Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
This book deals with the problem of finding suitable languages that can represent specific classes of Petri nets, the most studied and widely accepted model for distributed systems. Hence, the contribution of this book amounts to the alphabetization of some classes of distributed systems. The book also suggests the need for a generalization of Turing computability theory. It is important for graduate students and researchers engaged with the concurrent semantics of distributed communicating systems. The author assumes some prior knowledge of formal languages and theoretical computer science.
* Draws on work across multiple disciplines, from astrobiology and physics to linguistics and the social sciences, making it appealing to graduates from a wide variety of fields. * The first accessible introduction into the important work of philosopher Howard Pattee. * Aims to equip readers with new approaches to simple and complex systems theory to take into any respective discipline.
Information Systems Development: Business Systems and Services: Modeling and Development, is the collected proceedings of the 19th International Conference on Information Systems Development held in Prague, Czech Republic, August 25 - 27, 2010. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education. These proceedings represent ongoing reflections within the academic community on established information systems topics and emerging concepts, approaches and ideas. It is hoped that the papers herein contribute towards disseminating research and improving practice.
This book focuses on three core knowledge requirements for effective and thorough data analysis for solving business problems. These are a foundational understanding of: 1. statistical, econometric, and machine learning techniques; 2. data handling capabilities; 3. at least one programming language. Practical in orientation, the volume offers illustrative case studies throughout and examples using Python in the context of Jupyter notebooks. Covered topics include demand measurement and forecasting, predictive modeling, pricing analytics, customer satisfaction assessment, market and advertising research, and new product development and research. This volume will be useful to business data analysts, data scientists, and market research professionals, as well as aspiring practitioners in business data analytics. It can also be used in colleges and universities offering courses and certifications in business data analytics, data science, and market research.
This book includes the full research papers accepted by the scientific programme committee for the 22nd AGILE Conference on Geographic Information Science, held in June 2019 at Cyprus University of Technology, Limassol, Cyprus. It is intended primarily for professionals and researchers in geographic information science, as well as those in related fields in which geoinformation application plays a significant role.
"From the Preface: "
Information is an important concept that is studied extensively across a range of disciplines, from the physical sciences to genetics to psychology to epistemology. Information continues to increase in importance, and the present age has been referred to as the "Information Age." One may understand information in a variety of ways. For some, information is found in facts that were previously unknown. For others, a fact must have some economic value to be considered information. Other people emphasize the movement through a communication channel from one location to another when describing information. In all of these instances, information is the set of characteristics of the output of a process. Yet Information has seldom been studied in a consistent way across different disciplines. "Information from Processes" provides a discipline-independent and precise presentation of both information and computing processes. Information concepts and phenomena are examined in an effort to understand them, given a hierarchy of information processes, where one process uses others. Research about processes and computing is applied to answer the question of what information can and cannot be produced, and to determine the nature of this information (theoretical information science). The book also presents some of the basic processes that are used in specific domains (applied information science), such as those that generate information in areas like reasoning, the evolution of informative systems, cryptography, knowledge, natural language, and the economic value of information.Written for researchers and graduate students in information science and related fields, "Information from Processes "details a unique information model independent from other concepts in computer or archival science, which is thus applicable to a wide range of domains. Combining theoretical and empirical methods as well as psychological, mathematical, philosophical, and economic techniques, Losee's book delivers a solid basis and starting point for future discussions and research about the creation and use of information."
This book highlights recent advances in the development of effective modeling and solution approaches to enhance the performance of military logistics. It seeks to further research in global defense-related topics, including military operations, governmental operations and security, as well as nation support. Additionally its purpose is to promote the global exchange of information and ideas amongst developers and users of military operations research tools and techniques. Over the course of its nine chapters, this edited volume addresses significant issues in military logistics including: a) Restructuring processes via OR methods aimed at improving the efficiency and effectiveness of the military logistics, b) Sense-and-Respond logistics prediction and coordination techniques that provide competitive advantage, spanning the full range of military operations across the strategic, operational and tactical levels of war, c) Procurement and auctioning, d) Inventory and stock control theories and applications, e) Military transport and logistical equipment, and, f) Maintenance, repair and overhaul on operational capability in general and equipment availability. The book aims to bridge the gap between the abundant literature on commercial logistics and its scarce defense & combat counterpart. This collection of useful insights into new trends and research will offer an ideal reference for practitioners and army related personnel interested in integrating scientific rigor to improve logistics management within defense organizations & agencies. Ultimately this book should provide a relevant platform for the latest contributions of operations management, operations research, and computational intelligence towards the enhancement of military logistics.
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country's troops. Or imagine yourself as a public health expert trying to identify the location of contaminated water that is causing diarrheal diseases in a local population. Geospatial abduction is a new technique introduced by the authors that allows such problems to be solved. Geospatial Abduction provides the mathematics underlying geospatial abduction and the algorithms to solve them in practice; it has wide applicability and can be used by practitioners and researchers in many different fields. Real-world applications of geospatial abduction to military problems are included. Compelling examples drawn from other domains as diverse as criminology, epidemiology and archaeology are covered as well. This book also includes access to a dedicated website on geospatial abduction hosted by University of Maryland. Geospatial Abduction targets practitioners working in general AI, game theory, linear programming, data mining, machine learning, and more. Those working in the fields of computer science, mathematics, geoinformation, geological and biological science will also find this book valuable.
'Rough Computing' explores the application of rough set theory, which has attracted attention because of the ability to enhance databases by allowing for the management of uncertainty, a comparative analysis between rough sets, and other intelligent data analysis.
