Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
"The book of nature is written in the language of mathematics "-- "Galileo Galilei" How is it possible to predict weather patterns for tomorrow, with access solely to today s weather data? And how is it possible to predict the aerodynamic behavior of an aircraft that has yet to be built? The answer is computer simulations based on mathematical models sets of equations that describe the underlying physical properties. However, these equations are usually much too complicated to solve, either by the smartest mathematician or the largest supercomputer. This problem is overcome by constructing an approximation: a numerical model with a simpler structure can be translated into a program that tells the computer how to carry out the simulation. This book conveys the fundamentals of mathematical models, numerical methods and algorithms. Opening with a tutorial on mathematical models and analysis, it proceeds to introduce the most important classes of numerical methods, with finite element, finite difference and spectral methods as central tools. The concluding section describes applications in physics and engineering, including wave propagation, heat conduction and fluid dynamics. Also covered are the principles of computers and programming, including MATLAB(r).
This book constitutes the refereed proceedings of the 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, held in Costa de Caparica, Portugal, in April 2016. The 53 revised full papers were carefully reviewed and selected from 112 submissions. The papers present selected results produced in engineering doctoral programs and focus on research, development, and application of cyber-physical systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: enterprise collaborative networks; ontologies; Petri nets; manufacturing systems; biomedical applications; intelligent environments; control and fault tolerance; optimization and decision support; wireless technologies; energy: smart grids, renewables, management, and optimization; bio-energy; and electronics.
This book considers logical proof systems from the point of view of their space complexity. After an introduction to propositional proof complexity the author structures the book into three main parts. Part I contains two chapters on resolution, one containing results already known in the literature before this work and one focused on space in resolution, and the author then moves on to polynomial calculus and its space complexity with a focus on the combinatorial technique to prove monomial space lower bounds. The first chapter in Part II addresses the proof complexity and space complexity of the pigeon principles. Then there is an interlude on a new type of game, defined on bipartite graphs, essentially independent from the rest of the book, collecting some results on graph theory. Finally Part III analyzes the size of resolution proofs in connection with the Strong Exponential Time Hypothesis (SETH) in complexity theory. The book is appropriate for researchers in theoretical computer science, in particular computational complexity.
Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of this linear expression, certain major issues concerning Boolean network topology - fixed points, cycles, transient times and basins of attractors - can be easily revealed by a set of formulae. This framework renders the state-space approach to dynamic control systems applicable to Boolean control networks. The bilinear-systemic representation of a Boolean control network makes it possible to investigate basic control problems including controllability, observability, stabilization, disturbance decoupling etc.
This book presents a collection of research papers that address the challenge of how to develop software in a principled way that, in particular, enables reasoning. The individual papers approach this challenge from various perspectives including programming languages, program verification, and the systematic variation of software. Topics covered include programming abstractions for concurrent and distributed software, specification and verification techniques for imperative programs, and development techniques for software product lines. With this book the editors and authors wish to acknowledge - on the occasion of his 60th birthday - the work of Arnd Poetzsch-Heffter, who has made major contributions to software technology throughout his career. It features articles on Arnd's broad research interests including, among others, the implementation of programming languages, formal semantics, specification and verification of object-oriented and concurrent programs, programming language design, distributed systems, software modeling, and software product lines. All contributing authors are leading experts in programming languages and software engineering who have collaborated with Arnd in the course of his career. Overall, the book offers a collection of high-quality articles, presenting original research results, major case studies, and inspiring visions. Some of the work included here was presented at a symposium in honor of Arnd Poetzsch-Heffter, held in Kaiserslautern, Germany, in November 2018.
New Edition: Introduction to Computational Earthquake Engineering (3rd Edition)Introduction to Computational Earthquake Engineering covers solid continuum mechanics, finite element method and stochastic modeling comprehensively, with the second and third chapters explaining the numerical simulation of strong ground motion and faulting, respectively. Stochastic modeling is used for uncertain underground structures, and advanced analytical methods for linear and non-linear stochastic models are presented. The verification of these methods by comparing the simulation results with observed data is then presented, and examples of numerical simulations which apply these methods to practical problems are generously provided. Furthermore three advanced topics of computational earthquake engineering are covered, detailing examples of applying computational science technology to earthquake engineering problems.
