![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
The book investigates various MPPT algorithms, and the optimization of solar energy using machine learning and deep learning. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse engineering domains including electrical, electronics and communication, computer, and environmental. This book: Discusses data acquisition by the internet of things for real-time monitoring of solar cells. Covers artificial neural network techniques, solar collector optimization, and artificial neural network applications in solar heaters, and solar stills. Details solar analytics, smart centralized control centers, integration of microgrids, and data mining on solar data. Highlights the concept of asset performance improvement, effective forecasting for energy production, and Low-power wide-area network applications. Elaborates solar cell design principles, the equivalent circuits of single and two diode models, measuring idealist factors, and importance of series and shunt resistances. The text elaborates solar cell design principles, the equivalent circuit of single diode model, the equivalent circuit of two diode model, measuring idealist factor, and importance of series and shunt resistances. It further discusses perturb and observe technique, modified P&O method, incremental conductance method, sliding control method, genetic algorithms, and neuro-fuzzy methodologies. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse engineering domains including electrical, electronics and communication, computer, and environmental.
The methodological needs of environmental studies are unique in the breadth of research questions that can be posed, calling for a textbook that covers a broad swath of approaches to conducting research with potentially many different kinds of evidence. Fully updated to address new developments such as the effects of the internet, recent trends in the use of computers, remote sensing, and large data sets, this new edition of Research Methods for Environmental Studies is written specifically for social science-based research into the environment. This revised edition contains new chapters on coding, focus groups, and an extended treatment of hypothesis testing. The textbook covers the best-practice research methods most used to study the environment and its connections to societal and economic activities and objectives. Over five key parts, Kanazawa introduces quantitative and qualitative approaches, mixed methods, and the special requirements of interdisciplinary research, emphasizing that methodological practice should be tailored to the specific needs of the project. Within these parts, detailed coverage is provided on key topics including the identification of a research project, hypothesis testing, spatial analysis, the case study method, ethnographic approaches, discourse analysis, mixed methods, survey and interview techniques, focus groups, and ethical issues in environmental research. Drawing on a variety of extended and updated examples to encourage problem-based learning and fully addressing the challenges associated with interdisciplinary investigation, this book will be an essential resource for students embarking on courses exploring research methods in environmental studies.
As Information Technology continues to evolve as a key strategic enabler, many establishments feel the need to think more holistically about how IT can support corporate sustainability efforts. This book aims to recognize these efforts and best practices in numerous business settings. Sustainability is expensive, and requires collaboration between many different areas of the business. The solution to growing burden of carbon emission lies within the technology innovation as continued advancements in processes make businesses lean and smart. The multidisciplinary approach the book uses will be appreciated by students, academics and researchers in Information Technology, Management, Corporate, and Sustainability Champions. Print edition not for sale in South Asia (India, Sri Lanka, Nepal, Bangladesh, Pakistan and Bhutan)
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.
This volume covers a variety of topics related to the practice of rule-based modeling, a type of mathematical modeling useful for studying biomolecular site dynamics. There is an emphasis on software tools and detailed descriptions of techniques. The chapters in this book discuss topics such as software tools and frameworks for compartmental modeling (Pycellerator, RuleBuilder, Prgy, rxncon, MSMB, and ML-Rules); tools for spatial modeling (Simmune, Smoldyn, MCell-R, SRSim, and CellOrganizer); rule-based models to analyze proteomic data; model annotation; Markov chain aggregation; BioJazz; and methods to identify model parameters (Data2Dynamics, RKappa, and BioNetFit). Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary resources, step-by-step, readily reproducible protocols, and tips on troubleshooting and avoiding known pitfalls. Cutting-edge and thorough, Modeling Biomolecular Site Dynamics: Methods and Protocols is a valuable resource for both the novice and expert rule-based modeler. It will also appeal to systems biologists and help them enhance their studies with easy-to-read and write rule-based models.
This new volume discusses how integrating IoT devices and cyber-physical systems can help society by providing multiple efficient and affordable services to users. It covers the various applications of IoT-based cyber-physical systems, such as satellite imaging in relation to climate change, industrial control systems, e-healthcare applications, security uses, automotive and traffic monitoring and control, urban smart city planning, and more. The authors also outline the methods, tools, and algorithms for IoT-based cyber-physical systems and explore the integration of machine learning, blockchain, and Internet of Things-based cloud applications. With the continuous emerging new technologies and trends in IoT technology and CPS, this volume will be a helpful resource for scientists, researchers, industry professionals, faculty and students, and others who wish to keep abreast of new developments and new challenges for sustainable development in Industry 4.0.
Teach students to maximize the use of mobile devices, make the most of online tools for collaboration and communications, and fully utilize today's Internet capabilities with the latest edition DISCOVERING COMPUTERS ENHANCED. Introductory computing students see how technology skills assist in employment and advancing careers. This edition highlights the most recent developments in computer tools and technology with new emphasis on Web Development, creating a strong web presence, and the latest Windows 10 information. To keep content as current as possible, online coverage of contemporary technology developments builds on the book's discussions. The authors emphasize actionable content with a proven learning structure and practice to reinforce key skills. Self-assessments open each chapter, enabling learners to target study and learn more in less time. DISCOVERING COMPUTERS ENHANCED presents the content students need to succeed in a way that ensures understanding.