Since 1960, Advances in Computers has chronicled the constantly
shifting theories and methods of Information Technology which
greatly shapes our lives today
This book includes high-quality papers presented at International Conference on Scientific and Natural Computing (SNC 2021), organized by Department of Applied Mathematics, Gautam Buddha University, Greater Noida in collaboration with IIT Roorkee and Technical University of Ostrava (VSB-TU) and technically sponsored by Soft Computing Research Society of India, held online during 5 - 6 February 2021. The topics include self-organizing migrating algorithm, genetic algorithms, swarm intelligence based techniques, evolutionary computing, fuzzy computing, probabilistic computing, genetic programming, particle swarm optimization, neuro computing, hybrid methods, deep learning, including convolutional neural networks, generative adversarial networks and auto-encoders, bio-inspired systems, data mining, data visualization, intelligent agents, engineering design optimization, multi-objective optimization, fault diagnosis, decision support, robotics, signal or image processing, system identification and modelling, systems integration, time series prediction, virtual reality, vision or pattern recognition, intelligent information retrieval, motion control and power electronics, Internet of Everything (IoE), control systems, and supply chain management.
This book presents a systematic exposition of the main ideas and methods in treating inverse problems for PDEs arising in basic mathematical models, though it makes no claim to being exhaustive. Mathematical models of most physical phenomena are governed by initial and boundary value problems for PDEs, and inverse problems governed by these equations arise naturally in nearly all branches of science and engineering. The book's content, especially in the Introduction and Part I, is self-contained and is intended to also be accessible for beginning graduate students, whose mathematical background includes only basic courses in advanced calculus, PDEs and functional analysis. Further, the book can be used as the backbone for a lecture course on inverse and ill-posed problems for partial differential equations. In turn, the second part of the book consists of six nearly-independent chapters. The choice of these chapters was motivated by the fact that the inverse coefficient and source problems considered here are based on the basic and commonly used mathematical models governed by PDEs. These chapters describe not only these inverse problems, but also main inversion methods and techniques. Since the most distinctive features of any inverse problems related to PDEs are hidden in the properties of the corresponding solutions to direct problems, special attention is paid to the investigation of these properties. For the second edition, the authors have added two new chapters focusing on real-world applications of inverse problems arising in wave and vibration phenomena. They have also revised the whole text of the first edition.
This book is useful to understand and write alongside non-human agents, examine the impact of algorithms and AI on writing, and accommodate relationships with autonomous agents. This ground-breaking future-driven framework prepares scholars and practitioners to investigate and plan for the social, digital literacy, and civic implications arising from emerging technologies. This book prepares researchers, students, practitioners, and citizens to work with AI writers, virtual humans, and social robots. This book explores prompts to envision how fields and professions will change. The book's unique integration with Fabric of Digital Life, a database and structured content repository for conducting social and cultural analysis of emerging technologies, provides concrete examples throughout. Readers gain imperative direction for collaborative, algorithmic, and autonomous writing futures.
CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice, in Los Angeles, USA for the first and in Changchun, China for the second time, each of which attracted a large number of researchers from all over the world. The congress turns out to develop a spirit of cooperation that leads to new friendship for addressing a wide variety of ongoing problems in this vibrant area of technology and fostering more collaboration over the world. The congress, CSIE 2011, received 2483 full paper and abstract submissions from 27 countries and regions over the world. Through a rigorous peer review process, all submissions were refereed based on their quality of content, level of innovation, significance, originality and legibility. 688 papers have been accepted for the international congress proceedings ultimately.
Prolog Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of Parallel, and what's more convenient than getting to know both sides! Want to know More? Buy Now!
This book surveys the recent development of maintenance theory, advanced maintenance techniques with shock and damage models, and their applications in computer systems dealing with efficiency problems. It also equips readers to handle multiple maintenance, informs maintenance policies, and explores comparative methods for several different kinds of maintenance. Further, it discusses shock and damage modelling as an important failure mechanism for reliability systems, and extensively explores the degradation processes, failure modes, and maintenance characteristics of modern, highly complex systems, especially for some key mechanical systems designed for specific tasks.
Scheduling theory has received a growing interest since its origins in the second half of the 20th century. Developed initially for the study of scheduling problems with a single objective, the theory has been recently extended to problems involving multiple criteria. However, this extension has still left a gap between the classical multi-criteria approaches and some real-life problems in which not all jobs contribute to the evaluation of each criterion. In this book, we close this gap by presenting and developing multi-agent scheduling models in which subsets of jobs sharing the same resources are evaluated by different criteria. Several scenarios are introduced, depending on the definition and the intersection structure of the job subsets. Complexity results, approximation schemes, heuristics and exact algorithms are discussed for single-machine and parallel-machine scheduling environments. Definitions and algorithms are illustrated with the help of examples and figures.
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.
This collaborative book presents recent trends on the study of sequences, including combinatorics on words and symbolic dynamics, and new interdisciplinary links to group theory and number theory. Other chapters branch out from those areas into subfields of theoretical computer science, such as complexity theory and theory of automata. The book is built around four general themes: number theory and sequences, word combinatorics, normal numbers, and group theory. Those topics are rounded out by investigations into automatic and regular sequences, tilings and theory of computation, discrete dynamical systems, ergodic theory, numeration systems, automaton semigroups, and amenable groups. This volume is intended for use by graduate students or research mathematicians, as well as computer scientists who are working in automata theory and formal language theory. With its organization around unified themes, it would also be appropriate as a supplemental text for graduate level courses.
"Computer Science and Convergence"is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applicationsand will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows: - Mobile and ubiquitous computing WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows: - Cryptography and Security for Converged environments -
Wireless sensor network for Converged environments |
You may like...
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|