![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
"Digital Preservation Technology for Cultural Heritage" discusses the technology and processes in digital preservation of cultural heritage. It covers topics in five major areas: Digitization of cultural heritage; Digital management in the cultural heritage preservation; Restoration techniques for rigid solid relics; Restoration techniques for paintings; Digital museum. It also includes application examples for digital preservation of cultural heritage. The book is intended for researchers, advanced undergraduate and graduate students in Computer Graphics and Image Processing as well as Cultural heritage preservation. Mingquan Zhou is a professor at the College of Information Science and Technology, Beijing Normal University, China. Guohua Geng is a professor at the College of Information Science and Technology, Northwest University, Xi'an, China. Zhongke Wu is a professor at the College of Information Science and Technology, Beijing Normal University, China.
This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.
All games are potentially transformative experiences because they engage the player in dynamic action. When repurposed in an educational context, even highly popular casual games played online to pass the time can engage players in a way that deepens learning. Games as Transformative Experiences for Critical Thinking, Cultural Awareness, and Deep Learning: Strategies & Resources examines the learning value of a wide variety of games across multiple disciplines. Organized just like a well-made game, the book is divided into four parts highlighting classroom experiences, community and culture, virtual learning, and interdisciplinary instruction. The author crosses between the high school and college classroom and addresses a range of disciplines, both online and classroom practice, the design of curriculum, and the transformation of assessment practices. In addition to a wealth of practical exercises, resources, and lesson ideas, the book explains how to use a wide and diverse range of games from casual to massively multiplayer online games for self-improvement as well as classroom situations.
The first integrated, hierarchical model of software structures This book provides the first fully integrated approach to software paradigms commonly used to develop large software applications, with coverage ranging from discrete problems to full-scale applications. The book focuses on providing a structure for understanding a hierarchy of software development paradigms and showing the relationships between the different paradigms. In order to provide a clear understanding of how these "building blocks" are used to solve today's complex software design problems, the author assesses the benefits and disadvantages of each paradigm in terms of its contribution to the design process and, where applicable, provides a taxonomy for the paradigm of substructures. Coverage includes paradigms in the areas of: Design patterns Software components Software architectures Frameworks Chapters within each paradigm include design issues related to building and using the paradigm and feature numerous real-world applications. Software Paradigms presents a practical overview of the hierarchy of paradigms, with emphasis on how they build upon each other. It is an excellent teaching tool for undergraduates and graduates, and a comprehensive and reliable reference for software engineers. Challenging questions at the end of each chapter pose research problems that will lead to more detailed investigations of the topics discussed within the chapter.
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem independently and simultaneously. This approach has led to solutions of difficult problems in a number of vital fields, including artificial intelligence, image processing, and differential equations. As the first up-to-date summary of the topic, this book will be sought after by researchers, computer science professionals, and advanced students involved in parallel computing and parallel algorithms.
A common attraction to functional programming is the ease with which proofs can be given of program properties. A common disappointment with functional programming is the difficulty of expressing input/output (I/O) while at the same time being able to verify programs. Here, the author shows how a theory of functional programming can be smoothly extended to admit both an operational semantics for functional I/O and verification of programs engaged in I/O. He obtains, for the first time, operational semantics for the three most widely implemented I/O mechanisms for lazy languages, and proves that the three are equivalent in expressive power. He also develops semantics for a form of monadic I/O and verifies a simple programming example. These theories of functional I/O are based on an entirely operational theory of functional programming, developed using Abramsky's "applicative bisimulation." Graduate students and researchers will gain much from reading this book.
Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.
This book provides a concise overview of VR systems and their cybersickness effects, giving a description of possible reasons and existing solutions to reduce or avoid them. Moreover, the book explores the impact that understanding how efficiently our brains are producing a coherent and rich representation of the perceived outside world would have on helping VR technics to be more efficient and friendly to use. Getting Rid of Cybersickness will help readers to understand the underlying technics and social stakes involved, from engineering design to autonomous vehicle motion sickness to video games, with the hope of providing an insight of VR sickness induced by the emerging immersive technologies. This book will therefore be of interest to academics, researchers and designers within the field of VR, as well as industrial users of VR and driving simulators.
