![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Strengthen your students' understanding and upgrade their confidence and exam skills with our OCR Computer Science workbooks, full of self-contained exercises to consolidate knowledge and exam practice questions to improve performance. Written by an experienced Computer Science author, these full colour workbooks provide stimulus materials on all AS and A-level topics, followed by sets of questions designed to develop and test skills in the unit. * Thoroughly prepares students for their examinations as they work through numerous practice questions that cover every question type in the specification. * Helps students identify their revision needs and see how to target the top grades using online answers for each question. * Encourages ongoing revision throughout the course as students progressively develop their skills in class and at home. * Packed full with consolidation and exam practice questions, these workbooks can save valuable preparation time and expense, with self-contained exercises that don't need photocopying and provide instant lesson and homework solutions for specialist and non-specialist teachers. * Ensures that students feel confident tackling their exams as they know what to expect in each section.
"Digital age", "digital society", "digital civilization" many expressions are used to describe the major cultural transformation of our contemporary societies. Digital Dictionary presents the multiple facets of this phenomenon, which was born of computers and continues to permeate all human activity as it progresses at a rapid pace. In this multidisciplinary work, experts, academics and practitioners invite us to discover the digital world from various technological and societal perspectives. In this book, citizens, trainers, political leaders or association members, students and users will find a base of knowledge that will allow them to update their understanding and become stakeholders in current societal changes.
Philosophy of the Text This text presents an introductory survey of the basic concepts and applied mathematical methods of nonlinear science as well as an introduction to some simple related nonlinear experimental activities. Students in engineering, phys ics, chemistry, mathematics, computing science, and biology should be able to successfully use this book. In an effort to provide the reader with a cutting edge approach to one of the most dynamic, often subtle, complex, and still rapidly evolving, areas of modern research-nonlinear physics-we have made extensive use of the symbolic, numeric, and plotting capabilities of the Maple software sys tem applied to examples from these disciplines. No prior knowledge of Maple or computer programming is assumed, the reader being gently introduced to Maple as an auxiliary tool as the concepts of nonlinear science are developed. The CD-ROM provided with this book gives a wide variety of illustrative non linear examples solved with Maple. In addition, numerous annotated examples are sprinkled throughout the text and also placed on the CD. An accompanying set of experimental activities keyed to the theory developed in Part I of the book is given in Part II. These activities allow the student the option of "hands on" experience in exploring nonlinear phenomena in the REAL world. Although the experiments are easy to perform, they give rise to experimental and theoretical complexities which are not to be underestimated."
Welcome to ANALYZE, designed to provide computer assistance for analyzing linear programs and their solutions. Chapter 1 gives an overview of ANALYZE and how to install it. It also describes how to get started and how to obtain further documentation and help on-line. Chapter 2 reviews the forms of linear programming models and describes the syntax of a model. One of the routine, but important, functions of ANALYZE is to enable convenient access to rows and columns in the matrix by conditional delineation. Chapter 3 illustrates simple queries, like DISPLAY, LIST, and PICTURE. This chapter also introduces the SUBMAT command level to define any submatrix by an arbitrary sequence of additions, deletions and reversals. Syntactic explanations and a schema view are also illustrated. Chapter 4 goes through some elementary exercises to demonstrate computer assisted analysis and introduce additional conventions of the ANALYZE language. Besides simple queries, it demonstrates the INTERPRT command, which automates the analysis process and gives English explanations of results. The last 2 exercises are diagnoses of elementary infeasible instances of a particular model. Chapter 5 progresses to some advanced uses of ANALYZE. The first is blocking to obtain macro views of the model and for finding embedded substructures, like a netform. The second is showing rates of substitution described by the basic equations. Then, the use of the REDUCE and BASIS commands are illustrated for a variety of applications, including solution analysis, infeasibility diagnosis, and redundancy detection."
Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications is the first book to show how to use high-level synthesis techniques to cope with the stringent timing requirements of complex high-throughput real-time signal and data processing. The book describes the state-of-the-art in architectural synthesis for complex high-throughput real-time processing. Unlike many other, the Synthesis approach used in this book targets an architecture style or an application domain. This approach is thus heavily application-driven and this is illustrated in the book by several realistic demonstration examples used throughout. Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications focuses on domains where application-specific high-speed solutions are attractive such as significant parts of audio, telecom, instrumentation, speech, robotics, medical and automotive processing, image and video processing, TV, multi-media, radar, sonar, etc. Moreover, it addresses mainly the steps above the traditional scheduling and allocation tasks which focus on scalar operations and data. Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications is of interest to researchers, senior design engineers and CAD managers both in academia and industry. It provides an excellent overview of what capabilities to expect from future practical design tools and includes an extensive bibliography.
Computing Tools for Modeling, Optimization and Simulation reflects the need for preserving the marriage between operations research and computing in order to create more efficient and powerful software tools in the years ahead. The 17 papers included in this volume were carefully selected to cover a wide range of topics related to the interface between operations research and computer science. The volume includes the now perennial applications of rnetaheuristics (such as genetic algorithms, scatter search, and tabu search) as well as research on global optimization, knowledge management, software rnaintainability and object-oriented modeling. These topics reflect the complexity and variety of the problems that current and future software tools must be capable of tackling. The OR/CS interface is frequently at the core of successful applications and the development of new methodologies, making the research in this book a relevant reference in the future. The editors' goal for this book has been to increase the interest in the interface of computer science and operations research. Both researchers and practitioners will benefit from this book. The tutorial papers may spark the interest of practitioners for developing and applying new techniques to complex problems. In addition, the book includes papers that explore new angles of well-established methods for problems in the area of nonlinear optimization and mixed integer programming, which seasoned researchers in these fields may find fascinating.
The development of cognitive models is a key step in the challenging research program to advance our understanding of human cognition and behavior. Dynamical models represent a general and flexible approach to cognitive modeling. This introduction focuses on applications of stochastic processes and dynamical systems to model cognition. The dynamical approach is particularly useful to emphasize the strong link between experimental research (and its paradigms), data analysis, and mathematical models including their computer implementation for numerical simulation. Most of specific examples are from the domain of eye movement research, with concepts being applicable to a broad range of problems in cognitive modeling. The textbook aims at the graduate and/or advanced undergraduate level for students in Cognitive Science and related disciplines such as Psychology and Computer Science. Joint introduction of the theory of cognitive processes and mathematical models, their underlying mathematical concepts, numerical simulation, and analysis; The focus on eye movements provide a theoretically coherent, but very general application area; Computer code in R Programming Language for Statistical Computing is available for all examples, figures, and solutions to exercises.
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
In the last decade, there have been an increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization and compressed sensing. In particular, many theoretical and applied works in statistical physics and computer science have relied on the use of message passing algorithms and their connection to statistical physics of spin glasses. The aim of this book, especially adapted to PhD students, post-docs, and young researchers, is to present the background necessary for entering this fast developing field.
Although asynchronous circuits date back to the early 1950s most of
the digital circuits in use today are synchronous because,
traditionally, asynchronous circuits have been viewed as difficult
to understand and design. In recent years, however, there has been
a great surge of interest in asynchronous circuits, largely through
the development of new asynchronous design methodologies.
For many years, the dominant fault model in automatic test pattern gen eration (ATPG) for digital integrated circuits has been the stuck-at fault model. The static nature of stuck-at fault testing when compared to the extremely dynamic nature of integrated circuit (IC) technology has caused many to question whether or not stuck-at fault based testing is still viable. Attempts at answering this question have not been wholly satisfying due to a lack of true quantification, statistical significance, and/or high computational expense. In this monograph we introduce a methodology to address the ques tion in a manner which circumvents the drawbacks of previous approaches. The method is based on symbolic Boolean functional analyses using Or dered Binary Decision Diagrams (OBDDs). OBDDs have been conjectured to be an attractive representation form for Boolean functions, although cases ex ist for which their complexity is guaranteed to grow exponentially with input cardinality. Classes of Boolean functions which exploit the efficiencies inherent in OBDDs to a very great extent are examined in Chapter 7. Exact equa tions giving their OBDD sizes are derived, whereas until very recently only size bounds have been available. These size equations suggest that straight forward applications of OBDDs to design and test related problems may not prove as fruitful as was once thought."
