Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
Technological progress has allowed us to develop devices which make it possible to record blood pressure and heart rate outside the real living conditions. Furthermore, technological progress has provided computer tools to analyse data on a beat-to-beat basis, offering a large body of information on the complex patterns of blood pressure and heart rate variability in health and in disease which has clarified a number of mechanisms responsible for cardiovascular regulation during the day and night. This book aims at providing an updated state of the art on the analysis of blood pressure and heart rate variability from the different perspectives of physiologists, clinicians and engineers by gathering the contributions of experts taken from both the biomedical and the engineering environment. In particular, attention was focused on 1) the methodology of ambulatory blood pressure and heart rate analyses, 2) the mathematical models that can be derived from the data and the implications they have for the understating of normal and deranged cardiovascular control and 3) the present and future use of computer analysis of dynamically collected observations for the diagnosis of cardiovascular diseases.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including: Computer Science Communications and Electrical Engineering Management Science Service Science Business Intelligence
A collection of papers from ISCIS 27th Annual Symposium.
This book addresses the basics of interval/fuzzy set theory, artificial neural networks (ANN) and computational methods. It presents step-by-step modeling for application problems along with simulation and numerical solutions. In general, every science and engineering problem is inherently biased by uncertainty, and there is often a need to model, solve and interpret problems in the world of uncertainty. At the same time, exact information about models and parameters of practical applications is usually not known and precise values do not exist. This book discusses uncertainty in both data and models. It consists of seven chapters covering various aspects of fuzzy uncertainty in application problems, such as shallow water wave equations, static structural problems, robotics, radon diffusion in soil, risk of invasive alien species and air quality quantification. These problems are handled by means of advanced computational and fuzzy theory along with machine intelligence when the uncertainties involved are fuzzy. The proposed computational methods offer new fuzzy computing methods that help other areas of knowledge construction where inexact information is present.
This book presents cutting-edge developments in the advanced mathematical theories utilized in computer graphics research - fluid simulation, realistic image synthesis, and texture, visualization and digital fabrication. A spin-off book from the International Symposium on Mathematical Progress in Expressive Image Synthesis in 2016 and 2017 (MEIS2016/2017) held in Fukuoka, Japan, it includes lecture notes and an expert introduction to the latest research presented at the symposium. The book offers an overview of the emerging interdisciplinary themes between computer graphics and driven mathematic theories, such as discrete differential geometry. Further, it highlights open problems in those themes, making it a valuable resource not only for researchers, but also for graduate students interested in computer graphics and mathematics.
This is the first book devoted to the task of computing integrability structures by computer. The symbolic computation of integrability operator is a computationally hard problem and the book covers a huge number of situations through tutorials. The mathematical part of the book is a new approach to integrability structures that allows to treat all of them in a unified way. The software is an official package of Reduce. Reduce is free software, so everybody can download it and make experiments using the programs available at our website.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development, deployment, and use of these applications. The objective of this book is to provide a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, research on the expected impact of this technology on businesses and consumers, and case studies describing state-of-the-art m-commerce applications and lessons learned.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.
This edited, multi-author book gathers selected, peer-reviewed contributions based on papers presented at the 23rd International Workshop on Quantum Systems in Chemistry, Physics, and Biology (QSCP-XXIII), held in Mopani Camp, The Kruger National Park, South Africa, in September 2018. The content is primarily intended for scholars, researchers, and graduate students working at universities and scientific institutes who are interested in the structure, properties, dynamics, and spectroscopy of atoms, molecules, biological systems, and condensed matter.
This book presents modern functional analysis methods for the sensitivity analysis of some infinite-dimensional systems governed by partial differential equations. The main topics are treated in a general and systematic way. They include many classical applications such as the Signorini problem, the elastic-plastic torsion problem and the visco-elastic-plastic problem. The "material derivative" from which any kind of shape derivative of a cost functional can be derived is defined. New results about the wave equation and the unilateral problem are also included in this book, which is intended to serve as a basic reference work for the algorithmic approach to shape optimization problems.
The aim of the book is to give an accessible introduction of mathematical models and signal processing methods in speech and hearing sciences for senior undergraduate and beginning graduate students with basic knowledge of linear algebra, differential equations, numerical analysis, and probability. Speech and hearing sciences are fundamental to numerous technological advances of the digital world in the past decade, from music compression in MP3 to digital hearing aids, from network based voice enabled services to speech interaction with mobile phones. Mathematics and computation are intimately related to these leaps and bounds. On the other hand, speech and hearing are strongly interdisciplinary areas where dissimilar scientific and engineering publications and approaches often coexist and make it difficult for newcomers to enter.
This book presents a mathematical treatment of the radio resource allocation of modern cellular communications systems in contested environments. It focuses on fulfilling the quality of service requirements of the living applications on the user devices, which leverage the cellular system, and with attention to elevating the users' quality of experience. The authors also address the congestion of the spectrum by allowing sharing with the band incumbents while providing with a quality-of-service-minded resource allocation in the network. The content is of particular interest to telecommunications scheduler experts in industry, communications applications academia, and graduate students whose paramount research deals with resource allocation and quality of service.
Decades of research have shown that student collaboration in groups doesn't just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges. Computer-Supported Collaborative Learning: Best Practices & Principles for Instructors answers the demand for a thorough resource on techniques to facilitate effective collaborative learning in virtual environments. This book provides must-have information on the role of the instructor in computer-supported collaborative learning, real-world perspectives on virtual learning group collaboration, and supporting learning group motivation.
