0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (14)
  • R100 - R250 (582)
  • R250 - R500 (2,270)
  • R500+ (40,362)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Big Data Management and Processing (Paperback): Kuan-Ching Li, Hai Jiang, Albert Y. Zomaya Big Data Management and Processing (Paperback)
Kuan-Ching Li, Hai Jiang, Albert Y. Zomaya
R1,478 Discovery Miles 14 780 Ships in 12 - 17 working days

From the Foreword: "Big Data Management and Processing is [a] state-of-the-art book that deals with a wide range of topical themes in the field of Big Data. The book, which probes many issues related to this exciting and rapidly growing field, covers processing, management, analytics, and applications... [It] is a very valuable addition to the literature. It will serve as a source of up-to-date research in this continuously developing area. The book also provides an opportunity for researchers to explore the use of advanced computing technologies and their impact on enhancing our capabilities to conduct more sophisticated studies." ---Sartaj Sahni, University of Florida, USA "Big Data Management and Processing covers the latest Big Data research results in processing, analytics, management and applications. Both fundamental insights and representative applications are provided. This book is a timely and valuable resource for students, researchers and seasoned practitioners in Big Data fields. --Hai Jin, Huazhong University of Science and Technology, China Big Data Management and Processing explores a range of big data related issues and their impact on the design of new computing systems. The twenty-one chapters were carefully selected and feature contributions from several outstanding researchers. The book endeavors to strike a balance between theoretical and practical coverage of innovative problem solving techniques for a range of platforms. It serves as a repository of paradigms, technologies, and applications that target different facets of big data computing systems. The first part of the book explores energy and resource management issues, as well as legal compliance and quality management for Big Data. It covers In-Memory computing and In-Memory data grids, as well as co-scheduling for high performance computing applications. The second part of the book includes comprehensive coverage of Hadoop and Spark, along with security, privacy, and trust challenges and solutions. The latter part of the book covers mining and clustering in Big Data, and includes applications in genomics, hospital big data processing, and vehicular cloud computing. The book also analyzes funding for Big Data projects.

Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Hardcover): Jennifer Priestley,... Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Hardcover)
Jennifer Priestley, Robert McGrath
R3,232 Discovery Miles 32 320 Ships in 12 - 17 working days

How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .

Resilient Health Care - Muddling Through with Purpose, Volume 6 (Hardcover): Jeffrey Braithwaite, Erik Hollnagel, Garth Hunte Resilient Health Care - Muddling Through with Purpose, Volume 6 (Hardcover)
Jeffrey Braithwaite, Erik Hollnagel, Garth Hunte
R3,383 Discovery Miles 33 830 Ships in 12 - 17 working days

This book promotes an understanding of the purposeful muddling that health care workers rely on to be better able to function and operate in the multitude of complex ecosystems we call "health care." The book argues the case for the importance of recognising and understanding muddling behaviours, practices and activities in order to create resilient care. The book demonstrates how resilient health care principles can enable managers as well as those on the frontlines to work more effectively towards interdisciplinary care by gaining a deeper understanding of real-world practices that manifest in everyday clinical settings. This is done by presenting a set of case studies, theoretical chapters and applications that relate experiences, bring forth ideas and illustrate practical solutions. Primarily aimed at people who are directly involved in the running and improvement of health care systems, it provides practical guidance. It is also of direct interest to health care professionals in clinical and managerial positions as well as researchers. Jeffrey Braithwaite is Founding Director of the Australian Institute of Health Innovation, Professor of Health Systems Research and Director of the Centre for Healthcare Resilience and Implementation Science, Macquarie University (Australia). His research examines the changing nature of complex health systems and he has received over 50 different national and international awards for his teaching and research. Erik Hollnagel is Senior Professor of Patient Safety at Joenkoeping University (Sweden). He is a highly regarded international expert with significant contributions to a variety of fields ranging from nuclear power generation, aerospace and aviation to industry, transportation and, most notably, health care. Garthe Hunte is a Clinical Professor and Emergency Physician holding multiple academic and clinical leadership appointments across Canada. His research programme centres around how safety is created in complex socio-technical systems, and in the application of resilience engineering in health care.

