![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
Since its first volume in 1960, Advances in Computers has
presented detailed coverage of innovations in computer hardware,
software, theory, design, and applications. It has also provided
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles usually allow.
As a result, many articles have become standard references that
continue to be of sugnificant, lasting value in this rapidly
expanding field.
Modelling for Business Improvement contains the proceedings of the First International Conference on Process Modelling and Process Management (MMEP 2010) held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of process modelling and process management. This conference will showcase recent trends in the modelling and management of engineering processes, explore potential synergies between different modelling approaches, gather and discuss future challenges for the management of engineering processes and discuss future research areas and topics. Modelling for Business Improvement is divided into three main parts: theoretical foundation of modelling and management of engineering processes, and achievements in theory; experiences from management practice using various modelling methods and tools, and their future challenges; and, new perspectives on modelling methods, techniques and tools. Based on the latest achievements in this and related fields, the editors aim to landmark the research map for modelling and management of engineering processes for 2020.
As population increases, the need for energy becomes a crisis of great importance. Technologies for Electrical Power Conversion, Efficiency, and Distribution: Methods and Processes combines unparalleled research, contemporary achievements, and emerging trends within electrical energy conversion technologies and renewable energy sources. The scholarly findings compiled provide a background for discussion of the problems and opportunities of power efficiency and energy conversion in order to develop innovative ways to implement such cutting-edge technologies in the future.
Biological and biomedical studies have entered a new era over the past two decades thanks to the wide use of mathematical models and computational approaches. A booming of computational biology, which sheerly was a theoretician's fantasy twenty years ago, has become a reality. Obsession with computational biology and theoretical approaches is evidenced in articles hailing the arrival of what are va- ously called quantitative biology, bioinformatics, theoretical biology, and systems biology. New technologies and data resources in genetics, such as the International HapMap project, enable large-scale studies, such as genome-wide association st- ies, which could potentially identify most common genetic variants as well as rare variants of the human DNA that may alter individual's susceptibility to disease and the response to medical treatment. Meanwhile the multi-electrode recording from behaving animals makes it feasible to control the animal mental activity, which could potentially lead to the development of useful brain-machine interfaces. - bracing the sheer volume of genetic, genomic, and other type of data, an essential approach is, ?rst of all, to avoid drowning the true signal in the data. It has been witnessed that theoretical approach to biology has emerged as a powerful and st- ulating research paradigm in biological studies, which in turn leads to a new - search paradigm in mathematics, physics, and computer science and moves forward with the interplays among experimental studies and outcomes, simulation studies, and theoretical investigations.
"Digital Forensics for Legal Professionals" provides you with a guide to digital technology forensics in plain English. In the authors years of experience in working with attorneys as digital forensics experts, common questions arise again and again: What do I ask for? Is the evidence relevant? What does this item in the forensic report mean? What should I ask the other expert? What should I ask you? Can you explain that to a jury? This book answers many of those questions in clear language that is understandable by non-technical people. With many illustrations and diagrams that will be usable in court, they explain technical concepts such as unallocated space, forensic copies, timeline artifacts and metadata in simple terms that make these concepts accessible to both attorneys and juries. The authors also explain how to determine what evidence to ask
for, evidence might be that could be discoverable, and the methods
for getting to it including relevant subpoena and motion language.
Additionally, this book provides an overview of the current state
of digital forensics, the right way to select a qualified expert,
what to expect from a qualified expert and how to properly use
experts before and during trial.
New Edition: Introduction to Computational Earthquake Engineering (3rd Edition)Introduction to Computational Earthquake Engineering covers solid continuum mechanics, finite element method and stochastic modeling comprehensively, with the second and third chapters explaining the numerical simulation of strong ground motion and faulting, respectively. Stochastic modeling is used for uncertain underground structures, and advanced analytical methods for linear and non-linear stochastic models are presented. The verification of these methods by comparing the simulation results with observed data is then presented, and examples of numerical simulations which apply these methods to practical problems are generously provided. Furthermore three advanced topics of computational earthquake engineering are covered, detailing examples of applying computational science technology to earthquake engineering problems.
