Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing > General
This work describes the methods of dynamic system simulation from the ground up. It presents important techniques, the fundamentals of mathematical models, how to produce useful results, how to analyze and visualize data, and how to verify and validate models. There are step-by-step instructions for developing working simulations, and the author discuss determining when simulation is appropriate, managing the cost of simulation and communicating results.
Computer Concepts: Illustrated Introductory, 9/e, International Edition is designed to help students learn and retain the most relevant and essential information about computers and technology in today's digital world This edition has been revised to cover the latest important computing trends and skills, but maintains the pedagogical and streamlined design elements that instructors and students know and love about the Illustrated Series. New for this edition, make the most of Computer Concepts: Illustrated Introductory, 9/e, International Edition with the all-in-one CourseMate digital solution complete with a media-rich ebook, interactive quizzes and activities, and the Engagement Tracker for hassle-free, automatic grading.
Gives broad perspective on 5G communications with a focus on smart cities Discusses artificial intelligence in future wireless communication and its applications Provides a systemic and comprehensive coverage of 6G technologies, challenges and use cases Explores role of future wireless in safety, health, and transport in smart cities Includes case studies of future wireless communications
The availability of packaged clustering programs means that anyone with data can easily do cluster analysis on it. But many users of this technology don't fully appreciate its many hidden dangers. In today's world of "grab and go algorithms," part of my motivation for writing this book is to provide users with a set of cautionary tales about cluster analysis, for it is very much an art as well as a science, and it is easy to stumble if you don't understand its pitfalls. Indeed, it is easy to trip over them even if you do! The parenthetical word usually in the title is very important, because all clustering algorithms can and do fail from time to time. Modern cluster analysis has become so technically intricate that it is often hard for the beginner or the non-specialist to appreciate and understand its many hidden dangers. Here's how Yogi Berra put it, and he was right: In theory there's no difference between theory and practice. In practice, there is ~Yogi Berra This book is a step backwards, to four classical methods for clustering in small, static data sets that have all withstood the tests of time. The youngest of the four methods is now almost 50 years old: Gaussian Mixture Decomposition (GMD, 1898) SAHN Clustering (principally single linkage (SL, 1909)) Hard c-means (HCM, 1956, also widely known as (aka) "k-means") Fuzzy c-means (FCM, 1973, reduces to HCM in a certain limit) The dates are the first known writing (to me, anyway) about these four models. I am (with apologies to Marvel Comics) very comfortable in calling HCM, FCM, GMD and SL the Fantastic Four. Cluster analysis is a vast topic. The overall picture in clustering is quite overwhelming, so any attempt to swim at the deep end of the pool in even a very specialized subfield requires a lot of training. But we all start out at the shallow end (or at least that's where we should start!), and this book is aimed squarely at teaching toddlers not to be afraid of the water. There is no section of this book that, if explored in real depth, cannot be expanded into its own volume. So, if your needs are for an in-depth treatment of all the latest developments in any topic in this volume, the best I can do - what I will try to do anyway - is lead you to the pool, and show you where to jump in.
Within the last three decades, interest in the psychological
experience of human faces has drawn together cognitive science
researchers from diverse backgrounds. Computer scientists talk to
neural scientists who draw on the work of mathematicians who
explicitly influence those conducting behavioral experiments.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.
This text covers the use of computer applications in the mineral industries, encompassing topics such as the use of computer visualization in mining systems and aspects such as ventilation and safety.
Because of developments in powerful computer technology, computational techniques, advances in a wide spectrum of diverse technologies, and other advances coupled with cross disciplinary pursuits between technology and its greatly significant applied implications in human body processes, the field of biomechanics is evolving as a broadly significant area. The four volumes of Biomechanical Systems: Techniques and Applications presents the advances in widely diverse areas with significant implications for human betterment that occur continuously at a high rate. These include dynamics of musculo-skeletal systems; mechanics of hard and soft tissues; mechanics of muscle; mechanics of bone remodeling; mechanics of implant-tissue interfaces; cardiovascular and respiratory biomechanics; mechanics of blood flow, air flow, flow-prosthesis interfaces; mechanics of impact; dynamics of man machine interaction; and numerous other areas. The great breadth and depth of the field of biomechanics on the international scene requires at least four volumes for adequate treatment. These four volumes constitute a well integrated set that can be utilized as individual volumes. They provide a substantively significant and rather comprehensive, in-depth treatment of biomechanic systems and techniques that is most surely unique on the international scene.
