![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
This book analyses the impact of Information and Communication Technologies (ICTs) on economic development. It contains theoretical and empirical studies, including panel studies on various issues facing developing countries, such as education, corruption, economic growth, government expenditure, financial inclusion, foreign direct investment, infrastructure, economic and social welfare, and inequality. Each chapter offers a well-conceived analysis of the most recent trends in both theory and empirics and addresses numerous policy implications related to the different aspects dealt with in the volume. Overall, this book will be an excellent guide for global graduate students at the Master and PhD levels, as well as academics researching various issues related to economic development while analyzing the role of ICTs. It also addresses numerous policy implications related to economic development for policymakers, investors and stakeholders.
*This book balances the development, implementation, application and analysis of computational ideas and methods. *Problems are designed toward computer projects so that students can test and apply numerical method. *The book is written with motivation examples and real-world application problems to catch students' interest. *Short Matlab and Python tutorials to quickly start programming in scientific computing.
Experts in research, industry, and academia cover recent trends and state-of-the art solutions in computer and communications engineering, focusing specifically on real-time applications of electronics, communications, computing, and information technology. The volume provides sound theoretical and application-oriented knowledge with a special focus on the development of safety-critical networks and integrated electrical and electronics systems. The volume also features numerous new algorithms that assist in solving computer and communication engineering problems.
Energy Harvesting: Enabling IoT Transformations gives insight into the emergence of energy harvesting technology and its integration with IoT-based applications. The book educates the reader on how energy is harvested from different sources, increasing the effectiveness, efficiency and lifetime of IoT devices. * Discusses the technology and practices involved in energy harvesting for biomedical, agriculture and automobile industries * Compares the performance of IoT-based devices with and without energy harvesting for different applications * Studies the challenges and issues in the implementation of EH-IoT * Includes case studies on energy-harvesting approach for solar, thermal and RF sources * Analyzes the market and business opportunities for entrepreneurs in the field of EH-IoT. This book is primarily aimed at graduates and research scholars in wireless sensor networks. Scientists and R&D workers in industry will also find this book useful.
Power and Authority in Internet Governance investigates the hotly contested role of the state in today's digital society. The book asks: Is the state "back" in internet regulation? If so, what forms are state involvement taking, and with what consequences for the future? The volume includes case studies from across the world and addresses a wide range of issues regarding internet infrastructure, data and content. The book pushes the debate beyond a simplistic dichotomy between liberalism and authoritarianism in order to consider also greater state involvement based on values of democracy and human rights. Seeing internet governance as a complex arena where power is contested among diverse non-state and state actors across local, national, regional and global scales, the book offers a critical and nuanced discussion of how the internet is governed - and how it should be governed. Power and Authority in Internet Governance provides an important resource for researchers across international relations, global governance, science and technology studies and law as well as policymakers and analysts concerned with regulating the global internet.
Managers in organisations must make rational decisions. Rational decision making is the opposite of intuitive decision making. It is a strict procedure utilising objective knowledge and logic. It involves identifying the problem to solve, gathering facts, identifying options and outcomes, analysing them, considering all the relationships and selecting the decision. Rational decision making requires support: methods and software tools. The identification of the problem to solve needs methods that would measure and evaluate the current situation. Identification and evaluation of options and analysis of the available possibilities involves analysis and optimisation methods. Incorporating intuition into rational decision making needs adequate methods that would translate ideas or observed behaviours into hard data. Communication, observation and opinions recording is hardly possible today without adequate software. Information and data that form the input, intermediate variables and the output must be stored, managed and made accessible in a user-friendly manner. Rational Decisions in Organisations: Theoretical and Practical Aspects presents selected recent developments in the support of the widely understood rational decision making in organisations, illustrated through case studies. The book shows not only the variety of perspectives involved in decision making, but also the variety of domains where rational decision support systems are needed. The case studies present decision making by medical doctors, students and managers of various universities, IT project teams, construction companies, banks and small and large manufacturing companies. Covering the richness of relationships in which the decisions should and must be taken, the book illustrates how modern organisations operate in chains and networks; they have multiple responsibilities, including social, legal, business and ethical duties. Nowadays, managers in organisations can make transparent decisions and consider a multitude of stakeholders and their diverse features, incorporating diverse criteria, using multiple types and drivers of information and decision-making patterns, and referring to numerous lessons learned. As the book makes clear, the marriage of theoretical ideas with the possibilities offered by technology can make the decisions in organisations more rational and, at the same time, more human.