Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
Institutions of higher education have increasingly embraced distance education with the number of students enrolled in online courses rapidly rising in colleges and universities throughout the world. Given its popularity and increased usage, it is imperative that administrators and instructors monitor the current state and future directions relating to distance education in order to meet the needs and challenges of tomorrow. Distance Learning Technology, Current Instruction, and the Future of Education: Applications of Today, Practices of Tomorrow provides present and prospective directions of online education from various research fields, reporting on discussions from students, faculty members, researchers, and practitioners. This innovative publication contains significant and unique research findings influencing future developments in technology-enhanced education and industry.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.
This book is designed to cover three objectives. One, to provide a comprehensive resource to individuals (including novice, IT/Non-HP-UX administrators, HP-UX administrators) who intend to take the Certified System Administrator for HP-UX certification exam and pass it. Two, to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating system software, IT managers, programmers, and DBAs working in the HP-UX environment. Three, to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 33 chapters. The book is organized in such a way that it helps its audience understand concepts, implementation procedures, some basic troubleshooting, command syntax, configuration files, and daemons involved. There are three key areas: UNIX fundamentals, HP-UX system administration, and HP-UX network administration. 1.UNIX Fundamentals covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, but rather includes general UNIX concepts, file manipulation and security techniques, shell and awk programming, vi editor, basic commands, and other topics. Chapters 01 through 06 and chapter 21 cover this area. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration chapters. This is done intentionally to provide readers with some practical examples based on the knowledge they have gained from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration covers the HP-UX-specific system administration concepts and topics including HP-UX installation methods; software and patch management; user and group account administration; disk and device file management; LVM and file system administration; swap space and printer management; system startup and shutdown procedures; kernel reconfiguration techniques; backup, restore, and system recovery functions; job automation and process control; system logging and performance monitoring; and so on. Chapters 07 through 20 cover this area. 3.HP-UX Network Administration covers HP-UX network administration concepts and topics such as OSI and TCP/IP models; network hardware overview; LAN card administration; IP subnetting and routing techniques; network troubleshooting tools; system startup services; naming services such as DNS, NIS, and LDAP; File sharing tools viz. NFS and AutoFS; Time synchronization using NTP; internet services administration; BootP/TFTP services; system security; and so on. Chapters 22 through 33 cover this area. The beginning of each chapter highlights objectives covered. The end of each chapter includes a summary as to what is learnt in the chapter. Throughout the book tables, figures, screen shots, and examples are given to explain concepts and tasks. The output generated as a result of running commands is highlighted in light grey background to differentiate it with surrounding text. The book includes several appendices one of which contains more than 550 practice exam questions. Tables of commands, important files, and service daemons are included in separate appendices.
Mapping and localization are two essential tasks in autonomous mobile robotics. Due to the unavoidable noise that sensors present, mapping algorithms usually rely on loop closure detection techniques, which entail the correct identification of previously seen places to reduce the uncertainty of the resulting maps. This book deals with the problem of generating topological maps of the environment using efficient appearance-based loop closure detection techniques. Since the quality of a visual loop closure detection algorithm is related to the image description method and its ability to index previously seen images, several methods for loop closure detection adopting different approaches are developed and assessed. Then, these methods are used in three novel topological mapping algorithms. The results obtained indicate that the solutions proposed attain a better performance than several state-of-the-art approaches. To conclude, given that loop closure detection is also a key component in other research areas, a multi-threaded image mosaicing algorithm is proposed. This approach makes use of one of the loop closure detection techniques previously introduced in order to find overlapping pairs between images and finally obtain seamless mosaics of different environments in a reasonable amount of time.
The book is centered around the research areas of combinatorics, special functions, and computer algebra. What these research fields share is that many of their outstanding results do not only have applications in Mathematics, but also other disciplines, such as computer science, physics, chemistry, etc. A particular charm of these areas is how they interact and influence one another. For instance, combinatorial or special functions' techniques have motivated the development of new symbolic algorithms. In particular, first proofs of challenging problems in combinatorics and special functions were derived by making essential use of computer algebra. This book addresses these interdisciplinary aspects. Algorithmic aspects are emphasized and the corresponding software packages for concrete problem solving are introduced. Readers will range from graduate students, researchers to practitioners who are interested in solving concrete problems within mathematics and other research disciplines.
