![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
This book systematically reviews the development process of the world Internet and comprehensively reveals the great contributions of the Internet to economic development and social progress. The world today is marked by changes unseen in a century, and Internet development is facing new opportunities and challenges. In 2020, the COVID-19 epidemic broke out and spread at the global scale, which enormously impacted the global economy and society. Internet played an increasingly important role. Meanwhile, based on the development status of the global Internet, this book fully reflects the development process, status and trend of the world Internet in 2020, systematically summarizes the development status and highlights of the Internet in the major countries around the world, and makes an in-depth analysis of the new conditions, new dynamics and new trends of the development in the key Internet fields; the contents cover the information infrastructure, information technology, digital economy, digital government, internet media, network security, and international cyberspace governance, and other aspects. Moreover, this book further adjusts and enriches the development index systems of the world Internet, in the hope of better showing the development strength and development advantages of the Internet in various countries, and reflecting the overall development trend of the world Internet more comprehensively, accurately and objectively. From an objective perspective, this book collects the latest research results in the global internet field, featuring comprehensive contents and highlights; from a historical perspective, this book reviews the significant development process of the global internet, summarizes the experience and faces the future; from a global perspective, this book tries to construct the cyberspace community with a common future based on the new concepts, new ideas and new achievements of various countries in participating in cyberspace development and construction. This book provides an important reference value for employees in Internet fields, such as government departments, Internet enterprises, scientific research institutions, colleges and universities, to fully understand and master the development of the world internet.
Analytics is changing the landscape of businesses across sectors globally. This has led to the stimulation of interest of scholars and practitioners worldwide in this domain. The emergence of 'big data', has fanned the usages of machine learning techniques and the acceptance of 'Analytics Enabled Decision Making'. This book provides a holistic theoretical perspective combined with the application of such theories by drawing on the experiences of industry professionals and academicians from around the world. The book discusses several paradigms including pattern mining, clustering, classification, and data analysis to name a few. The main objective of this book is to offer insight into the process of decision-making that is accelerated and made more precise with the help of analytics.
Membrane computing is a branch of natural computing which investigates computing models abstracted from the structure and functioning of living cells and from their interactions in tissues or higher-order biological structures. The models considered, called membrane systems (P systems), are parallel, distributed computing models, processing multisets of symbols in cell-like compartmental architectures. In many applications membrane systems have considerable advantages among these are their inherently discrete nature, parallelism, transparency, scalability and nondeterminism. In dedicated chapters, leading experts explain most of the applications of membrane computing reported so far, in biology, computer science, computer graphics and linguistics. The book also contains detailed reviews of the software tools used to simulate P systems.
Becoming a Teacher offers a broad context for understanding education, addressing issues such as social justice, educational ideology and teacher well-being and identity. The theoretical content is balanced with practical advice for the classroom on topics such as assessment for learning, behaviour management, differentiation and curriculum planning. Becoming a Teacher draws extensively on contemporary research and empirical evidence to support critical reflection about learning and teaching. Encouraging the reader to reflect on their own knowledge and beliefs, it explores some of the complex social and cultural dimensions that influence professional learning and practice. Becoming a Teacher's approach chimes with the commonly accepted recognition that all those involved in the education of young people should take a research-informed approach towards classroom practice. The substantial rethinking that has informed this sixth edition means the Becoming a Teacher continues to provide invaluable support, guidance and insight for all those training to be secondary teachers and a rich resource for students undertaking undergraduate or postgraduate education studies programmes.
This textbook is a comprehensive introduction to applied spatial data analysis using R. Each chapter walks the reader through a different method, explaining how to interpret the results and what conclusions can be drawn. The author team showcases key topics, including unsupervised learning, causal inference, spatial weight matrices, spatial econometrics, heterogeneity and bootstrapping. It is accompanied by a suite of data and R code on Github to help readers practise techniques via replication and exercises. This text will be a valuable resource for advanced students of econometrics, spatial planning and regional science. It will also be suitable for researchers and data scientists working with spatial data.
Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour. Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field, and presents extensive information on terrorism data sets, new ways of building such data sets in real-time using text analytics, introduces the mathematics and computational approaches to understand terror group behaviour, analyzes terror networks, forecasts terror group behaviour, and shapes policies against terrorist groups. Auxiliary information will be posted on the book's website. This book targets defence analysts, counter terror analysts, computer scientists, mathematicians, political scientists, psychologists, and researchers from the wide variety of fields engaged in counter-terrorism research. Advanced-level students in computer science, mathematics and social sciences will also find this book useful.
