![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Paralleling emerging trends in cyber-health technology, concerns are mounting about racial and ethnic disparities in health care utilization and outcomes. This book brings these themes together, challenging readers to use, promote, and develop new technology-based methods for closing these gaps. Edited by a leading urban health advocate and featuring 16 expert contributors, the book examines cyber-strategies with the greatest potential toward effective, equitable care, improved service delivery and better health outcomes for all. The rise of e-Patients and the transformation of the doctor-patient relationship are also discussed.
This book focuses on the progress of G20 members on entrepreneurship services since the G20 Entrepreneurship Action Plan was issued at the G20 Hangzhou Summit in China. The authors analyse the similarities and differences of policy measures taken by G20 members from five aspects of entrepreneurship services: government services, fiscal and financial supports, entrepreneur services, entrepreneurship education, and fair competition for SMEs. The book aims to bridge academic research with the multilevel and diverse practice in entrepreneurial activities and explores how national policies and conditions can promote entrepreneurship among G20 members. This book will inspire the policy- makers, stakeholders in the entrepreneurship ecosystems and scholars on entrepreneurship research as well, on how to promote the entrepreneurship as an effective way to stimulate employment growth, boost innovation development, and realize economic recovery in the post- COVID-19 era.
Modeling by Object-Driven Linear Elemental Relations (MODLER) is a computer language for representing linear programming models, completely separate from instances defined by data realizations. It also includes representations of binary variables and logical constraints, which arise naturally in large-scale planning and operational decision support. The basic input to MODLER is a model file, and its basic output is a matrix file that is in a standard (MPS) format for most optimizers and for ANALYZE and RANDMOD. MODLER can also generate a syntax file for ANALYZE to enable automatic translation of activities and constraints into English for intelligent analysis support. The book is accompanied by a DOS version of MODLER on 3.5 inch diskettes and A Laboratory Manual for Teaching Linear Programming is available upon request.
The European Computing Conference offers a unique forum for establishing new collaborations within present or upcoming research projects, exchanging useful ideas, presenting recent research results, participating in discussions and establishing new academic collaborations, linking university with the industry. Engineers and Scientists working on various areas of Systems Theory, Applied Mathematics, Simulation, Numerical and Computational Methods and Parallel Computing present the latest findings, advances, and current trends on a wide range of topics. This proceedings volume will be of interest to students, researchers, and practicing engineers.
"Digital age", "digital society", "digital civilization" many expressions are used to describe the major cultural transformation of our contemporary societies. Digital Dictionary presents the multiple facets of this phenomenon, which was born of computers and continues to permeate all human activity as it progresses at a rapid pace. In this multidisciplinary work, experts, academics and practitioners invite us to discover the digital world from various technological and societal perspectives. In this book, citizens, trainers, political leaders or association members, students and users will find a base of knowledge that will allow them to update their understanding and become stakeholders in current societal changes.
Philosophy of the Text This text presents an introductory survey of the basic concepts and applied mathematical methods of nonlinear science as well as an introduction to some simple related nonlinear experimental activities. Students in engineering, phys ics, chemistry, mathematics, computing science, and biology should be able to successfully use this book. In an effort to provide the reader with a cutting edge approach to one of the most dynamic, often subtle, complex, and still rapidly evolving, areas of modern research-nonlinear physics-we have made extensive use of the symbolic, numeric, and plotting capabilities of the Maple software sys tem applied to examples from these disciplines. No prior knowledge of Maple or computer programming is assumed, the reader being gently introduced to Maple as an auxiliary tool as the concepts of nonlinear science are developed. The CD-ROM provided with this book gives a wide variety of illustrative non linear examples solved with Maple. In addition, numerous annotated examples are sprinkled throughout the text and also placed on the CD. An accompanying set of experimental activities keyed to the theory developed in Part I of the book is given in Part II. These activities allow the student the option of "hands on" experience in exploring nonlinear phenomena in the REAL world. Although the experiments are easy to perform, they give rise to experimental and theoretical complexities which are not to be underestimated."
