![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Tearing and interconnecting methods, such as FETI, FETI-DP, BETI, etc., are among the most successful domain decomposition solvers for partial differential equations. The purpose of this book is to give a detailed and self-contained presentation of these methods, including the corresponding algorithms as well as a rigorous convergence theory. In particular, two issues are addressed that have not been covered in any monograph yet: the coupling of finite and boundary elements within the tearing and interconnecting framework including exterior problems, and the case of highly varying (multiscale) coefficients not resolved by the subdomain partitioning. In this context, the book offers a detailed view to an active and up-to-date area of research.
Modelling for Business Improvement contains the proceedings of the First International Conference on Process Modelling and Process Management (MMEP 2010) held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of process modelling and process management. This conference will showcase recent trends in the modelling and management of engineering processes, explore potential synergies between different modelling approaches, gather and discuss future challenges for the management of engineering processes and discuss future research areas and topics. Modelling for Business Improvement is divided into three main parts: theoretical foundation of modelling and management of engineering processes, and achievements in theory; experiences from management practice using various modelling methods and tools, and their future challenges; and, new perspectives on modelling methods, techniques and tools. Based on the latest achievements in this and related fields, the editors aim to landmark the research map for modelling and management of engineering processes for 2020.
"Computer Science and Convergence"is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applicationsand will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows: - Mobile and ubiquitous computing WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows: - Cryptography and Security for Converged environments -
Wireless sensor network for Converged environments
"Digital Forensics for Legal Professionals" provides you with a guide to digital technology forensics in plain English. In the authors years of experience in working with attorneys as digital forensics experts, common questions arise again and again: What do I ask for? Is the evidence relevant? What does this item in the forensic report mean? What should I ask the other expert? What should I ask you? Can you explain that to a jury? This book answers many of those questions in clear language that is understandable by non-technical people. With many illustrations and diagrams that will be usable in court, they explain technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries. The authors also explain how to determine what evidence to ask
for, evidence might be that could be discoverable, and the methods
for getting to it including relevant subpoena and motion language.
Additionally, this book provides an overview of the current state
of digital forensics, the right way to select a qualified expert,
what to expect from a qualified expert and how to properly use
experts before and during trial.
This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 - July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
Decision-aiding software, the underpinning of computer-aided judicial analysis, can facilitate the prediction of how cases are likely to be decided, prescribe decisions that should be reached in such cases, and help administrate more efficiently the court process. It can do so, says Nagel, by listing past cases on each row of a spreadsheet matrix, by listing predictive criteria in the columns, and in general by showing for each factual element the estimated probability of winning a case. The software aggregates the information available and deduces likely outcomes. But it can also prescribe judicial decisions by listing alternatives in the rows, the goals to be achieved in the columns, and by showing relations between alternatives in the cells. By similar means decision-aiding software can also help perform administrative tasks, such as rationally assigning judges or other personnel to cases, and by sequencing cases to reduce the time consumed by each case. In Part I, Nagel provides an overview of computer-aided analysis and the role of decision-aiding software in the legal process. In the second part he deals with judicial prediction from prior cases and from present facts; and in the third part he emphasizes the prescribing role of judges, particularly in deciding the rules that ought to be applied in civil and criminal procedures. Nagel also covers computer-aided mediation and provides a new perspective on judicial decisions. Then, in Part IV, he treats at length the process of judicial administration and how to improve its efficiency. Of particular interest to court personnel will be the benefits to be derived from reducing delays and in the docketing and sequencing of cases.
New Edition: Introduction to Computational Earthquake Engineering (3rd Edition)Introduction to Computational Earthquake Engineering covers solid continuum mechanics, finite element method and stochastic modeling comprehensively, with the second and third chapters explaining the numerical simulation of strong ground motion and faulting, respectively. Stochastic modeling is used for uncertain underground structures, and advanced analytical methods for linear and non-linear stochastic models are presented. The verification of these methods by comparing the simulation results with observed data is then presented, and examples of numerical simulations which apply these methods to practical problems are generously provided. Furthermore three advanced topics of computational earthquake engineering are covered, detailing examples of applying computational science technology to earthquake engineering problems.
