![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
The study of network theory is a highly interdisciplinary field, which has emerged as a major topic of interest in various disciplines ranging from physics and mathematics, to biology and sociology. This book promotes the diverse nature of the study of complex networks by balancing the needs of students from very different backgrounds. It references the most commonly used concepts in network theory, provides examples of their applications in solving practical problems, and clear indications on how to analyse their results. In the first part of the book, students and researchers will discover the quantitative and analytical tools necessary to work with complex networks, including the most basic concepts in network and graph theory, linear and matrix algebra, as well as the physical concepts most frequently used for studying networks. They will also find instruction on some key skills such as how to proof analytic results and how to manipulate empirical network data. The bulk of the text is focused on instructing readers on the most useful tools for modern practitioners of network theory. These include degree distributions, random networks, network fragments, centrality measures, clusters and communities, communicability, and local and global properties of networks. The combination of theory, example and method that are presented in this text, should ready the student to conduct their own analysis of networks with confidence and allow teachers to select appropriate examples and problems to teach this subject in the classroom.
The world-class National Palace Museum (NPM) in Taiwan possesses a repository of the largest collection of Chinese cultural treasures of outstanding quality. Through implementing a two-organizational restructuring, and shifting its operational focus from being object-oriented to public-centered, it aims to capture the attention of people and promote awareness of the culture and traditions of China. In this vein, the NPM combines its expertise in museum service with the possibilities afforded by Information Technology (IT). This book analyses the research results of a team sponsored by the National Science Council in Taiwan to observe the development processes and accomplishments, and to conduct scientific researches covering not only the technology and management disciplines, but also the humanities and social science disciplines. The development process of new digital content and IT-enabled services of NPM would be a useful benchmark for museums, cultural and creative organizations and traditional organizations in Taiwan and around the world.
This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.
The creation of a new public realm through the use of the Internet and ICT may positively promote political liberties and freedom of speech, but could also threaten the political and public autonomy of the individual. Human Rights and the Impact of ICT in the Public Sphere: Participation, Democracy, and Political Autonomy focuses on the new technological era as an innovative way to initiate democratic dialogue, but one that can also endanger individual rights to freedom, privacy, and autonomy. This reference book focuses on the new opportunities technology offers for political expression and will be of use to both academic and legal audiences, including academics, students, independent authorities, legislative bodies, and lawyers.
Python Programming In A Day 2nd Edition: Beginners Power Guide To Learning Python Programming From Scratch What exactly is python programming and is it really that complex? How is Python made so easy so the jargon is gone and you can have success programming within a day? Want to know all about interactive mode with mathematical operations? Variables? Strings? Mr. Key is going above and beyond with data types, programming modes and conditional statements Always wanted a step by step guide to begin a program building from start to finish? Look no further! Its time for you to take advantage of this easy programming guide so you can have immediate success in Python Programming! But Now!
The advancement of computing and communication technologies have profoundly accelerated the development and deployment of complex enterprise systems, creating an importance in its implementation across corporate and industrial organizations worldwide.""The Handbook of Research on Enterprise Systems"" addresses the field of enterprise systems with more breadth and depth than any other resource, covering progressive technologies, leading theories, and advanced applications. Comprising over 25 articles from 47 expert authors from around the globe, this exhaustive collection of highly developed research extends the field of enterprise systems to offer libraries an unrivaled reference.This title features: 27 authoritative contributions by over 45 of the world's leading experts on enterprise systems from 16 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 800 references to existing literature and research on enterprise systems; and, a compendium of over 200 key terms with detailed definitions. It is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It also features cross-referencing of key terms, figures, and information pertinent to enterprise systems.
Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions presents a collection of the most recent contributions in the areas of organization, knowledge, and technology management in the context of virtual enterprises. This book contains important and in-depth information on four dimensions: semantic, managerial, technological, and social. The semantic dimensions covered in this book are ontological and organizational approaches, concepts, organizational models, and knowledge management models. In respect to managerial dimensions, this book covers process management, integration management, relationship management, process integration, knowledge management, technology integration management, and information integration. ""Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions"" presents the technological dimension by explaining the infrastructures and technologies to support technology and information integration standards and protocols. Lastly, this title highlights the social dimension, including human resources management, human resources integration, social issues, social impact, social requirements, and communities of knowledge.
This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain. It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources. The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services. Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data.
Ecological Assessment of Polymers Strategies for Product Stewardship and Regulatory Programs John D. Hamilton and Roger Sutcliffe The expense of providing ecological assessments of new commercial products is formidable. The cost of the failure to comply with the current regulations--measured in fines, liability damages, and loss of public trust--is potentially much, much higher. Establishing effective environmental product stewardship strategies for assessment upfront not only promotes initial and continued compliance, it can reduce costs via the more efficient development of new products. Based on the collaboration of the Rohm and Haas Company and S.C. Johnson Wax with other manufacturers, contract laboratories, universities, and government agencies, Ecological Assessment of Polymers is the first complete reference to provide environment-oriented information about polymers from a product development and regulatory compliance perspective. A number of books deal with the potential hazards of pesticides and solvents. This is the first to focus on the commercial synthetic polymers that exist in laundry detergents, paints, super-absorbent diapers, packaging materials, and many other consumer and industrial products. Using the principles of environmental toxicology and chemistry, Ecological Assessment of Polymers approaches environmental evaluation as a decision-making process. The book demonstrates how assessment can be used as a planning tool for developing products, reducing potential liability, and creating new products, processes, and disposal systems. Featured discussions:
This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant.
In this work we plan to revise the main techniques for enumeration algorithms and to show four examples of enumeration algorithms that can be applied to efficiently deal with some biological problems modelled by using biological networks: enumerating central and peripheral nodes of a network, enumerating stories, enumerating paths or cycles, and enumerating bubbles. Notice that the corresponding computational problems we define are of more general interest and our results hold in the case of arbitrary graphs. Enumerating all the most and less central vertices in a network according to their eccentricity is an example of an enumeration problem whose solutions are polynomial and can be listed in polynomial time, very often in linear or almost linear time in practice. Enumerating stories, i.e. all maximal directed acyclic subgraphs of a graph G whose sources and targets belong to a predefined subset of the vertices, is on the other hand an example of an enumeration problem with an exponential number of solutions, that can be solved by using a non trivial brute-force approach. Given a metabolic network, each individual story should explain how some interesting metabolites are derived from some others through a chain of reactions, by keeping all alternative pathways between sources and targets. Enumerating cycles or paths in an undirected graph, such as a protein-protein interaction undirected network, is an example of an enumeration problem in which all the solutions can be listed through an optimal algorithm, i.e. the time required to list all the solutions is dominated by the time to read the graph plus the time required to print all of them. By extending this result to directed graphs, it would be possible to deal more efficiently with feedback loops and signed paths analysis in signed or interaction directed graphs, such as gene regulatory networks. Finally, enumerating mouths or bubbles with a source s in a directed graph, that is enumerating all the two vertex-disjoint directed paths between the source s and all the possible targets, is an example of an enumeration problem in which all the solutions can be listed through a linear delay algorithm, meaning that the delay between any two consecutive solutions is linear, by turning the problem into a constrained cycle enumeration problem. Such patterns, in a de Bruijn graph representation of the reads obtained by sequencing, are related to polymorphisms in DNA- or RNA-seq data.
Everything you know about the future is wrong. Presumptive Design: Design Provocations for Innovation is for people "inventing" the future: future products, services, companies, strategies and policies. It introduces a design-research method that shortens time to insights from months to days. Presumptive Design is a fundamentally agile approach to identifying your audiences' key needs. Offering rapidly crafted artifacts, your teams collaborate with your customers to identify preferred and profitable elements of your desired outcome. Presumptive Design focuses on your users' problem space, informing your business strategy, your project's early stage definition, and your innovation pipeline. Comprising discussions of design theory with case studies and how-to's, the book offers business leadership, management and innovators the benefits of design thinking and user experience in the context of early stage problem definition. Presumptive Design is an advanced technique and quick to use: within days of reading this book, your research and design teams can apply the approach to capture a risk-reduced view of your future.