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Remarkable progress has been achieved within recent years in developing flexible, wearable, and stretchable (FWS) electronics. These electronics will play an increasingly significant role in the future of electronics and will open new product paradigms that conventional semiconductors are not capable of. This is because flexible electronics will allow us to build flexible circuits and devices on a substrate that can be bent, stretched, or folded without losing functionality. This revolutionary change will impact how we interact with the world around us. Future electronic devices will use flexible electronics as part of ambient intelligence and ubiquitous computing for many different applications such as consumer electronics, medical, healthcare, and security devices. Thus, these devices have the potential to create a huge market all over the world. Flexible, Wearable, and Stretchable Electronics, provide a comprehensive technological review of the state-of-the-art developments in FWS electronics. This book offers the reader a taste of what is possible with FWS electronics and describes how these electronics can provide unique solutions for a wide variety of applications. Furthermore, the book introduces and explains new applications of flexible technology that has opened up the future of FWS electronics.
Multivariable Calculus with Mathematica is a textbook addressing the calculus of several variables. Instead of just using Mathematica to directly solve problems, the students are encouraged to learn the syntax and to write their own code to solve problems. This not only encourages scientific computing skills but at the same time stresses the complete understanding of the mathematics. Questions are provided at the end of the chapters to test the student's theoretical understanding of the mathematics, and there are also computer algebra questions which test the student's ability to apply their knowledge in non-trivial ways. Features Ensures that students are not just using the package to directly solve problems, but learning the syntax to write their own code to solve problems Suitable as a main textbook for a Calculus III course, and as a supplementary text for topics scientific computing, engineering, and mathematical physics Written in a style that engages the students' interest and encourages the understanding of the mathematical ideas
While simulation has a vast area of application, this textbook focuses on the use of simulation to analyse business processes. It provides an up-to-date coverage of all stages of the discrete-event simulation (DES) process, covering important areas such as conceptual modelling, modelling input data, verification and validation and simulation output analysis. The book is comprehensive yet uncomplicated, covering the theoretical aspects of the subject and the practical elements of a typical simulation project, demonstrated by cases, examples and exercises. It also shows how simulation relates to new developments in machine learning, big data analytics and conceptual modelling techniques. Guidance is provided on how to build DES models using the Arena, Simio and Simul8 simulation software, and tutorials for using the software are incorporated throughout. Simulation Modelling offers a uniquely practical and end-to-end overview of the subject, which makes it perfect required or recommended reading for advanced undergraduate and postgraduate students studying business simulation and simulation modelling as part of operations research, business analytics, supply chain management and computer science courses.
While simulation has a vast area of application, this textbook focuses on the use of simulation to analyse business processes. It provides an up-to-date coverage of all stages of the discrete-event simulation (DES) process, covering important areas such as conceptual modelling, modelling input data, verification and validation and simulation output analysis. The book is comprehensive yet uncomplicated, covering the theoretical aspects of the subject and the practical elements of a typical simulation project, demonstrated by cases, examples and exercises. It also shows how simulation relates to new developments in machine learning, big data analytics and conceptual modelling techniques. Guidance is provided on how to build DES models using the Arena, Simio and Simul8 simulation software, and tutorials for using the software are incorporated throughout. Simulation Modelling offers a uniquely practical and end-to-end overview of the subject, which makes it perfect required or recommended reading for advanced undergraduate and postgraduate students studying business simulation and simulation modelling as part of operations research, business analytics, supply chain management and computer science courses.
Discusses the legal, ethical, and societal implications of information technology. Covers important topics including infringement of intellectual property, security risks, Internet crime, and social networking. Provides in-depth knowledge of privacy techniques. Discusses concepts of intellectual property (IPR) and issues in software development.