Decision-aiding software, the underpinning of computer-aided judicial analysis, can facilitate the prediction of how cases are likely to be decided, prescribe decisions that should be reached in such cases, and help administrate more efficiently the court process. It can do so, says Nagel, by listing past cases on each row of a spreadsheet matrix, by listing predictive criteria in the columns, and in general by showing for each factual element the estimated probability of winning a case. The software aggregates the information available and deduces likely outcomes. But it can also prescribe judicial decisions by listing alternatives in the rows, the goals to be achieved in the columns, and by showing relations between alternatives in the cells. By similar means decision-aiding software can also help perform administrative tasks, such as rationally assigning judges or other personnel to cases, and by sequencing cases to reduce the time consumed by each case. In Part I, Nagel provides an overview of computer-aided analysis and the role of decision-aiding software in the legal process. In the second part he deals with judicial prediction from prior cases and from present facts; and in the third part he emphasizes the prescribing role of judges, particularly in deciding the rules that ought to be applied in civil and criminal procedures. Nagel also covers computer-aided mediation and provides a new perspective on judicial decisions. Then, in Part IV, he treats at length the process of judicial administration and how to improve its efficiency. Of particular interest to court personnel will be the benefits to be derived from reducing delays and in the docketing and sequencing of cases.
Technological advancements have become an integral part of life, impacting the way we work, communicate, make decisions, learn, and play. As technology continually progresses, humans are being outpaced by its capabilities, and it is important for businesses, organizations, and individuals to understand how to optimize data and to implement new methods for more efficient knowledge discovery and information management and retrieval. Innovative Applications of Knowledge Discovery and Information Resources Management offers in-depth coverage on the pervasiveness of technological change with a collection of material on topics such as the impact of permeable work-life boundaries, burnout and turnover, big data usage, and computer-based learning. It proves a worthy source for academicians, practitioners, IT leaders, IT professionals, and advanced-level students interested in examining the ways in which technology is changing the world.
This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 - July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
This book deals with the problem of finding suitable languages that can represent specific classes of Petri nets, the most studied and widely accepted model for distributed systems. Hence, the contribution of this book amounts to the alphabetization of some classes of distributed systems. The book also suggests the need for a generalization of Turing computability theory. It is important for graduate students and researchers engaged with the concurrent semantics of distributed communicating systems. The author assumes some prior knowledge of formal languages and theoretical computer science.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
Essential Computational Modeling for the Human Body presents key contributions selected from the volume in the Handbook of Numerical Analysis: Computational Modeling for the Human Body Vol. 12 (2005). Computational (Mathematical) Modeling is used by scientists and
researchers with various applications in chemical, biological,
behavioral, environmental sciences, etc. This guide presents
essential research techniques for analysis and essential concrete
examples of computational models, while supplying a wide range of
commonly used methods and applications, followed by various
numerical simulations. Provides various viewpoints of methods and applications are available for researchers to chose and experiment with; Numerical analysis and open problems useful for experimentation; Computational Models useful for surgery simulations;
This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.