This book bridges fundamental gaps between control theory and formal methods. Although it focuses on discrete-time linear and piecewise affine systems, it also provides general frameworks for abstraction, analysis, and control of more general models. The book is self-contained, and while some mathematical knowledge is necessary, readers are not expected to have a background in formal methods or control theory. It rigorously defines concepts from formal methods, such as transition systems, temporal logics, model checking and synthesis. It then links these to the infinite state dynamical systems through abstractions that are intuitive and only require basic convex-analysis and control-theory terminology, which is provided in the appendix. Several examples and illustrations help readers understand and visualize the concepts introduced throughout the book.
In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.
This book shows how mathematics, computer science and science can be usefully and seamlessly intertwined. It begins with a general model of cognitive processes in a network of computational nodes, such as neurons, using a variety of tools from mathematics, computational science and neurobiology. It then moves on to solve the diffusion model from a low-level random walk point of view. It also demonstrates how this idea can be used in a new approach to solving the cable equation, in order to better understand the neural computation approximations. It introduces specialized data for emotional content, which allows a brain model to be built using MatLab tools, and also highlights a simple model of cognitive dysfunction.
Software has long been perceived as complex, at least within
Software Engineering circles. We have been living in a recognised
state of crisis since the first NATO Software Engineering
conference in 1968. Time and again we have been proven unable to
engineer reliable software as easily/cheaply as we imagined. Cost
overruns and expensive failures are the norm.
This book deals with an information-driven approach to plan materials discovery and design, iterative learning. The authors present contrasting but complementary approaches, such as those based on high throughput calculations, combinatorial experiments or data driven discovery, together with machine-learning methods. Similarly, statistical methods successfully applied in other fields, such as biosciences, are presented. The content spans from materials science to information science to reflect the cross-disciplinary nature of the field. A perspective is presented that offers a paradigm (codesign loop for materials design) to involve iteratively learning from experiments and calculations to develop materials with optimum properties. Such a loop requires the elements of incorporating domain materials knowledge, a database of descriptors (the genes), a surrogate or statistical model developed to predict a given property with uncertainties, performing adaptive experimental design to guide the next experiment or calculation and aspects of high throughput calculations as well as experiments. The book is about manufacturing with the aim to halving the time to discover and design new materials. Accelerating discovery relies on using large databases, computation, and mathematics in the material sciences in a manner similar to the way used to in the Human Genome Initiative. Novel approaches are therefore called to explore the enormous phase space presented by complex materials and processes. To achieve the desired performance gains, a predictive capability is needed to guide experiments and computations in the most fruitful directions by reducing not successful trials. Despite advances in computation and experimental techniques, generating vast arrays of data; without a clear way of linkage to models, the full value of data driven discovery cannot be realized. Hence, along with experimental, theoretical and computational materials science, we need to add a "fourth leg'' to our toolkit to make the "Materials Genome'' a reality, the science of Materials Informatics.
Whether by synergy or by synthesis, development and technology are becoming synonymous in every domain. Cases on Transnational Learning and Technologically Enabled Environments reports on national and international initiatives undertaken to adapt advancements in information and communication technology and successfully face the challenges posed by various social and economic forces. The international research in this book represents instances of institutions that are in transition as well as those that are readily using technology in education.
This book presents the latest research advances in complex network structure analytics based on computational intelligence (CI) approaches, particularly evolutionary optimization. Most if not all network issues are actually optimization problems, which are mostly NP-hard and challenge conventional optimization techniques. To effectively and efficiently solve these hard optimization problems, CI based network structure analytics offer significant advantages over conventional network analytics techniques. Meanwhile, using CI techniques may facilitate smart decision making by providing multiple options to choose from, while conventional methods can only offer a decision maker a single suggestion. In addition, CI based network structure analytics can greatly facilitate network modeling and analysis. And employing CI techniques to resolve network issues is likely to inspire other fields of study such as recommender systems, system biology, etc., which will in turn expand CI's scope and applications. As a comprehensive text, the book covers a range of key topics, including network community discovery, evolutionary optimization, network structure balance analytics, network robustness analytics, community-based personalized recommendation, influence maximization, and biological network alignment. Offering a rich blend of theory and practice, the book is suitable for students, researchers and practitioners interested in network analytics and computational intelligence, both as a textbook and as a reference work.
This research volume presents a sample of recent contributions related to the issue of quality-assessment for Web Based information in the context of information access, retrieval, and filtering systems. The advent of the Web and the uncontrolled process of documents' generation have raised the problem of declining quality assessment to information on the Web, by considering both the nature of documents (texts, images, video, sounds, and so on), the genre of documents ( news, geographic information, ontologies, medical records, products records, and so on), the reputation of information sources and sites, and, last but not least the actions performed on documents (content indexing, retrieval and ranking, collaborative filtering, and so on). The volume constitutes a compendium of both heterogeneous approaches and sample applications focusing specific aspects of the quality assessment for Web-based information for researchers, PhD students and practitioners carrying out their research activity in the field of Web information retrieval and filtering, Web information mining, information quality representation and management.
|
You may like...
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
R966 Discovery Miles 9 660
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
|