This new volume provides the information needed to understand the simplex method, the revised simplex method, dual simplex method, and more for solving linear programming problems. Following a logical order, the book first gives a mathematical model of the linear problem programming and describes the usual assumptions under which the problem is solved. It gives a brief description of classic algorithms for solving linear programming problems as well as some theoretical results. It goes on to explain the definitions and solutions of linear programming problems, outlining the simplest geometric methods and showing how they can be implemented. Practical examples are included along the way. The book concludes with a discussion of multi-criteria decision-making methods. Advances in Optimization and Linear Programming is a highly useful guide to linear programming for professors and students in optimization and linear programming.
dance, data, multimodal communication, dancers, neuro-cognitive science, contemporary dance, intangible cultural heritage, performing arts, cognitive linguistics, embodiment, design, and creativity studies
This book offers an overview of the key ideas of Petri nets, how they were developed, and how they were applied in diverse applications. The chapters in the first part offer individual perspectives on the impact of Petri's work. The second part of the book contains personal memories from researchers who collaborated with him closely, in particular they recount his unique personality. The chapters in the third part offer more conventional treatments on various aspects of current Petri net research, and the fourth part examines the wide applications of Petri nets, and the relationships with other domains. The editors and authors are the leading researchers in this domain, and this book will be a valuable insight for researchers in computer science, particularly those engaged with concurrency and distributed systems.
The term speech processing refers to the scientific discipline concerned with the analysis and processing of speech signals for getting the best benefit in various practical scenarios. These different practical scenarios correspond to a large variety of applications of speech processing research. Examples of some applications include enhancement, coding, synthesis, recognition and speaker recognition. A very rapid growth, particularly during the past ten years, has resulted due to the efforts of many leading scientists. The ideal aim is to develop algorithms for a certain task that maximize performance, are computationally feasible and are robust to a wide class of conditions. The purpose of this book is to provide a cohesive collection of articles that describe recent advances in various branches of speech processing. The main focus is in describing specific research directions through a detailed analysis and review of both the theoretical and practical settings. The intended audience includes graduate students who are embarking on speech research as well as the experienced researcher already working in the field. For graduate students taking a course, this book serves as a supplement to the course material. As the student focuses on a particular topic, the corresponding set of articles in this book will serve as an initiation through exposure to research issues and by providing an extensive reference list to commence a literature survey. Expe rienced researchers can utilize this book as a reference guide and can expand their horizons in this rather broad area."
This book contains all refereed papers accepted during the fourth asia-pacific edition & twelve edition - which were merged this year - of the CSD&M conference that took place in Beijing, People's Republic of China by 2021. Mastering complex systems requires an integrated understanding of industrial practices as well as sophisticated theoretical techniques and tools. This explains the creation of an annual go-between European and Asian forum dedicated to academic researchers & industrial actors working on complex industrial systems architecting, modeling & engineering. These proceedings cover the most recent trends in the emerging field of complex systems, both from an academic and professional perspective. A special focus was put this year on "Digital Transformation in Complex Systems Engineering". CESAM Community The CSD&M series of conferences are organized under the guidance of CESAM Community, managed by CESAMES. CESAM Community aims in organizing the sharing of good practices in systems architecting and model-based systems engineering (MBSE) and certifying the level of knowledge and proficiency in this field through the CESAM certification. The CESAM systems architecting & model-based systems engineering (MBSE) certification is especially currently the most disseminated professional certification in the world in this domain through more than 1,000 real complex system development projects on which it was operationally deployed and around 10,000 engineers who were trained on the CESAM framework at international level.
Brushless permanent-magnet motors provide simple, low maintenance, and easily controlled mechanical power. Written by two leading experts on the subject, this book offers the most comprehensive guide to the design and performance of brushless permanent-magnetic motors ever written. Topics range from electrical and magnetic design to materials and control. Throughout, the authors stress both practical and theoretical aspects of the subject, and relate the material to modern software-based techniques for design and analysis. As new magnetic materials and digital power control techniques continue to widen the scope of the applicability of such motors, the need for an authoritative overview of the subject becomes ever more urgent. Design of Brushless Permanent-Magnet Motors fits the bill and will be read by students and researchers in electric and electronic engineering.
