![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
This new volume discusses how integrating IoT devices and cyber-physical systems can help society by providing multiple efficient and affordable services to users. It covers the various applications of IoT-based cyber-physical systems, such as satellite imaging in relation to climate change, industrial control systems, e-healthcare applications, security uses, automotive and traffic monitoring and control, urban smart city planning, and more. The authors also outline the methods, tools, and algorithms for IoT-based cyber-physical systems and explore the integration of machine learning, blockchain, and Internet of Things-based cloud applications. With the continuous emerging new technologies and trends in IoT technology and CPS, this volume will be a helpful resource for scientists, researchers, industry professionals, faculty and students, and others who wish to keep abreast of new developments and new challenges for sustainable development in Industry 4.0.
Teach students to maximize the use of mobile devices, make the most of online tools for collaboration and communications, and fully utilize today's Internet capabilities with the latest edition DISCOVERING COMPUTERS ENHANCED. Introductory computing students see how technology skills assist in employment and advancing careers. This edition highlights the most recent developments in computer tools and technology with new emphasis on Web Development, creating a strong web presence, and the latest Windows 10 information. To keep content as current as possible, online coverage of contemporary technology developments builds on the book's discussions. The authors emphasize actionable content with a proven learning structure and practice to reinforce key skills. Self-assessments open each chapter, enabling learners to target study and learn more in less time. DISCOVERING COMPUTERS ENHANCED presents the content students need to succeed in a way that ensures understanding.
This book was motivated by the problems being faced with shrinking IC process feature sizes. It is well known that as process feature sizes shrink, a host of electrical problems like cross-talk, electromigration, self-heat, etc. are becoming important. Cross-talk is one of the major problems since it results in unpredictable design behavior. In particular, it can result in significant delay variation or signal integrity problems in a wire, depending on the state of its neighboring wires. Typical approaches to tackle the cross-talk problem attempt to fix the problem once it is created. In our approach, we ensure that cross-talk is eliminated by design. The work described in this book attempts to take an "outside-the-box" view and propose a radically different design style. This design style first imposes a fixed layout pattern (or fabric) on the integrated circuit, and then embeds the circuit being implemented into this fabric. The fabric is chosen carefully in order to eliminate the cross-talk problem being faced in modem IC processes. With our choice of fabric, cross-talk between adjacent wires on an IC is reduced by between one and two orders of magnitude. In this way, the fabric concept eliminates cross-talk up-front, and by design. We propose two separate design flows, each of which uses the fabric concept to implement logic. The first flow uses fabric-compliant standard cells as an im plementation vehicle. We call these cells fabric cells, and they have the same logic functionality as existing standard cells with which they are compared."
This authored volume presents the fundamentals of NeuroIS, which is an emerging subfield within the Information Systems discipline that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, use, and impact of information and communication technologies. This book is an initial guide to this new research domain. The target audience primarily comprises PhD students and researchers, but the book may also be beneficial for graduate students and practitioners.
The book presents the life and works of one of Germany's most famous computer scientists, Carl Adam Petri. It is written in a vivid and entertaining manner, providing an in-depth discussion of the background behind Petri's best-known contribution to computer science, the Petri net. In this way the book can be read as a first introduction to nets, but it also covers the theoretical, physical and philosophical foundations behind nets, thus facilitating a comprehensive understanding of the wider range of Petri's works. The book is intended for readers with a previous knowledge in computer science, as well as for "interested non-professionals", who want to get to know a remarkable personality of contemporary science.
There are very few books that focus on the unique challenges of technology leadership that are written by a technology leader. This book examines leadership challenges that technologists face and provides simple strategies and practical tools for increasing personal leadership skills. The book provides a path to move from being an average leader to being a great leader.
