![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
Computerized assessment offers many opportunities for innovations
in measurement. In contrast to static paper-and-pencil instruments,
computerized assessment can capitalize on the dynamic capabilities
of the computer. For example, the difficulty of administered items
can be adopted to the ability of the examinee, thus eliminating
items that are too hard or too easy. Multimedia computers provide
the opportunity to revolutionize assessment. Stereo sound,
animation, and full-motion video can be incorporated into
assessment tools and aid in the measurement of individual
differences ranging from musical skills to interpersonal abilities.
Containing over one hundred and sixty line drawings, maps and one hundred tables, this book explains the fundamental hydrologic principles and favoured methods of analysis. Aimed at students interested in natural resources and environmental science, spreadsheet exercises and worked examples help to develop basic problem solving skills.
This text provides a process oriented discussion of the theory, methodology and philosophy of geologic and mine modelling using two commercial software packages: Techbase, a leader for mineral exploration and modelling bedded deposits; and Lynx, for modelling geology.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.
This volume contains papers presented during the first international PLAXIS symposium. Topics covered include: general geo-technical aspects; tunnels and deep excavations, and education and research. This pack is meant for the user of the PLAXIS program, as well as engineers and researchers.
The aim of this book is to provide detailed coverage of the topics in the new OCR AS and A Level Computer Science specifications H046 / H446. The book is divided into twelve sections and within each section, each chapter covers material that can comfortably be taught in one or two lessons. Material that is applicable only to the second year of the full A Level is clearly marked. Sometimes this may include an entire chapter and at other times, just a small part of a chapter. Each chapter contains exercises and questions, some new and some from past examination questions. Answers to all these are available to teachers only in a free Teacher's Pack which can be ordered from our website www.pgonline.co.uk. This book has been written to cover the topics which will be examined in the written papers at both AS and A Level. Sections 10, 11 and 12 relate principally to problem solving skills, with programming techniques covered in sufficient depth to allow students to answer questions in Component 02. Pseudocode, rather than any specific programming language, is used in the algorithms given in the text. Sample Python programs which implement many of the algorithms are included in a folder with the Teacher's Pack.
This book studies the relationship between automata and monadic second-order logic, focusing on classes of automata that describe the concurrent behavior of distributed systems. It provides a unifying theory of communicating automata and their logical properties. Based on Hanf's Theorem and Thomas's graph acceptors, it develops a result that allows characterization of many popular models of distributed computation in terms of the existential fragment of monadic second-order logic.
Considering computer contracting? If you are, then read this book. It explores the many aspects of the computer contracting world and gives sound practical advice to both the newcomer and the experienced contractor. It will also be invaluable if you are an employer wrestling with the perennial problem of finding staff in this highly competitive marketplace. Let this book show you how to break loose from being an employee to working freelance. The author, a freelancer himself, considers what it takes to become a contract worker and gives you invaluable information throughout to help you get started in the world of computer contracting. This book looks at: * why contract workers are used at all - what kind of companies actually employ contractors, and why? * how you make the transition from full-time working - what does it actually take temperamentally to be a successful contractor? * how you start - what does forming your own company involve, and why is it even necessary? * how you go about finding a contract, and negotiating the right rate. * what agencies do for you - and how can you find who are the best? * the financial differences between being a full-time employee and a contractor - how do you manage your affairs? * how you keep your experience up to date when you do not have a regular employer to help train you. * what sort of opportunities are available, and what sort of rates of pay you can expect. * your possible career progressions after contracting. The contracting scene is ever changing. In this wide-ranging book, the current outlook for contract staff is analysed as well as the trends in the computer industry which are driving these changes. Some doors are opening whilst other close - let this book be your guide. If you have marketable skills, the right attitude and would like to be your own boss, there could not be a better time to consider computer contracting.
Many biologists and ecologists have developed models that find widespread use in theoretical investigations and in applications to organism behavior, disease control, population and metapopulation theory, ecosystem dynamics, and environmental management. This book captures and extends the process of model development by concentrating on the dynamic aspects of these processes and by providing the tools such that virtually anyone with basic knowledge in the Life Sciences can develop meaningful dynamic models. Examples of the systems modeled in the book range from models of cell development, the beating heart, the growth and spread of insects, spatial competition and extinction, to the spread and control of epidemics, including the conditions for the development of chaos. Key features: - easy-to-learn and easy-to-use software - examples from many subdisciplines of biology, covering models of cells, organisms, populations, and metapopulations - no prior computer or programming experience required Key benefits: - learn how to develop modeling skills and system thinking on your own rather than use models developed by others - be able to easily run models under alternative assumptions and investigate the implications of these assumptions for the dynamics of the biological system being modeled - develop skills to assess the dynamics of biological systems
In this book, Kathleen Tyner examines the tenets of literacy
through a historical lens to demonstrate how new communication
technologies are resisted and accepted over time. New uses of
information for teaching and learning create a "disconnect" in the
complex relationship between literacy and schooling, and raise
questions about the purposes of literacy in a global, networked,
educational environment. The way that new communication
technologies change the nature of literacy in contemporary society
is discussed as a rationale for corresponding changes in schooling.
