![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
Fortran remains one of the principal programming languages used in
high-performance scientific, numerical, and engineering computing.
A series of significant revisions to the standard versions of the
language have progressively enhanced its capabilities and the
latest standard, Fortran 2008, includes many modern features, such
as object orientation, coarrays for parallel programming,
interoperability with C and various other enhancements.
Effectively reading and understanding existing code is a developer's superpower. In this book, you'll master techniques for code profiling, advanced debugging, and log evaluation to find and fix bugs and performance problems. In How To Read Java: Understanding, debugging, and optimizing JVM applications you will learn how to: Determine what code does the first time you see it Expose code logic problems Evaluate heap dumps to find memory leaks Monitor CPU consumption to optimize execution Use thread dumps to find and solve deadlocks Easily follow a service-oriented or microservices system Properly use logging to better understand Java app execution Use Java debuggers efficiently How To Read Java: Understanding, debugging, and optimizing JVM applications teaches code investigation techniques that will help you understand how Java apps work, optimize them, and fix the bugs that break them. You'll go from the basics of debugging to advanced methods for locating problems in microservices architectures. Each new technique is explained with lively illustrations and engaging real-world examples. about the technology Tasks like searching for bugs, working through messy legacy code, and analyzing an application's readiness to support new features consume a lot of developer time. In fact, most developers spend more time trying to read and understand code than they do writing it! In this unique guide, you'll learn techniques like resolving deadlocks by examining thread dumps and locating memory leaks by inspecting the heap that will radically improve your efficiency when working with existing code in JVM languages like Java, Scala, and Kotlin.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
In the digital age, modern society is exposed to high volumes of multimedia information. In efforts to optimize this information, there are new and emerging methods of information retrieval and knowledge management leading to higher efficiency and a deeper understanding of this data. The Handbook of Research on Biomimicry in Information Retrieval and Knowledge Management is a critical scholarly resource that examines bio-inspired classes that solve computer problems. Featuring coverage on a broad range of topics such as big data analytics, bioinformatics, and black hole optimization, this book is geared towards academicians, practitioners, and researchers seeking current research on the use of biomimicry in information and knowledge management.
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.
3D Mesh Processing and Character Animation focusses specifically on topics that are important in three-dimensional modelling, surface design and real-time character animation. It provides an in-depth coverage of data structures and popular methods used in geometry processing, keyframe and inverse kinematics animations and shader based processing of mesh objects. It also introduces two powerful and versatile libraries, OpenMesh and Assimp, and demonstrates their usefulness through implementations of a wide range of algorithms in mesh processing and character animation respectively. This Textbook is written for students at an advanced undergraduate or postgraduate level who are interested in the study and development of graphics algorithms for three-dimensional mesh modeling and analysis, and animations of rigged character models. The key topics covered in the book are mesh data structures for processing adjacency queries, simplification and subdivision algorithms, mesh parameterization methods, 3D mesh morphing, skeletal animation, motion capture data, scene graphs, quaternions, inverse kinematics algorithms, OpenGL-4 tessellation and geometry shaders, geometry processing and terrain rendering.
This book provides basic and practical techniques of parallel computing and related methods of numerical analysis for researchers who conduct numerical calculation and simulation. Although the techniques provided in this book are field-independent, these methods can be used in fields such as physics, chemistry, biology, earth sciences, space science, meteorology, disaster prevention, and manufacturing. In particular, those who develop software code in these areas will find this book useful. The contents are suitable for graduate students and researchers in computational science rather than novices at programming or informed experts in computer science.Starting with an introduction to the recent trends in computer architecture and parallel processing, Chapter 1 explains the basic knowledge of speedup programs with simple examples of numerical computing. Chapters 2 - 4 detail the basics of parallel programming, the message passing interface (MPI), and OpenMP and discuss hybrid parallelization techniques. Showing an actual example of adaptation, Chapter 5 gives an overview of performance tuning and communication optimizations. To deal with dense matrix calculations, Chapter 6 details the basics and practice of linear algebra calculation libraries BLAS and LAPACK, including some examples that can be easily reproduced by readers using free software. Focusing on sparse matrix calculations, Chapter 7 explains high performance algorithms for numerical linear algebra. Chapter 8 introduces the fast Fourier transform in large-scale systems from the basics. Chapter 9 explains optimization and related topics such as debug methods and version control systems. Chapter 10 discusses techniques for increasing computation accuracy as an essential topic in numerical calculation. This is the first of the two volumes that grew out of a series of lectures in the K computer project in Japan. The second volume will focus on advanced techniques and examples of applications in materials science.
