![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.
Improved geospatial instrumentation and technology such as in laser scanning has now resulted in millions of data being collected, e.g., point clouds. It is in realization that such huge amount of data requires efficient and robust mathematical solutions that this third edition of the book extends the second edition by introducing three new chapters: Robust parameter estimation, Multiobjective optimization and Symbolic regression. Furthermore, the linear homotopy chapter is expanded to include nonlinear homotopy. These disciplines are discussed first in the theoretical part of the book before illustrating their geospatial applications in the applications chapters where numerous numerical examples are presented. The renewed electronic supplement contains these new theoretical and practical topics, with the corresponding Mathematica statements and functions supporting their computations introduced and applied. This third edition is renamed in light of these technological advancements.
Essential Computational Modeling in Chemistry presents key contributions selected from the volume in the Handbook of Numerical Analysis: Computational Modeling in Chemistry Vol. 10(2005). Computational Modeling is an active field of scientific
computing at the crossroads between Physics, Chemistry, Applied
Mathematics and Computer Science. Sophisticated mathematical models
are increasingly complex and extensive computer simulations are on
the rise. Numerical Analysis and scientific software have emerged
as essential steps for validating mathematical models and
simulations based on these models. This guide provides a quick
reference of computational methods for use in understanding
chemical reactions and how to control them. By demonstrating
various computational methods in research, scientists can predict
such things as molecular properties. The reference offers a number
of techniques and the numerical analysis needed to perform
rigorously founded computations. Various viewpoints of methods and applications are available for researchers to chose and experiment with; Numerical analysis and open problems is useful for experimentation; Most commonly used models and techniques for the molecular case is quickly accessible
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.
Email steals too much of your precious time, doesn't it? Processing email takes way too much time because we never learned to manage it effectively. We are constantly interrupted, invest countless hours in it, re-read emails that languish in our inbox, store email we don't need and suffer from email overload. Don't you agree? This book provides what you need to manage email, eliminate the overload and save your precious time. It will help you minimize interruption, overcome indecision and empty your inbox. It will help you organize priorities and manage time, so you can get your work done--at work. You can give up doing email at dinner and in bed. Good idea?
As governments and policy makers take advantage of information and communication technologies, leaders must understand how to navigate the ever-shifting landscape of modern technologies in order to be most effective in enacting change and leading their constituents. The Handbook of Research on Advanced ICT Integration for Governance and Policy Modeling builds on the available literature, research, and recent advances in e-governance to explore advanced methods and applications of digital tools in government. This collection of the latest research in the field presents an essential reference for academics, researchers, and advanced-level students, as well as government leaders, policy makers, and experts in international relations.