This book was motivated by the problems being faced with shrinking IC process feature sizes. It is well known that as process feature sizes shrink, a host of electrical problems like cross-talk, electromigration, self-heat, etc. are becoming important. Cross-talk is one of the major problems since it results in unpredictable design behavior. In particular, it can result in significant delay variation or signal integrity problems in a wire, depending on the state of its neighboring wires. Typical approaches to tackle the cross-talk problem attempt to fix the problem once it is created. In our approach, we ensure that cross-talk is eliminated by design. The work described in this book attempts to take an "outside-the-box" view and propose a radically different design style. This design style first imposes a fixed layout pattern (or fabric) on the integrated circuit, and then embeds the circuit being implemented into this fabric. The fabric is chosen carefully in order to eliminate the cross-talk problem being faced in modem IC processes. With our choice of fabric, cross-talk between adjacent wires on an IC is reduced by between one and two orders of magnitude. In this way, the fabric concept eliminates cross-talk up-front, and by design. We propose two separate design flows, each of which uses the fabric concept to implement logic. The first flow uses fabric-compliant standard cells as an im plementation vehicle. We call these cells fabric cells, and they have the same logic functionality as existing standard cells with which they are compared."
This authored volume presents the fundamentals of NeuroIS, which is an emerging subfield within the Information Systems discipline that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, use, and impact of information and communication technologies. This book is an initial guide to this new research domain. The target audience primarily comprises PhD students and researchers, but the book may also be beneficial for graduate students and practitioners.
The book presents the life and works of one of Germany's most famous computer scientists, Carl Adam Petri. It is written in a vivid and entertaining manner, providing an in-depth discussion of the background behind Petri's best-known contribution to computer science, the Petri net. In this way the book can be read as a first introduction to nets, but it also covers the theoretical, physical and philosophical foundations behind nets, thus facilitating a comprehensive understanding of the wider range of Petri's works. The book is intended for readers with a previous knowledge in computer science, as well as for "interested non-professionals", who want to get to know a remarkable personality of contemporary science.
There are very few books that focus on the unique challenges of technology leadership that are written by a technology leader. This book examines leadership challenges that technologists face and provides simple strategies and practical tools for increasing personal leadership skills. The book provides a path to move from being an average leader to being a great leader.
The book discusses the fundamentals of high-performance computing. The authors combine visualization, comprehensibility, and strictness in their material presentation, and thus influence the reader towards practical application and learning how to solve real computing problems. They address both key approaches to programming modern computing systems: multithreading-based parallelizing in shared memory systems, and applying message-passing technologies in distributed systems. The book is suitable for undergraduate and graduate students, and for researchers and practitioners engaged with high-performance computing systems. Each chapter begins with a theoretical part, where the relevant terminology is introduced along with the basic theoretical results and methods of parallel programming, and concludes with a list of test questions and problems of varying difficulty. The authors include many solutions and hints, and often sample code.
Soft computing techniques are widely used in most businesses. This book consists of several important papers on the applications of soft computing techniques for the business field. The soft computing techniques used in this book include (or very closely related to): Bayesian networks, biclustering methods, case-based reasoning, data mining, Dempster-Shafer theory, ensemble learning, evolutionary programming, fuzzy decision trees, hidden Markov models, intelligent agents, k-means clustering, maximum likelihood Hebbian learning, neural networks, opportunistic scheduling, probability distributions combined with Monte Carlo methods, rough sets, self organizing maps, support vector machines, uncertain reasoning, other statistical and machine learning techniques, and combinations of these techniques. The businesses or business problems addressed in this book include (or very closely related to): analysis of correlations between currency exchange rates, analysis of USA banks and Moody s bank financial strength rating, arrears management, business risk identification, company audit fee evaluation, dental treatments, business internal control, intelligent tutoring systems and educational assessment, modeling agent behavior, motor insurance industry, personal loan defaults, pricing strategies for increasing the market share, pricing strategies in supply chain management, probabilistic sales forecasting, user relevance feedback analysis for online text retrieval, and world crude oil spot price forecasting."
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
This monograph, for the first time in book form, considers the large structure of metric spaces as captured by bornologies: families of subsets that contain the singletons, that are stable under finite unions, and that are stable under taking subsets of its members. The largest bornology is the power set of the space and the smallest is the bornology of its finite subsets. Between these lie (among others) the metrically bounded subsets, the relatively compact subsets, the totally bounded subsets, and the Bourbaki bounded subsets. Classes of functions are intimately connected to various bornologies; e.g., (1) a function is locally Lipschitz if and only if its restriction to each relatively compact subset is Lipschitz; (2) a subset is Bourbaki bounded if and only if each uniformly continuous function on the space is bounded when restricted to the subset. A great deal of attention is given to the variational notions of strong uniform continuity and strong uniform convergence with respect to the members of a bornology, leading to the bornology of UC-subsets and UC-spaces. Spaces on which its uniformly continuous real-valued functions are stable under pointwise product are characterized in terms of the coincidence of the Bourbaki bounded subsets with a usually larger bornology. Special attention is given to Lipschitz and locally Lipschitz functions. For example, uniformly dense subclasses of locally Lipschitz functions within the real-valued continuous functions, Cauchy continuous functions, and uniformly continuous functions are presented. It is shown very generally that a function between metric spaces has a particular metric property if and only if whenever it is followed in a composition by a real-valued Lipschitz function, the composition has the property. Bornological convergence of nets of closed subsets, having Attouch-Wets convergence as a prototype, is considered in detail. Topologies of uniform convergence for continuous linear operators between normed spaces is explained in terms of the bornological convergence of their graphs. Finally, the idea of a bornological extension of a topological space is presented, and all regular extensions can be so realized.