Internet of Things, Threats, Landscape, and Countermeasures (Hardcover): Stavros Shiaeles, Nicholas Kolokotronis Internet of Things, Threats, Landscape, and Countermeasures (Hardcover)
Stavros Shiaeles, Nicholas Kolokotronis
R3,431 Discovery Miles 34 310 Ships in 12 - 17 working days

Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R2,632 Discovery Miles 26 320 Ships in 12 - 17 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

Cloud Data Center Network Architectures and Technologies (Hardcover): Lei Zhang, Le Chen Cloud Data Center Network Architectures and Technologies (Hardcover)
Lei Zhang, Le Chen; Contributions by Yang Chang Qing
R3,101 Discovery Miles 31 010 Ships in 10 - 15 working days

Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.

Role of ICT in Higher Education - Trends, Problems, and Prospects (Paperback): Gopal Singh Latwal, Sudhir Kumar Sharma, Prerna... Role of ICT in Higher Education - Trends, Problems, and Prospects (Paperback)
Gopal Singh Latwal, Sudhir Kumar Sharma, Prerna Mahajan, Piet Kommers
R2,611 Discovery Miles 26 110 Ships in 12 - 17 working days

This new volume provides an informative collection of chapters on ICT and data analytics in education, helping to lead the digital revolution in higher education. The chapters emphasize skill development through ICT, artificial intelligence in education, policies for integrating ICT in higher education, and more. The book focuses mainly on technological advancements in ICT in education, the perceived role of ICT in the teaching-learning transaction, pedagogy for teaching-learning in the 21st century, student-centered learning based on ICT, learning analytics, online technologies learning, tools for technology enhanced learning, distance education and learning, the effective use of ICT in management education, experiences in ICT for technology-enhanced learning, influence of ICT in research development in higher education, role of teachers in direct classroom teaching in web-based education system, and role of ICT in innovation capacity building. The case studies help to illustrate the ideas and concepts discussed in the chapters.

Translational Bioinformatics Applications in Healthcare (Hardcover): Khalid Raza, Nilanjan Dey Translational Bioinformatics Applications in Healthcare (Hardcover)
Khalid Raza, Nilanjan Dey
R3,388 Discovery Miles 33 880 Ships in 12 - 17 working days

Translational bioinformatics (TBI) involves development of storage, analytics, and advanced computational methods to harvest knowledge from voluminous biomedical and genomic data into 4P healthcare (proactive, predictive, preventive, and participatory). Translational Bioinformatics Applications in Healthcare offers a detailed overview on concepts of TBI, biological and clinical databases, clinical informatics, and pertinent real-case applications. It further illustrates recent advancements, tools, techniques, and applications of TBI in healthcare, including Internet of Things (IoT) potential, toxin databases, medical image analysis and telemedicine applications, analytics of COVID-19 CT images, viroinformatics and viral diseases, and COVID-19-related research. Covers recent technologies such as Blockchain, IoT, and Big data analytics in bioinformatics Presents the role of translational bioinformatic methods in the field of viroinformatics, as well as in drug development and repurposing Includes translational healthcare and NGS for clinical applications Illustrates translational medicine systems and their applications in better healthcare Explores medical image analysis with focus on CT images and novel coronavirus disease detection Aimed at researchers and graduate students in computational biology, data mining and knowledge discovery, algorithms and complexity, and interdisciplinary fields of studies, including bioinformatics, health-informatics, biostatistics, biomedical engineering, and viroinformatics. Khalid Raza is an Assistant Professor, the Department of Computer Science, Jamia Millia Islamia (Central University), New Delhi. His research interests include translational bioinformatics, computational intelligence methods and its applications in bioinformatics, viroinformatics, and health informatics. Nilanjan Dey is an Associate Professor, the Department of Computer Science and Engineering, JIS University, Kolkata, India. His research interests include medical imaging, machine learning, computer-aided diagnosis, and data mining.