Essential Computational Modeling in Chemistry presents key contributions selected from the volume in the Handbook of Numerical Analysis: Computational Modeling in Chemistry Vol. 10(2005). Computational Modeling is an active field of scientific
computing at the crossroads between Physics, Chemistry, Applied
Mathematics and Computer Science. Sophisticated mathematical models
are increasingly complex and extensive computer simulations are on
the rise. Numerical Analysis and scientific software have emerged
as essential steps for validating mathematical models and
simulations based on these models. This guide provides a quick
reference of computational methods for use in understanding
chemical reactions and how to control them. By demonstrating
various computational methods in research, scientists can predict
such things as molecular properties. The reference offers a number
of techniques and the numerical analysis needed to perform
rigorously founded computations. Various viewpoints of methods and applications are available for researchers to chose and experiment with; Numerical analysis and open problems is useful for experimentation; Most commonly used models and techniques for the molecular case is quickly accessible
As governments and policy makers take advantage of information and communication technologies, leaders must understand how to navigate the ever-shifting landscape of modern technologies in order to be most effective in enacting change and leading their constituents. The Handbook of Research on Advanced ICT Integration for Governance and Policy Modeling builds on the available literature, research, and recent advances in e-governance to explore advanced methods and applications of digital tools in government. This collection of the latest research in the field presents an essential reference for academics, researchers, and advanced-level students, as well as government leaders, policy makers, and experts in international relations.
1. Paradigmatische Konstruktionen.- Unser heutiges Wirklichkeits-Verstandnis.- Wirklichkeits-Pluralismus.- Entstehen von Wirklichkeiten.- Lebendiger Vollzug von Wirklichkeiten.- Fruchtbare Vielfalt.- Simultane und sequenzielle Wirklichkeiten in der Lebenswelt.- Okkulte Wirklichkeiten und andere Geheimlehren.- Gefahrliche Verabsolutierungen.- 2. Farbe als Wirklichkeit.- Goethes Farbenlehre.- Physiologische Farben.- Farblose Bilder.- Farbige Bilder.- Farbige Schatten.- Schwach wirkende Lichter, subjektive Hoefe, pathologische Farben.- Physische Farben.- Dioptrische Farben der 1. Klasse.- Dioptrische Farben der 2. Klasse.- Das Phanomen der Refraktion.- Refraktion ohne Farberscheinung.- Farberscheinungen bei Linsen.- Grundzuge refraktionsbedingter Farberscheinungen.- Farberscheinungen bei Prismen.- Farberscheinungen an gro?en und kleinen wei?en Bildern.- Farberscheinungen an gro en und kleinen schwarzen Bildern.- Farberscheinungen sind nie statisch.- Zum Wesen von Licht und Farbe aus Goetheseher Sieht.- Wichtige, ganz allgemeine Begriffe.- Die Polaritat.- Die Steigerung.- Phanomen und Urphanomen.- Farbenkreis und Spektrogramm.- Newtons Farben des Liehts.- Newtons Experimente.- 1. Experiment.- 2. Experiment.- 3. Experiment.- 4. Experiment.- 5. Experiment.- Das We sen der Farbe.- Einfache Farbmetrik.- Das Auge.- Der Spektralfarbenzug.- Zwei Wirklichkeiten.- 3. Heilkundliche Wirkliehkeiten.- Chinesische Lebenswirkliehkeit.- Das Schafgarbenorakel.- Das Yin-Yang-Prinzip.- Shen und Kuei. Qi und Jing.- Die funf Elemente.- Chinesische Medizin.- Yin-Yang-Theorie.- Lebenssubstanzen.- Qi.- Blut und Safte.- Jing.- Shen.- Die Funktion der inneren Organe.- Die Leitbahnen oder die Meridiane.- Wie kommt es zur Disharmonie?.- Die Sechs UEbel.- Die sieben Emotionen.- Die Lebensweise.- Das Dishannoniemuster.- Ein Beispiel.- Ein simultanes Massenphanomen.- 4. Mikro-Wirklichkeiten.- Spiele als Mikro-Wirklichkeiten.- Definition des Spielbegriffes.- Die Vielfalt der Spiele.- Mikro-Wirklichkeiten im weiteren Sinn.- 5. Wirklichkeit eines Verbrechens.