![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > General
Developed by Professionals and Experienced Teachers from top schools across the country, the book has been divided into five sections namely Word Structure and Knowledge, Reading Comprehension, Spoken and Written Expressions, Achievers section, Model Papers. The concepts have been explained in brief through solved examples and Illustrations. To enhance the problem solving skills of candidates, Multiple Choice Questions (MCQs) with detailed solutions have been provided at the end of each chapter. Two Mock Test Papers have been provided for practice purpose. A CD containing Study Chart for systematic preparation, Tips & Tricks to crack English Olympiad, Pattern of exam, and links of Previous Years Papers is accompanied with this book. The book is recommended for various school level and competitive exams. #v&spublishers
While much has been written about strategic information systems planning, the integration of strategic planning with portfolio management has been ignored, leaving the potential benefits of their combined approach to planning yet to be explored. ""Strategic Information Technology and Portfolio Management"" bridges the knowledge between information technology planning, enterprise architecture, and IT portfolio management taking into account their financial impact. Intended for IT professionals, researchers, and academicians, this book provides techniques and tools appropriate for building application portfolios and developing strategies which increase financial performance.
Recent advances in gene sequencing technology are now shedding light on the complex interplay between genes that elicit phenotypic behavior characteristic of any given organism. In order to mediate internal and external signals, the daunting task of classifying an organism's genes into complex signaling pathways needs to be completed. The Handbook of Research on Computational Methodologies in Gene Regulatory Networks focuses on methods widely used in modeling gene networks including structure discovery, learning, and optimization. This innovative Handbook of Research presents a complete overview of computational intelligence approaches for learning and optimization and how they can be used in gene regulatory networks.
The Internet of Things has become a major influence on the development of new technologies and innovations. When combined with smart services, the end-user experience can be significantly enhanced. Novel Design and the Applications of Smart-M3 Platforms in the Internet of Things: Emerging Research and Opportunities provides an innovative outlook on the development of open source technology for the creation of smart spaces and services. Including a range of relevant topics such as interoperability, system architecture, and information processing, this book is an ideal reference source for academics, researchers, graduate students, and practitioners interested in the latest advancements in the Internet of things.
Das Unternehmen des Informationszeitalters muss vom Kundenprozess ausgehen, die Starken verschiedener Online- und Offline-Absatzkanale kombinieren und Echzeit-Prozesse mit seinen Supply-Chain-Partnern organisieren. Um zum Netzwerk- oder Echtzeit-Unternehmen zu werden, ist ein Vorgehen in kleinen, wohluberlegten Schritten erfolgversprechender als "der grosse Wurf." Jeder Schritt benotigt eine Geschaftslosung, einen Kooperationsprozess zwischen Unternehmen und eine offene Infrastruktur. Dazu hat die Universitat St. Gallen gemeinsam mit neun namhaften Unternehmen eine Architektur erarbeitet, die eine Ausgestaltung der Schritte auf den Ebenen Strategie, Prozess und System unterstutzt. Anhand dieser Architektur werden verschiedene marktgangige Produkte und Technologien eingeordnet. Eine aus der Praxis abgeleitete Projektmethode fasst abschliessend die Erfahrungen zusammen und schlagt ein allgemeines Vorgehen vo
The purpose of this book is to teach quantitative analysis to solve a variety of different business problems, using the Microsoft Excel software program. The book is primarily written for students and business executives. It covers both theoretical and applied material. The book contains 22 chapters and 2 appendices. Prior to using this book, users should have some familiarity with statistics, accounting, and marketing. They should also be comfortable with using computers, particularly spreadsheets, and have some knowledge of the Internet. The following is a summary of the topics covered in this book. *Computer Literacy and Advanced Spreadsheet Commands *Quantitative Analysis *Financial Statements *Loans and Amortization Tables *Income Tax Calculation *Advanced Logical Statements *Payroll Calculation *Product-Market Strategies Using Excel's Drawing Tools *Sales and Profit Forecasting in Domestic and International Arena *Frequency Distributions and Descriptive Summary Measures of Data *Resource Allocation and Linear Programming *Simple and Multiple Regression Analysis *Annual, Quarterly, and Monthly Time Series Analysis *Chi-Square Test of Independence *Breakeven Analysis *Business Plans *How to Create a Web Page
With the ever-present growth in technology, opportunities to explore and experience technology at an early age are increasingly important in order to develop problem-solving and thinking skills. ""Technology for Early Childhood Education and Socialization: Developmental Applications and Methodologies"" provides readers with valuable and authentic research on how technology relates to early childhood growth. Including international perspectives on technology and education from expert authors, this book discusses important issues of assessment, teacher education, special education, and family involvement in terms of technology.
Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.
This book provides application of multi criteria decision making techniques for managerial discretion. With this book, a concerted platform has been provided for several peers and other management organizations to understand and implement these tools and deal with the practical problems in a better way so as to provide more robust managerial decision making.
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Secured Transactions: Problems and Materials combines original material with recent cases to teach students about secured financing under Article 9 of the Uniform Commercial Code. Students learn how to identify basic Article 9 issues and craft solutions for them. The book begins with an explanation of secured versus unsecured financing and addresses how transactions were handled before the institution of Article 9. It then discusses specific aspects of Article 9 including its scope, creating and protecting a security interest, priorities, exceptions, fixtures, proceeds, and enforcement. The book is built around a series of problems that connect the cases and original material to the text of Article 9. The original material clarifies and contextualizes the legal issues, providing background and support. The cases demonstrate how legal principles are applied in the real world, enabling students to understand automatic perfection, certificates of title, statutory liens, commercial reasonableness, and more. The revised first edition features updated information regarding laws and legislation, as well as new cases for the chapters on repossessing fixtures and proceeds. Secured Transactions successfully balances the study of law and its application. It is an ideal book for foundational courses in secured transactions.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
This book describes the development of an intrusion detection system for online poker, which uses player's game strategy as the behavioral profile. The system is improved by modifications to the similarity measure functions and different ways of representing behavioral signatures. The system is further enhanced by inclusion of spatial, temporal and contextual information about the environment alongside the user's behavior. Possibility of creation of artificial behavioral profiles and use of such profiles for spoofing of behavior-based security systems is investigated and promising results are achieved. In a somewhat related research, recognizing importance of games in our experiments, it is proven that poker is a game of skill. Finally, a number of games are analyzed in terms of their spatial ontologies.
Cases on Progressions and Challenges in ICT Utilization for Citizen-Centric Governance is a collection of case studies on the advancements and challenges of information technology in the involvements of citizens with the government. With contributions from authors around the world, this compilation is relevant to researchers, academics, and practitioners who wish to stay informed of the new world of technology in the government.
Yours can be the first APPLE house on the block! Learn how to save time and money by using your Apple II computer to control your home: the security, lights, temperature, telephone, and much more. With John Blankenship's system of software and hardware, your house can accept verbal commands and respond with its own voice. It does not need human instruction and performs many useful tasks on its own. Once you get used to an intelligent house, you will wonder how you ever got along without one. Even though devices featured in The Apple House can be purchased, the author shows how you can save money by building some from scratch. He also points out that you can substitute equipment you already own because of the system's modularity. Although written with an Apple II computer in mind, the principles discussed can easily be transferred to other computer systems.
Agent technologies are believed to be one of the most promising tools to conduct business via networks and the Web in an autonomous, intelligent, and efficient way. The ever-expanding application of business automation necessitates clarification of the methods and techniques of agent-based electronic business systems.
Text entry has never been so important as it is today. This is in
large part due to the phenomenal, relatively recent success of
mobile computing, text messaging on mobile phones, and the
proliferation of small devices like the Blackberry and Palm Pilot.
Compared with the recent past, when text entry was primarily
through the standard "qwerty" keyboard, people today use a diverse
array of devices with the number and variety of such devices ever
increasing.
|
You may like...
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
The Oxford Handbook of Music and…
Sheila Whiteley, Shara Rambarran
Hardcover
R4,713
Discovery Miles 47 130
|