Welcome to ANALYZE, designed to provide computer assistance for analyzing linear programs and their solutions. Chapter 1 gives an overview of ANALYZE and how to install it. It also describes how to get started and how to obtain further documentation and help on-line. Chapter 2 reviews the forms of linear programming models and describes the syntax of a model. One of the routine, but important, functions of ANALYZE is to enable convenient access to rows and columns in the matrix by conditional delineation. Chapter 3 illustrates simple queries, like DISPLAY, LIST, and PICTURE. This chapter also introduces the SUBMAT command level to define any submatrix by an arbitrary sequence of additions, deletions and reversals. Syntactic explanations and a schema view are also illustrated. Chapter 4 goes through some elementary exercises to demonstrate computer assisted analysis and introduce additional conventions of the ANALYZE language. Besides simple queries, it demonstrates the INTERPRT command, which automates the analysis process and gives English explanations of results. The last 2 exercises are diagnoses of elementary infeasible instances of a particular model. Chapter 5 progresses to some advanced uses of ANALYZE. The first is blocking to obtain macro views of the model and for finding embedded substructures, like a netform. The second is showing rates of substitution described by the basic equations. Then, the use of the REDUCE and BASIS commands are illustrated for a variety of applications, including solution analysis, infeasibility diagnosis, and redundancy detection."
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications is the first book to show how to use high-level synthesis techniques to cope with the stringent timing requirements of complex high-throughput real-time signal and data processing. The book describes the state-of-the-art in architectural synthesis for complex high-throughput real-time processing. Unlike many other, the Synthesis approach used in this book targets an architecture style or an application domain. This approach is thus heavily application-driven and this is illustrated in the book by several realistic demonstration examples used throughout. Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications focuses on domains where application-specific high-speed solutions are attractive such as significant parts of audio, telecom, instrumentation, speech, robotics, medical and automotive processing, image and video processing, TV, multi-media, radar, sonar, etc. Moreover, it addresses mainly the steps above the traditional scheduling and allocation tasks which focus on scalar operations and data. Accelerator Data-Path Synthesis for High-Throughput Signal Processing Applications is of interest to researchers, senior design engineers and CAD managers both in academia and industry. It provides an excellent overview of what capabilities to expect from future practical design tools and includes an extensive bibliography.
Computing Tools for Modeling, Optimization and Simulation reflects the need for preserving the marriage between operations research and computing in order to create more efficient and powerful software tools in the years ahead. The 17 papers included in this volume were carefully selected to cover a wide range of topics related to the interface between operations research and computer science. The volume includes the now perennial applications of rnetaheuristics (such as genetic algorithms, scatter search, and tabu search) as well as research on global optimization, knowledge management, software rnaintainability and object-oriented modeling. These topics reflect the complexity and variety of the problems that current and future software tools must be capable of tackling. The OR/CS interface is frequently at the core of successful applications and the development of new methodologies, making the research in this book a relevant reference in the future. The editors' goal for this book has been to increase the interest in the interface of computer science and operations research. Both researchers and practitioners will benefit from this book. The tutorial papers may spark the interest of practitioners for developing and applying new techniques to complex problems. In addition, the book includes papers that explore new angles of well-established methods for problems in the area of nonlinear optimization and mixed integer programming, which seasoned researchers in these fields may find fascinating.
The development of cognitive models is a key step in the challenging research program to advance our understanding of human cognition and behavior. Dynamical models represent a general and flexible approach to cognitive modeling. This introduction focuses on applications of stochastic processes and dynamical systems to model cognition. The dynamical approach is particularly useful to emphasize the strong link between experimental research (and its paradigms), data analysis, and mathematical models including their computer implementation for numerical simulation. Most of specific examples are from the domain of eye movement research, with concepts being applicable to a broad range of problems in cognitive modeling. The textbook aims at the graduate and/or advanced undergraduate level for students in Cognitive Science and related disciplines such as Psychology and Computer Science. Joint introduction of the theory of cognitive processes and mathematical models, their underlying mathematical concepts, numerical simulation, and analysis; The focus on eye movements provide a theoretically coherent, but very general application area; Computer code in R Programming Language for Statistical Computing is available for all examples, figures, and solutions to exercises.