Technological advancements have become an integral part of life, impacting the way we work, communicate, make decisions, learn, and play. As technology continually progresses, humans are being outpaced by its capabilities, and it is important for businesses, organizations, and individuals to understand how to optimize data and to implement new methods for more efficient knowledge discovery and information management and retrieval. Innovative Applications of Knowledge Discovery and Information Resources Management offers in-depth coverage on the pervasiveness of technological change with a collection of material on topics such as the impact of permeable work-life boundaries, burnout and turnover, big data usage, and computer-based learning. It proves a worthy source for academicians, practitioners, IT leaders, IT professionals, and advanced-level students interested in examining the ways in which technology is changing the world.
Biological and biomedical studies have entered a new era over the past two decades thanks to the wide use of mathematical models and computational approaches. A booming of computational biology, which sheerly was a theoretician's fantasy twenty years ago, has become a reality. Obsession with computational biology and theoretical approaches is evidenced in articles hailing the arrival of what are va- ously called quantitative biology, bioinformatics, theoretical biology, and systems biology. New technologies and data resources in genetics, such as the International HapMap project, enable large-scale studies, such as genome-wide association st- ies, which could potentially identify most common genetic variants as well as rare variants of the human DNA that may alter individual's susceptibility to disease and the response to medical treatment. Meanwhile the multi-electrode recording from behaving animals makes it feasible to control the animal mental activity, which could potentially lead to the development of useful brain-machine interfaces. - bracing the sheer volume of genetic, genomic, and other type of data, an essential approach is, ?rst of all, to avoid drowning the true signal in the data. It has been witnessed that theoretical approach to biology has emerged as a powerful and st- ulating research paradigm in biological studies, which in turn leads to a new - search paradigm in mathematics, physics, and computer science and moves forward with the interplays among experimental studies and outcomes, simulation studies, and theoretical investigations.
This series, since its first volume in 1960 and now the oldest
series still being published, covers new developments in computer
technology. Each volume contains from 5 to 7 chapters and 3 volumes
are produced annually. Most chapters present an overview of a
current subfield within computer science, include many citations,
and often new developments in the field by the authors of the
individual chapters. Topics include hardware, software, web
technology, communications, theoretical underpinnings of computing,
and novel applications of computers. The book series is a valuable
addition to university courses that emphasize the topics under
discussion in that particular volume as well as belonging on the
bookshelf of industrial practitioners who need to implement many of
the technologies that are described.
Develop your own trading system with practical guidance and expert advice In Building Algorithmic Trading Systems: A Trader's Journey From Data Mining to Monte Carlo Simulation to Live Training, award-winning trader Kevin Davey shares his secrets for developing trading systems that generate triple-digit returns. With both explanation and demonstration, Davey guides you step-by-step through the entire process of generating and validating an idea, setting entry and exit points, testing systems, and implementing them in live trading. You'll find concrete rules for increasing or decreasing allocation to a system, and rules for when to abandon one. The companion website includes Davey's own Monte Carlo simulator and other tools that will enable you to automate and test your own trading ideas. A purely discretionary approach to trading generally breaks down over the long haul. With market data and statistics easily available, traders are increasingly opting to employ an automated or algorithmic trading system enough that algorithmic trades now account for the bulk of stock trading volume. Building Algorithmic Trading Systems teaches you how to develop your own systems with an eye toward market fluctuations and the impermanence of even the most effective algorithm. * Learn the systems that generated triple-digit returns in the World Cup Trading Championship * Develop an algorithmic approach for any trading idea using off-the-shelf software or popular platforms * Test your new system using historical and current market data * Mine market data for statistical tendencies that may form the basis of a new system Market patterns change, and so do system results. Past performance isn't a guarantee of future success, so the key is to continually develop new systems and adjust established systems in response to evolving statistical tendencies. For individual traders looking for the next leap forward, Building Algorithmic Trading Systems provides expert guidance and practical advice.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
Essential Computational Modeling for the Human Body presents key contributions selected from the volume in the Handbook of Numerical Analysis: Computational Modeling for the Human Body Vol. 12 (2005). Computational (Mathematical) Modeling is used by scientists and
researchers with various applications in chemical, biological,
behavioral, environmental sciences, etc. This guide presents
essential research techniques for analysis and essential concrete
examples of computational models, while supplying a wide range of
commonly used methods and applications, followed by various
numerical simulations. Provides various viewpoints of methods and applications are available for researchers to chose and experiment with; Numerical analysis and open problems useful for experimentation; Computational Models useful for surgery simulations;
Essential Computational Modeling in Chemistry presents key contributions selected from the volume in the Handbook of Numerical Analysis: Computational Modeling in Chemistry Vol. 10(2005). Computational Modeling is an active field of scientific
computing at the crossroads between Physics, Chemistry, Applied
Mathematics and Computer Science. Sophisticated mathematical models
are increasingly complex and extensive computer simulations are on
the rise. Numerical Analysis and scientific software have emerged
as essential steps for validating mathematical models and
simulations based on these models. This guide provides a quick
reference of computational methods for use in understanding
chemical reactions and how to control them. By demonstrating
various computational methods in research, scientists can predict
such things as molecular properties. The reference offers a number
of techniques and the numerical analysis needed to perform
rigorously founded computations. Various viewpoints of methods and applications are available for researchers to chose and experiment with; Numerical analysis and open problems is useful for experimentation; Most commonly used models and techniques for the molecular case is quickly accessible
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."