Introduces an assortment of powerful command line utilities that can be combined to create simple, yet powerful shell scripts for processing datasets. The code samples and scripts use the bash shell, and typically involve small datasets so you can focus on understanding the features of grep, sed, and awk. Companion files with code are available for downloading from the publisher.
This book summarizes years of research in the field of fuzzy relational programming, with a special emphasis on geometric models. It discusses the state-of-the-art in fuzzy relational geometric problems, together with key open issues that must be resolved to achieve a more efficient application of this method. Though chiefly based on research conducted by the authors, who were the first to introduce fuzzy geometric problems, it also covers important findings obtained in the field of linear and non-linear programming. Thanks to its balance of basic and advanced concepts, and its wealth of practical examples, the book offers a valuable guide for both newcomers and experienced researcher in the fields of soft computing and mathematical optimization.
This book provides insights into the 3rd International Conference on Communication, Devices and Computing (ICCDC 2021), which was held in Haldia, India, on August 16-18, 2021. It covers new ideas, applications, and the experiences of research engineers, scientists, industrialists, scholars, and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices, and computing and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, and signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.
A Practical Approach To Building Small To Medium Software Systems For Real Business Clients Based on more than 100 actual commercial projects, this book clearly explains how to run an agile software development project that delivers high-quality, high-value solutions to business clients. It concentrates on the practical, social, business, and management aspects as well as the technical issues involved. Professor Holcombe successfully connects readers with the wave of "Agile 2.0" concepts that take the techniques of agile development and place them in the service of business goals. Since it is widely believed that the use of Windows XP will become much more common in coming years, readers should be armed with cutting-edge knowledge of the latest practices in the field. Further features of the book include: Case studies provide real-world examples and describe how XP was introduced into the environment Analysis is provided to help readers determine which elements of XP are suitable for the unique challenges and environments for different projects Problems of a failing agile project and how they can be fixed are covered, including insight into which managerial techniques can be employed An Instructor's Guide provides practical advice on how to motivate students, organize real group projects, and deal, in a simple and effective way, with many of the problems that arise A sample syllabus, sample tests, and additional case study information are available on an instructor's password-protected ftp site Running an Agile Software Development Project is an indispensable guide for professional software developers, engineers, and project managers interested in learning how to use agile processes. It is also a valuable textbook for advanced undergraduate- and graduate-level students in computer engineering and software engineering courses.
Program analysis concerns static techniques for computing reliable approximate information about the dynamic behaviour of programs. Applications include compilers (for code improvement), software validation (for detecting errors in algorithms or breaches of security) and transformations between data representation (for solving problems such as the Y2K problem). This book is unique in giving an overview of the four major approaches to program analysis: data flow analysis, constraint based analysis, abstract interpretation, and type and effect systems. The presentation demonstrates the extensive similarities between the approaches; this will aid the reader in choosing the right approach and in enhancing it with insights from the other approaches. The book covers basic semantic properties as well as more advanced algorithmic techniques. The book is aimed at M.Sc. and Ph.D. students but will be valuable also for experienced researchers and professionals.
This book presents the recent computational developments inspired by swarms in art known as swarm art and discusses applying swarm intelligence concepts in architecture. Non-human art is a great leap in the evolution of contemporary art, removing the requirement of an artist's production from the creative process. Furthermore, it is a critical declaration in opposition to the anthropomorphic vision which is so destructive for all other life forms and the planet's ecology. When accepted and integrated into human culture, non-human art done by artificial systems or machines boosts creativity and stimulates innovative fusions. We analyze 120 swarm systems with unique and diverse conceptual contexts, agent design, and audience engagement that can be utilized as inspiration for future projects or to design new swarm algorithms by artists, architects, or computer scientists.
At all educational levels, innovation is progressively becoming an intrinsic aspect of learning. The proliferation of mobile devices and sensor-based technologies increased the possibilities for learning and pushed it into institutions. One major challenge accompanying the growth in online education is that many teacher educators find themselves under pressure and underprepared to teach online courses. As online education continues to grow, curriculum and training that prepares teachers for online course design and delivery are critical. Mobile and Sensor-Based Technologies in Higher Education explores how mobile and sensor-based technologies are shaping higher education and creating a roadmap for harnessing artificial intelligence, online learning, distance learning, and other modern technologies to aid education. Covering key topics such as assessment, inclusive education, and social distancing, this reference work is ideal for policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This book presents the development of a gaming quality model to predict the gaming Quality of Experience (QoE) of players that could be used for planning the network service or quality monitoring of cloud gaming services. The author presents a model that is developed following a modular structure approach that keeps the different types of impairments separately. The book shows how such a modular structure allows developing a sustainable model as each component can be updated by advances in that specific research area or technology. The presented gaming quality model takes into account two modules of video quality and input quality. The latter considers the interactivity aspects of gaming. The video quality module offers a series of models that differ depending on the level of access to the video stream information, allowing high flexibility for service providers regarding the positions of measuring points within their system. In summary, the present book focuses on (1) creation of multiple image/video and cloud gaming quality datasets, (2) development of a gaming video classification, and (3) development of a series of gaming QoE models to predict the gaming QoE depending on the level of access to the video stream information.
