Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
C++ Programming Professional Made Easy: Expert C++ Programming Language Success in a Day for Any Computer User! Want to take your programming to the next level! Sam Key right back at providing his expert book from his great foundation food of c programming Did you love his first technical book? Well now you can take it up one notch! Know the basics and you want to get right into Variables and Operators? Discouraged to learn all the User Inputs Lets master Flow Controls! Grab your copy today and let's dive right in! PURCHASE NOW YOUR COPY!
Security video surveillance systems, such as homeland security and national defence, rely on specific mathematical algorithms in order to run effectively. It is essential for these parameters to be understood in order to design and create a successful system. Video Surveillance Techniques and Technologies presents empirical research and acquired experience on the original solutions and mathematical algorithms for motion detection and object identification problems. Emphasising a wide variety of applications of security systems, this book is an essential tool for graduate students and professionals in the field of signal and image processing applied in static/moving object detection, tracking, and identification.
The interrelation of globalization, communication, and media has prompted many individuals to view the world in terms of a new dichotomy: the global "wired" (nations with widespread online access) and the global "tired" (nations with very limited online access). In this way, differing levels of online access have created an international rift - the global digital divide. The nature, current status, and future projections related to this rift, in turn, have important implications for all of the world's citizens. Yet these problems are not intractable. Rather, with time and attention, public policies and private sector practices can be developed or revised to close this divide and bring more of the world's citizens to the global stage on a more equal footing. The first step in addressing problems resulting from the global digital divide is to improve understanding, that is, organizations and individuals must understand what factors contribute to this global digital divide for them to address it effectively. From this foundational understanding, organizations can take the kinds of focused, coordinated actions needed to address such international problems effectively. This collection represents an initial step toward examining the global digital divide from the perspective of developing nations and the challenges their citizens face in today's error of communication-driven globalization. The entries in this collection each represent different insights on the digital divide from the perspectives of developing nations - many of which have been overlooked in previous discussions of this topic. This book examines globalization and its effects from the perspective of how differences in access to online communication technologies between the economically developed countries and less economically developed countries is affecting social, economic, educational, and political developments in the world's emerging economies. This collection also examines how this situation is creating a global digital divide that will have adverse consequences for all nations. Each of the book's chapters thus presents trends and ideas related to the global digital divide between economically developed countries and less economically developed nations. Through this approach, the contributors present perspectives from the economically developing nations themselves versus other texts that explore this topic from the perspective of economically developed countries. In this way, the book provides a new and an important perspective to the growing literature on the global digital divide. The primary audiences for this text would include individuals from both academics and industry practitioners. The academic audience would include administrators in education; researchers; university, college, and community college instructors; and students at the advanced undergraduate and graduate levels.
Personal technology continues to evolve every day, but business technology does not follow that trend. Business IT is often treated as a necessary evil that can't be relied upon to take companies to the next level in their corporate evolution. In "The Golden Age of Drive-Thru IT," author Kedar Sathe offers useful, wide-ranging, and imaginative advice about how to revive and strengthen IT departments. Sathe, who has been programming computers since age fourteen, discusses how businesses must establish and execute new IT strategies to maintain and increase their bottom line. "The Golden Age of Drive-Thru IT" describes various aspects of technology and how IT can rise to every occasion and become a strategic enabler. It shows how IT can become nimble and flexible, yet produce robust and graceful solutions that allow companies to drive toward success in an efficient and enriching fashion. "The Golden Age of Drive-Thru IT" communicates how innovative ideas and smart, enthusiastic contributors will allow IT transformations to take place, reinvent itself, rise to its true potential, and stop selling itself short.
Edited by a renowned and much cited chemist, this book covers the
whole span of molecular computers that are based on non-biological
systems. The contributions by all the major scientists in the field
provide an excellent overview of the latest developments in this
rapidly expanding area.
This book approaches economic problems from a systems thinking and feedback perspective. By introducing system dynamics methods (including qualitative and quantitative techniques) and computer simulation models, the respective contributions apply feedback analysis and dynamic simulation modeling to important local, national, and global economics issues and concerns. Topics covered include: an introduction to macro modeling using a system dynamics framework; a system dynamics translation of the Phillips machine; a re-examination of classical economic theories from a feedback perspective; analyses of important social, ecological, and resource issues; the development of a biophysical economics module for global modelling; contributions to monetary and financial economics; analyses of macroeconomic growth, income distribution and alternative theories of well-being; and a re-examination of scenario macro modeling. The contributions also examine the philosophical differences between the economics and system dynamics communities in an effort to bridge existing gaps and compare methods. Many models and other supporting information are provided as online supplementary files. Consequently, the book appeals to students and scholars in economics, as well as to practitioners and policy analysts interested in using systems thinking and system dynamics modeling to understand and improve economic systems around the world. "Clearly, there is much space for more collaboration between the advocates of post-Keynesian economics and system dynamics! More generally, I would like to recommend this book to all scholars and practitioners interested in exploring the interface and synergies between economics, system dynamics, and feedback thinking." Comments in the Foreword by Marc Lavoie, Emeritus Professor, University of Ottawa and University of Sorbonne Paris Nord
This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem. The research results strengthen the importance of evidence-based approaches in the fight against corruption in all its forms, and foster the discussion about the best ways to convert the obtained knowledge into public policy. The contributed chapters provide comprehensive and multidisciplinary approaches to handle the non-trivial structural and dynamical aspects that characterize the modern social, economic, political and technological systems where corruption takes place. This book will serve a broad multi-disciplinary audience from natural to social scientists, applied mathematicians, including law and policymakers.