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
In the last decade, there have been an increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization and compressed sensing. In particular, many theoretical and applied works in statistical physics and computer science have relied on the use of message passing algorithms and their connection to statistical physics of spin glasses. The aim of this book, especially adapted to PhD students, post-docs, and young researchers, is to present the background necessary for entering this fast developing field.
Although asynchronous circuits date back to the early 1950s most of
the digital circuits in use today are synchronous because,
traditionally, asynchronous circuits have been viewed as difficult
to understand and design. In recent years, however, there has been
a great surge of interest in asynchronous circuits, largely through
the development of new asynchronous design methodologies.
An introduction to operating systems, covering processes, states of processes, synchronization, programming methods of synchronization, main memory, secondary storage and file systems. Although the book is short, it covers all the essentials and opens up synchronization by introducing a metaphor: producer--consumer that other authors have employed. The difference is that the concept is presented without the programming normally involved with the concept. The thinking is that using a warehouse, the size of which is the shared variable in synchronization terms, without the programming will aid in understanding to this difficult concept. The book also covers main memory, secondary storage with file systems, and concludes with a brief discussion of the client-server paradigm and the way in which client-server impacts the design of the World-Wide Web.
For many years, the dominant fault model in automatic test pattern gen eration (ATPG) for digital integrated circuits has been the stuck-at fault model. The static nature of stuck-at fault testing when compared to the extremely dynamic nature of integrated circuit (IC) technology has caused many to question whether or not stuck-at fault based testing is still viable. Attempts at answering this question have not been wholly satisfying due to a lack of true quantification, statistical significance, and/or high computational expense. In this monograph we introduce a methodology to address the ques tion in a manner which circumvents the drawbacks of previous approaches. The method is based on symbolic Boolean functional analyses using Or dered Binary Decision Diagrams (OBDDs). OBDDs have been conjectured to be an attractive representation form for Boolean functions, although cases ex ist for which their complexity is guaranteed to grow exponentially with input cardinality. Classes of Boolean functions which exploit the efficiencies inherent in OBDDs to a very great extent are examined in Chapter 7. Exact equa tions giving their OBDD sizes are derived, whereas until very recently only size bounds have been available. These size equations suggest that straight forward applications of OBDDs to design and test related problems may not prove as fruitful as was once thought."
Software systems that used to be relatively autonomous entities
such as e.g. accounting systems, order-entry systems etc. are now
interlinked in large networks comprising extensive information
infrastructures. What earlier used to be stand-alone proprietary
systems are now for the most part replaced by more or less
standardized interdependent systems that form large networks of
production and use. Organizations have to make decisions about what
office suite to purchase? The easiest option is to continuously
upgrade the existing office suite to the latest version, but the
battle between WordPerfect and Microsoft Word demonstrated that the
choice is not obvious. What instant messenger network to join for
global communication? Preferably the one most colleagues and
friends use; AOL Instant Messenger, Microsoft Messenger, and ICQ
represent three satisfactory, but disjunctive alternatives.
Similarly organizations abandon their portfolio of homegrown IT
systems and replace them with a single Enterprise Resource Planning
(ERP) system. Several ERP alternatives exist on the market, but
which is the right one for you? The argumentation and rationale
behind these considerations are obviously related to the
technological and social networks we are embedded in, but it is not
always easy to specify how.
Juraj Hromkovic takes the reader on an elegant route through the theoretical fundamentals of computer science. The author shows that theoretical computer science is a fascinating discipline, full of spectacular contributions and miracles. The book also presents the development of the computer scientist's way of thinking as well as fundamental concepts such as approximation and randomization in algorithmics, and the basic ideas of cryptography and interconnection network design.