This book focuses on the design, implementation and applications of embedded systems and advanced industrial controls with microcontrollers. It combines classical and modern control theories as well as practical control programming codes to help readers learn control techniques easily and effectively. The book covers both linear and nonlinear control techniques to help readers understand modern control strategies. The author provides a detailed description of the practical considerations and applications in linear and nonlinear control systems. They concentrate on the ARM (R) Cortex (R)-M4 MCU system built by Texas Instruments (TM) called TM4C123GXL, in which two ARM (R) Cortex (R)-M4 MCUs, TM4C123GH6PM, are utilized. In order to help the reader develop and build application control software for a specified microcontroller unit. Readers can quickly develop and build their applications by using sample project codes provided in the book to access specified peripherals. The book enables readers to transfer from one interfacing protocol to another, even if they only have basic and fundamental understanding and basic knowledge of one interfacing function. Classical and Modern Controls with Microcontrollers is a powerful source of information for control and systems engineers looking to expand their programming knowledge of C, and of applications of embedded systems with microcontrollers. The book is a textbook for college students majored in CE, EE and ISE to learn and study classical and modern control technologies. The book can also be adopted as a reference book for professional programmers working in modern control fields or related to intelligent controls and embedded computing and applications. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
The third edition of this handbook is designed to provide a broad coverage of the concepts, implementations, and applications in metaheuristics. The book's chapters serve as stand-alone presentations giving both the necessary underpinnings as well as practical guides for implementation. The nature of metaheuristics invites an analyst to modify basic methods in response to problem characteristics, past experiences, and personal preferences, and the chapters in this handbook are designed to facilitate this process as well. This new edition has been fully revised and features new chapters on swarm intelligence and automated design of metaheuristics from flexible algorithm frameworks. The authors who have contributed to this volume represent leading figures from the metaheuristic community and are responsible for pioneering contributions to the fields they write about. Their collective work has significantly enriched the field of optimization in general and combinatorial optimization in particular.Metaheuristics are solution methods that orchestrate an interaction between local improvement procedures and higher level strategies to create a process capable of escaping from local optima and performing a robust search of a solution space. In addition, many new and exciting developments and extensions have been observed in the last few years. Hybrids of metaheuristics with other optimization techniques, like branch-and-bound, mathematical programming or constraint programming are also increasingly popular. On the front of applications, metaheuristics are now used to find high-quality solutions to an ever-growing number of complex, ill-defined real-world problems, in particular combinatorial ones. This handbook should continue to be a great reference for researchers, graduate students, as well as practitioners interested in metaheuristics.
Resources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.
This is a central topic in any computer science curriculum. To distinguish this textbook from others, the author considers probabilistic methods as being fundamental for the construction of simple and efficient algorithms, and in each chapter at least one problem is solved using a randomized algorithm. Data structures are discussed to the extent needed for the implementation of the algorithms. The specific algorithms examined were chosen because of their wide field of application. This book originates from lectures for undergraduate and graduate students. The text assumes experience in programming algorithms, especially with elementary data structures such as chained lists, queues, and stacks. It also assumes familiarity with mathematical methods, although the author summarizes some basic notations and results from probability theory and related mathematical terminology in the appendices. He includes many examples to explain the individual steps of the algorithms, and he concludes each chapter with numerous exercises.
Recently, educators have begun to consider what is required in literacy curricula and best teaching practices given the demands placed on the educator sector and on literacy in general. ""Multiliteracies and Technology Enhanced Education: Social Practice and the Global Classroom"" features theoretical reflections and approaches on the use of multiliteracies and technologies in the improvement of education and social practices. Assisting educators at different teaching levels and fostering professional development and progress in this growing field, this innovative publication supports practitioners concerned with teaching at both a local and global level.
This book is about describing the meaning of programming languages. The author teaches the skill of writing semantic descriptions as an efficient way to understand the features of a language. While a compiler or an interpreter offers a form of formal description of a language, it is not something that can be used as a basis for reasoning about that language nor can it serve as a definition of a programming language itself since this must allow a range of implementations. By writing a formal semantics of a language a designer can yield a far shorter description and tease out, analyse and record design choices. Early in the book the author introduces a simple notation, a meta-language, used to record descriptions of the semantics of languages. In a practical approach, he considers dozens of issues that arise in current programming languages and the key techniques that must be mastered in order to write the required formal semantic descriptions. The book concludes with a discussion of the eight key challenges: delimiting a language (concrete representation), delimiting the abstract content of a language, recording semantics (deterministic languages), operational semantics (non-determinism), context dependency, modelling sharing, modelling concurrency, and modelling exits. The content is class-tested and suitable for final-year undergraduate and postgraduate courses. It is also suitable for any designer who wants to understand languages at a deep level. Most chapters offer projects, some of these quite advanced exercises that ask for complete descriptions of languages, and the book is supported throughout with pointers to further reading and resources. As a prerequisite the reader should know at least one imperative high-level language and have some knowledge of discrete mathematics notation for logic and set theory.
This book is a collection of conference proceedings mainly concerned with the problem class of nonlinear transport/diffusion/reaction systems, chief amongst these being the Navier-Stokes equations, porous-media flow problems and semiconductor-device equations. Of particular interest are unsolved problems which challenge open questions from applications and assess the various numerous methods used to treat them. A fundamental aim is to raise the overall awareness of a broad range of topical issues in scientific computing and numerical analysis, including multispecies/multiphysics problems, discretisation methods for nonlinear systems, mesh generation, adaptivity, linear algebraic solvers and preconditioners, and portable parallelisation.