This unique text/reference provides an overview of crossbar-based interconnection networks, offering novel perspectives on these important components of high-performance, parallel-processor systems. A particular focus is placed on solutions to the blocking and scalability problems. Topics and features: introduces the fundamental concepts in interconnection networks in multi-processor systems, including issues of blocking, scalability, and crossbar networks; presents a classification of interconnection networks, and provides information on recognizing each of the networks; examines the challenges of blocking and scalability, and analyzes the different solutions that have been proposed; reviews a variety of different approaches to improve fault tolerance in multistage interconnection networks; discusses the scalable crossbar network, which is a non-blocking interconnection network that uses small-sized crossbar switches as switching elements. This invaluable work will be of great benefit to students, researchers and practitioners interested in computer networks, parallel processing and reliability engineering. The text is also essential reading for course modules on interconnection network design and reliability.
The CMOS Cookbook contains all you need to know to understand and
successfully use CMOS (Complementary Metal-Oxide Semiconductor)
integrated circuits. Written in a "cookbook" format that requires
little math, this practical, user-oriented book covers all the
basics for working with digital logic and many of its end
appilations.
The evolution of soft computing applications has offered a multitude of methodologies and techniques that are useful in facilitating new ways to address practical and real scenarios in a variety of fields. In particular, these concepts have created significant developments in the engineering field. Soft Computing Techniques and Applications in Mechanical Engineering is a pivotal reference source for the latest research findings on a comprehensive range of soft computing techniques applied in various fields of mechanical engineering. Featuring extensive coverage on relevant areas such as thermodynamics, fuzzy computing, and computational intelligence, this publication is an ideal resource for students, engineers, research scientists, and academicians involved in soft computing techniques and applications in mechanical engineering areas.
In this book the authors present an alternative set theory dealing with a more relaxed notion of infiniteness, called finitely supported mathematics (FSM). It has strong connections to the Fraenkel-Mostowski (FM) permutative model of Zermelo-Fraenkel (ZF) set theory with atoms and to the theory of (generalized) nominal sets. More exactly, FSM is ZF mathematics rephrased in terms of finitely supported structures, where the set of atoms is infinite (not necessarily countable as for nominal sets). In FSM, 'sets' are replaced either by `invariant sets' (sets endowed with some group actions satisfying a finite support requirement) or by `finitely supported sets' (finitely supported elements in the powerset of an invariant set). It is a theory of `invariant algebraic structures' in which infinite algebraic structures are characterized by using their finite supports. After explaining the motivation for using invariant sets in the experimental sciences as well as the connections with the nominal approach, admissible sets and Gandy machines (Chapter 1), the authors present in Chapter 2 the basics of invariant sets and show that the principles of constructing FSM have historical roots both in the definition of Tarski `logical notions' and in the Erlangen Program of Klein for the classification of various geometries according to invariants under suitable groups of transformations. Furthermore, the consistency of various choice principles is analyzed in FSM. Chapter 3 examines whether it is possible to obtain valid results by replacing the notion of infinite sets with the notion of invariant sets in the classical ZF results. The authors present techniques for reformulating ZF properties of algebraic structures in FSM. In Chapter 4 they generalize FM set theory by providing a new set of axioms inspired by the theory of amorphous sets, and so defining the extended Fraenkel-Mostowski (EFM) set theory. In Chapter 5 they define FSM semantics for certain process calculi (e.g., fusion calculus), and emphasize the links to the nominal techniques used in computer science. They demonstrate a complete equivalence between the new FSM semantics (defined by using binding operators instead of side conditions for presenting the transition rules) and the known semantics of these process calculi. The book is useful for researchers and graduate students in computer science and mathematics, particularly those engaged with logic and set theory.