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles. It is also for people who are involved in the procurement and deployment of advanced applications, algorithms, and AI systems, and in policy making. Together, they create the digital products, services, and systems that shape our societies and daily lives. The book's aim is to empower people to take responsibility, to 'upgrade' their skills for ethical reflection, inquiry, and deliberation. It introduces ethics in an accessible manner with practical examples, outlines of different ethical traditions, and practice-oriented methods. Additional online resources are available at: ethicsforpeoplewhoworkintech.com.
INVITATION TO COMPUTER SCIENCE, 6E, International Edition is a well-respected text that provides an overview of the computer science field. Using a flexible, non-language specific model, INVITATION TO COMPUTER SCIENCE, 6E, International Edition offers a solid foundation for the first course in a Computer Science curriculum. INVITATION TO COMPUTER SCIENCE, 6E, International Edition maintains its bestselling, algorithm-driven approach and includes expanded chapter exercises and practice problems, as well as new boxes dedicated to mobile applications and current issues throughout. Online language modules are available in C++, Java, Python, C#, and Ada, allowing the option of incorporating a programming language to expand concepts from the text. INVITATION TO COMPUTER SCIENCE, 6E, International Edition offers an optional CourseMate with study tools such as flashcards, quizzing, and games. CourseMate Activities speak to and engage students while developing abstract thinking and problem solving skills. Also available with INVITATION TO COMPUTER SCIENCE, 6E, International Edition, an optional Lab Manual containing 20 laboratory projects that map directly to the main text. The Lab Manual and accompanying software provide both visual and hands-on activities, allowing students to experience the fundamentals of computer science.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
HIMSS' Certified Associate in Healthcare Information and Management Systems (CAHIMS) certification offers a pathway to careers in health information technology (health IT) for associate-level, emerging professionals, or those who would like to transition to health IT from other industries. The CAHIMS Review Guide, 2nd Edition is the ideal resource for those preparing for the CAHIMS certification exam-or looking for a comprehensive "health IT 101" guide. Content in this updated and revised CAHIMS review guide reflects the new CAHIMS exam content outline. Content is divided into three topic categories: organizational and technology environments; systems analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy, and security; and leadership and management support. Each chapter includes learning objectives for tracking progress in understanding and articulating the content. Practice exam questions at the end of the book reinforce key concepts explored throughout the book. This book is a comprehensive and timely introduction to healthcare information and management systems. It's also an invaluable resource for staying current in all aspects of the industry. In addition to sample exam questions, this book includes an overview of the eligibility requirements, testing procedures, and the CAHIMS examination itself.
Digital transformation is a multidimensional concept and involves many moving parts. Successful digital transformation requires a fresh approach to harnessing people, processes, technology, and data to develop new business models and digital ecosystems. One main barrier could be an overemphasis on applying technology to expand the business rather than transforming the people's mindsets to do things differently. Thus, it is important to develop a holistic view of these parts and assemble them to foster the right conditions for digital transformation to happen. Business leaders and executives must be equipped with a wide range of digital competencies to thrive in a rapidly changing digital environment. Digital Transformation: Strategy, Execution, and Technology provides an overall view on the strategy, execution, and technology for organizations aiming to transform digitally. It offers insights on how to become more successful in the digital age by explaining the importance and relevance of the various building blocks which form the foundation of a digital organization. It shows the reader how to develop these building blocks in the organization as part of the digital transformation journey from both a business and technical perspective. Highlights of the book include: Digital transformation strategy Digital governance and risk management Digital organization and change management Experimental learning and design thinking Digital product management Agile and DevSecOps Digital enterprise architecture Business applications of digital technology This practical guide is written keeping business and information technology professionals and digital transformation practitioners in mind. It is also suitable for students pursuing postgraduate degrees and participants attending executive education programs in business and information technology.
Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations |
You may like...
Is Your Thinking Keeping You Poor? - 50…
Douglas Kruger
Paperback
(4)
The Handy Book of Knots - Learn to Tie…
Geoffrey Budworth, Richard. Hopkins
Paperback
R259
Discovery Miles 2 590
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, …
Paperback
|