1. Paradigmatische Konstruktionen.- Unser heutiges Wirklichkeits-Verstandnis.- Wirklichkeits-Pluralismus.- Entstehen von Wirklichkeiten.- Lebendiger Vollzug von Wirklichkeiten.- Fruchtbare Vielfalt.- Simultane und sequenzielle Wirklichkeiten in der Lebenswelt.- Okkulte Wirklichkeiten und andere Geheimlehren.- Gefahrliche Verabsolutierungen.- 2. Farbe als Wirklichkeit.- Goethes Farbenlehre.- Physiologische Farben.- Farblose Bilder.- Farbige Bilder.- Farbige Schatten.- Schwach wirkende Lichter, subjektive Hoefe, pathologische Farben.- Physische Farben.- Dioptrische Farben der 1. Klasse.- Dioptrische Farben der 2. Klasse.- Das Phanomen der Refraktion.- Refraktion ohne Farberscheinung.- Farberscheinungen bei Linsen.- Grundzuge refraktionsbedingter Farberscheinungen.- Farberscheinungen bei Prismen.- Farberscheinungen an gro?en und kleinen wei?en Bildern.- Farberscheinungen an gro en und kleinen schwarzen Bildern.- Farberscheinungen sind nie statisch.- Zum Wesen von Licht und Farbe aus Goetheseher Sieht.- Wichtige, ganz allgemeine Begriffe.- Die Polaritat.- Die Steigerung.- Phanomen und Urphanomen.- Farbenkreis und Spektrogramm.- Newtons Farben des Liehts.- Newtons Experimente.- 1. Experiment.- 2. Experiment.- 3. Experiment.- 4. Experiment.- 5. Experiment.- Das We sen der Farbe.- Einfache Farbmetrik.- Das Auge.- Der Spektralfarbenzug.- Zwei Wirklichkeiten.- 3. Heilkundliche Wirkliehkeiten.- Chinesische Lebenswirkliehkeit.- Das Schafgarbenorakel.- Das Yin-Yang-Prinzip.- Shen und Kuei. Qi und Jing.- Die funf Elemente.- Chinesische Medizin.- Yin-Yang-Theorie.- Lebenssubstanzen.- Qi.- Blut und Safte.- Jing.- Shen.- Die Funktion der inneren Organe.- Die Leitbahnen oder die Meridiane.- Wie kommt es zur Disharmonie?.- Die Sechs UEbel.- Die sieben Emotionen.- Die Lebensweise.- Das Dishannoniemuster.- Ein Beispiel.- Ein simultanes Massenphanomen.- 4. Mikro-Wirklichkeiten.- Spiele als Mikro-Wirklichkeiten.- Definition des Spielbegriffes.- Die Vielfalt der Spiele.- Mikro-Wirklichkeiten im weiteren Sinn.- 5. Wirklichkeit eines Verbrechens.- Ein Beispiel aus der japanischen Literatur.- Eine neue Erzlihlung des Rashomon-Textes.- Die Aussage eines Holzfallers.- Die Aussage eines Wandergeistlichen.- Die Aussage eines Gerichtsdieners.- Die Aussage einer alten Frau.- Das Gestandnis des Raubers.- Die Aussage eines Gefahrten des Raubers.- Bericht eines Waldbewohners.- Die Beichte der Ehefrau in einem Kloster.- Der Geist des Toten spricht durch den Mund einer Wahrsagerin.- Vergewaltigung und Tod.- 6. Verwandlung von Wirklichkeiten.- Siddhartha. Eine indische Dichtung.- Die Brahmana-Welt.- Die Samana-Welt.- Die Buddha-Welt.- Die Menschenkinder-Welt.- Am Flu?.- 7. Magie und Damonie.- Weissagung.- Wirksarnkeit von Weissagungen.- Kassandra.- Die delphische Seherin.- Andere Fonnen der Weissagung.- Zauber und Damonen.- Magische Praktikep in der Volkskunst.- Magische Praktiken' der Antike.- Kirke verzaubert Manner.- Hexen morden Knaben.- Fluche verandern das Leben.- Fluchtafeln.- Ovids Ibis.- Schamanen.- Spuren des Schamanismus in der Neuzeit.- Antike Schamanen.- Orpheus.- Pythagoras.- Empedokles.- Vespasian.- Nekromantie.- Die Macht des Okkulten.- Magie und Damonie als Wirklichkeit?.- 8. Totalitare Wirklichkeiten.- Wahnsinn als totalitare Wirklichkeit.- Das Entstehen eines Wahnes.- Der logische Zusammenhang von Wahnideen.- Die weitgehende Unkorrigierbarkeit.- Gro?en und Verfolgungswahn.- Groe?enwahn.- Verfolgungswahn.- Paranoia erotica.- Eifersuchtsparanoia.- Religioeser Wahn mit erotischer Komponente.- Kraftentfaltung in totalitaren Wirklichkeiten.- Der Kriegstanz der Maori.- Atomare Bedrohung.- Extremsituationen in totalitaren Wirklichkeiten.- Der Tag des Blutes.- Der spontane Volkszorn.- Entgleisung einer Hochtechnologie.- Die Eigendynamik und die Hilflosigkeit.- 9. Chance und Bedrangnis.- Wirklichkeit ist eine Konstruktion. Der Urgrund ist ohne Eigenschaften.- Wirklichkeiten als Gewordenes.- Die Lebenswirklichkeit als Ausgangsbasi
As information availability pervades every aspect of life, new trends, technologies, and enhancements must be carefully researched, evaluated and implemented in order to fabricate successful computing applications. Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends examines current practices and challenges faced by designers of Ubiquitous and Pervasive Computing projects. Analyzing theoretical assumptions, empirical research, practical implementations, and case studies, this book intends to present a comprehensive yet concise overview of the recent progress in ubiquitous and pervasive computing applications, as well as discuss new methodologies, technologies and approaches currently practiced. Truly interdisciplinary, this publication serves as a valuable reference for researchers in the fields of electrical engineering and computer science, students, educators, and industrial trainers interested in network sensors, embedded systems, distributed systems, computer networks, and computer science.