China's Belt and Road Initiatives (BRI) is an ambitious infrastructure project conceived in 2013 by President Xi Jinping with development and investment initiatives stretching from Asia and Europe that reflect the original Silk Road with business networks through countries such as Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as India and Pakistan, spanning a route of more than four thousand miles and history that can be dated back more than 2200 years. Given the background of China's unique approach in fighting the COVID-19, and against the backdrop of sluggish economic growth, innovation and management within the sustainable development of BRI will be the key and the driving force for the post-pandemic economic recovery for many countries, especially when BRI countries now accounts for nearly 30% of China's foreign trade and 15% of outward direct investment. The vision to create a vast network of railways, energy pipelines, highways, and streamlined border crossings to expand the international use of Chinese currency and improve connectivity to China is good foresight and fortuitous with COVID-19 pandemic came to plague the world, and amid in the conflicts between US and China as well as a War between Russia and Ukraine. Since the inception of BRI many books are written to cover topics ranging from globalization to detailing how China's business and politics as a major motivation for China's overseas economic activities with case studies and practices, yet seldom of these books provide structured approach to the sustainable management of BRI projects. This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project. Here the readers will find guidelines and insights to survive and prosper in a myriad of BRI opportunities and risks. Most important of all, this book provides a glimpse of different approach for success in BRI projects, including sustainability, environmental issues, social and political aspects, technological, choice of industry, project management, education and training, governance and many more.
Is your enterprise architecture making a difference? Does it contribute to the goals of your company? Are the architects your best paid employees? If you are striving for a full-hearted yes to these questions, this is the book for you. Building an Enterprise Architecture Practice provides practical advice on how to develop your enterprise architecture practice. The authors developed different tools and models to support organizations in implementing and professionalizing an enterprise architecture function. The application of these tools and models in many different organizations forms the basis for this book. The result is a hands-on book that will help you to avoid certain pitfalls and achieve success with enterprise architecture. A lot of organizations nowadays have a team of enterprise architects at work but struggle with questions like: a [ How do I show the added value of enterprise architecture? a [ How do I determine what specific architectures are necessary for my organization? a [ What steps do I need to take to improve my enterprise architecture practice? a [ How do I fulfill the role of enterprise architect? These questions are answered in this book and illustrated with a lot of best practices. After reading the book the reader will have a better understanding of what makes enterprise architecture successful and will possess the tools to analyse his own situation and build an enterprise architecture practice accordingly. ---------------------------------------------------------------------------------------------------- This book clearly describes how to establish an architecture practice that delivers value for an organization. The authorsdemonstrate a wealth of experience and a deep understanding of the multifaceted nature of this challenging task and they provide sound advice on how to avoid the many pitfalls that may be encountered along the way. Recognising that there is no 'one-size-fits-all' approach, they show how to deploy a range of practical tools and approaches that will enable each organization to create its own road map to success. In particular, their Maturity Matrix is invaluable for balancing architecture priorities and targeting improvements. The book makes a significant contribution to the professionalization of the architect role. Sally Bean, Enterprise Architecture Consultant ---------------------------------------------------------------------------------------------------- Too many books on enterprise architecture leave one in a state of mental fuzziness: After reading them, the reader has learned a lot of impressive words but still does not know how to design an enterprise architecture. This step by step guide to DYA is different. It provides pragmatic guidelines for developing enterprise architecture and presents a maturity model that helps the users of DYA to state realistic goals and to outline feasible steps to achieve these goals. Particularly useful is the emphasis on a coherent enterprise architecture vision, including the value added by the architecture. I warmly recommend this book to practicing enterprise architects. Prof. Dr. Roel Wieringa, Universiteit Twente
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
The study of the brain and behavior is illuminated with the discovery of invariances. Experimental brain research uncovers constancies amidst variation, with respect to interventions and transformations prescribed by experimental paradigms. Place cells, mirror neurons, event related potentials and areas differentially active in fMRI, all illustrate the pervasive role of invariances in neural systems in relation to their function.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource. |
You may like...
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,434
Discovery Miles 14 340
OS X Exploits and Defense - Own…
Paul Baccas, Kevin Finisterre, …
Paperback
R1,278
Discovery Miles 12 780
Computer Vision - Statistical Models for…
Song-Chun Zhu, Ying Nian Wu
Hardcover
R2,104
Discovery Miles 21 040
|