Digital Systems Design and Prototyping: Using Field Programmable Logic and Hardware Description Languages, Second Edition covers the subject of digital systems design using two important technologies: Field Programmable Logic Devices (FPLDs) and Hardware Description Languages (HDLs). These two technologies are combined to aid in the design, prototyping, and implementation of a whole range of digital systems from very simple ones replacing traditional glue logic to very complex ones customized as the applications require. Three HDLs are presented: VHDL and Verilog, the widely used standard languages, and the proprietary Altera HDL (AHDL). The chapters on these languages serve as tutorials and comparisons are made that show the strengths and weaknesses of each language. A large number of examples are used in the description of each language providing insight for the design and implementation of FPLDs. The CD-ROM included with the book contains the Altera MAX+PLUS II development environment which is ready to compile and simulate all examples. With the addition of the Altera UP-1 prototyping board, all examples can be tested and verified in a real FPLD. Digital Systems Design and Prototyping: Using Field Programmable Logic and Hardware Description Languages, Second Edition is designed as an advanced level textbook as well as a reference for the professional engineer.
Chemoinformatics is a scientific area that endeavours to study and solve complex chemical problems using computational techniques and methods. Chemoinformatics and Advanced Machine Learning Perspectives: Complex Computational Methods and Collaborative Techniques provides an overview of current research in machine learning and applications to chemoinformatics tasks. As a timely compendium of research, this book offers perspectives on key elements that are crucial for complex study and investigation.
This book will resonate with anyone no matter where you reside on this journey, whether newbie or old guard. If you want to be part of this change, you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn't resonate, then I suggest you think about stepping aside. -Curt Queyrouze, President, CCBX, A Division of Coastal Community Bank The world is going digital, and so is banking-in fits, starts, and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits, mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about, not by external heroes and saviours, not by a generation yet to be born, but people just like us. People who understand the industry and its quirks. Bankers who have the grit, determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a 'this is who we are' piece, including the author's trench credentials. It then present an overview of corporate culture (this is what we deal with and a few ideas on how to handle it), as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds, and a hopeful look-ahead on what a team of principled, dedicated folks can do despite everything.
How to acquire the input frequency from an unlocked state A phase locked loop (PLL) by itself cannot become useful until it has acquired the applied signal's frequency. Often, a PLL will never reach frequency acquisition (capture) without explicit assistive circuits. Curiously, few books on PLLs treat the topic of frequency acquisition in any depth or detail. "Frequency Acquisition Techniques for Phase Locked Loops" offers a no-nonsense treatment that is equally useful for engineers, technicians, and managers. Since mathematical rigor for its own sake can degenerate into intellectual "rigor mortis," the author introduces readers to the basics and delivers useful information with clear language and minimal mathematics. With most of the approaches having been developed through years of experience, this completely practical guide explores methods for achieving the locked state in a variety of conditions as it examines: Performance limitations of phase/frequency detector-based phase locked loopsThe quadricorrelator method for both continuous and sampled modesSawtooth ramp-and-sample phase detector and how its waveform contains frequency error information that can be extractedThe benefits of a self-sweeping, self-extinguishing topologySweep methods using quadrature mixer-based lock detectionThe use of digital implementations versus analog "Frequency Acquisition Techniques for Phase Locked Loops" is an important resource for RF/microwave engineers, in particular, circuit designers; practicing electronics engineers involved in frequency synthesis, phase locked loops, carrier or clock recovery loops, radio-frequency integrated circuit design, and aerospace electronics; and managers wanting to understand the technology of phase locked loops and frequency acquisition assistance techniques or jitter attenuating loops.Errata can be found by visiting the Book Support Site at: http: //booksupport.wiley.com
This book features a systematic description of microelectronic device design ranging from the basics to current topics, such as low-power/ultralow-voltage designs including subthreshold current reduction, memory subsystem designs for modern DRAMs and various on-chip supply-voltage conversion techniques. It also covers process and device issues as well as design issues relating to systems, circuits, devices and processes, such as signal-to-noise and redundancy.
This practical new book offers the distributed-computing fundamental knowledge for individuals to connect with one another in a more secure and efficient way than with traditional blockchains. These new forms of secure, scalable blockchains promise to replace centralized institutions to connect individuals without the risks of user manipulations or data extortions. The techniques taught herein consist of enhancing blockchain security and making blockchain scalable by relying on the observation that no blockchain can exist without solving the consensus problem. First, the state-of-the-art of consensus protocols are analyzed, hence motivating the need for a new family of consensus protocols offering strong (deterministic) guarantees. Second, a didactic series of classic blockchain vulnerabilities is presented to illustrate the importance of novel designs better suited for the adversarial environment of open networks. These cutting-edge solutions are illustrated through the Redbelly blockchain design, which solves a different problem from the classic Byzantine consensus problem of 1982 and which delivers-in the modern blockchain context-high performance at large scale. Topics and features: Covers the combination of security and distributed computing to devise the new generation of blockchains Shows how blockchain has shed new light on decades of research in distributed systems Provides instruction on the security needed by the industry to use blockchains in production Explains didactically the necessary ingredients to make blockchain efficient at large scale Helps fill the gap of knowledge in the highly demanded blockchain sector This unique volume contains the building blocks to design secure and scalable blockchains. As such, it is dedicated to developers, application designers, and computer scientists and requires only a minimal undergraduate level in mathematics and computer science. Vincent Gramoli is an Australian Research Council Future Fellow at the University of Sydney and the Chief Technology Officer of Redbelly Network. He teaches the Blockchain Scalability course on Coursera.
