![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
Despite advancements in technological and engineering fields, there is still a digital gender divide in the adoption, use, and development of information communication technology (ICT) services. This divide is also evident in educational environments and careers, specifically in the STEM fields. In order to mitigate this divide, policy approaches must be addressed and improved in order to encourage the inclusion of women in ICT disciplines. Gender Gaps and the Social Inclusion Movement in ICT provides emerging research exploring the theoretical and practical aspects of gender and policy from developed and developing country perspectives and its applications within ICT through various forms of research including case studies. Featuring coverage on a broad range of topics such as digital identity, human rights, and social inclusion, this book is ideally designed for policymakers, academicians, researchers, students, and technology developers seeking current research on gender inequality in ICT environments.
Method engineering is a very young field. Generally, method engineering can be considered from engineering of an entire methodology for information systems development to engineering of modeling techniques according to project requirements. Computer aided method engineering is about generation and use of information systems design techniques according to user needs. Some times such environments are called generic tools or MetaCASE. Computer-Aided Method Engineering: Designing Case Repositories for the 21st Century presents a contribution on a methodology and architecture of a CASE repository, forwarding a theory that will bring about the component based development into CASE tool design and development covering a repository construction principle for the 21st century.
C++ Programming Professional Made Easy: Expert C++ Programming Language Success in a Day for Any Computer User! Want to take your programming to the next level! Sam Key right back at providing his expert book from his great foundation food of c programming Did you love his first technical book? Well now you can take it up one notch! Know the basics and you want to get right into Variables and Operators? Discouraged to learn all the User Inputs Lets master Flow Controls! Grab your copy today and let's dive right in! PURCHASE NOW YOUR COPY!
Personal technology continues to evolve every day, but business technology does not follow that trend. Business IT is often treated as a necessary evil that can't be relied upon to take companies to the next level in their corporate evolution. In "The Golden Age of Drive-Thru IT," author Kedar Sathe offers useful, wide-ranging, and imaginative advice about how to revive and strengthen IT departments. Sathe, who has been programming computers since age fourteen, discusses how businesses must establish and execute new IT strategies to maintain and increase their bottom line. "The Golden Age of Drive-Thru IT" describes various aspects of technology and how IT can rise to every occasion and become a strategic enabler. It shows how IT can become nimble and flexible, yet produce robust and graceful solutions that allow companies to drive toward success in an efficient and enriching fashion. "The Golden Age of Drive-Thru IT" communicates how innovative ideas and smart, enthusiastic contributors will allow IT transformations to take place, reinvent itself, rise to its true potential, and stop selling itself short.
"Extended Finite Element Method" provides an introduction to the extended finite element method (XFEM), a novel computational method which has been proposed to solve complex crack propagation problems. The book helps readers understand the method and make effective use of the XFEM code and software plugins now available to model and simulate these complex problems. The book explores the governing equation behind XFEM, including
level set method and enrichment shape function. The authors outline
a new XFEM algorithm based on the continuum-based shell and
consider numerous practical problems, including planar
discontinuities, arbitrary crack propagation in shells and dynamic
response in 3D composite materials.
Due to the growing use of web applications and communication devices, the use of data has increased throughout various industries. It is necessary to develop new techniques for managing data in order to ensure adequate usage. The Handbook of Research on Pattern Engineering System Development for Big Data Analytics is a critical scholarly resource that examines the incorporation of pattern management in business technologies as well as decision making and prediction process through the use of data management and analysis. Featuring coverage on a broad range of topics such as business intelligence, feature extraction, and data collection, this publication is geared towards professionals, academicians, practitioners, and researchers seeking current research on the development of pattern management systems for business applications.
Information communication technologies (ICT) have long been important in supporting doctoral study. Though ICTs have been integrated into educational practices at all levels, there is little understanding of how effective these technologies are in supporting resource development for students and researchers in academic institutions. Enhancing the Role of ICT in Doctoral Research Processes is a collection of innovative research that identifies the ways that doctoral supervisors and students perceive the role of ICTs within the doctoral research process and supports the development of guidelines to enhance ICT skills within these programs. While highlighting topics including professional development, online learning, and ICT management, this book is ideally designed for academicians, researchers, and professionals seeking current research on ICT use for doctoral research.
