computational…
Wolfgang Karl Hardle, Ostap Okhrin, …
Hardcover
R3,109
Discovery Miles 31 090
Geometry, Mechanics, and Dynamics - The…
Dong Eui Chang, Darryl D Holm, …
Hardcover
R3,703
Discovery Miles 37 030
Elliptic Integrals, Elliptic Functions…
Johannes Blumlein, Carsten Schneider, …
Hardcover
R5,911
Discovery Miles 59 110
Properties and Dynamics of Neutron Stars…
Veronica Dexheimer, Rodrigo Negreiros
Hardcover
Crossbar-Based Interconnection Networks…
Mohsen Jahanshahi, Fathollah Bistouni
Hardcover
R1,408
Discovery Miles 14 080
Fault Diagnosis Inverse Problems…
Lidice Camps Echevarria, Orestes Llanes Santiago, …
Hardcover
R2,879
Discovery Miles 28 790
|