Test Resource Partitioning for System-on-a-Chip is about test resource partitioning and optimization techniques for plug-and-play system-on-a-chip (SOC) test automation. Plug-and-play refers to the paradigm in which core-to-core interfaces as well as core-to-SOC logic interfaces are standardized, such that cores can be easily plugged into "virtual sockets" on the SOC design, and core tests can be plugged into the SOC during test without substantial effort on the part of the system integrator. The goal of the book is to position test resource partitioning in the context of SOC test automation, as well as to generate interest and motivate research on this important topic. SOC integrated circuits composed of embedded cores are now commonplace. Nevertheless, There remain several roadblocks to rapid and efficient system integration. Test development is seen as a major bottleneck in SOC design, and test challenges are a major contributor to the widening gap between design capability and manufacturing capacity. Testing SOCs is especially challenging in the absence of standardized test structures, test automation tools, and test protocols. Test Resource Partitioning for System-on-a-Chip responds to a pressing need for a structured methodology for SOC test automation. It presents new techniques for the partitioning and optimization of the three major SOC test resources: test hardware, testing time and test data volume. Test Resource Partitioning for System-on-a-Chip paves the way for a powerful integrated framework to automate the test flow for a large number of cores in an SOC in a plug-and-play fashion. The framework presented allows the system integrator to reduce test cost and meet short time-to-market requirements.
Recent years have seen rapid strides in the level of sophistication of VLSI circuits. On the performance front, there is a vital need for techniques to design fast, low-power chips with minimum area for increasingly complex systems, while on the economic side there is the vastly increased pressure of time-to-market. These pressures have made the use of CAD tools mandatory in designing complex systems. Timing Analysis and Optimization of Sequential Circuits describes CAD algorithms for analyzing and optimizing the timing behavior of sequential circuits with special reference to performance parameters such as power and area. A unified approach to performance analysis and optimization of sequential circuits is presented. The state of the art in timing analysis and optimization techniques is described for circuits using edge-triggered or level-sensitive memory elements. Specific emphasis is placed on two methods that are true sequential timing optimizations techniques: retiming and clock skew optimization. Timing Analysis and Optimization of Sequential Circuits covers the following topics: Algorithms for sequential timing analysis Fast algorithms for clock skew optimization and their applications Efficient techniques for retiming large sequential circuits Coupling sequential and combinational optimizations. Timing Analysis and Optimization of Sequential Circuits is written for graduate students, researchers and professionals in the area of CAD for VLSI and VLSI circuit design.
The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). Theobjective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. "Informatics and Management Science "contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including: Computer Science Communications and Electrical Engineering Management Science Service Science Business Intelligence Communications and Electrical Engineering Management Science Service Science Business Intelligence Management Science Service Science Business Intelligence Service Science Business Intelligence Business Intelligence Communications and Electrical Engineering Management Science Service Science Business Intelligence Management Science Service Science Business Intelligence Service Science Business Intelligence Business Intelligence Management Science Service Science Business Intelligence Service Science Business Intelligence Business Intelligence Service Science Business Intelligence Business Intelligence Business Intelligence"
Information technologies have evolved to an enabling science for natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Computing plays a significant role in the every day practices of environmental engineers, natural scientists, economists, and social scientists. The complexity of natural phenomena requires interdisciplinary approaches, where computing science offers the infrastructure for environmental data collection and management, scientific simulations, decision support, documentation and reporting. Ecology, environmental engineering and natural resource management comprise an excellent real-world testbed for IT system demonstration, while presenting new challenges for computer science. Complexity, uncertainty and scaling issues of natural systems constitute a demanding application domain for modelling, simulation and scientific workflows, data management and reporting, decision support and intelligent systems, distributed computing environments, geographical information systems, heterogeneous systems integration, software engineering, accounting systems, control systems, as well as sustainable manufacturing and reverse logistics. This books offers a collection of papers presented at the 6th International Conference on Environmental Engineering, held in July 2013, in Luneburg, Germany. Recent success stories in ecoinformatics, promising ideas and new challenges are discussed among computer scientists, environmental engineers, industrial engineers, economists and social scientists, demonstrating new paradigms for problem solving and decision making.