1. Paradigmatische Konstruktionen.- Unser heutiges Wirklichkeits-Verstandnis.- Wirklichkeits-Pluralismus.- Entstehen von Wirklichkeiten.- Lebendiger Vollzug von Wirklichkeiten.- Fruchtbare Vielfalt.- Simultane und sequenzielle Wirklichkeiten in der Lebenswelt.- Okkulte Wirklichkeiten und andere Geheimlehren.- Gefahrliche Verabsolutierungen.- 2. Farbe als Wirklichkeit.- Goethes Farbenlehre.- Physiologische Farben.- Farblose Bilder.- Farbige Bilder.- Farbige Schatten.- Schwach wirkende Lichter, subjektive Hoefe, pathologische Farben.- Physische Farben.- Dioptrische Farben der 1. Klasse.- Dioptrische Farben der 2. Klasse.- Das Phanomen der Refraktion.- Refraktion ohne Farberscheinung.- Farberscheinungen bei Linsen.- Grundzuge refraktionsbedingter Farberscheinungen.- Farberscheinungen bei Prismen.- Farberscheinungen an gro?en und kleinen wei?en Bildern.- Farberscheinungen an gro en und kleinen schwarzen Bildern.- Farberscheinungen sind nie statisch.- Zum Wesen von Licht und Farbe aus Goetheseher Sieht.- Wichtige, ganz allgemeine Begriffe.- Die Polaritat.- Die Steigerung.- Phanomen und Urphanomen.- Farbenkreis und Spektrogramm.- Newtons Farben des Liehts.- Newtons Experimente.- 1. Experiment.- 2. Experiment.- 3. Experiment.- 4. Experiment.- 5. Experiment.- Das We sen der Farbe.- Einfache Farbmetrik.- Das Auge.- Der Spektralfarbenzug.- Zwei Wirklichkeiten.- 3. Heilkundliche Wirkliehkeiten.- Chinesische Lebenswirkliehkeit.- Das Schafgarbenorakel.- Das Yin-Yang-Prinzip.- Shen und Kuei. Qi und Jing.- Die funf Elemente.- Chinesische Medizin.- Yin-Yang-Theorie.- Lebenssubstanzen.- Qi.- Blut und Safte.- Jing.- Shen.- Die Funktion der inneren Organe.- Die Leitbahnen oder die Meridiane.- Wie kommt es zur Disharmonie?.- Die Sechs UEbel.- Die sieben Emotionen.- Die Lebensweise.- Das Dishannoniemuster.- Ein Beispiel.- Ein simultanes Massenphanomen.- 4. Mikro-Wirklichkeiten.- Spiele als Mikro-Wirklichkeiten.- Definition des Spielbegriffes.- Die Vielfalt der Spiele.- Mikro-Wirklichkeiten im weiteren Sinn.- 5. Wirklichkeit eines Verbrechens.- Ein Beispiel aus der japanischen Literatur.- Eine neue Erzlihlung des Rashomon-Textes.- Die Aussage eines Holzfallers.- Die Aussage eines Wandergeistlichen.- Die Aussage eines Gerichtsdieners.- Die Aussage einer alten Frau.- Das Gestandnis des Raubers.- Die Aussage eines Gefahrten des Raubers.- Bericht eines Waldbewohners.- Die Beichte der Ehefrau in einem Kloster.- Der Geist des Toten spricht durch den Mund einer Wahrsagerin.- Vergewaltigung und Tod.- 6. Verwandlung von Wirklichkeiten.- Siddhartha. Eine indische Dichtung.- Die Brahmana-Welt.- Die Samana-Welt.- Die Buddha-Welt.- Die Menschenkinder-Welt.- Am Flu?.- 7. Magie und Damonie.- Weissagung.- Wirksarnkeit von Weissagungen.- Kassandra.- Die delphische Seherin.- Andere Fonnen der Weissagung.- Zauber und Damonen.- Magische Praktikep in der Volkskunst.- Magische Praktiken' der Antike.- Kirke verzaubert Manner.- Hexen morden Knaben.- Fluche verandern das Leben.- Fluchtafeln.- Ovids Ibis.- Schamanen.- Spuren des Schamanismus in der Neuzeit.- Antike Schamanen.- Orpheus.- Pythagoras.- Empedokles.- Vespasian.- Nekromantie.- Die Macht des Okkulten.- Magie und Damonie als Wirklichkeit?.- 8. Totalitare Wirklichkeiten.- Wahnsinn als totalitare Wirklichkeit.- Das Entstehen eines Wahnes.- Der logische Zusammenhang von Wahnideen.- Die weitgehende Unkorrigierbarkeit.- Gro?en und Verfolgungswahn.- Groe?enwahn.- Verfolgungswahn.- Paranoia erotica.- Eifersuchtsparanoia.- Religioeser Wahn mit erotischer Komponente.- Kraftentfaltung in totalitaren Wirklichkeiten.- Der Kriegstanz der Maori.- Atomare Bedrohung.- Extremsituationen in totalitaren Wirklichkeiten.- Der Tag des Blutes.- Der spontane Volkszorn.- Entgleisung einer Hochtechnologie.- Die Eigendynamik und die Hilflosigkeit.- 9. Chance und Bedrangnis.- Wirklichkeit ist eine Konstruktion. Der Urgrund ist ohne Eigenschaften.- Wirklichkeiten als Gewordenes.- Die Lebenswirklichkeit als Ausgangsbasi