This book provides a general overview of multiple instance learning (MIL), defining the framework and covering the central paradigms. The authors discuss the most important algorithms for MIL such as classification, regression and clustering. With a focus on classification, a taxonomy is set and the most relevant proposals are specified. Efficient algorithms are developed to discover relevant information when working with uncertainty. Key representative applications are included. This book carries out a study of the key related fields of distance metrics and alternative hypothesis. Chapters examine new and developing aspects of MIL such as data reduction for multi-instance problems and imbalanced MIL data. Class imbalance for multi-instance problems is defined at the bag level, a type of representation that utilizes ambiguity due to the fact that bag labels are available, but the labels of the individual instances are not defined. Additionally, multiple instance multiple label learning is explored. This learning framework introduces flexibility and ambiguity in the object representation providing a natural formulation for representing complicated objects. Thus, an object is represented by a bag of instances and is allowed to have associated multiple class labels simultaneously. This book is suitable for developers and engineers working to apply MIL techniques to solve a variety of real-world problems. It is also useful for researchers or students seeking a thorough overview of MIL literature, methods, and tools.
Forth Programmer's Handbook is a thorough introduction to the Forth programming language. Written for readers with programming backgrounds but not necessarily with prior exposure to Forth, it offers comprehensive coverage of all major aspects of the language, from basic principles to advanced concepts such as multitasking and cross-compiling for embedded systems. It covers nearly 400 commands, including ANS Forth words and many common extensions. The book describes how programmers use Forth to solve problems, serves as a reference for experienced programmers and presents the language's history and rationale. Forth was developed at the National Radio Astronomy Laboratory in the early 1970s; the authors were among its original developers and founders of FORTH, Inc., a premier supplier of Forth products and services. Elizabeth D. Rather chaired the Technical Committee that produced the ANSI Standard for Forth in 1994.
The central theme of this book is focused on the analyses and the results which emerged from the international research project BRAHMATWINN sponsored by European Commission (EC) and conducted during 2006 - 2009. The book highlights the achievements of BRAHMATWINN to carry out a harmonised integrated water resources management (IWRM) approach as addressed by the European Water Initiative (EWI) in headwater river systems of alpine mountain massifs. The latter are already impacted from climate change, and the BRAHMATWINN project established transfer of professional IWRM expertise, approaches and tools based on case studies carried out in twinning European and Asian river basins. The project addresses all important IWRM issues in a balanced way, including conflict resolution in the trans- boundary Danube and Brahmaputra River Basins in Europe and South Asia respectively. This book will be useful to researchers, professionals, managers and decision makers associated with study and application of sustainable integrated land and water resources management (ILWRM) in the backdrop of climate change.
In this book you will learn all of the basics required to rig any character in Maya. The book covers everything from joints to wires, from the connection editor to pruning small weights. With over 30 example files, 200 images, and countless step by step tutorials, you will be shown exactly how to rig a foot and leg, a hand, and much more. The thing that separates this book from the competition is answering the question of "Why?." The book covers exactly what is a gimbal lock and how do you avoid it? What axis should you use as your primary one? How do I add an influence object to fix a rig already in progress and why would I use a joint in some cases? Knowing why things are done the way they are will allow you to innovate and create new rigs. Knowing why will allow you to troubleshoot someone else's rig, and progress far beyond being a beginner. This book will help the beginner build a solid foundation and is a great addition for any character rigger using Maya. Proceeds donated to charity.
