Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
*Information Technology for Management by Turban, Volonino, and Wood engages students with up-to-date coverage of the most important IT trends today. * Over the years, this leading IT textbook had distinguished itself with an emphasis on illustrating the use of cutting edge business technologies for achieving managerial goals and objectives. * The 10th Edition continues this tradition with coverage of emerging trends in Mobile Computing and Commerce, IT virtualization, Social Media, Cloud Computing and the Management and Analysis of Big Data along with advances in more established areas of Information Technology.
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
A resource on quantitative methods and methodologies for researchers, practitioners, and doctoral students Demonstrates, in a step-by-step fashion, the development of the theoretically sound general framework allowing for instantiating a variety of research models. Illustrates a process of constructing of a variety of methodological modules- components comprised of complementary quantitative data analytic methods Explores the negative societal effects of implications of ICT and discusses future research directions to mitigate such effects
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.
How can we understand the complexity of genes, RNAs, and proteins and the associated regulatory networks? One approach is to look for recurring types of dynamical behavior. Mathematical models prove to be useful, especially models coming from theories of biochemical reactions such as ordinary differential equation models. Clever, careful experiments test these models and their basis in specific theories. This textbook aims to provide advanced students with the tools and insights needed to carry out studies of signal transduction drawing on modeling, theory, and experimentation. Early chapters summarize the basic building blocks of signaling systems: binding/dissociation, synthesis/destruction, and activation/inactivation. Subsequent chapters introduce various basic circuit devices: amplifiers, stabilizers, pulse generators, switches, stochastic spike generators, and oscillators. All chapters consistently use approaches and concepts from chemical kinetics and nonlinear dynamics, including rate-balance analysis, phase plane analysis, nullclines, linear stability analysis, stable nodes, saddles, unstable nodes, stable and unstable spirals, and bifurcations. This textbook seeks to provide quantitatively inclined biologists and biologically inclined physicists with the tools and insights needed to apply modeling and theory to interesting biological processes. Key Features: * Full-color illustration program with diagrams to help illuminate the concepts * Enables the reader to apply modeling and theory to the biological processes * Further Reading for each chapter * High-quality figures available for instructors to download
Offers parents, and training and practising professionals in psychology, psychotherapy, education and social work insight into what the evidence says about human behaviour online, what this means for how children develop and how we can best support children to be safe and healthy online now and in future. Accessibly presents the key research from psychology, sociology and biology to reveal how and why humans interact with platforms, apps and software. Covers essential topics including social media, gaming and harmful effects of technology and social media.
Resolves linear and non-linear data structures in C language using the algorithm, diagrammatically and its time and space complexity analysis. Covers interview questions and MCQs on all topics of campus readiness Identifies possible solutions to each problem. Includes real life and computational applications of linear and non-linear data structures
1) Make use of digital technology for social care services is the major responsibility of computing domain. Social care services require attention for health care, old age person and disables. Thus the book focuses on suggesting software solutions for supporting societal issues such as health care, support system for old age citizens, learning and monitoring mythology for disables and also technical solutions for better living. It is considered that technology is enabling people so that they could access to advances and so that there could be benefits in the health and technology 2) Interdisciplinary computing can be applicable to all the ranges. It would remove barriers to cooperation. This book would be helpful to undergraduate, post graduate and researchers. This course is offered in many universities in US, UK etc. Interdisciplinary studies are emerging as both necessary and expedient in the academy. Hence there would be a demand for such a book. This book would also help improve computational thinking to 'understand and change the world'. It will be a link between computing and variety of other fields. 3) There are several books available on computing which either focus on programming or basics of assistive technology, online social interactions, or general topics of information science in the market currently. However, none of the available books which covers the use of recent technologies to solve real life societal problems. This book not only focuses the computing technologies, basic theories, challenges, and implementation but also covers case studies. It focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications. The book also has the high potential to be used as recommended textbook for research scholars and post-graduate programs.