This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Gamification for the economic and social development of countries while providing further research opportunities in this dynamic and growing field. Thus, the book aims to provide the opportunity for a reflection on this important issue, increasing the understanding of the importance of Gamification in the context of organizations' improvements, providing relevant academic work, empirical research findings and, an overview of this relevant field of study. This text will provide the resources necessary for policymakers, technology developers, and managers to adopt and implement solutions for a more digital era.
This book includes review articles in the field of elliptic integrals, elliptic functions and modular forms intending to foster the discussion between theoretical physicists working on higher loop calculations and mathematicians working in the field of modular forms and functions and analytic solutions of higher order differential and difference equations.
Significant research and development advancement has been achieved in enterprise computing, integration, and management. The results of this advancement stimulate the creation of a new class of mission-critical infrastructures, a new category of integration methods and software tools, and a new group of business platforms for cost-effectively exploiting, integrating, and managing business operations across enterprises. ""Enterprise Service Computing: From Concept To Deployment"" presents the emerging service computing, or service-enabled computing, technologies currently preferably used in integrating enterprise-wide and cross-enterprise applications. The topics covered range from concept development, system design, modeling, and development technologies, to the final deployment, providing both theoretical research results and practical applications.
This book provides practical applications of doubly classified models by using R syntax to generate the models. It also presents these models in symbolic tables so as to cater to those who are not mathematically inclined, while numerous examples throughout the book illustrate the concepts and their applications. For those who are not aware of this modeling approach, it serves as a good starting point to acquire a basic understanding of doubly classified models. It is also a valuable resource for academics, postgraduate students, undergraduates, data analysts and researchers who are interested in examining square contingency tables.
This book highlights practical solutions for flight safety improvement techniques, which are currently the focus of the International Civil Aviation Organization (ICAO). It has become clear that, in order to rapidly and significantly improve flight safety, the integrated use of new aeronautical technologies is called for. Considering the size of the aviation fleet, its constant growth and the long service lives of aircraft, new technologies should be adapted both to cutting-edge air navigation systems and to those that have been used for over a decade. Concretely, the book discusses methodological approaches to the construction of ground and on-board avionics that make it possible to achieve improved flight safety using innovative new methods. The proposed approaches are illustrated with real-world examples of e.g. satellite-based navigation systems and enhanced ground proximity warning systems. The book is written for professionals involved in the development of avionics systems, as well as students, researchers and experts in the field of radiolocation, radio navigation and air traffic control, the book will support the development and modeling of radio technical complexes, as well as the analysis of complex radio technical systems.
In this thesis, "Human behavior on the Internet," the human anxiety is conceptualized. The following questions have guided the writing of the thesis: How humans behave with the Internet technology? What goes in their mind? What kinds of behaviors are shown while using the Internet? What is the role of the content on the Internet and especially what are the types of anxiety behavior on the Internet? By conceptualization this thesis aims to provide a model for studying whether humans show signs of less or exacerbated anxiety while using the Internet.
This book offers a holistic framework to study behavior and evolutionary dynamics in large-scale, decentralized, and heterogeneous crowd networks. In the emerging crowd cyber-ecosystems, millions of deeply connected individuals, smart devices, government agencies, and enterprises actively interact with each other and influence each other's decisions. It is crucial to understand such intelligent entities' behaviors and to study their strategic interactions in order to provide important guidelines on the design of reliable networks capable of predicting and preventing detrimental events with negative impacts on our society and economy. This book reviews the fundamental methodologies to study user interactions and evolutionary dynamics in crowd networks and discusses recent advances in this emerging interdisciplinary research field. Using information diffusion over social networks as an example, it presents a thorough investigation of the impact of user behavior on the network evolution process and demonstrates how this can help improve network performance. Intended for graduate students and researchers from various disciplines, including but not limited to, data science, networking, signal processing, complex systems, and economics, the book encourages researchers in related research fields to explore the many untouched areas in this domain, and ultimately to design crowd networks with efficient, effective, and reliable services.
Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the 2022 CIPP exam! Information privacy has become a critical and central concern for small and large businesses across the United States. At the same time, the demand for talented professionals able to navigate the increasingly complex web of legislation and regulation regarding privacy continues to increase. Written from the ground up to prepare you for the United States version of the Certified Information Privacy Professional (CIPP) exam, Sybex's IAPP CIPP/US Certified Information Privacy Professional Study Guide also readies you for success in the rapidly growing privacy field. You'll efficiently and effectively prepare for the exam with online practice tests and flashcards as well as a digital glossary. The concise and easy-to-follow instruction contained in the IAPP/CIPP Study Guide covers every aspect of the CIPP/US exam, including the legal environment, regulatory enforcement, information management, private sector data collection, law enforcement and national security, workplace privacy and state privacy law, and international privacy regulation. Provides the information you need to gain a unique and sought-after certification that allows you to fully understand the privacy framework in the US Fully updated to prepare you to advise organizations on the current legal limits of public and private sector data collection and use Includes access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.
|
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
R966 Discovery Miles 9 660
|