![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
MACSYMA for Statisticians introduces the basic principles and ideas of MACSYMA so that it can be used for mathematical computations, manipulations and simplifications. MACSYMA is a large computer programming system which is designed to perform a wide spectrum of mathematical computations and manipulations in symbolic as well as numerical form. It operates interactively and displays results in ordinary mathematical notation. MACSYMA is perhaps most well known for its capabilities in algebraic manipulations and simplifications. However, its usefulness extends much further than that. In the field of analysis, MACSYMA performs differentiation, integration and the taking of limits. It can compute definite integrals, change variables, perform integration by parts, reduce rational polynomials into partial fractions and take Laplace transforms. MACSYMA has several commands relating to Taylor Series and asymptotic expansions.
Ecological Assessment of Polymers Strategies for Product Stewardship and Regulatory Programs John D. Hamilton and Roger Sutcliffe The expense of providing ecological assessments of new commercial products is formidable. The cost of the failure to comply with the current regulations--measured in fines, liability damages, and loss of public trust--is potentially much, much higher. Establishing effective environmental product stewardship strategies for assessment upfront not only promotes initial and continued compliance, it can reduce costs via the more efficient development of new products. Based on the collaboration of the Rohm and Haas Company and S.C. Johnson Wax with other manufacturers, contract laboratories, universities, and government agencies, Ecological Assessment of Polymers is the first complete reference to provide environment-oriented information about polymers from a product development and regulatory compliance perspective. A number of books deal with the potential hazards of pesticides and solvents. This is the first to focus on the commercial synthetic polymers that exist in laundry detergents, paints, super-absorbent diapers, packaging materials, and many other consumer and industrial products. Using the principles of environmental toxicology and chemistry, Ecological Assessment of Polymers approaches environmental evaluation as a decision-making process. The book demonstrates how assessment can be used as a planning tool for developing products, reducing potential liability, and creating new products, processes, and disposal systems. Featured discussions:
The CMOS Cookbook contains all you need to know to understand and
successfully use CMOS (Complementary Metal-Oxide Semiconductor)
integrated circuits. Written in a "cookbook" format that requires
little math, this practical, user-oriented book covers all the
basics for working with digital logic and many of its end
appilations.
This book examines a writing activity that has recently fallen into disrepute. Outlining has a bad reputation among students, even though many teachers and textbooks still recommend the process. In part, the author argues, the medium is to blame. Paper and ink make the revision difficult. But if one uses an electronic outliner, the activity can be very helpful in developing a thoughtful and effective document, particularly one that spans many pages and deals with a complicated subject. Outlining Goes Electronic takes an historical approach, examining the way people developed the idea of outlining, from the classical period to the present. We see that the medium in which people worked strongly shaped their assumptions, ideas, and use of outlines. In developing a theoretical model of outlining as an activity, the author argues that a relatively new electronic tool-software that accelerates and performs the process of outlining-can give us a new perspective from which to engage previous classroom models of writing, recent writing theory, and current practice in the technical writing field.
The evolution of soft computing applications has offered a multitude of methodologies and techniques that are useful in facilitating new ways to address practical and real scenarios in a variety of fields. In particular, these concepts have created significant developments in the engineering field. Soft Computing Techniques and Applications in Mechanical Engineering is a pivotal reference source for the latest research findings on a comprehensive range of soft computing techniques applied in various fields of mechanical engineering. Featuring extensive coverage on relevant areas such as thermodynamics, fuzzy computing, and computational intelligence, this publication is an ideal resource for students, engineers, research scientists, and academicians involved in soft computing techniques and applications in mechanical engineering areas.
This is a volume of chapters on the historical study of information, computing, and society written by seven of the most senior, distinguished members of the History of Computing field. These are edited, expanded versions of papers presented in a distinguished lecture series in 2018 at the University of Colorado Boulder - in the shadow of the Flatirons, the front range of the Rocky Mountains. Topics range widely across the history of computing. They include the digitalization of computer and communication technologies, gender history of computing, the history of data science, incentives for innovation in the computing field, labor history of computing, and the process of standardization. Authors were given wide latitude to write on a topic of their own choice, so long as the result is an exemplary article that represents the highest level of scholarship in the field, producing articles that scholars in the field will still look to read twenty years from now. The intention is to publish articles of general interest, well situated in the research literature, well grounded in source material, and well-polished pieces of writing. The volume is primarily of interest to historians of computing, but individual articles will be of interest to scholars in media studies, communication, computer science, cognitive science, general and technology history, and business.