Since the 1950's character recognition has been an active field of research for computer scientists worldwide. The main reason is that character recognition is not only an interesting area of theoretical research with relevance to many pattern recognition sub-fields, but also a very needed and useful real life application. Making computers able to read would allow for substantial savings in terms of the costs for data entry, mail processing, form processing and many other similar situations. Every realistic character recognition system requires a feature extraction step in order to properly operate. This book is a large-scale review of the feature extraction approaches for character recognition based on literature review and experimental results. An original classification system is described, which groups feature extraction methods depending on their theoretical approach. The developed classification system aids in comparison and analysis of the feature extraction methods.
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals can commit new kinds of crimes, where governments can exert political pressure, and where we can be hurt by the unthinking actions of the bored and careless. Making cyberspace more secure is one of the challenges of our times. This is not only (or perhaps even primarily) a technical challenge. It requires actions by governments and businesses to encourage security whenever possible, and to make sure that their own actions do not undermine it. Unfortunately, many of those in a position to do something about cybersecurity do not have the background to understand the issues fully. Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.
The target audience of this book is students and researchers in computational sciences who need to develop computer codes for solving partial differential equations. The exposition is focused on numerics and software related to mathematical models in solid and fluid mechanics. The book teaches finite element methods, and basic finite difference methods from a computational point of view. The main emphasis regards development of flexible computer programs, using the numerical library Diffpack. The application of Diffpack is explained in detail for problems including model equations in applied mathematics, heat transfer, elasticity, and viscous fluid flow. Diffpack is a modern software development environment based on C++ and object-oriented programming. All the program examples, as well as a test version of Diffpack, are available for free over the Internet. The second edition contains several new applications and projects, improved explanations, correction of errors, and is up to date with Diffpack version 4.0.
This stimulating textbook presents a broad and accessible guide to the fundamentals of discrete mathematics, highlighting how the techniques may be applied to various exciting areas in computing. The text is designed to motivate and inspire the reader, encouraging further study in this important skill. Features: This book provides an introduction to the building blocks of discrete mathematics, including sets, relations and functions; describes the basics of number theory, the techniques of induction and recursion, and the applications of mathematical sequences, series, permutations, and combinations; presents the essentials of algebra; explains the fundamentals of automata theory, matrices, graph theory, cryptography, coding theory, language theory, and the concepts of computability and decidability; reviews the history of logic, discussing propositional and predicate logic, as well as advanced topics such as the nature of theorem proving; examines the field of software engineering, including software reliability and dependability and describes formal methods; investigates probability and statistics and presents an overview of operations research and financial mathematics.
This book provides a practical introduction to computationally solving discrete optimization problems using dynamic programming. From the examples presented, readers should more easily be able to formulate dynamic programming solutions to their own problems of interest. We also provide and describe the design, implementation, and use of a software tool that has been used to numerically solve all of the problems presented earlier in the book.
The built environment has been digitizing rapidly and is now transforming into a physical world that is at all times supplemented by a fully web-supported and interconnected digital version, often referred to as Digital Twin. This book shows how diverse data models and web technologies can be created and used for the built environment. Key features of this book are its technical nature and technical detail. The first part of the book highlights a large diversity of IT techniques and their use in the AEC domain, from JSON to XML to EXPRESS to RDF/OWL, for modelling geometry, products, properties, sensor and energy data. The second part of the book focuses on diverse software solutions and approaches, including digital twins, federated data storage on the web, IoT, cloud computing, and smart cities. Key research and strategic development opportunities are comprehensively discussed for distributed web-based building data management, IoT integration and cloud computing. This book aims to serve as a guide and reference for experts and professionals in AEC computing and digital construction including Master's students, PhD researchers, and junior to senior IT-oriented AEC professionals. |
You may like...
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,065
Discovery Miles 40 650
|