Software systems that used to be relatively autonomous entities
such as e.g. accounting systems, order-entry systems etc. are now
interlinked in large networks comprising extensive information
infrastructures. What earlier used to be stand-alone proprietary
systems are now for the most part replaced by more or less
standardized interdependent systems that form large networks of
production and use. Organizations have to make decisions about what
office suite to purchase? The easiest option is to continuously
upgrade the existing office suite to the latest version, but the
battle between WordPerfect and Microsoft Word demonstrated that the
choice is not obvious. What instant messenger network to join for
global communication? Preferably the one most colleagues and
friends use; AOL Instant Messenger, Microsoft Messenger, and ICQ
represent three satisfactory, but disjunctive alternatives.
Similarly organizations abandon their portfolio of homegrown IT
systems and replace them with a single Enterprise Resource Planning
(ERP) system. Several ERP alternatives exist on the market, but
which is the right one for you? The argumentation and rationale
behind these considerations are obviously related to the
technological and social networks we are embedded in, but it is not
always easy to specify how.
Since the 1950's character recognition has been an active field of research for computer scientists worldwide. The main reason is that character recognition is not only an interesting area of theoretical research with relevance to many pattern recognition sub-fields, but also a very needed and useful real life application. Making computers able to read would allow for substantial savings in terms of the costs for data entry, mail processing, form processing and many other similar situations. Every realistic character recognition system requires a feature extraction step in order to properly operate. This book is a large-scale review of the feature extraction approaches for character recognition based on literature review and experimental results. An original classification system is described, which groups feature extraction methods depending on their theoretical approach. The developed classification system aids in comparison and analysis of the feature extraction methods.
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
The target audience of this book is students and researchers in computational sciences who need to develop computer codes for solving partial differential equations. The exposition is focused on numerics and software related to mathematical models in solid and fluid mechanics. The book teaches finite element methods, and basic finite difference methods from a computational point of view. The main emphasis regards development of flexible computer programs, using the numerical library Diffpack. The application of Diffpack is explained in detail for problems including model equations in applied mathematics, heat transfer, elasticity, and viscous fluid flow. Diffpack is a modern software development environment based on C++ and object-oriented programming. All the program examples, as well as a test version of Diffpack, are available for free over the Internet. The second edition contains several new applications and projects, improved explanations, correction of errors, and is up to date with Diffpack version 4.0.
This stimulating textbook presents a broad and accessible guide to the fundamentals of discrete mathematics, highlighting how the techniques may be applied to various exciting areas in computing. The text is designed to motivate and inspire the reader, encouraging further study in this important skill. Features: This book provides an introduction to the building blocks of discrete mathematics, including sets, relations and functions; describes the basics of number theory, the techniques of induction and recursion, and the applications of mathematical sequences, series, permutations, and combinations; presents the essentials of algebra; explains the fundamentals of automata theory, matrices, graph theory, cryptography, coding theory, language theory, and the concepts of computability and decidability; reviews the history of logic, discussing propositional and predicate logic, as well as advanced topics such as the nature of theorem proving; examines the field of software engineering, including software reliability and dependability and describes formal methods; investigates probability and statistics and presents an overview of operations research and financial mathematics.
This book provides a practical introduction to computationally solving discrete optimization problems using dynamic programming. From the examples presented, readers should more easily be able to formulate dynamic programming solutions to their own problems of interest. We also provide and describe the design, implementation, and use of a software tool that has been used to numerically solve all of the problems presented earlier in the book.