The book discusses the fundamentals of high-performance computing. The authors combine visualization, comprehensibility, and strictness in their material presentation, and thus influence the reader towards practical application and learning how to solve real computing problems. They address both key approaches to programming modern computing systems: multithreading-based parallelizing in shared memory systems, and applying message-passing technologies in distributed systems. The book is suitable for undergraduate and graduate students, and for researchers and practitioners engaged with high-performance computing systems. Each chapter begins with a theoretical part, where the relevant terminology is introduced along with the basic theoretical results and methods of parallel programming, and concludes with a list of test questions and problems of varying difficulty. The authors include many solutions and hints, and often sample code.
Soft computing techniques are widely used in most businesses. This book consists of several important papers on the applications of soft computing techniques for the business field. The soft computing techniques used in this book include (or very closely related to): Bayesian networks, biclustering methods, case-based reasoning, data mining, Dempster-Shafer theory, ensemble learning, evolutionary programming, fuzzy decision trees, hidden Markov models, intelligent agents, k-means clustering, maximum likelihood Hebbian learning, neural networks, opportunistic scheduling, probability distributions combined with Monte Carlo methods, rough sets, self organizing maps, support vector machines, uncertain reasoning, other statistical and machine learning techniques, and combinations of these techniques. The businesses or business problems addressed in this book include (or very closely related to): analysis of correlations between currency exchange rates, analysis of USA banks and Moody s bank financial strength rating, arrears management, business risk identification, company audit fee evaluation, dental treatments, business internal control, intelligent tutoring systems and educational assessment, modeling agent behavior, motor insurance industry, personal loan defaults, pricing strategies for increasing the market share, pricing strategies in supply chain management, probabilistic sales forecasting, user relevance feedback analysis for online text retrieval, and world crude oil spot price forecasting."
Discusses digital fashion design and e-prototyping, including 2D/3D CAD, fashion simulation, fit analysis, digital pattern cutting, marker making, and the zero-waste concept Covers digital human modelling and VR/AR technology Details digital fashion business and promotion, including application of e-tools for supply chain, e-commerce, block chain technologies, big data, and AI
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
This monograph, for the first time in book form, considers the large structure of metric spaces as captured by bornologies: families of subsets that contain the singletons, that are stable under finite unions, and that are stable under taking subsets of its members. The largest bornology is the power set of the space and the smallest is the bornology of its finite subsets. Between these lie (among others) the metrically bounded subsets, the relatively compact subsets, the totally bounded subsets, and the Bourbaki bounded subsets. Classes of functions are intimately connected to various bornologies; e.g., (1) a function is locally Lipschitz if and only if its restriction to each relatively compact subset is Lipschitz; (2) a subset is Bourbaki bounded if and only if each uniformly continuous function on the space is bounded when restricted to the subset. A great deal of attention is given to the variational notions of strong uniform continuity and strong uniform convergence with respect to the members of a bornology, leading to the bornology of UC-subsets and UC-spaces. Spaces on which its uniformly continuous real-valued functions are stable under pointwise product are characterized in terms of the coincidence of the Bourbaki bounded subsets with a usually larger bornology. Special attention is given to Lipschitz and locally Lipschitz functions. For example, uniformly dense subclasses of locally Lipschitz functions within the real-valued continuous functions, Cauchy continuous functions, and uniformly continuous functions are presented. It is shown very generally that a function between metric spaces has a particular metric property if and only if whenever it is followed in a composition by a real-valued Lipschitz function, the composition has the property. Bornological convergence of nets of closed subsets, having Attouch-Wets convergence as a prototype, is considered in detail. Topologies of uniform convergence for continuous linear operators between normed spaces is explained in terms of the bornological convergence of their graphs. Finally, the idea of a bornological extension of a topological space is presented, and all regular extensions can be so realized.