This volume examines the complex, contradictory discourses of hypertext. Using theoretical material from cultural theory, radical and border pedagogies, and technology criticism, the text discusses three primary ways hypertext is articulated: as automated book (technical communication), as virtual commodity (online databases), and as environment for constructing and exploring multiple subject positions (postmodern hypertext in composition and literature). I would recommend the entire book to researchers and academics who recognize the need to integrate new technologies into our classrooms and pedagogies. - Technical Communication
This textbook intends to be a comprehensive and substantially self-contained two-volume book covering performance, reliability, and availability evaluation subjects. The volumes focus on computing systems, although the methods may also be applied to other systems. The first volume covers Chapter 1 to Chapter 14, whose subtitle is ``Performance Modeling and Background". The second volume encompasses Chapter 15 to Chapter 25 and has the subtitle ``Reliability and Availability Modeling, Measuring and Workload, and Lifetime Data Analysis". This text is helpful for computer performance professionals for supporting planning, design, configuring, and tuning the performance, reliability, and availability of computing systems. Such professionals may use these volumes to get acquainted with specific subjects by looking at the particular chapters. Many examples in the textbook on computing systems will help them understand the concepts covered in each chapter. The text may also be helpful for the instructor who teaches performance, reliability, and availability evaluation subjects. Many possible threads could be configured according to the interest of the audience and the duration of the course. Chapter 1 presents a good number of possible courses programs that could be organized using this text.
Standardization has the potential to shape, expand, and create markets. Information technology has undergone a rapid transformation in the application of standards in practice, and recent developments have augmented the need for the divulgence of supplementary research. Standardization Research in Information Technology: New Perspectives amasses cutting-edge research on the application of standards in the market, covering topics such as corporate standardization, linguistic qualities of international standards, the role of individuals in standardization, and the development, use, application, and influence of information technology in standardization techniques.
The second volume in a series which aims to focus on advances in computational biology. This volume discusses such topics as: statistical analysis of protein sequences; progress in large-scale sequence analysis; and the architecture of loops in proteins.
Over the past six years personal computers have carved a deep niche in the music world. This widespread popularity is largely due to the establishment of the MIDI (Musical Instrument Digital Interface) standard in 1983. This communications protocol allows computers to send, receive, and store digital information generated by various electronic musical instruments. In addition to numerous writings exploring the possibilities of present and future technology, this annotated bibliography offers educators many introductory sources, articles on how to evaluate and purchase equipment, and directories of available software. Specifically, it provides a collection of source material, an overview of significant publications in the field, and serves as a point of departure for further inquiry. Part I of the bibliography is divided into seven sections, each devoted to information regarding a specific computer. Articles written about two or more popular computers or models not covered elsewhere are detailed in part II. Music education is the subject of Part III and Part IV lists and annotates significant books. The appendix contains information on associations involved with the musical applications of personal computers and brief descriptions of several popular online services. Author and subject indexes are also included. Music and the Personal Computer covers a variety of topics that will be of interest to practicing musicians, music educators, and computer enthusiasts with interests in music.
In digital enterprise, individuals use a variety of technologies to assist them in communicating, collaborating, and coordinating their activities across distance and time, enhancing workflow expertise and communications. ""Leadership in the Digital Enterprise: Issues and Challenges"" presents a comprehensive collection of the most current research on various aspects, roles, and functions of digital enterprises. A compendium of latest industry findings and advancements, this Premier Reference Source provides researchers, academicians, and practitioners with useful theories and references in topics such as e-business, knowledge management, and enterprise planning.
The present work provides a platform for leading Data designers whose vision and creativity help us to anticipate major changes occurring in the Data Design field, and pre-empt the future. Each of them strives to provide new answers to the question, "What challenges await Data Design?" To avoid falling into too narrow a mind-set, each works hard to elucidate the breadth of Data Design today and to demonstrate its widespread application across a variety of business sectors. With end users in mind, designer-contributors bring to light the myriad of purposes for which the field was originally intended, forging the bond even further between Data Design and the aims and intentions of those who contribute to it. The first seven parts of the book outline the scope of Data Design, and presents a line-up of "viewpoints" that highlight this discipline's main topics, and offers an in-depth look into practices boasting both foresight and imagination. The eighth and final part features a series of interviews with Data designers and artists whose methods embody originality and marked singularity. As a result, a number of enlightening concepts and bright ideas unfold within the confines of this book to help dispel the thick fog around this new and still relatively unknown discipline. A plethora of equally eye-opening and edifying new terms, words, and key expressions also unfurl. Informing, influencing, and inspiring are just a few of the buzz words belonging to an initiative that is, first and foremost, a creative one, not to mention the possibility to discern the ever-changing and naturally complex nature of today's datasphere. Providing an invaluable and cutting-edge resource for design researchers, this work is also intended for students, professionals and practitioners involved in Data Design, Interaction Design, Digital & Media Design, Data & Information Visualization, Computer Science and Engineering.