This text in the series "Innovations in GIS", continues the theme of directions in geographical information systems research established by the four previous Research UK (GISRUK) conferences. The chapters reflect the interdisciplinary nature of GIS research and includes coverage of such themes as: virtual GIS; spatial analysis; artificial intelligence; spatial agents and fuzzy systems; and space-time GIS and GIS applications.
1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.
Advances in computer networking have allowed computer systems across the world to be interconnected. Open Distributed Processing (ODP) systems are those that support heterogenous distributed applications both within and between autonomous organizations. Many challenges must be overcome before ODP systems can be fully realized. This book describes the recent advances in the theory and practice of developing, deploying and managing open distributed systems. Applications of these systems include but are not limited to telecommunication, medical and large scale transaction processing and electronic commerce systems. All of these are currently developed on distributed platforms. For anybody working in industry or research in this field, Open Distributed Processing and Distributed Platforms will prove an invaluable text.
DISCOVERING COMPUTERS: DIGITAL TECHNOLOGY, DATA, AND DEVICES, 17th edition, teaches you not only the basics of technology, but also how you will use it -- and the responsibilities that go along with being a digital citizen. Focusing on current technology, the content addresses convergence of devices and platforms. Each module integrates practical how-to tips, ethics issues and security topics, while Consider This boxes woven throughout help you sharpen your critical-thinking skills. A variety of end-of-module activities -- checkpoint questions, small group activities and problem-solving exercises -- enable you to put what you learn into practice. MindTap digital learning solution is also available. Using an inviting approach that ensures understanding, DISCOVERING COMPUTERS equips you with the information you need for success at home, school and work.
An ideal reference source for CEOs, marketing and sales managers, sales consultants, and students of international marketing, Guide to Software Export provides a step-by-step approach to initiating or expanding international software sales. It teaches you how to examine critically your candidate product for exportability; how to find distributors, agents, and resellers abroad; how to identify the best distribution structure for export; and much, much more Not content with providing just the guidelines for setting up, expanding, and managing your international sales channels, Guide to Software Export advises you on pitfalls to avoid, important legal and financial considerations associated with software export, and essential market and distribution information. In an effort to cover all the bases, this comprehensive text also discusses: negotiating partnerships electronic marketing evaluating the competition cultural assumptions and biases adapting software for use in Asian markets information sources on the Internet distribution channel strategiesIf you re not satisfied with your company 's international sales performance or you want to get into the global market, Guide to Software Export can help you guide your company through the transition. With the book 's easy-to-follow advice and checkpoints, you are sure to bring new levels of success to your company, so act now and get out in the forefront of software exporting.
Analytics is changing the landscape of businesses across sectors globally. This has led to the stimulation of interest of scholars and practitioners worldwide in this domain. The emergence of 'big data', has fanned the usages of machine learning techniques and the acceptance of 'Analytics Enabled Decision Making'. This book provides a holistic theoretical perspective combined with the application of such theories by drawing on the experiences of industry professionals and academicians from around the world. The book discusses several paradigms including pattern mining, clustering, classification, and data analysis to name a few. The main objective of this book is to offer insight into the process of decision-making that is accelerated and made more precise with the help of analytics.
Nowadays neural computation has become an interdisciplinary field in its own right; researches have been conducted ranging from diverse disciplines, e.g. computational neuroscience and cognitive science, mathematics, physics, computer science, and other engineering disciplines. From different perspectives, neural computation provides an alternative methodology to understand brain functions and cognitive process and to solve challenging real-world problems effectively. Trends in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well selected papers presented in the 2005 International Conference on Natural Computation. The edited book aims to reflect the latest progresses made in different areas of neural computation, including theoretical neural computation, biologically plausible neural modeling, computational cognitive science, artificial neural networks architectures and learning algorithms and their applications in real-world problems."
Hypertext, email, word-processing: electronic technologies have
revolutionized the way we write language. How does language on
screen work differently from language on the page? What new
literacy skills are needed and how do we teach them?
The emergence and widespread use personal computers and network technologies have seen the development of interest in the use of computers to support cooperative work. This volume presents the proceedings of the ninth European conference on Computer Supported Cooperative Work (CSCW). This is a multidisciplinary area that embraces the development of new technologies grounded in actual cooperative practices. These proceedings contain a collection of papers that reflect the variegated research activities in the field. The volume includes papers addressing novel interaction technologies for CSCW systems, new models and architectures for groupware systems, studies of communication and coordination among mobile actors, studies of cooperative work in complex settings, studies of groupware systems in actual use in real-world settings, and theories and techniques to support the development of cooperative applications. The papers present emerging technologies alongside new methods and approaches to the development of this important class of applications. The work in this volume represents the best of the current research and practice within CSCW. The collection of papers presented here will appeal to researchers and practitioners alike, as they combine an understanding of the nature of work with the possibility offered by new technologies.