The built environment has been digitizing rapidly and is now transforming into a physical world that is at all times supplemented by a fully web-supported and interconnected digital version, often referred to as Digital Twin. This book shows how diverse data models and web technologies can be created and used for the built environment. Key features of this book are its technical nature and technical detail. The first part of the book highlights a large diversity of IT techniques and their use in the AEC domain, from JSON to XML to EXPRESS to RDF/OWL, for modelling geometry, products, properties, sensor and energy data. The second part of the book focuses on diverse software solutions and approaches, including digital twins, federated data storage on the web, IoT, cloud computing, and smart cities. Key research and strategic development opportunities are comprehensively discussed for distributed web-based building data management, IoT integration and cloud computing. This book aims to serve as a guide and reference for experts and professionals in AEC computing and digital construction including Master's students, PhD researchers, and junior to senior IT-oriented AEC professionals.
Juraj Hromkovic takes the reader on an elegant route through the theoretical fundamentals of computer science. The author shows that theoretical computer science is a fascinating discipline, full of spectacular contributions and miracles. The book also presents the development of the computer scientist's way of thinking as well as fundamental concepts such as approximation and randomization in algorithmics, and the basic ideas of cryptography and interconnection network design.
The goal of the research out of which this monograph grew, was to make annealing as much as possible a general purpose optimization routine. At first glance this may seem a straight-forward task, for the formulation of its concept suggests applicability to any combinatorial optimization problem. All that is needed to run annealing on such a problem is a unique representation for each configuration, a procedure for measuring its quality, and a neighbor relation. Much more is needed however for obtaining acceptable results consistently in a reasonably short time. It is even doubtful whether the problem can be formulated such that annealing becomes an adequate approach for all instances of an optimization problem. Questions such as what is the best formulation for a given instance, and how should the process be controlled, have to be answered. Although much progress has been made in the years after the introduction of the concept into the field of combinatorial optimization in 1981, some important questions still do not have a definitive answer. In this book the reader will find the foundations of annealing in a self-contained and consistent presentation. Although the physical analogue from which the con cept emanated is mentioned in the first chapter, all theory is developed within the framework of markov chains. To achieve a high degree of instance independence adaptive strategies are introduced."
This book defines and studies a combinatorial object called the pedigree and develops the theory for optimising a linear function over the convex hull of pedigrees (the Pedigree polytope). A strongly polynomial algorithm implementing the framework given in the book for checking membership in the pedigree polytope is a major contribution. This book challenges the popularly held belief in computer science that a problem included in the NP-complete class may not have a polynomial algorithm to solve. By showing STSP has a polynomial algorithm, this book settles the P vs NP question. This book has illustrative examples, figures, and easily accessible proofs for showing this unexpected result. This book introduces novel constructions and ideas previously not used in the literature. Another interesting feature of this book is it uses basic max-flow and linear multicommodity flow algorithms and concepts in these proofs establishing efficient membership checking for the pedigree polytope. Chapters 3-7 can be adopted to give a course on Efficient Combinatorial Optimization. This book is the culmination of the author's research that started in 1982 through a presentation on a new formulation of STSP at the XIth International Symposium on Mathematical Programming at Bonn.
This book provides an essential update for experienced data processing professionals, transaction managers and database specialists who are seeking system solutions beyond the confines of traditional approaches. It provides practical advice on how to manage complex transactions and share distributed databases on client servers and the Internet. Based on extensive research in over 100 companies in the USA, Europe, Japan and the UK, topics covered include : * the challenge of global transaction requirements within an expanding business perspective *how to handle long transactions and their constituent elements *possible benefits from object-oriented solutions * the contribution of knowledge engineering in transaction management * the Internet, the World Wide Web and transaction handling * systems software and transaction-processing monitors * OSF/1 and the Encina transaction monitor * active data transfers and remote procedure calls * serialization in a transaction environment * transaction locks, two-phase commit and deadlocks * improving transaction-oriented database management * the successful development of an increasingly complex transaction environment. |
You may like...
David Attenborough, Volume 34
Maria Isabel Sanchez Vegara
Hardcover
(1)
Love By Design - 6 Ingredients To Build…
Dr Sara Nasserzadeh
Paperback
Song For Sarah - Lessons From My Mother
Jonathan Jansen, Naomi Jansen
Hardcover
(3)
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, …
Paperback
Domain Theory, Logic and Computation…
Guo-Qiang Zhang, J. Lawson, …
Hardcover
R4,017
Discovery Miles 40 170
|