Pervasive Computing: Next Generation Platforms for Intelligent Data Collection presents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals. Using numerous illustrative examples and following both theoretical and practical results the authors discuss: a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography, and developments related to pervasive computing components for intelligently collecting data, resource, and data management issues; the importance of data security and privacy in the era of big data; the benefits of pervasive computing and the development process for scientific and commercial applications and platforms to support them in this field. Pervasive computing has developed technology that allows sensing, computing, and wireless communication to be embedded in everyday objects, from cell phones to running shoes, enabling a range of context-aware applications. Pervasive computing is supported by technology able to acquire and make use of the ubiquitous data sensed or produced by many sensors blended into our environment, designed to make available a wide range of new context-aware applications and systems. While such applications and systems are useful, the time has come to develop the next generation of pervasive computing systems. Future systems will be data oriented and need to support quality data, in terms of accuracy, latency and availability. Pervasive Computing is intended as a platform for the dissemination of research efforts and presentation of advances in the pervasive computing area, and constitutes a flagship driver towards presenting and supporting advanced research in this area. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"-references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker's search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker's presence on a computer system; and the underlying hacking culture.
Game AI Pro2: Collected Wisdom of Game AI Professionals presents cutting-edge tips, tricks, and techniques for artificial intelligence (AI) in games, drawn from developers of shipped commercial games as well as some of the best-known academics in the field. It contains knowledge, advice, hard-earned wisdom, and insights gathered from across the community of developers and researchers who have devoted themselves to game AI. In this book, 47 expert developers and researchers have come together to bring you their newest advances in game AI, along with twists on proven techniques that have shipped in some of the most successful commercial games of the last few years. The book provides a toolbox of proven techniques that can be applied to many common and not-so-common situations. It is written to be accessible to a broad range of readers. Beginners will find good general coverage of game AI techniques and a number of comprehensive overviews, while intermediate to expert professional game developers will find focused, deeply technical chapters on specific topics of interest to them. Covers a wide range of AI in games, with topics applicable to almost any game Touches on most, if not all, of the topics necessary to get started in game AI Provides real-life case studies of game AI in published commercial games Gives in-depth, technical solutions from some of the industry's best-known games Includes downloadable demos and/or source code, available at http://www.gameaipro.com
You may know SQL basics, but are you taking advantage of its expressive power? This second edition applies a highly practical approach to Structured Query Language (SQL) so you can create and manipulate large stores of data. Based on real-world examples, this updated cookbook provides a framework to help you construct solutions and executable examples in several flavors of SQL, including Oracle, DB2, SQL Server, MySQL, and PostgreSQL. SQL programmers, analysts, data scientists, database administrators, and even relatively casual SQL users will find SQL Cookbook to be a valuable problem-solving guide for everyday issues. No other resource offers recipes in this unique format to help you tackle nagging day-to-day conundrums with SQL. The second edition includes: Fully revised recipes that recognize the greater adoption of window functions in SQL implementations Additional recipes that reflect the widespread adoption of common table expressions (CTEs) for more readable, easier-to-implement solutions New recipes to make SQL more useful for people who aren't database experts, including data scientists Expanded solutions for working with numbers and strings Up-to-date SQL recipes throughout the book to guide you through the basics
Analyses a variety of approaches to development and publishing, across a multitude of platforms and genres, to provide a new vision for the next twenty years of game development. Considers technical advances in adjacent markets and how they will impact the games industry over the next twenty years. Includes insightful interviews from leading game and entertainment industry figures.