This book is open access under a CC BY 4.0 license. This easy-to-read book introduces the basics of solving partial differential equations by means of finite difference methods. Unlike many of the traditional academic works on the topic, this book was written for practitioners. Accordingly, it especially addresses: the construction of finite difference schemes, formulation and implementation of algorithms, verification of implementations, analyses of physical behavior as implied by the numerical solutions, and how to apply the methods and software to solve problems in the fields of physics and biology.
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 - July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
This monograph presents examples of best practices when combining bioinspired algorithms with parallel architectures. The book includes recent work by leading researchers in the field and offers a map with the main paths already explored and new ways towards the future. Parallel Architectures and Bioinspired Algorithms will be of value to both specialists in Bioinspired Algorithms, Parallel and Distributed Computing, as well as computer science students trying to understand the present and the future of Parallel Architectures and Bioinspired Algorithms.
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.
This book is a comprehensive, systematic survey of the synthesis problem, and of region theory which underlies its solution, covering the related theory, algorithms, and applications. The authors focus on safe Petri nets and place/transition nets (P/T-nets), treating synthesis as an automated process which, given behavioural specifications or partial specifications of a system to be realized, decides whether the specifications are feasible, and then produces a Petri net realizing them exactly, or if this is not possible produces a Petri net realizing an optimal approximation of the specifications. In Part I the authors introduce elementary net synthesis. In Part II they explain variations of elementary net synthesis and the unified theory of net synthesis. The first three chapters of Part III address the linear algebraic structure of regions, synthesis of P/T-nets from finite initialized transition systems, and the synthesis of unbounded P/T-nets. Finally, the last chapter in Part III and the chapters in Part IV cover more advanced topics and applications: P/T-net with the step firing rule, extracting concurrency from transition systems, process discovery, supervisory control, and the design of speed-independent circuits. Most chapters conclude with exercises, and the book is a valuable reference for both graduate students of computer science and electrical engineering and researchers and engineers in this domain.
Enjoy Life, Make Money, and Live Your Dreams The App Business is one of the hottest businesses to get into and is expected to grow even faster this year in 2013 and beyond Many have started such businesses with small investments and have become very wealthy In fact in many cases, the wealth has been so explosive that people have been quitting their day jobs and turning to app development and the app business full time. That's the beauty of this business; you make money all the time, even while you sleep...LITERALLY The greatest benefit of running an app business is the freedom it brings Being able to do what you love and make money is truly a dream come true However it takes a lot of hard work and requires certain steps to setup correctly That's where this book comes in handy Think of it as a step-by-step guide to creating a successful app business Can you do this part time? SURE Can you do it full time? MOST DEFINITELY The world of apps is growing exponentially...will you be the next App Trillionaire?
This book presents intellectual, innovative, information
technologies (I3-technologies) based on logical and probabilistic
(LP) risk models. The technologies presented here consider such
models for structurally complex systems and processes with logical
links and with random events in economics and technology. A number of applications is given to show the effectiveness of risk management technologies. In addition, topics of lectures and practical computer exercises intended for a two-semester course Risk management technologies are suggested."
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.
Modelling for Business Improvement contains the proceedings of the First International Conference on Process Modelling and Process Management (MMEP 2010) held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of process modelling and process management. This conference will showcase recent trends in the modelling and management of engineering processes, explore potential synergies between different modelling approaches, gather and discuss future challenges for the management of engineering processes and discuss future research areas and topics. Modelling for Business Improvement is divided into three main parts: theoretical foundation of modelling and management of engineering processes, and achievements in theory; experiences from management practice using various modelling methods and tools, and their future challenges; and, new perspectives on modelling methods, techniques and tools. Based on the latest achievements in this and related fields, the editors aim to landmark the research map for modelling and management of engineering processes for 2020.
In recent years, IT standardization has become increasingly complex as a result of globalization, widespread Internet use, and the economic importance of standards. New Applications in IT Standards: Developments and Progress unites contributions on all facets of standards research, providing essential research on developing, teaching, and implementing standards in global organizations and institutions. Researchers can benefit from specific cases, frameworks, and new theories in IT standards studies.
With more restrictions upon animal experimentations, pharmaceutical industries are currently focusing on a new generation of experiments and technologies that are considerably more efficient and less controversial. The integration of computational and experimental strategies has led to the identification and development of promising compounds. Computer Applications in Drug Discovery and Development is a pivotal reference source that provides innovative research on the application of computers for discovering and designing new drugs in modern molecular biology and medicinal chemistry. While highlighting topics such as chemical structure databases and dataset utilization, this publication delves into the current panorama of drug discovery, where high drug failure rates are a major concern and properly designed virtual screening strategies can be a time-saving, cost-effective, and productive alternative. This book is ideally designed for chemical engineers, pharmacists, molecular biologists, students, researchers, and academicians seeking current research on the unexplored avenues and future perspectives of drug design.
