Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
Do you have creative ideas that you wish you could transform into code? Do you want to boost your problem solving and logic skills? Do you want to enhance your career by adopting an algorithmic mindset? In our increasingly digital world, coding is an essential skill. Communicating an algorithm to a machine to perform a set of tasks is vital. Beginner's Guide to Code Algorithms: Experiments to Enhance Productivity and Solve Problems written by Deepankar Maitra teaches you how to think like a programmer. The author unravels the secret behind writing code - building a good algorithm. Algorithmic thinking leads to asking the right question and enables a shift from issue resolution to value creation. Having this mindset will make you more marketable to employers. This book takes you on a problem-solving journey to expand your mind and increase your willingness to experiment with code. You will: Learn the art of building an algorithm through hands-on exercises Understand how to develop code for inspiring productivity concepts Build a mentality of developing algorithms to solve problems Develop, test, review, and improve code through guided experimentation This book is designed to develop a culture of logical thinking through intellectual stimulation. It will benefit students and teachers of programming, business professionals, as well as experienced users of Microsoft Excel who wish to become proficient with macros.
Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.
Many mathematical problems in science and engineering are defined by ordinary or partial differential equations with appropriate initial-boundary conditions. Among the various methods, boundary integral equation method (BIEM) is probably the most effective. It's main advantage is that it changes a problem from its formulation in terms of unbounded differential operator to one for an integral/integro-differential operator, which makes the problem tractable from the analytical or numerical point of view. Basically, the review/study of the problem is shifted to a boundary (a relatively smaller domain), where it gives rise to integral equations defined over a suitable function space. Integral equations with singular kernels areamong the most important classes in the fields of elasticity, fluid mechanics, electromagnetics and other domains in applied science and engineering. With the advancesin computer technology, numerical simulations have become important tools in science and engineering. Several methods have been developed in numerical analysis for equations in mathematical models of applied sciences. Widely used methods include: Finite Difference Method (FDM), Finite Element Method (FEM), Finite Volume Method (FVM) and Galerkin Method (GM). Unfortunately, none of these are versatile. Each has merits and limitations. For example, the widely used FDM and FEM suffers from difficulties in problem solving when rapid changes appear in singularities. Even with the modern computing machines, analysis of shock-wave or crack propagations in three dimensional solids by the existing classical numerical schemes is challenging (computational time/memory requirements). Therefore, with the availability of faster computing machines, research into the development of new efficient schemes for approximate solutions/numerical simulations is an ongoing parallel activity. Numerical methods based on wavelet basis (multiresolution analysis) may be regarded as a confluence of widely used numerical schemes based on Finite Difference Method, Finite Element Method, Galerkin Method, etc. The objective of this monograph is to deal with numerical techniques to obtain (multiscale) approximate solutions in wavelet basis of different types of integral equations with kernels involving varieties of singularities appearing in the field of elasticity, fluid mechanics, electromagnetics and many other domains in applied science and engineering.
The Foundations of Computational Mathematics meetings are a platform for cross-fertilisation between numerical analysis, mathematics and computer science. This volume is a collection of articles based on plenary presentations, given at the 2011 meeting, by some of the world's foremost authorities in computational mathematics. The topics covered reflect the breadth of research within the area as well as the richness of interactions between seemingly unrelated branches of pure and applied mathematics. As a result this volume will be of interest to researchers in the field of computational mathematics and also to non-experts who wish to gain some insight into the state of the art in this active and significant field.
An introduction to the Central Dogma of molecular biology and information flow in biological systems. A systematic overview of the methods for generating gene expression data. Background knowledge on statistical modeling and machine learning techniques. Detailed methodology of analyzing gene expression data with an example case study. Clustering methods for finding co-expression patterns from microarray, bulkRNA and scRNA data. A large number of practical tools, systems and repositories that are useful for computational biologists to create, analyze and validate biologically relevant gene expression patterns. Suitable for multi-disciplinary researchers and practitioners in computer science and biological sciences.
Discusses various aspects of digitization of healthcare systems Examines deployment of machine learning including IoT and medical analytics Provides studies on the design, implementation, development, and management of intelligent healthcare systems Includes sensor-based digitization of healthcare data Reviews real-time advancements and challenges of digital communication in the field of healthcare
Infinite Words is an important theory in both Mathematics and
Computer Sciences. Many new developments have been made in the
field, encouraged by its application to problems in computer
science. Infinite Words is the first manual devoted to this topic.
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
1) Make use of digital technology for social care services is the major responsibility of computing domain. Social care services require attention for health care, old age person and disables. Thus the book focuses on suggesting software solutions for supporting societal issues such as health care, support system for old age citizens, learning and monitoring mythology for disables and also technical solutions for better living. It is considered that technology is enabling people so that they could access to advances and so that there could be benefits in the health and technology 2) Interdisciplinary computing can be applicable to all the ranges. It would remove barriers to cooperation. This book would be helpful to undergraduate, post graduate and researchers. This course is offered in many universities in US, UK etc. Interdisciplinary studies are emerging as both necessary and expedient in the academy. Hence there would be a demand for such a book. This book would also help improve computational thinking to 'understand and change the world'. It will be a link between computing and variety of other fields. 3) There are several books available on computing which either focus on programming or basics of assistive technology, online social interactions, or general topics of information science in the market currently. However, none of the available books which covers the use of recent technologies to solve real life societal problems. This book not only focuses the computing technologies, basic theories, challenges, and implementation but also covers case studies. It focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications. The book also has the high potential to be used as recommended textbook for research scholars and post-graduate programs.
Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures
Explores the potential for disruptive technologies in different industries Addresses the challenges associated with the practical implementation or adoption of disruptive technologies Discusses topics related to IoT, Machine Learning, Sensors, Artificial Intelligence and Cloud Computing for Industry 4.0 and 5.0 Includes examples of the implementation of Industry 4.0 and 5.0 in various sectors, including engineering Contains many case studies for easy comprehension.
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.
Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.
The theory and applications of Iteration Methods is a very fast-developing field of numerical analysis and computer methods. The second edition is completely updated and continues to present the state-of-the-art contemporary theory of iteration methods with practical applications, exercises, case studies, and examples of where and how they can be used. The Theory and Applications of Iteration Methods, Second Edition includes newly developed iteration methods taking advantage of the most recent technology (computers, robots, machines). It extends the applicability of well-established methods by increasing the convergence domain and offers sharper error tolerance. New proofs and ideas for handling convergence are introduced along with a new variety of story problems picked from diverse disciplines. This new edition is for researchers, practitioners, and students in engineering, economics, and computational sciences.
'Work hard, have fun, make history' proclaims the slogan on the walls of Amazon's warehouses. This cheerful message hides a reality of digital surveillance, aggressive anti-union tactics and disciplinary layoffs. Reminiscent of the tumult of early industrial capitalism, the hundreds of thousands of workers who help Amazon fulfil consumers' desire are part of an experiment in changing the way we all work. In this book, Alessandro Delfanti takes readers inside Amazon's warehouses to show how technological advancements and managerial techniques subdue the workers rather than empower them, as seen in the sensors that track workers' every movement around the floor and algorithmic systems that re-route orders to circumvent worker sabotage. He looks at new technologies including robotic arms trained by humans and augmented reality goggles, showing that their aim is to standardise, measure and discipline human work rather than replace it. Despite its innovation, Amazon will always need living labour's flexibility and low cost. And as the warehouse is increasingly automated, worker discontent increases. Striking under the banner 'we are not robots', employees have shown that they are acutely aware of such contradictions. The only question remains: how long will it be until Amazon's empire collapses?
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.
This book proposes a new critical relationship between computation and architecture, developing a history and theory of representation in architecture to understand and unleash potential means to open up creativity in the field. Historically, architecture has led spatial representation. Today, computation has established new representational paradigms that can be compared to spatial representations, such as the revolution of perspective in the Renaissance. Architects now use software, robotics, and fabrication tools with very little understanding and participation in how these tools influence, revolutionize, and determine both architecture and its construction today. Why does the discipline of architecture not have a higher degree of authorship in the conception and development of computational technologies that define spatial representation? This book critically explores the relationship between history, theory and cultural criticism. Lorenzo-Eiroa positions new understandings through parallel historical sections and theories of many revolutionary representational architecture canons displaced by conventional spatial projection. He identifies the architects, artists, mathematicians, and philosophers that were able to revolutionise their disciplines through the development of new technologies, new systems of representation, and new lenses to understand reality. This book frames the discussion by addressing new means to understand and expand architecture authorship in relation to survey, information, representation, higher dimensional space, Big Data, and Artificial Intelligence - in the pursuit of activating an architecture of information. This will be important reading for upper-level students and researchers of architecture and architectural theory, especially those with a keen interest in computational design and robotic fabrication.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Focuses on new machine learning developments that can lead to newly developed applications Uses a predictive and futuristic approach which makes Machine Learning a promising tool for business processes and sustainable solutions Promotes newer algorithms which are more efficient and reliable for a new dimension in discovering certain latent domains of applications Discusses the huge potential in making better use of machines in order to ensure optimal prediction, execution, and decision-making Offers many real-time case studies
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
Includes specific pedagogy used in engineering teaching Offers case studies and classroom practices used by engineering institutions Discusses innovative strategies used in lockdown days during COVID-19 pandemic Presents guidelines and comparisons on various national and international accreditation bodies Explores cost effective technologies and open source tools specifically used for low income educational institutions
Systems-Level Modelling of Microbial Communities: Theory and Practice introduces various aspects of modelling microbial communities and presents a detailed overview of the computational methods which have been developed in this area. This book is aimed at researchers in the field of computational/systems biology as well as biologists/experimentalists studying microbial communities, who are keen on embracing the concepts of computational modelling. The primary focus of this book is on methods for modelling interactions between micro-organisms in a community, with special emphasis on constraint-based and network-based modelling techniques. A brief overview of population- and agent-based modelling is also presented. Lastly, it covers the experimental methods to understand microbial communities, and provides an outlook on how the field may evolve in the coming years.
Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.
Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|