Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing > General
Showcasing the most influential developments, experiments, and architectures impacting the digital, surveillance, automotive, industrial, and medical sciences, Image Processing Technologies tracks the evolution and advancement of computer vision and image processing (CVIP) technologies, examining methods and algorithms for image analysis, optimization, segmentation, and restoration. It focuses on recent approaches and techniques in CVIP applications development and explores various coding methods for individual types of 3-D images. This text/reference brings researchers and specialists up-to-date on the latest innovations affecting multiple image processing environments.
This volume: * Uses the Coronavirus pandemic to explore the link between news sentiment and global financial markets * Shows how the COVID-19 crisis differs from the Global Financial Crisis of 2008 * Focuses on the Noise vs Signal in news sentiment * will be invaluable for business professionals, bankers, media professionals, and investment consultants.
Formal methods is a field of computer science that emphasizes the use of rigorous mathematical techniques for verification and design of hardware and software systems. Analysis and design of nonlinear control design plays an important role across many disciplines of engineering and applied sciences, ranging from the control of an aircraft engine to the design of genetic circuits in synthetic biology. While linear control is a well-established subject, analysis and design of nonlinear control systems remains a challenging topic due to some of the fundamental difficulties caused by nonlinearity. Formal Methods for Control of Nonlinear Systems provides a unified computational approach to analysis and design of nonlinear systems. Features Constructive approach to nonlinear control. Rigorous specifications and validated computation. Suitable for graduate students and researchers who are interested in learning how formal methods and validated computation can be combined together to tackle nonlinear control problems with complex specifications from an algorithmic perspective. Combines mathematical rigor with practical applications.
When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.
Using the implementation of a deep learning framework as an example, C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters, the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book's chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems, expression templates, and writing complex meta-functions, as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming, the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional, which means that the intermediate results of the construction cannot be changed, and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs.
Although many books have been written about Mathematica, very few of them cover the new functionality added to the most recent versions of the program. This thoroughly revised second edition of Mathematica Beyond Mathematics: The Wolfram Language in the Real World introduces the new features using real-world examples based on the experience of the author as a consultant and Wolfram certified instructor. The examples strike a balance between relevance and difficulty in terms of Mathematica syntax, allowing readers to incrementally build up their Mathematica skills as they go through the chapters While reading this book, you will also learn more about the Wolfram Language and how to use it to solve a wide variety of problems. The author raises questions from a wide range of topics and answers them by taking full advantage of Mathematica's latest features. For example: What sources of energy does the world really use? Are our cities getting warmer? Is the novel El Quixote written in Pi? Is it possible to reliably date the Earth using radioactive isotopes? How can we find planets outside our solar system? How can we model epidemics, earthquakes and other natural phenomena? What is the best way to compare organisms genetically? This new edition introduces the new capabilities added to the latest version of Mathematica (version 13), and discusses new topics related to machine learning, big data, finance economics, and physics. New to the Second Edition Separate sections containing carefully selected additional resources that can be accessed from either Mathematica or online Online Supplementary materials including code snippets used in the book and additional examples. Updated commands to take full advantage of Mathematica 13.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
Pulling aside the curtain of 'Big Data' buzz, this book introduces C-suite and other non-technical senior leaders to the essentials of obtaining and maintaining accurate, reliable data, especially for decision-making purposes. Bad data begets bad decisions, and an understanding of data fundamentals - how data is generated, organized, stored, evaluated, and maintained - has never been more important when solving problems such as the pandemic-related supply chain crisis. This book addresses the data-related challenges that businesses face, answering questions such as: What are the characteristics of high-quality data? How do you get from bad data to good data? What procedures and practices ensure high-quality data? How do you know whether your data supports the decisions you need to make? This clear and valuable resource will appeal to C-suite executives and top-line managers across industries, as well as business analysts at all career stages and data analytics students.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.