The Internet generation of interculturally minded, socially networked leaders is redefining the workplace. Management is slow to respond. Asian philosophy - with concepts like ba, Zen, feng shui, and ki - is becoming increasingly important for tomorrow's leader. Blend that with the Scandinavian mindset of egalitarianism, openness, and gender equity, add sophisticated use of network effects and you begin to understand the true logic of Internet in the workplace. Cultural diversity and technological dependence are global trends that demand constant attention. Know: - How to lead without being the leader - How to adapt quickly to change - How to thrive on diversity - How to be a trendsetter in technology - How to be on top but still have a life.
This book examines a writing activity that has recently fallen into disrepute. Outlining has a bad reputation among students, even though many teachers and textbooks still recommend the process. In part, the author argues, the medium is to blame. Paper and ink make the revision difficult. But if one uses an electronic outliner, the activity can be very helpful in developing a thoughtful and effective document, particularly one that spans many pages and deals with a complicated subject. Outlining Goes Electronic takes an historical approach, examining the way people developed the idea of outlining, from the classical period to the present. We see that the medium in which people worked strongly shaped their assumptions, ideas, and use of outlines. In developing a theoretical model of outlining as an activity, the author argues that a relatively new electronic tool-software that accelerates and performs the process of outlining-can give us a new perspective from which to engage previous classroom models of writing, recent writing theory, and current practice in the technical writing field.
This book serves not only as an introduction, but also as an
advanced text and reference source in the field of deterministic
optimal control systems governed by ordinary differential
equations. It also includes an introduction to the classical
calculus of variations.
Highlights key research currently being undertaken within the field of telepresence, providing the most detailed account of the field to date, advancing our understanding of a fundamental property of all media - the illusion of presence; the sense of "being there" inside a virtual environment, with actual or virtual others. This collection has been put together by leading international scholars from America, Europe, and Asia. Together, they describe the state-of-the-art in presence theory, research and technology design for an advanced academic audience. Immersed in Media provides research that can help designers optimize presence for users of advanced media technologies such as virtual and augmented reality, collaborative social media, robotics, and artificial intelligence and lead us to better understand human cognition, emotion and behaviour.
This is a volume of chapters on the historical study of information, computing, and society written by seven of the most senior, distinguished members of the History of Computing field. These are edited, expanded versions of papers presented in a distinguished lecture series in 2018 at the University of Colorado Boulder - in the shadow of the Flatirons, the front range of the Rocky Mountains. Topics range widely across the history of computing. They include the digitalization of computer and communication technologies, gender history of computing, the history of data science, incentives for innovation in the computing field, labor history of computing, and the process of standardization. Authors were given wide latitude to write on a topic of their own choice, so long as the result is an exemplary article that represents the highest level of scholarship in the field, producing articles that scholars in the field will still look to read twenty years from now. The intention is to publish articles of general interest, well situated in the research literature, well grounded in source material, and well-polished pieces of writing. The volume is primarily of interest to historians of computing, but individual articles will be of interest to scholars in media studies, communication, computer science, cognitive science, general and technology history, and business.
The main aim of this book is to discuss model order reduction (MOR) methods for differential-algebraic equations (DAEs) with linear coefficients that make use of splitting techniques before applying model order reduction. The splitting produces a system of ordinary differential equations (ODE) and a system of algebraic equations, which are then reduced separately. For the reduction of the ODE system, conventional MOR methods can be used, whereas for the reduction of the algebraic systems new methods are discussed. The discussion focuses on the index-aware model order reduction method (IMOR) and its variations, methods for which the so-called index of the original model is automatically preserved after reduction. |
You may like...
Sustainability in Engineering Design
Anthony Johnson, Andy Gibson
Paperback
R1,290
Discovery Miles 12 900
Genius and Spirit of the Hebrew Bible…
Constantine Samuel Rafinesque
Paperback
R500
Discovery Miles 5 000
|