The development of cognitive models is a key step in the challenging research program to advance our understanding of human cognition and behavior. Dynamical models represent a general and flexible approach to cognitive modeling. This introduction focuses on applications of stochastic processes and dynamical systems to model cognition. The dynamical approach is particularly useful to emphasize the strong link between experimental research (and its paradigms), data analysis, and mathematical models including their computer implementation for numerical simulation. Most of specific examples are from the domain of eye movement research, with concepts being applicable to a broad range of problems in cognitive modeling. The textbook aims at the graduate and/or advanced undergraduate level for students in Cognitive Science and related disciplines such as Psychology and Computer Science. Joint introduction of the theory of cognitive processes and mathematical models, their underlying mathematical concepts, numerical simulation, and analysis; The focus on eye movements provide a theoretically coherent, but very general application area; Computer code in R Programming Language for Statistical Computing is available for all examples, figures, and solutions to exercises.
In businesses and organizations, understanding the social reality of individuals, groups, and cultures allows for in-depth understanding and rich analysis of multiple research areas to improve practices. Qualitative research provides important insight into the interactions of the workplace. Qualitative Techniques for Workplace Data Analysis is an essential reference source that discusses the qualitative methods used to analyze workplace data, as well as what measures should be adopted to ensure the credibility and dependability of qualitative findings in the workplace. Featuring research on topics such as collection methods, content analysis, and sampling, this book is ideally designed for academicians, development practitioners, business managers, and analytic professionals seeking coverage on quality measurement techniques in the occupational settings of emerging markets.
This book is the result of years of research following a realization of the mismatch of engineering skills produced by universities and those that industry required, based on the situation in Sub-Saharan Africa, equally applicable to other regions in Africa and indeed worldwide. The book is meant to assist engineering academics and engineers in industry to build capacity and cope with the dynamic trends in technology brought on by the 4th Industrial Revolution and to prepare for the 5th Industrial Revolution, an era predicted to be dominated by critical and system thinkers with creative and innovative skills as basic necessities. The book is also useful for policy-making researchers in academia, industrial and public sector researchers, and implementers in governments that provide required funding for the development of human resources and skills. The book primarily consists of the novel research and innovation approaches of modelling and building systems thinking sub-models which were ultimately integrated into the Universal Systems Thinking (UST) model aimed at improving the quality of engineers and engineering practice. The initiatives in this book include strategies for bridging the gap between industry and academia through systems thinking research. The book provides information on how to model, simulate, adjust and implement integrated systems thinking approaches to engineering education and training for capacity building and sustainability. The book also covers approaches to address research gaps and mismatch of skills while capitalizing on the successes of several projects carried out and supported by the Royal Academy of Engineering over the years.
The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context. Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, techniques, and practical applications related to the three dimensions of context awareness. Through the exploration of emerging research trends of pervasive computing, this book is beneficial to professors, students, researchers, and developers interested this latest development in the field of context-awareness and pervasive computing.
Method engineering is a very young field. Generally, method engineering can be considered from engineering of an entire methodology for information systems development to engineering of modeling techniques according to project requirements. Computer aided method engineering is about generation and use of information systems design techniques according to user needs. Some times such environments are called generic tools or MetaCASE. Computer-Aided Method Engineering: Designing Case Repositories for the 21st Century presents a contribution on a methodology and architecture of a CASE repository, forwarding a theory that will bring about the component based development into CASE tool design and development covering a repository construction principle for the 21st century.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
DOS Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of DOS, and what's more convenient than getting to know both sides! Want to know More? Buy Now!
To date, a plethora of companies and organizations are investing vast amounts of money on the latest technologies. Information technology can be used to improve market share, profits, sales, competitive advantage, and customer/employee satisfaction. Unfortunately, the individuals meant to use these technologies are not well equipped on how to effectively and efficiently use these tools for competitive advantage and decision making. The Handbook of Research on IT Applications for Strategic Competitive Advantage and Decision Making is a collection of innovative research relevant to the methodologies, theoretical frameworks, and latest empirical research findings in information technology applications, strategic competitive advantage, and decision making. While highlighting topics including agility, knowledge management, and business intelligence, this book is ideally designed for information technology professionals, academics, researchers, managers, executives, and government officials interested in using information technology for strategic competitive advantage and better decision making.
This book focuses on the combination of IoT and data science, in particular how methods, algorithms, and tools from data science can effectively support IoT. The authors show how data science methodologies, techniques and tools, can translate data into information, enabling the effectiveness and usefulness of new services offered by IoT stakeholders. The authors posit that if IoT is indeed the infrastructure of the future, data structure is the key that can lead to a significant improvement of human life. The book aims to present innovative IoT applications as well as ongoing research that exploit modern data science approaches. Readers are offered issues and challenges in a cross-disciplinary scenario that involves both IoT and data science fields. The book features contributions from academics, researchers, and professionals from both fields. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
R966 Discovery Miles 9 660
Technology In Action Complete, Global…
Alan Evans, Kendall Martin, …
Paperback
R2,490
Discovery Miles 24 900
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|