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
Includes specific pedagogy used in engineering teaching Offers case studies and classroom practices used by engineering institutions Discusses innovative strategies used in lockdown days during COVID-19 pandemic Presents guidelines and comparisons on various national and international accreditation bodies Explores cost effective technologies and open source tools specifically used for low income educational institutions
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.
Focuses on new machine learning developments that can lead to newly developed applications Uses a predictive and futuristic approach which makes Machine Learning a promising tool for business processes and sustainable solutions Promotes newer algorithms which are more efficient and reliable for a new dimension in discovering certain latent domains of applications Discusses the huge potential in making better use of machines in order to ensure optimal prediction, execution, and decision-making Offers many real-time case studies
With the advent of approximation algorithms for NP-hard combinatorial optimization problems, several techniques from exact optimization such as the primal-dual method have proven their staying power and versatility. This book describes a simple and powerful method that is iterative in essence, and similarly useful in a variety of settings for exact and approximate optimization. The authors highlight the commonality and uses of this method to prove a variety of classical polyhedral results on matchings, trees, matroids, and flows. The presentation style is elementary enough to be accessible to anyone with exposure to basic linear algebra and graph theory, making the book suitable for introductory courses in combinatorial optimization at the upper undergraduate and beginning graduate levels. Discussions of advanced applications illustrate their potential for future application in research in approximation algorithms.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform
Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.
1) Enables engineers to enhance system performance through interpreting algebraic inequalities. 2) Demonstrates how to optimise systems through mathematical modelling, aiding engineers in cost saving and weight reduction 3) Shows the clear link between mathematics and reality to aid engineers in practically applications of algebraic inequalities 4) Aids professional engineers in correctly mapping operating costs- correct application of the mathematics minimises the risk of underestimating costs and overestimating profits.
The advanced AI techniques are essential for resolving various problematic aspects emerging in the field of bioinformatics. This book covers the recent approaches in artificial intelligence and machine learning methods and their applications in Genome and Gene editing, cancer drug discovery classification, and the protein folding algorithms among others. Deep learning, which is widely used in image processing, is also applicable in bioinformatics as one of the most popular artificial intelligence approaches. The wide range of applications discussed in this book are an indispensable resource for computer scientists, engineers, biologists, mathematicians, physicians, and medical informaticists. Features: Focusses on the cross-disciplinary relation between computer science and biology and the role of machine learning methods in resolving complex problems in bioinformatics Provides a comprehensive and balanced blend of topics and applications using various advanced algorithms Presents cutting-edge research methodologies in the area of AI methods when applied to bioinformatics and innovative solutions Discusses the AI/ML techniques, their use, and their potential for use in common and future bioinformatics applications Includes recent achievements in AI and bioinformatics contributed by a global team of researchers
This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.
This book presents fundamental concepts of optimization problems and its real-world applications in various fields. The core concepts of optimization, formulations and solution procedures of various real-world problems are provided in an easy-to-read manner. The unique feature of this book is that it presents unified knowledge of the modelling of real-world decision-making problems and provides the solution procedure using the appropriate optimization techniques. The book will help students, researchers, and faculty members to understand the need for optimization techniques for obtaining optimal solution for the decision-making problems. It provides a sound knowledge of modelling of real-world problems using optimization techniques. It is a valuable compendium of several optimization techniques for solving real-world application problems using optimization software LINGO. The book is useful for academicians, practitioners, students and researchers in the field of OR. It is written in simple language with a detailed explanation of the core concepts of optimization techniques. Readers of this book will understand the formulation of real-world problems and their solution procedures obtained using the appropriate optimization techniques.
Provides an overview to futuristic research areas Explores various engineering optimization and multi-criteria decision making techniques Introduces a specific control framework for use in analyzing processes Covers problem-analyzing and solving skills Includes different types of composites materials, design considerations, and applications
Focuses on the latest research in the field of differential equations in engineering applications Discusses the most recent research findings that are occurring across different institutions Identifies the gaps in the knowledge of differential equations Presents the most fruitful areas for further research in advanced processes Offers the most forthcoming studies in modeling and simulation along with real-world case studies |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,056
Discovery Miles 10 560
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|