China's Belt and Road Initiatives (BRI) is an ambitious infrastructure project conceived in 2013 by President Xi Jinping with development and investment initiatives stretching from Asia and Europe that reflect the original Silk Road with business networks through countries such as Afghanistan, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, as well as India and Pakistan, spanning a route of more than four thousand miles and history that can be dated back more than 2200 years. Given the background of China's unique approach in fighting the COVID-19, and against the backdrop of sluggish economic growth, innovation and management within the sustainable development of BRI will be the key and the driving force for the post-pandemic economic recovery for many countries, especially when BRI countries now accounts for nearly 30% of China's foreign trade and 15% of outward direct investment. The vision to create a vast network of railways, energy pipelines, highways, and streamlined border crossings to expand the international use of Chinese currency and improve connectivity to China is good foresight and fortuitous with COVID-19 pandemic came to plague the world, and amid in the conflicts between US and China as well as a War between Russia and Ukraine. Since the inception of BRI many books are written to cover topics ranging from globalization to detailing how China's business and politics as a major motivation for China's overseas economic activities with case studies and practices, yet seldom of these books provide structured approach to the sustainable management of BRI projects. This book is about how to manage innovation, sustainability, and business necessary to make BRI works, and how to handle the issues, problems and crisis that may arise thereof. Participants of BRI projects can take many different roles but ultimately it is team effort and leadership for each project. Here the readers will find guidelines and insights to survive and prosper in a myriad of BRI opportunities and risks. Most important of all, this book provides a glimpse of different approach for success in BRI projects, including sustainability, environmental issues, social and political aspects, technological, choice of industry, project management, education and training, governance and many more.
Is your enterprise architecture making a difference? Does it contribute to the goals of your company? Are the architects your best paid employees? If you are striving for a full-hearted yes to these questions, this is the book for you. Building an Enterprise Architecture Practice provides practical advice on how to develop your enterprise architecture practice. The authors developed different tools and models to support organizations in implementing and professionalizing an enterprise architecture function. The application of these tools and models in many different organizations forms the basis for this book. The result is a hands-on book that will help you to avoid certain pitfalls and achieve success with enterprise architecture. A lot of organizations nowadays have a team of enterprise architects at work but struggle with questions like: a [ How do I show the added value of enterprise architecture? a [ How do I determine what specific architectures are necessary for my organization? a [ What steps do I need to take to improve my enterprise architecture practice? a [ How do I fulfill the role of enterprise architect? These questions are answered in this book and illustrated with a lot of best practices. After reading the book the reader will have a better understanding of what makes enterprise architecture successful and will possess the tools to analyse his own situation and build an enterprise architecture practice accordingly. ---------------------------------------------------------------------------------------------------- This book clearly describes how to establish an architecture practice that delivers value for an organization. The authorsdemonstrate a wealth of experience and a deep understanding of the multifaceted nature of this challenging task and they provide sound advice on how to avoid the many pitfalls that may be encountered along the way. Recognising that there is no 'one-size-fits-all' approach, they show how to deploy a range of practical tools and approaches that will enable each organization to create its own road map to success. In particular, their Maturity Matrix is invaluable for balancing architecture priorities and targeting improvements. The book makes a significant contribution to the professionalization of the architect role. Sally Bean, Enterprise Architecture Consultant ---------------------------------------------------------------------------------------------------- Too many books on enterprise architecture leave one in a state of mental fuzziness: After reading them, the reader has learned a lot of impressive words but still does not know how to design an enterprise architecture. This step by step guide to DYA is different. It provides pragmatic guidelines for developing enterprise architecture and presents a maturity model that helps the users of DYA to state realistic goals and to outline feasible steps to achieve these goals. Particularly useful is the emphasis on a coherent enterprise architecture vision, including the value added by the architecture. I warmly recommend this book to practicing enterprise architects. Prof. Dr. Roel Wieringa, Universiteit Twente
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms
The study of the brain and behavior is illuminated with the discovery of invariances. Experimental brain research uncovers constancies amidst variation, with respect to interventions and transformations prescribed by experimental paradigms. Place cells, mirror neurons, event related potentials and areas differentially active in fMRI, all illustrate the pervasive role of invariances in neural systems in relation to their function.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.