This book presents a comprehensive guide to the design of playing robots and the related play experiences. Play is a natural activity for building and improving abilities, and it reveals important particularly for persons with disabilities. Many social, physical and cultural factors may hinder children with disabilities from fully enjoying play as their peers. Autonomous robots with specific characteristics can enhance the ludic experience, having implications for the character of the play and presenting opportunities related to autonomy and physical movement, the very nature of robots. Their introduction into play thus provides everybody, and in particular persons with disabilities, new possibilities for developing abilities, improving general status, participating in social contexts, as well as supporting professionals in monitoring progress. This book presents a framework for the design of playful activities with robots, developed over 20 years' experience at AIRLab - POLIMI. Part 1 introduces the play concepts and characteristics, and research results about play of children with different kinds of impairments. Part 2 focuses on implementing robots able to play. The design of playful activities is discussed, as well as the necessary characteristics for them to be useful in both general play and activities involving disability-related limitations. In Part 3, the defined framework is used to analyze possibilities involving robots available on the toy market, robots developed at research labs, and robots to be developed in the next future. The aim of the book is to give developers, caregivers, and users a set of methodological tools for selecting, exploring, and designing inclusive play activities where robots play a central role.
An abundance of unique, interesting examples, use of the Unified Modeling Language throughout, and the newest Java 1.5 features characterize this text. Drake provides a concise and engaging introduction to Java and object-oriented programming, assuming familiarity with the basic control structures of Java or C and only a pre-calculus level of mathematics.
Python (R) is a free open-source language and environment that has tremendous potential in the scientific computing domain. Computing with Python presents the programming language in tight connection with mathematical applications. The approach of the book is concept based rather than a systematic introduction to the language. It is written for a mathematical readership and is aimed at students with a mathematical background.
Inspired by the success of their best-selling introductory programming text, Java Software Solutions, authors Lewis, DePasquale, and Chase now release Java Foundations, Third Edition. This text is a comprehensive resource for instructors who want a two-or three-semester introduction to programming textbook that includes detail on data structures topics. Java Foundations introduces a Software Methodology early on and revisits it throughout to ensure students develop sound program development skills from the beginning. Control structures are covered before writing classes, providing a solid foundation of fundamental concepts and sophisticated topics.
In this book we develop powerful techniques based on formal methods for the verification of correctness, consistency and safety properties related to dynamic reconfiguration and communication in complex distributed systems. In particular, static analysis techniques based on types and type systems are an adequate methodology considering their success in guaranteeing not only basic safety properties, but also more sophisticated ones like deadlock or lock freedom in concurrent settings.The main contributions of this book are twofold. i) We design a type system for a concurrent object-oriented calculus to statically ensure consistency of dynamic reconfigurations. ii) We define an encoding of the session pi-calculus, which models communication in distributed systems, into the standard typed pi-calculus. We use this encoding to derive properties like type safety and progress in the session pi-calculus by exploiting the corresponding properties in the standard typed pi-calculus.
Intended for use in a beginning web design or web development course The Basics of Web Design: HTML5 & CSS3, 2e takes a unique approach to prepare students to design web pages that work today in addition to being ready to take advantage of HTML5 coding techniques of the future. The text covers the basic concepts that web designers need to develop their skills: * Introductory Internet and Web concepts * Creating web pages with HTML5 * Configuring text, color, and page layout with Cascading Style Sheets * Configuring images and multimedia on web pages * Web design best practices * Accessibility, usability, and search engine optimization considerations * Obtaining a domain name and web host * Publishing to the Web Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Apply Theory and/or Research: A well-rounded foundation of hard and soft skills will help students as they pursue careers as web professionals. *Engage Students: Hands-on practice exercises and a running case study offer real-world perspective, and keep students interested in the material. *Support Instructors and Students: Student files for web page Hands-on Practice exercises and the case study are available on the companion website.
This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.
The book is basically written with a view to project Computer Numerical Control Programming (CNC) Programming for machines. This book shows how to write, read and understand such programs for modernizating manufacturing machines. It includes topics such as different programming codes as well as different CNC machines such as drilling and milling. |
You may like...
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R14,523
Discovery Miles 145 230
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
|