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
This book covers the distinguishing characteristics and tropes of visual novels (VNs) as choice-based games and analyzes VNs like 999: Nine Hours, Nine Persons, Nine Doors; Hatoful Boyfriend; and Monster Prom, some of the best examples of the genre as illustrations. The author covers structuring branching narrative and plot, designing impactful and compelling choices, writing entertaining relationships and character interactions, understanding the importance of a VN's prose, and planning a VN's overall narrative design and story delivery. The book contains exercises at the end of chapters to practice the techniques discussed. By the end of the book, if the reader finishes all the exercises, they may have several portfolio pieces or a significant portion of their own VN project designed. Features: Discusses different aspects and genres of VNs, what makes them enjoyable, and successful techniques developers can incorporate into their own games Analyzes various VNs and choice-based games that use these successful techniques Shares tips from developers on portfolio pieces, hiring a team to work on VNs, and plotting and outlining VNs Branching Story, Unlocked Dialogue: Designing and Writing Visual Novels is a valuable resource for developers and narrative designers interested in working on VNs. The book will show them how they can design their own VN projects, design branching narratives, develop entertaining plots and relationships, design impactful and compelling choices, and write prose that's a pleasure to read.
Provides a wide snapshot of building knowledge-based systems, inconsistency measures, methods for handling consistency, and methods for integrating knowledge bases. Provides the mathematical background to solve problems of restoring consistency and problems of integrating probabilistic knowledge bases in the integrating process. The research results presented in the book can be applied in decision support systems, semantic web systems, multimedia information retrieval systems, medical imaging systems, cooperative information systems, and more.
In this book, John Hunt and Chris Loftus take you through the core technologies that make up the Enterprise Edition of the Java 2 platform (J2EE). They cover all the aspects of J2EE that both professionals and students need to know to build multi-tier enterprise applications in Java - the technologies, the design methodology and design patterns. Whether you are a professional or student, this book will help equip you with the skills you need to build enterprise wide applications in Java. Key Topics Includes design issues using J2EE patterns Covers all parts of the enterprise application J2EE Uses an integrated example that spans the chapters to be built up by the reader More accessible and less daunting than a lot of the competition A coherent whole, rather than independent separate chapters (as with some rivals) Features and Benefits Provides an overview of J2EE technologies and their benefits. Discusses architectural design issues using J2EE patterns. Looks at the issues of designing and building multi-tier J2EE applications. Includes fully worked examples, built up throughout the book, which enable you to quickly develop your own multi-tier applications. About the Authors: Dr. John Hunt is Technical Director at JayDeeTechnology Ltd. He runs industrial courses, including server-side Java technologies. He also leads development projects for government and blue chip organisations using Java, J2EE, XML and C#. Chris Loftus is a Teaching Fellow at the Department of Computer Science at the University of Wales, Aberystwyth. He has taught Java-based courses, including J2EE, both in university and industry.
Foundations of Fuzzy Control: A Practical Approach, 2nd Edition has been significantly revised and updated, with two new chapters on Gain Scheduling Control and Neurofuzzy Modelling. It focuses on the PID (Proportional, Integral, Derivative) type controller which is the most widely used in industry and systematically analyses several fuzzy PID control systems and adaptive control mechanisms. This new edition covers the basics of fuzzy control and builds a solid foundation for the design of fuzzy controllers, by creating links to established linear and nonlinear control theory. Advanced topics are also introduced and in particular, common sense geometry is emphasised. Key features * Sets out practical worked through problems, examples and case studies to illustrate each type of control system * Accompanied by a website hosting downloadable MATLAB programs * Accompanied by an online course on Fuzzy Control which is taught by the author. Students can access further material and enrol at the companion website Foundations of Fuzzy Control: A Practical Approach, 2nd Edition is an invaluable resource for researchers, practitioners, and students in engineering. It is especially relevant for engineers working with automatic control of mechanical, electrical, or chemical systems.
Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data's impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.