This book introduces readers to a reconfigurable chip architecture for future wireless communication systems, such as 5G and beyond. The proposed architecture perfectly meets the demands for future mobile communication solutions to support different standards, algorithms, and antenna sizes, and to accommodate the evolution of standards and algorithms. It employs massive MIMO detection algorithms, which combine the advantages of low complexity and high parallelism, and can fully meet the requirements for detection accuracy. Further, the architecture is implemented using ASIC, which offers high energy efficiency, high area efficiency and low detection error. After introducing massive MIMO detection algorithms and circuit architectures, the book describes the ASIC implementation for verifying the massive MIMO detection. In turn, it provides detailed information on the proposed reconfigurable architecture: the data path and configuration path for massive MIMO detection algorithms, including the processing unit, interconnections, storage mechanism, configuration information format, and configuration method.
Electrical Engineering Electric Power Applications of Fuzzy Systems Let world-renowned electrical engineers introduce you to the latest developments in the application of one of the fastest growing artificial intelligence techniques for power systems--fuzzy system theory. Compiled and edited by well-known power systems educator Mohamed E. El-Hawary, Electric Power Applications of Fuzzy Systems assembles a distinguished panel of highly regarded experts to bring you original, up-to-date coverage of the applications of fuzzy systems. This volume presents theoretical background material from a practical point of view and then explores a number of applications of fuzzy systems. Each chapter features an informative introduction. Look for succinct, practical discussions on:
Research and development of logic synthesis and verification have matured considerably over the past two decades. Many commercial products are available, and they have been critical in harnessing advances in fabrication technology to produce today's plethora of electronic components. While this maturity is assuring, the advances in fabrication continue to seemingly present unwieldy challenges. Logic Synthesis and Verification provides a state-of-the-art view of logic synthesis and verification. It consists of fifteen chapters, each focusing on a distinct aspect. Each chapter presents key developments, outlines future challenges, and lists essential references. Two unique features of this book are technical strength and comprehensiveness. The book chapters are written by twenty-eight recognized leaders in the field and reviewed by equally qualified experts. The topics collectively span the field. Logic Synthesis and Verification fills a current gap in the existing CAD literature. Each chapter contains essential information to study a topic at a great depth, and to understand further developments in the field. The book is intended for seniors, graduate students, researchers, and developers of related Computer-Aided Design (CAD) tools. From the foreword: "The commercial success of logic synthesis and verification is due in large part to the ideas of many of the authors of this book. Their innovative work contributed to design automation tools that permanently changed the course of electronic design." by Aart J. de Geus, Chairman and CEO, Synopsys, Inc.
The Physics of Information Technology explores the familiar devices that we use to collect, transform, transmit, and interact with electronic information. Many such devices operate surprisingly close to very many fundamental physical limits. Understanding how such devices work, and how they can (and cannot) be improved, requires deep insight into the character of physical law as well as engineering practice. The book starts with an introduction to units, forces, and the probabilistic foundations of noise and signalling, then progresses through the electromagnetics of wired and wireless communications, and the quantum mechanics of electronic, optical, and magnetic materials, to discussions of mechanisms for computation, storage, sensing, and display. This self-contained volume will help both physical scientists and computer scientists see beyond the conventional division between hardware and software to understand the implications of physical theory for information manipulation. |
You may like...
Seabird Islands - Ecology, Invasion, and…
Christa P H Mulder, Wendy B Anderson, …
Hardcover
R2,830
Discovery Miles 28 300
Ecological Statistics - Contemporary…
Gordon A. Fox, Simoneta Negrete-Yankelevich, …
Hardcover
R4,917
Discovery Miles 49 170
Book of Quests - Seven Scenarios Against…
Darren Driver, Tom Griffith, …
Paperback
R669
Discovery Miles 6 690
Contre le Chaos - Sept scenarios d'epee…
Tom Griffith, Keane Peterson, …
Paperback
R691
Discovery Miles 6 910
|