The industrial society is fast becoming an information society. As
a result, many companies are experiencing serious difficulties in
developing the new internal structures required. The increasing use
of information technology has a profound effect on markets,
products, and processes, as well as the management of and
co-operation between companies. Recognising the possibilities and
grasping the emerging potential is an important challenge for
todays management, if the organisations and systems are to develop
over the next twenty years.
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
This book is a guide to kinetic studies of reaction mechanisms. It
reviews conventional reactor types and data collection methods, and
introduces a new methodology for data collection using Temperature
Scanning Reactors (TSR). It provides a theoretical and practical
approach to temperature scanning (TS) methodology and supports a
revival of kinetic studies as a useful approach to the fundamental
understanding of chemical reaction mechanisms and the consequential
reaction kinetics.
Industrial Engineering (IE) is concerned with the design, improvement, and installation of integrated systems of people, material, equipment, and energy. Industrial engineers face many problems with incomplete and vague information in these systems since the characteristics of these problems often require this kind of information. Fuzzy sets approaches are usually most appropriate when human evaluations and the modeling of human knowledge are needed. IE brings a significant number of applications of fuzzy set theory. After an introductory chapter explaining the recent status of fuzzy sets in IE, this volume involves application chapters on the major seven areas of IE to which fuzzy set theory can contribute. These major application areas are Control and Reliability, Engineering Economics and Investment Analysis, Group and Multi-criteria Decision-making, Human Factors Engineering and Ergonomics, Manufacturing Systems and Technology Management, Optimization Techniques, and Statistical Decision-making. Under these major areas, every chapter includes didactic numerical applications. The authors
Simulating Fuzzy Systems demonstrates how many systems naturally become fuzzy systems and shows how regular (crisp) simulation can be used to estimate the alpha-cuts of the fuzzy numbers used to analyze the behavior of the fuzzy system. This monograph presents a concise introduction to fuzzy sets, fuzzy logic, fuzzy estimation, fuzzy probabilities, fuzzy systems theory, and fuzzy computation. It also presents a wide selection of simulation applications ranging from emergency rooms to machine shops to project scheduling, showing the varieties of fuzzy systems.
Reasoning in Boolean Networks provides a detailed treatment of recent research advances in algorithmic techniques for logic synthesis, test generation and formal verification of digital circuits. The book presents the central idea of approaching design automation problems for logic-level circuits by specific Boolean reasoning techniques. While Boolean reasoning techniques have been a central element of two-level circuit theory for many decades Reasoning in Boolean Networks describes a basic reasoning methodology for multi-level circuits. This leads to a unified view on two-level and multi-level logic synthesis. The presented reasoning techniques are applied to various CAD-problems to demonstrate their usefulness for today's industrially relevant problems. Reasoning in Boolean Networks provides lucid descriptions of basic algorithmic concepts in automatic test pattern generation, logic synthesis and verification and elaborates their intimate relationship to provide further intuition and insight into the subject. Numerous examples are provide for ease in understanding the material. Reasoning in Boolean Networks is intended for researchers in logic synthesis, VLSI testing and formal verification as well as for integrated circuit designers who want to enhance their understanding of basic CAD methodologies.
This book explores clustering operations in the context of social networks and consensus-reaching paths that take into account non-cooperative behaviors. This book focuses on the two key issues in large-scale group decision-making: clustering and consensus building. Clustering aims to reduce the dimension of a large group. Consensus reaching requires that the divergent individual opinions of the decision makers converge to the group opinion. This book emphasizes the similarity of opinions and social relationships as important measurement attributes of clustering, which makes it different from traditional clustering methods with single attribute to divide the original large group without requiring a combination of the above two attributes. The proposed consensus models focus on the treatment of non-cooperative behaviors in the consensus-reaching process and explores the influence of trust loss on the consensus-reaching process.The logic behind is as follows: firstly, a clustering algorithm is adopted to reduce the dimension of decision-makers, and then, based on the clusters' opinions obtained, a consensus-reaching process is carried out to obtain a decision result acceptable to the majority of decision-makers. Graduates and researchers in the fields of management science, computer science, information management, engineering technology, etc., who are interested in large-scale group decision-making and consensus building are potential audience of this book. It helps readers to have a deeper and more comprehensive understanding of clustering analysis and consensus building in large-scale group decision-making. |
You may like...
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland
Paperback
(4)
Song For Sarah - Lessons From My Mother
Jonathan Jansen, Naomi Jansen
Hardcover
(3)
|