George Landow's widely acclaimed Hypertext was the first book to bring together the worlds of literary theory and computer technology. Landow was one of the first scholars to explore the implications of giving readers instant, easy access to a virtual library of sources as well as unprecedented control of what and how they read. In hypermedia, Landow saw a strikingly literal embodiment of many major points of contemporary literary theory, particularly Derrida's idea of "de-centering" and Barthes's conception of the "readerly" versus "writerly" text. From Intermedia to Microcosm, Storyspace, and the World Wide Web, Landow offers specific information about the kinds of hypertext, different modes of linking, attitudes toward technology, and the proliferation of pornography and gambling on the Internet. For the third edition he includes new material on developing Internet-related technologies, considering in particular their increasingly global reach and the social and political implications of this trend as viewed from a postcolonial perspective. He also discusses blogs, interactive film, and the relation of hypermedia to games. Thoroughly expanded and updated, this pioneering work continues to be the "ur-text" of hypertext studies.
Role-play as a Heritage Practice is the first book to examine physically performed role-enactments, such as live-action role-play (LARP), tabletop role-playing games (TRPG), and hobbyist historical reenactment (RH), from a combined game studies and heritage studies perspective. Demonstrating that non-digital role-plays, such as TRPG and LARP, share many features with RH, the book contends that all three may be considered as heritage practices. Studying these role-plays as three distinct genres of playful, participatory and performative forms of engagement with cultural heritage, Mochocki demonstrates how an exploration of the affordances of each genre can be valuable. Showing that a player's engagement with history or heritage material is always multi-layered, the book clarifies that the layers may be conceptualised simultaneously as types of heritage authenticity and as types of in-game immersion. It is also made clear that RH, TRPG and LARP share commonalities with a multitude of other media, including video games, historical fiction and film. Existing within, and contributing to, the fiction and non-fiction mediasphere, these role-enactments are shaped by the same large-scale narratives and discourses that persons, families, communities, and nations use to build memory and identity. Role-play as a Heritage Practice will be of great interest to academics and students engaged in the study of heritage, memory, nostalgia, role-playing, historical games, performance, fans and transmedia narratology.
Introduction to Computational Engineering with MATLAB (R) aims to teach readers how to use MATLAB programming to solve numerical engineering problems. The book focuses on computational engineering with the objective of helping engineering students improve their numerical problem-solving skills. The book cuts a middle path between undergraduate texts that simply focus on programming and advanced mathematical texts that skip over foundational concepts, feature cryptic mathematical expressions, and do not provide sufficient support for novices. Although this book covers some advanced topics, readers do not need prior computer programming experience or an advanced mathematical background. Instead, the focus is on learning how to leverage the computer and software environment to do the hard work. The problem areas discussed are related to data-driven engineering, statistics, linear algebra, and numerical methods. Some example problems discussed touch on robotics, control systems, and machine learning. Features: Demonstrates through algorithms and code segments how numeric problems are solved with only a few lines of MATLAB code Quickly teaches students the basics and gets them started programming interesting problems as soon as possible No prior computer programming experience or advanced math skills required Suitable for students at undergraduate level who have prior knowledge of college algebra, trigonometry, and are enrolled in Calculus I MATLAB script files, functions, and datasets used in examples are available for download from http://www.routledge.com/9781032221410.
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16-17 August 2019. Written by researchers from academia and industry, the book discusses a wide variety of industrial, engineering, and scientific applications of the emerging techniques in the field of computer science. |
You may like...
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier
Hardcover
R1,831
Discovery Miles 18 310
Insect Pests of Potato - Global…
Andrei Alyokhin, Silvia I Rondon, …
Paperback
R3,505
Discovery Miles 35 050
The Hornet Literacy Primer - The Word…
Harry Cowling, Marie Cowling
Paperback
R611
Discovery Miles 6 110
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,065
Discovery Miles 40 650
Microbial Biomass Proteins
Murray Moo- Young, Kenneth F. Gregory
Hardcover
R2,757
Discovery Miles 27 570
Wanted Dead & Alive - The Case For South…
Gregory Mthembu-Salter
Paperback
Single Cell Analysis in Biotechnology…
Fan-Gang Tseng, Tuhin Subhra Santra
Hardcover
|