An Introduction to Optimization Techniques (Hardcover): Vikrant Sharma, Vinod Kumar Jain, Atul Kumar An Introduction to Optimization Techniques (Hardcover)
Vikrant Sharma, Vinod Kumar Jain, Atul Kumar
R3,407 Discovery Miles 34 070 Ships in 12 - 17 working days

An Introduction to Optimization Techniques introduces the basic ideas and techniques of optimization. Optimization is a precise procedure using design constraints and criteria to enable the planner to find the optimal solution. Optimization techniques have been applied in numerous fields to deal with different practical problems. This book is designed to give the reader a sense of the challenge of analyzing a given situation and formulating a model for it while explaining the assumptions and inner structure of the methods discussed as fully as possible. It includes real-world examples and applications making the book accessible to a broader readership. Features Each chapter begins with the Learning Outcomes (LO) section, which highlights the critical points of that chapter. All learning outcomes, solved examples and questions are mapped to six Bloom Taxonomy levels (BT Level). Book offers fundamental concepts of optimization without becoming too complicated. A wide range of solved examples are presented in each section after the theoretical discussion to clarify the concept of that section. A separate chapter on the application of spreadsheets to solve different optimization techniques. At the end of each chapter, a summary reinforces key ideas and helps readers recall the concepts discussed. The wide and emerging uses of optimization techniques make it essential for students and professionals. Optimization techniques have been applied in numerous fields to deal with different practical problems. This book serves as a textbook for UG and PG students of science, engineering, and management programs. It will be equally useful for Professionals, Consultants, and Managers.

Secret History - The Story of Cryptology (Hardcover): Craig Bauer Secret History - The Story of Cryptology (Hardcover)
Craig Bauer
R2,464 Discovery Miles 24 640 Ships in 12 - 17 working days

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenere cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

Accelerate - The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations... Accelerate - The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations (Paperback)
Nicole Forsgren Phd, Jez Humble, Gene Kim 1
R553 R468 Discovery Miles 4 680 Save R85 (15%) Ships in 12 - 17 working days

Winner of the Shingo Publication Award Accelerate your organization to win in the marketplace. How can we apply technology to drive business value? For years, we've been told that the performance of software delivery teams doesn't matter that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance and what drives it using rigorous statistical methods. This book presents both the findings and the science behind that research, making the information accessible for readers to apply in their own organizations. Readers will discover how to measure the performance of their teams, and what capabilities they should invest in to drive higher performance. This book is ideal for management at every level.

The Logic of Commands (Paperback): Nicholas Rescher The Logic of Commands (Paperback)
Nicholas Rescher
R1,013 Discovery Miles 10 130 Ships in 12 - 17 working days

Originally published in 1966. Professor Rescher's aim is to develop a "logic of commands" in exactly the same general way which standard logic has already developed a "logic of truth-functional statement compounds" or a "logic of quantifiers". The object is to present a tolerably accurate and precise account of the logically relevant facets of a command, to study the nature of "inference" in reasonings involving commands, and above all to establish a viable concept of validity in command inference, so that the logical relationships among commands can be studied with something of the rigour to which one is accustomed in other branches of logic.

Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback)
Alan Weiss, Adam Shwartz
R1,489 Discovery Miles 14 890 Ships in 12 - 17 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,600 Discovery Miles 16 000 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Soft Computing Techniques for Engineering Optimization (Paperback): Kaushik Kumar, Supriyo Roy, J. Paulo Davim Soft Computing Techniques for Engineering Optimization (Paperback)
Kaushik Kumar, Supriyo Roy, J. Paulo Davim
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

This book covers the issues related to optimization of engineering and management problems using soft computing techniques with an industrial outlook. It covers a broad area related to real life complex decision making problems using a heuristics approach. It also explores a wide perspective and future directions in industrial engineering research on a global platform/scenario. The book highlights the concept of optimization, presents various soft computing techniques, offers sample problems, and discusses related software programs complete with illustrations. Features Explains the concept of optimization and relevance to soft computing techniques towards optimal solution in engineering and management Presents various soft computing techniques Offers problems and their optimization using various soft computing techniques Discusses related software programs, with illustrations Provides a step-by-step tutorial on how to handle relevant software for obtaining the optimal solution to various engineering problems

Systems Engineering Models - Theory, Methods, and Applications (Paperback): Adedeji B. Badiru Systems Engineering Models - Theory, Methods, and Applications (Paperback)
Adedeji B. Badiru
R1,469 Discovery Miles 14 690 Ships in 12 - 17 working days

This book presents a comprehensive compilation of practical systems engineering models. The application and recognition of systems engineering is spreading rapidly, however there is no book that addresses the availability and usability of systems engineering models. Notable among the models to be included are the V-Model, DEJI Model, and Waterfall Model. There are other models developed for specific organizational needs, which will be identified and presented in a practical template so that other organizations can learn and use them. A better understanding of the models, through a comprehensive book, will make these models more visible, embraced, and applied across the spectrum. Visit www.DEJImodel.com for model details. Features Covers applications to both small and large problems Displays decomposition of complex problems into smaller manageable chunks Discusses direct considerations of the pertinent constraints that exist in the problem domain Presents systematic linking of inputs to goals and outputs