How well does your organization manage the risks associated with
information quality? Managing information risk is becoming a top
priority on the organizational agenda. The increasing
sophistication of IT capabilities along with the constantly
changing dynamics of global competition are forcing businesses to
make use of their information more effectively. Information is
becoming a core resource and asset for all organizations; however,
it also brings many potential risks to an organization, from
strategic, operational, financial, compliance, and environmental to
societal. If you continue to struggle to understand and measure how
information and its quality affects your business, this book is for
you. This reference is in direct response to the new challenges
that all managers have to face. Our process helps your organization
to understand the "pain points" regarding poor data and information
quality so you can concentrate on problems that have a high impact
on core business objectives. This book provides you with all the
fundamental concepts, guidelines and tools to ensure core business
information is identified, protected and used effectively, and
written in a language that is clear and easy to understand for
non-technical managers.
Digital collaboration is abundant in today's world, but it is often problematic and does not provide an apt solution to the human need for comprehensive communication. Humans require more personal interactions beyond what can be achieved online. Returning to Interpersonal Dialogue and Understanding Human Communication in the Digital Age is a collection of innovative studies on the methods and applications of comparing online human interactions to face-to-face interactions. While highlighting topics including digital collaboration, social media, and privacy, this book is a vital reference source for public administrators, educators, businesses, academicians, and researchers seeking current research on the importance of non-digital communication between people.
The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context. Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, techniques, and practical applications related to the three dimensions of context awareness. Through the exploration of emerging research trends of pervasive computing, this book is beneficial to professors, students, researchers, and developers interested this latest development in the field of context-awareness and pervasive computing.
The theory of computation is used to address challenges arising in many computer science areas such as artificial intelligence, language processors, compiler writing, information and coding systems, programming language design, computer architecture and more. To grasp topics concerning this theory readers need to familiarize themselves with its computational and language models, based on concepts of discrete mathematics including sets, relations, functions, graphs and logic. This handbook introduces with rigor the important concepts of this kind and uses them to cover the most important mathematical models for languages and computation, such as various classical as well as modern automata and grammars. It explains their use in such crucially significant topics of computation theory as computability, decidability, and computational complexity. The authors pay special attention to the implementation of all these mathematical concepts and models and explains clearly how to encode them in computational practice. All computer programs are written in C#.
Technology's presence in society continues to increase as new products and programs emerge. As such, it is vital for various industries to rapidly adapt and learn to incorporate the latest technology applications and tools. The Handbook of Research on Technology Integration in the Global World is an essential reference source that examines a variety of approaches to integrating technology through technology diffusion, e-collaboration, and e-adoption. The book explores topics such as information systems agility, semantic web, and the digital divide. This publication is a valuable resource for academicians, practitioners, researchers, and upper-level graduate students.
Information in today's advancing world is rapidly expanding and becoming widely available. This eruption of data has made handling it a daunting and time-consuming task. Natural language processing (NLP) is a method that applies linguistics and algorithms to large amounts of this data to make it more valuable. NLP improves the interaction between humans and computers, yet there remains a lack of research that focuses on the practical implementations of this trending approach. Neural Networks for Natural Language Processing is a collection of innovative research on the methods and applications of linguistic information processing and its computational properties. This publication will support readers with performing sentence classification and language generation using neural networks, apply deep learning models to solve machine translation and conversation problems, and apply deep structured semantic models on information retrieval and natural language applications. While highlighting topics including deep learning, query entity recognition, and information retrieval, this book is ideally designed for research and development professionals, IT specialists, industrialists, technology developers, data analysts, data scientists, academics, researchers, and students seeking current research on the fundamental concepts and techniques of natural language processing.
A crash course into 8086/8088 assembler programming, in an easy way with practice at each step. You will learn how to use the registers, move data, do arithmetic, and handle text and graphics. You can run these programs on any PC machine and no program exceeds 512 bytes of executable code! The example programs include: * Guess the number. * Tic-Tac-Toe game. * Text graphics. * Mandelbrot set. * F-Bird game. * Invaders game. * Pillman game. * Toledo Atomchess. * bootBASIC language. |
You may like...
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
|