Prepare for the coming convergence of AI and quantum computing A collection of essays from 20 renowned, international authors working in industry, academia, and government, Convergence: Artificial Intelligence and Quantum Computing explains the impending convergence of artificial intelligence and quantum computing. A diversity of viewpoints is presented, each offering their view of this coming watershed event. In the book, you'll discover that we're on the cusp of seeing the stuff of science fiction become reality, with huge implications for ripping up the existing social fabric, global economy, and current geopolitical order. Along with an incisive foreword by Hugo- and Nebula-award winning author David Brin, you'll also find: Explorations of the increasing pace of technological development Explanations of why seemingly unusual and surprising breakthroughs might be just around the corner Maps to navigate the potential minefields that await us as AI and quantum computing come together A fascinating and thought-provoking compilation of insights from some of the leading technological voices in the world, Convergence convincingly argues that we should prepare for a world in which very little will remain the same and shows us how to get ready.
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
The text focuses on mathematical modeling and applications of advanced techniques of machine learning, and artificial intelligence, including artificial neural networks, evolutionary computing, data mining, and fuzzy systems to solve performance and design issues more precisely. Intelligent computing encompasses technologies, algorithms, and models in providing effective and efficient solutions to a wide range of problems including the airport's intelligent safety system. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in fields including industrial engineering, manufacturing engineering, computer engineering, and mathematics. The book- Discusses mathematical modeling for traffic, sustainable supply chain, vehicular Ad-Hoc networks, internet of things networks with intelligent gateways. Covers advanced machine learning, artificial intelligence, fuzzy systems, evolutionary computing, data mining techniques for real-world problems. Presents applications of mathematical models in chronic diseases such as kidney and coronary artery diseases. Highlights advances in mathematical modeling, strength, and benefits of machine learning and artificial intelligence, including driving goals, applicability, algorithms, and processes involved. Showcases emerging real-life topics on mathematical models, machine learning, and intelligent computing using an interdisciplinary approach. The text presents emerging real-life topics on mathematical models, machine learning, and intelligent computing in a single volume. It will serve as an ideal text for senior undergraduate, graduate students, and researchers in diverse fields domains including industrial and manufacturing engineering, computer engineering, and mathematics.
This CCIS volume constitutes the proceedings of the First International Conference on Computational Systems Biology and Bioinformatics (CSBio 2010), held in Bangkok, Thailand, November 3-5, 2010. CSBio 2010 was a follow up to the successful Special th Session on Computational Advances in Bioinformatics (CAB 2009) in the 16 International Conference on Neural Information Processing (ICONIP 2009). CSBio will provide an annual forum for international researchers to exchange the latest ideas on advances in the interdisciplinary fields of computational systems biology and bioinformatics. CSBio is proposed to be hosted alternately by King Mongkut's University of Technology Thonburi (KMUTT), Thailand, and Nanyang Technological University (NTU), Singapore. The School of Information Technology (SIT) at KMUTT was the proud host of CSBio 2010. This inaugural conference was launched th th to coincide with the 15 anniversary of SIT and the 50 anniversary of KMUTT. CSBio 2010 accepted 19 regular session papers from a total of 48 submissions received on the EasyChair conference system. The authors of the submitted papers covered 16 countries worldwide and there were over 60 authors in the conference proceedings. The technical sessions were divided into five topical categories. Technical highlights included a keynote speech by Michael Brudno (Canada Research Chair in Computational Biology) and plenary talks by Nikhil R. Pal, Sung-Bae Cho, Yaochu Jin, and David W. Ussery. In addition, three tutorials by Kwoh Chee Keong, Stijn Meganck and Philip Shaw were included with CSBio 2010 registration.