The material requires no previous exposure to an introductory computational science class (i.e. knowledge of a programming language). All mathematical knowledge needed beyond Calculus (and the more useful Calculus notation and concepts) is introduced in the text to make it self-contained. The book will discuss operation counts, emphasize the importance of computational efficiency and highlight the basic methods used to achieve it. To this end, efficiency inserts will be used throughout the text as they become relevant.
Image Acquisition and Processing With LabVIEWä combines the general theory of image acquisition and processing, the underpinnings of LabVIEW and the NI Vision toolkit, examples of their applications, and real-world case studies in a clear, systematic, and richly illustrated presentation. Designed for LabVIEW programmers, it fills a significant gap in the technical literature by providing a general training manual for those new to National Instruments (NI) Vision application development and a reference for more experienced vision programmers.
Computational hydraulics and hydrologic modeling are rapidly developing fields with a wide range of applications in areas ranging from wastewater disposal and stormwater management to civil and environmental engineering. The fields are full of promise, but while an abundance of literature now exists, it contains a plethora of new terms that are not always defined.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
Choose the right hardware and software for your school!This unique book is the first systematic work on evaluating and assessing educational information technology. Here you?ll find specific strategies, best practices, and techniques to help you choose the educational technology that is most appropriate for your institution. Evaluation and Assessment in Educational Information Technology will show you how to measure the effects of information technology on teaching and learning, help you determine the extent of technological integration into the curriculum that is best for your school, and point you toward the most effective ways to teach students and faculty to use new technology.Evaluation and Assessment in Educational Information Technology presents: a summary of the last ten years of assessment instrument development seven well-validated instruments that gauge attitudes, beliefs, skills, competencies, and technology integration proficiencies two content analysis instruments for analyzing teacher-student interaction patterns in a distance learning setting an examination of the best uses of computerized testing--as opposed to conventional tests, as used in local settings, to meet daily instructional needs, in online delivery programs, in public domain software, and available commercial and shareware options successful pedagogical and assessment strategies for use in online settings a four-dimensional model to assess student learning in instructional technology courses three models for assessing the significance of information technology in education from a teacher's perspective an incisive look at Michigan's newly formed Consortium of Outstanding Achievement in Teaching withTechnology (COATT) ways to use electronic portfolios for teaching/learning performance assessment and much more!
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.
For almost four decades, Software Engineering: A Practitioner's Approach (SEPA) has been the world's leading textbook in software engineering. The ninth edition represents a major restructuring and update of previous editions, solidifying the book's position as the most comprehensive guide to this important subject.
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate. These technologies have the potential to reshape the justice system, improve access to justice, and demystify legal institutions. Using artificial intelligence techniques, apps can even facilitate the resolution of common legal disputes. However, these opportunities must be assessed in light of the many challenges associated with app use in the justice sector. These include the digital divide and other accessibility issues; the ethical challenges raised by the dehumanisation of legal processes; and various privacy, security, and confidentiality risks. Surveying the landscape of this emergent industry, this book explores the objectives, opportunities, and challenges presented by apps across all areas of the justice sector. Detailed consideration is also given to the use of justice apps in specific legal contexts, including the family law and criminal law sectors. The first book to engage with justice apps, this book will appeal to a wide range of legal scholars, students, practitioners, and policy-makers.
Value-Driven IT Management explains how huge sums are wasted by
companies (and governments) on poorly aligned, poorly justified and
poorly managed IT projects based on 'wishful thinking' cost and
benefit assumptions and that even 'successful' projects rarely seem
to realise the benefits promised.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
A First Course in Aerial Robots and Drones provides an accessible and student friendly introduction to aerial robots and drones. Drones figure prominently as opportunities for students to learn various aspects of aerospace engineering and design. Drones offer an enticing entry point for STEM studies. As the use of drones in STEM studies grows, there is an emerging generation of drone pilots who are not just good at flying, but experts in specific niches, such as mapping or thermography. Key Features: Focuses on algorithms that are currently used to solve diverse problems. Enables students to solve problems and improve their science skills. Introduces difficult concepts with simple, accessible examples. Suitable for undergraduate students, this textbook provides students and other readers with methods for solving problems and improving their science skills. |
You may like...
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
|