Computational Biology - A Statistical Mechanics Perspective, Second Edition (Paperback, 2nd edition): Ralf Blossey Computational Biology - A Statistical Mechanics Perspective, Second Edition (Paperback, 2nd edition)
Ralf Blossey
R1,442 Discovery Miles 14 420 Ships in 12 - 17 working days

Computational biology has developed rapidly during the last two decades following the genomic revolution which culminated in the sequencing of the human genome. More than ever it has developed into a field which embraces computational methods from different branches of the exact sciences: pure and applied mathematics, computer science, theoretical physics. This Second Edition provides a solid introduction to the techniques of statistical mechanics for graduate students and researchers in computational biology and biophysics. Material has been reorganized to clarify equilbrium and nonequilibrium aspects of biomolecular systems Content has been expanded, in particular in the treatment of the electrostatic interactions of biomolecules and the application of non-equilibrium statistical mechanics to biomolecules New network-based approaches for the study of proteins are presented. All treated topics are put firmly in the context of the current research literature, allowing the reader to easily follow an individual path into a specific research field. Exercises and Tasks accompany the presentations of the topics with the intention of enabling the readers to test their comprehension of the developed basic concepts.

Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback): Joao Paulo Coelho, Tatiana M. Pinho, Jose... Hidden Markov Models - Theory and Implementation using MATLAB (R) (Paperback)
Joao Paulo Coelho, Tatiana M. Pinho, Jose Boaventura-Cunha
R1,537 Discovery Miles 15 370 Ships in 12 - 17 working days

This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts

Private Investigation and Homeland Security (Paperback): Daniel J Benny Private Investigation and Homeland Security (Paperback)
Daniel J Benny
R1,585 Discovery Miles 15 850 Ships in 12 - 17 working days

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.

Scientific Computing with MATLAB (Paperback, 2nd edition): Yangquan Chen, Dingyu Xue Scientific Computing with MATLAB (Paperback, 2nd edition)
Yangquan Chen, Dingyu Xue
R1,525 Discovery Miles 15 250 Ships in 12 - 17 working days

Scientific Computing with MATLAB (R), Second Edition improves students' ability to tackle mathematical problems. It helps students understand the mathematical background and find reliable and accurate solutions to mathematical problems with the use of MATLAB, avoiding the tedious and complex technical details of mathematics. This edition retains the structure of its predecessor while expanding and updating the content of each chapter. The book bridges the gap between problems and solutions through well-grouped topics and clear MATLAB example scripts and reproducible MATLAB-generated plots. Students can effortlessly experiment with the scripts for a deep, hands-on exploration. Each chapter also includes a set of problems to strengthen understanding of the material.

Matrix Inequalities for Iterative Systems (Paperback): Hanjo Taubig Matrix Inequalities for Iterative Systems (Paperback)
Hanjo Taubig
R1,468 Discovery Miles 14 680 Ships in 12 - 17 working days

The book reviews inequalities for weighted entry sums of matrix powers. Applications range from mathematics and CS to pure sciences. It unifies and generalizes several results for products and powers of sesquilinear forms derived from powers of Hermitian, positive-semidefinite, as well as nonnegative matrices. It shows that some inequalities are valid only in specific cases. How to translate the Hermitian matrix results into results for alternating powers of general rectangular matrices? Inequalities that compare the powers of the row and column sums to the row and column sums of the matrix powers are refined for nonnegative matrices. Lastly, eigenvalue bounds and derive results for iterated kernels are improved.

Testing R Code (Paperback): Richard Cotton Testing R Code (Paperback)
Richard Cotton
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

Learn how to write R code with fewer bugs. The problem with programming is that you are always one typo away from writing something silly. Likewise with data analysis, a small mistake in your model can lead to a big mistake in your results. Combining the two disciplines means that it is all too easy for a missed minus sign to generate a false prediction that you don't spot until it's too late. Testing is the only way to be sure that your code, and your results, are correct. Testing R Code teaches you how to perform development-time testing using the testthat package, allowing you to ensure that your code works as intended. The book also teaches run-time testing using the assertive package; enabling your users to correctly run your code. After beginning with an introduction to testing in R, the book explores more advanced cases such as integrating tests into R packages; testing code that accesses databases; testing C++ code with Rcpp; and testing graphics. Each topic is explained with real-world examples, and has accompanying exercises for readers to practise their skills - only a small amount of experience with R is needed to get started!