"Hacking Europe" traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European countries at the end of the Cold War, the book shows the digital development was not an exclusively American affair. Local hacker communities appropriated the computer and forged new cultures around it like the hackers in Yugoslavia, Poland and Finland, who showed off their tricks and creating distinct demoscenes. Together the essays reflect a diverse palette of cultural practices by which European users domesticated computer technologies. Each chapter explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. More generally, the ludological element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the history of technology."
This Handbook provides a complete compendium of methods for
evaluation of IT-based systems and solutions within healthcare.
Emphasis is entirely on assessment of the IT-system within its
organizational environment. The author provides a coherent and
complete assessment of methods addressing interactions with and
effects of technology at the organizational, psychological, and
social levels.
Enterprise information systems touch every process of an organization as new functionalities in previously existing and upcoming solutions are created every day. ""Social, Managerial, and Organizational Dimensions of Enterprise Information Systems"" discusses the technological developments, main issues, challenges, opportunities, and trends impacting every part of small to medium sized enterprises. A leading resource for academicians, managers, and researchers, this advanced publication provides an integrated and progressive view into the benefits and applications of enterprise information systems.
Internal migration serves as one of the key contributing factors to population change involving not only change in the numbers of people, but also a change in composition and structure of local populations. Technologies for Migration and Population Analysis: Spatial Interaction Data Applications addresses the technical and data-related side of studying population flows and provides a selection of substantive case studies and applications to exemplify research currently being carried out. With expert international contributors currently working in the field, this authoritative book allows readers to better understand interaction data and ways knowledge of population flows can be put to use.
Tools of data comparison and analysis are critical in the field of archaeology, and the integration of technological advancements such as geographic information systems, intelligent systems, and virtual reality reconstructions with the teaching of archaeology is crucial to the effective utilization of resources in the field. ""E-Learning Methodologies and Computer Applications in Archaeology"" presents innovative instructional approaches for archaeological e-learning based on networked technologies, providing researchers, scholars, and professionals a comprehensive global perspective on the resources, development, application, and implications of information communication technology in multimedia-based educational products and services in archaeology.
Virtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters featuring practical research, insight and recommendations on how virtual team projects can be better managed, as well as in depth discussion on issues critical to virtual team success, including the place of virtual teams in organizations, leadership, trust and relationship building, best use of technology, and knowledge sharing.
Gain the knowledge and tools to deliver compelling mobile phone applications. Mobile and wireless application design is complex and challenging. Selecting an application technology and designing a mobile application require an understanding of the benefits, costs, context, and restrictions of the development company, end user, target device, and industry structure. "Designing the Mobile User Experience" provides the experienced product development professional with an understanding of the users, technologies, devices, design principles, techniques and industry players unique to the mobile and wireless space. Barbara Ballard describes the different components affecting the user experience and principles applicable to the mobile environment, enabling the reader to choose effective technologies, platforms, and devices, plan appropriate application features, apply pervasive design patterns, and choose and apply appropriate research techniques. "Designing the Mobile User Experience: " Provides a comprehensive guide to the mobile user experience, offering guidance to help make appropriate product development and design decisions. Gives product development professionals the tools necessary to understand development in the mobile environment. Clarifies the components affecting the user experience and principles uniquely applicable to the mobile application field. Explores industry structure and power dynamics, providing insight into how mobile technologies and platforms become available on current and future phones. Provides user interface design patterns, design resources, and user research methods for mobile user interface design. Illustrates concepts with example photographs, explanatory tables and charts, and an example application. "Designing the Mobile User Experience" is an invaluable resource for information architects, user experience planners and designers, interaction designers, human factors specialists, ergonomists, product marketing specialists, and brand managers. Managers and directors within organizations entering the mobile space, advanced students, partnership managers, software architects, solution architects, development managers, graphic designers, visual designers, and interface designers will also find this to be an excellent guide to the topic.
This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.
Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.
In the United States, mobile commerce is a $1 billion industry and growing. More and more people are using their mobile phones everywhere to communicate, to get information, and to have fun. The technology for you to create, deliver, and market that content - and profit from it - is available now too. In Making Money on the Mobile Internet, the experts at Cingular Wireless show you how to harness the potential of the mobile marketplace in five simple steps. The business opportunities for mobile content providers are tremendous. From creating your application to getting it to market to tracking your success, Making Money on the Mobile Internet shows you how to create the next killer app. Let's get started!
"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, "Google
Earth Forensics" is written by an investigator and trainer with
more than 13 years of experience in law enforcement who will show
you how to use this valuable tool anywhere at the crime scene, in
the lab, or in the courtroom. |
You may like...
Transformations, Ideology, and the Real…
Maximillian E Novak
Hardcover
R3,019
Discovery Miles 30 190
|