Documents, such as drawings, memos and specifications, form an essential function in the design and construction industry. Throughout the lifecycle of a built asset, starting from an initial design idea, right through to a final built form and its ongoing management, thousands, even millions of documents can be used to convey various forms of information to a range of interested parties. In many ways, therefore, the success of a design, or construction-based company, relies upon an understanding of the use of documents, as well as the technologies and techniques that are used to create them. The Digital Document provides an extensive background to the
issues and technologies surrounding this very important topic. It
examines a technical subject in an insightful manner that is
neither intimidating nor confusing, even to the novice computer
user. By introducing the subject through a series of preliminary
reviews of current practices and essential computing technologies,
the reader is able to better appreciate the benefits and
capabilities of a wide range of digital document types. This book
explores the role of documents in a professional practice, examines
the components, capabilities, viability, and use of digital
documents in the design and construction industry, and identifies
and explains many of the
This book systematically reviews the development process of the world Internet and comprehensively reveals the great contributions of the Internet to economic development and social progress. The world today is marked by changes unseen in a century, and Internet development is facing new opportunities and challenges. In 2020, the COVID-19 epidemic broke out and spread at the global scale, which enormously impacted the global economy and society. Internet played an increasingly important role. Meanwhile, based on the development status of the global Internet, this book fully reflects the development process, status and trend of the world Internet in 2020, systematically summarizes the development status and highlights of the Internet in the major countries around the world, and makes an in-depth analysis of the new conditions, new dynamics and new trends of the development in the key Internet fields; the contents cover the information infrastructure, information technology, digital economy, digital government, internet media, network security, and international cyberspace governance, and other aspects. Moreover, this book further adjusts and enriches the development index systems of the world Internet, in the hope of better showing the development strength and development advantages of the Internet in various countries, and reflecting the overall development trend of the world Internet more comprehensively, accurately and objectively. From an objective perspective, this book collects the latest research results in the global internet field, featuring comprehensive contents and highlights; from a historical perspective, this book reviews the significant development process of the global internet, summarizes the experience and faces the future; from a global perspective, this book tries to construct the cyberspace community with a common future based on the new concepts, new ideas and new achievements of various countries in participating in cyberspace development and construction. This book provides an important reference value for employees in Internet fields, such as government departments, Internet enterprises, scientific research institutions, colleges and universities, to fully understand and master the development of the world internet.
In the past few years, an increasing number of colleges and universities have added courses in biomedical ethics to their curricula. To some extent, these additions serve to satisfy student demands for "relevance. " But it is also true that such changes reflect a deepening desire on the part of the academic community to deal effectively with a host of problems which must be solved if we are to have a health-care delivery system which is efficient, humane, and just. To a large degree, these problems are the unique result of both rapidly changing moral values and dramatic advances in biomedical technology. The past decade has witnessed sudden and conspicuous controversy over the morality and legality of new practices relating to abortion, therapy for the mentally ill, experimentation using human subjects, forms of genetic interven tion, and euthanasia. Malpractice suits abound, and astronomical fees for malpractice insurance threaten the very possibility of medical and health-care practice. Without the backing of a clear moral consensus, the law is frequently forced into resolving these conflicts only to see the moral issues involved still hotly debated and the validity of the existing law further questioned. Take abortion, for example. Rather than settling the legal issue, the Supreme Court's original abortion decision in Roe v. Wade (1973), seems only to have spurred further legal debate. And of course, whether or not abortion is a mo rally ac ceptable procedure is still the subject of heated dispute."
This book covers sustainable development in smart society's 5.0 using data analytics. The data analytics is the approach of integrating diversified heterogeneous data for predictive analysis to accredit innovation, decision making, business analysis, and strategic decision making. The data science brings together the research in the field of data analytics, online information analytics, and big data analytics to synthesize issues, challenges, and opportunities across smart society 5.0. Accordingly, the book offers an interesting and insightful read for researchers in the areas of decision analytics, cognitive analytics, big data analytics, visual analytics, text analytics, spatial analytics, risk analytics, graph analytics, predictive analytics, and analytics-enabled applications.
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberties. Topics covered include: Counter-terrorism modeling Quantitative and computational social science Signal processing and information management techniques Semantic Web and knowledge management technologies Information and intelligence sharing technologies Text/data processing and language translation technologies Social network analysis Legal standards for data mining Potential structures for enabling policies Technical system designto support policy Countering terrorism in today's world requires innovative technologies and corresponding creative policies; the two cannot be practically and realistically addressed separately. Emergent Information Technologies and Enabling Policies for Counter-Terrorism offers a comprehensive examination of both areas, serving as an essential resource for students, practitioners, researchers, developers, and decision-makers. |
![]() ![]() You may like...
Portfolio and Investment Analysis with…
John B. Guerard, Ziwei Wang, …
Hardcover
R2,491
Discovery Miles 24 910
Well Test Analysis for Multilayered…
Hedong Sun, Chengtai Gao
Paperback
Real World Health Care Data Analysis…
Douglas Faries, Xiang Zhang, …
Hardcover
R2,702
Discovery Miles 27 020
|