"The healthcare industry in the United States consumes roughly 20% of the gross national product per year. This huge expenditure not only represents a large portion of the country's collective interests, but also an enormous amount of medical information. Information intensive healthcare enterprises have unique issues related to the collection, disbursement, and integration of various data within the healthcare system.Information Systems and Healthcare Enterprises provides insight on the challenges arising from the adaptation of information systems to the healthcare industry, including development, design, usage, adoption, expansion, and compliance with industry regulations. Highlighting the role of healthcare information systems in fighting healthcare fraud and the role of information technology and vendors, this book will be a highly valued addition to academic, medical, and health science libraries."
In this essay collection, leading physicists, philosophers, and historians attempt to fill the empty theoretical ground in the foundations of information and address the related question of the limits to our knowledge of the world. Over recent decades, our practical approach to information and its exploitation has radically outpaced our theoretical understanding - to such a degree that reflection on the foundations may seem futile. But it is exactly fields such as quantum information, which are shifting the boundaries of the physically possible, that make a foundational understanding of information increasingly important. One of the recurring themes of the book is the claim by Eddington and Wheeler that information involves interaction and putting agents or observers centre stage. Thus, physical reality, in their view, is shaped by the questions we choose to put to it and is built up from the information residing at its core. This is the root of Wheeler's famous phrase "it from bit." After reading the stimulating essays collected in this volume, readers will be in a good position to decide whether they agree with this view.
Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.
"The Supply of ConceptS" achieves a major breakthrough in the general theory of systems. It unfolds a theory of everything that steps beyond Physics' theory of the same name. The author unites all knowledge by including not only the natural but also the philosophical and theological universes of discourse. The general systems model presented here resembles an organizational flow chart that represents conceptual positions within any type of system and shows how the parts are connected hierarchically for communication and control. Analyzing many types of systems in various branches of learned discourse, the model demonstrates how any system type manages to maintain itself true to type. The concepts thus generated form a network that serves as a storehouse for the supply of concepts in learned discourse. Partial to the use of analogies, Irving Silverman presents his thesis in an easy-to-read style, explaining a way of thinking that he has found useful. This book will be of particular interest to the specialist in systems theory, philosophy, linguistics, and the social sciences. Irving Silverman applies his general systems model to 22 system types and presents rationales for these analyses. He provides the reader with a method, and a way to apply that method; a theory of knowledge derived from the method; and a practical outlook based on a comprehensive approach. Chapters include: Minding the Storehouse; Standing Together; The Cognitive Contract; The Ecological Contract; The Social Contract; The Semantic Terrain.
This book highlights the current challenges for engineers involved in product development and the associated changes in procedure they make necessary. Methods for systematically analyzing the requirements for safety and security mechanisms are described using examples of how they are implemented in software and hardware, and how their effectiveness can be demonstrated in terms of functional and design safety are discussed. Given today's new E-mobility and automated driving approaches, new challenges are arising and further issues concerning "Road Vehicle Safety" and "Road Traffic Safety" have to be resolved. To address the growing complexity of vehicle functions, as well as the increasing need to accommodate interdisciplinary project teams, previous development approaches now have to be reconsidered, and system engineering approaches and proven management systems need to be supplemented or wholly redefined. The book presents a continuous system development process, starting with the basic requirements of quality management and continuing until the release of a vehicle and its components for road use. Attention is paid to the necessary definition of the respective development item, the threat-, hazard- and risk analysis, safety concepts and their relation to architecture development, while the book also addresses the aspects of product realization in mechanics, electronics and software as well as for subsequent testing, verification, integration and validation phases. In November 2011, requirements for the Functional Safety (FuSa) of road vehicles were first published in ISO 26262. The processes and methods described here are intended to show developers how vehicle systems can be implemented according to ISO 26262, so that their compliance with the relevant standards can be demonstrated as part of a safety case, including audits, reviews and assessments. |
You may like...
Information Systems, International…
Ralph Stair, George Reynolds
Paperback
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano
Paperback
R2,163
Discovery Miles 21 630
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
|