A hands-on roadmap to using Python for artificial intelligence programming In Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples. Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learning Expansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learning Practical AI and Python "cheat sheet" quick references This hands-on AI programming guide is perfect for anyone with a basic knowledge of programming--including familiarity with variables, arrays, loops, if-else statements, and file input and output--who seeks to understand foundational concepts in AI and AI development.
The central theme of this book is focused on the analyses and the results which emerged from the international research project BRAHMATWINN sponsored by European Commission (EC) and conducted during 2006 - 2009. The book highlights the achievements of BRAHMATWINN to carry out a harmonised integrated water resources management (IWRM) approach as addressed by the European Water Initiative (EWI) in headwater river systems of alpine mountain massifs. The latter are already impacted from climate change, and the BRAHMATWINN project established transfer of professional IWRM expertise, approaches and tools based on case studies carried out in twinning European and Asian river basins. The project addresses all important IWRM issues in a balanced way, including conflict resolution in the trans- boundary Danube and Brahmaputra River Basins in Europe and South Asia respectively. This book will be useful to researchers, professionals, managers and decision makers associated with study and application of sustainable integrated land and water resources management (ILWRM) in the backdrop of climate change.
Developments in industry in recent years have made employee learning a critical factor in organizations' success. The ever-faster pace of technological development and the variety of tasks that business professionals must perform mean that on-the-job learning is a constant, too quick and vital to be left to training departments. And yet, management knows too little about how workers learn on the job and does not give sufficient time and effort to understanding this process. As learning is largely left to chance, it is amazing that it happens at all, and well enough to enable workers to be productive and not to destroy each other's work. This book explores the daily work lives and learning experiences of programmers and other professionals in the computer-software industry. The book focuses on the staff of one small software firm, allowing workers to tell their own stories, describing their work and their use of all the resources available to them in learning the complex systems they are required to develop and maintain. Based in qualitative sociological method, it is an ethnography of a business setting as well as a study of learning. After describing the professional world in which programmers work, the book introduces the company to be discussed and the backgrounds of the participants in the study. Then, proceeding from the environment to the systems to be learned, the author schematizes all of the resources professionals use on the job--their experiences and thought processes, documentation, their colleagues, the computer, and the software system itself--as learning tools. All of this material is then related to academic models of learning style, which are mostly found not to be very relevant, as they are not grounded in the life experiences of workers. The author advocates that professionals' learning be modeled in context, that training be developed from experience rather than from theory, and that management strive to build a workplace and an organizational culture as conducive as possible to employees' continual learning. |
You may like...
|