Whether you re new to systems analysis or have been there, done that and seen it all but especially if you want to ponder the significance of information systems analysis in the scheme of the universe, this book is for you. The author brings a unique perspective to the problems of computer system analysis
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."
Podcasting Success in a Day: Beginner's Guide to Fast, Easy, and Efficient Learning of Podcasting What is Podcasting? Want to take your online marketing to the next level and provide Podcasts? Need simple guide to getting started with Podcasting? Need cheap and easy solutions to Podcasting? What equipment to use for Podcasting? How about a successful strategy to Podcasting? Want tips on how to get consumers to subscribe to your podcast? All start today right here with one click!
This book considers logical proof systems from the point of view of their space complexity. After an introduction to propositional proof complexity the author structures the book into three main parts. Part I contains two chapters on resolution, one containing results already known in the literature before this work and one focused on space in resolution, and the author then moves on to polynomial calculus and its space complexity with a focus on the combinatorial technique to prove monomial space lower bounds. The first chapter in Part II addresses the proof complexity and space complexity of the pigeon principles. Then there is an interlude on a new type of game, defined on bipartite graphs, essentially independent from the rest of the book, collecting some results on graph theory. Finally Part III analyzes the size of resolution proofs in connection with the Strong Exponential Time Hypothesis (SETH) in complexity theory. The book is appropriate for researchers in theoretical computer science, in particular computational complexity.
This monograph describes the latest advances in discriminative learning methods for biometric recognition. Specifically, it focuses on three representative categories of methods: sparse representation-based classification, metric learning, and discriminative feature representation, together with their applications in palmprint authentication, face recognition and multi-biometrics. The ideas, algorithms, experimental evaluation and underlying rationales are also provided for a better understanding of these methods. Lastly, it discusses several promising research directions in the field of discriminative biometric recognition.
This book covers the important aspects involved in making cognitive radio devices portable, mobile and green, while also extending their service life. At the same time, it presents a variety of established theories and practices concerning cognitive radio from academia and industry. Cognitive radio can be utilized as a backbone communication medium for wireless devices. To effectively achieve its commercial application, various aspects of quality of service and energy management need to be addressed. The topics covered in the book include energy management and quality of service provisioning at Layer 2 of the protocol stack from the perspectives of medium access control, spectrum selection, and self-coexistence for cognitive radio networks.
These are the proceedings of the 20th international conference on domain decomposition methods in science and engineering. Domain decomposition methods are iterative methods for solving the often very large linearor nonlinear systems of algebraic equations that arise when various problems in continuum mechanics are discretized using finite elements. They are designed for massively parallel computers and take the memory hierarchy of such systems in mind. This is essential for approaching peak floating point performance. There is an increasingly well developed theory whichis having a direct impact on the development and improvements of these algorithms.
Volume 5 Reviews in Computational Chemistry Kenny B. Lipkowitz and Donald B. Boyd A Valuable Resource for Novices and Practitioners Alike, This Series Features Detailed Treatments of the Latest Advances in Computational Methods for Organic, Pharmaceutical, Physical, and Biological Chemistry. Balancing Academic and Industrial Interests, Volume 5 Presents Tutorials on Post-Hartree-Fock Methods, Electron Population Analysis, Brownian Dynamics, Lipid Simulations, Distance Geometry in Molecular Modeling, and Computer-Aided Drug Design. A History Traces the Field's Growth and Relationship to Funding Agencies. An Enlarged Compendium of Software Serves As a Valuable Buyer's guide. -From Reviews of the Series Many of the Articles are Indeed Accessible to any Interested Nonspecialist, Even Without Theoretical Background. Journal of the American Chemical Society This Book Serves Beginners as Well as Experts Looking for New Perspectives in the Field and is Highly Recommended. Journal of Molecular Graphics |
You may like...
Call Sign Chaos - Learning To Lead
Jim Mattis, Bing West
Hardcover
(1)
Exploring Chicago Blues - Inside the…
Rosalind Cummings-Yeates
Paperback
Hidden Figures - The Untold Story of the…
Margot Lee Shetterly
Paperback
(2)
|