Iterative Methods and Their Dynamics with Applications - A Contemporary Study (Paperback): Ioannis Konstantinos Argyros, Angel... Iterative Methods and Their Dynamics with Applications - A Contemporary Study (Paperback)
Ioannis Konstantinos Argyros, Angel Alberto Magrenan
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

Iterative processes are the tools used to generate sequences approximating solutions of equations describing real life problems. Intended for researchers in computational sciences and as a reference book for advanced computational method in nonlinear analysis, this book is a collection of the recent results on the convergence analysis of numerical algorithms in both finite-dimensional and infinite-dimensional spaces and presents several applications and connections with fixed point theory. It contains an abundant and updated bibliography and provides comparisons between various investigations made in recent years in the field of computational nonlinear analysis. The book also provides recent advancements in the study of iterative procedures and can be used as a source to obtain the proper method to use in order to solve a problem. The book assumes a basic background in Mathematical Statistics, Linear Algebra and Numerical Analysis and may be used as a self-study reference or as a supplementary text for an advanced course in Biosciences or Applied Sciences. Moreover, the newest techniques used to study the dynamics of iterative methods are described and used in the book and they are compared with the classical ones.

Image Processing and Pattern Recognition Based on Parallel Shift Technology - Based on Parallel Shift Technology (Paperback):... Image Processing and Pattern Recognition Based on Parallel Shift Technology - Based on Parallel Shift Technology (Paperback)
Stepan Bilan, Sergey Yuzhakov
R1,437 Discovery Miles 14 370 Ships in 12 - 17 working days

This book describes the methods and algorithms for image pre-processing and recognition. These methods are based on a parallel shift technology of the imaging copy, as well as simple mathematical operations to allow the generation of a minimum set of features to describe and recognize the image. This book also describes the theoretical foundations of parallel shift technology and pattern recognition. Based on these methods and theories, this book is intended to help researchers with artificial intelligence systems design, robotics, and developing software and hardware applications.

Verilog HDL Design Examples (Paperback): Joseph Cavanagh Verilog HDL Design Examples (Paperback)
Joseph Cavanagh
R2,014 Discovery Miles 20 140 Ships in 12 - 17 working days

The Verilog language provides a means to model a digital system at many levels of abstraction from a logic gate to a complex digital system to a mainframe computer. The purpose of this book is to present the Verilog language together with a wide variety of examples, so that the reader can gain a firm foundation in the design of the digital system using Verilog HDL. The Verilog projects include the design module, the test bench module, and the outputs obtained from the simulator that illustrate the complete functional operation of the design. Where applicable, a detailed review of the theory of the topic is presented together with the logic design principles-including: state diagrams, Karnaugh maps, equations, and the logic diagram. Numerous examples and homework problems are included throughout. The examples include logical operations, counters of different moduli, half adders, full adders, a carry lookahead adder, array multipliers, different types of Moore and Mealy machines, and arithmetic logic units (ALUs).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,375 R1,229 Discovery Miles 12 290
Program Construction - Calculating…
Roland Backhouse Paperback R1,315 R1,177 Discovery Miles 11 770
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,323 R1,186 Discovery Miles 11 860
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, … Paperback R1,256 R1,124 Discovery Miles 11 240
Introduction to Computer Theory
Daniel I. A. Cohen Paperback  (4)
R6,226 R933 Discovery Miles 9 330
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R468 R349 Discovery Miles 3 490
The Rules of Contagion - Why Things…
Adam Kucharski Paperback R527 R442 Discovery Miles 4 420
Innovators - How a Group of Inventors…
Walter Isaacson Paperback  (2)
R300 R240 Discovery Miles 2 400
Python for Everyone, Third Edition EMEA…
C.S. Horstmann Paperback R1,515 Discovery Miles 15 150
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, … Paperback  (3)
R1,395 R1,249 Discovery Miles 12 490

 

Partners