Social Media Analytics and Practical Applications: The Change to the Competition Landscape provides a framework that allows you to understand and analyze the impact of social media in various industries. It illustrates how social media analytics can help firms build transformational strategies and cope with the challenges of social media technology. By focusing on the relationship between social media and other technology models, such as wisdom of crowds, healthcare, fintech and blockchain, machine learning methods, and 5G, this book is able to provide applications used to understand and analyze the impact of social media. Various industries are called out and illustrate how social media analytics can help firms build transformational strategies and at the same time cope with the challenges that are part of the landscape. The book discusses how social media is a driving force in shaping consumer behavior and spurring innovations by embracing and directly engaging with consumers on social media platforms. By closely reflecting on emerging practices, the book shows how to take advantage of recent advancements and how business operations are being revolutionized. Social Media Analytics and Practical Applications is written for academicians and professionals involved in social media and social media analytics.
Python for Scientific Computation and Artificial Intelligence is split into 3 parts: in Section 1, the reader is introduced to the Python programming language and shown how Python can aid in the understanding of advanced High School Mathematics. In Section 2, the reader is shown how Python can be used to solve real-world problems from a broad range of scientific disciplines. Finally, in Section 3, the reader is introduced to neural networks and shown how TensorFlow (written in Python) can be used to solve a large array of problems in Artificial Intelligence (AI). This book was developed from a series of national and international workshops that the author has been delivering for over twenty years. The book is beginner friendly and has a strong practical emphasis on programming and computational modelling. Features: No prior experience of programming is required. Online GitHub repository available with codes for readers to practice. Covers applications and examples from biology, chemistry, computer science, data science, electrical and mechanical engineering, economics, mathematics, physics, statistics and binary oscillator computing. Full solutions to exercises are available as Jupyter notebooks on the Web.
An overview of the worldwide discussion of the information concept, this book presents thoughts of scholars from various disciplines including information and computer science, semiotics, system science, evolutionary theory, physics, biology, psychology, consciousness theory, sociology, and science and technology studies. The shortcomings of the old fashioned Shannon and Weaver's model of information are examined, providing insights into how research of evolutionary systems could lay the basis for a new theory of information that will bridge the gap between "hard" and "soft" sciences.
This book describes, for the first time in pedagogical form, an
approach to computer-based work in complex sociotechnical systems
developed over the last 30 years by Jens Rasmussen and his
colleagues at Riso National Laboratory in Roskilde, Denmark. This
approach is represented by a framework called "cognitive work
analysis." Its goal is to help designers of complex sociotechnical
systems create computer-based information support that helps
workers adapt to the unexpected and changing demands of their jobs.
In short, cognitive work analysis is about designing for
adaptation.
Computerized assessment offers many opportunities for innovations
in measurement. In contrast to static paper-and-pencil instruments,
computerized assessment can capitalize on the dynamic capabilities
of the computer. For example, the difficulty of administered items
can be adopted to the ability of the examinee, thus eliminating
items that are too hard or too easy. Multimedia computers provide
the opportunity to revolutionize assessment. Stereo sound,
animation, and full-motion video can be incorporated into
assessment tools and aid in the measurement of individual
differences ranging from musical skills to interpersonal abilities.
What is creative technological change? This text explores new ways of thinking and acting in relation to this question in contemporary organizations. It examines how technology shapes organizations and how organizations shape technology - especially "virtual" and other information and computing technologies. A wide range of thinking on these issues from organizational theory, political economy, evolutionary economics, feminist analysis, the sociology of technology and the "new socio-technical theory" is outlined. The idea of metaphor is deployed to capture the differences between, and strengths and weaknesses of, different ways of conceptualizing the technology/organization relationship. It is argued that this approach offers the possibility of developing new ways of thinking about, viewing and ultimately responding creatively to the organizational challenges posed by technological change. The book concludes by outlining a model of the process by which technology and organization are configured. Topics covered include: machine, biological and virtual ways of understanding technology and organization; the evolution of innovative organizational forms; the politics of consuming techno
Containing over one hundred and sixty line drawings, maps and one hundred tables, this book explains the fundamental hydrologic principles and favoured methods of analysis. Aimed at students interested in natural resources and environmental science, spreadsheet exercises and worked examples help to develop basic problem solving skills.
This volume contains papers presented during the first international PLAXIS symposium. Topics covered include: general geo-technical aspects; tunnels and deep excavations, and education and research. This pack is meant for the user of the PLAXIS program, as well as engineers and researchers.
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in details in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing "affective computing" and "autonomic computing" are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|