- Ein Beispiel aus der japanischen Literatur.- Eine neue Erzlihlung des Rashomon-Textes.- Die Aussage eines Holzfallers.- Die Aussage eines Wandergeistlichen.- Die Aussage eines Gerichtsdieners.- Die Aussage einer alten Frau.- Das Gestandnis des Raubers.- Die Aussage eines Gefahrten des Raubers.- Bericht eines Waldbewohners.- Die Beichte der Ehefrau in einem Kloster.- Der Geist des Toten spricht durch den Mund einer Wahrsagerin.- Vergewaltigung und Tod.- 6. Verwandlung von Wirklichkeiten.- Siddhartha. Eine indische Dichtung.- Die Brahmana-Welt.- Die Samana-Welt.- Die Buddha-Welt.- Die Menschenkinder-Welt.- Am Flu?.- 7. Magie und Damonie.- Weissagung.- Wirksarnkeit von Weissagungen.- Kassandra.- Die delphische Seherin.- Andere Fonnen der Weissagung.- Zauber und Damonen.- Magische Praktikep in der Volkskunst.- Magische Praktiken' der Antike.- Kirke verzaubert Manner.- Hexen morden Knaben.- Fluche verandern das Leben.- Fluchtafeln.- Ovids Ibis.- Schamanen.- Spuren des Schamanismus in der Neuzeit.- Antike Schamanen.- Orpheus.- Pythagoras.- Empedokles.- Vespasian.- Nekromantie.- Die Macht des Okkulten.- Magie und Damonie als Wirklichkeit?.- 8. Totalitare Wirklichkeiten.- Wahnsinn als totalitare Wirklichkeit.- Das Entstehen eines Wahnes.- Der logische Zusammenhang von Wahnideen.- Die weitgehende Unkorrigierbarkeit.- Gro?en und Verfolgungswahn.- Groe?enwahn.- Verfolgungswahn.- Paranoia erotica.- Eifersuchtsparanoia.- Religioeser Wahn mit erotischer Komponente.- Kraftentfaltung in totalitaren Wirklichkeiten.- Der Kriegstanz der Maori.- Atomare Bedrohung.- Extremsituationen in totalitaren Wirklichkeiten.- Der Tag des Blutes.- Der spontane Volkszorn.- Entgleisung einer Hochtechnologie.- Die Eigendynamik und die Hilflosigkeit.- 9. Chance und Bedrangnis.- Wirklichkeit ist eine Konstruktion. Der Urgrund ist ohne Eigenschaften.- Wirklichkeiten als Gewordenes.- Die Lebenswirklichkeit als Ausgangsbasi
As information availability pervades every aspect of life, new trends, technologies, and enhancements must be carefully researched, evaluated and implemented in order to fabricate successful computing applications. Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends examines current practices and challenges faced by designers of Ubiquitous and Pervasive Computing projects. Analyzing theoretical assumptions, empirical research, practical implementations, and case studies, this book intends to present a comprehensive yet concise overview of the recent progress in ubiquitous and pervasive computing applications, as well as discuss new methodologies, technologies and approaches currently practiced. Truly interdisciplinary, this publication serves as a valuable reference for researchers in the fields of electrical engineering and computer science, students, educators, and industrial trainers interested in network sensors, embedded systems, distributed systems, computer networks, and computer science.
Forth Programmer's Handbook is a thorough introduction to the Forth programming language. Written for readers with programming backgrounds but not necessarily with prior exposure to Forth, it offers comprehensive coverage of all major aspects of the language, from basic principles to advanced concepts such as multitasking and cross-compiling for embedded systems. It covers nearly 400 commands, including ANS Forth words and many common extensions. The book describes how programmers use Forth to solve problems, serves as a reference for experienced programmers and presents the language's history and rationale. Forth was developed at the National Radio Astronomy Laboratory in the early 1970s; the authors were among its original developers and founders of FORTH, Inc., a premier supplier of Forth products and services. Elizabeth D. Rather chaired the Technical Committee that produced the ANSI Standard for Forth in 1994.
The central theme of this book is focused on the analyses and the results which emerged from the international research project BRAHMATWINN sponsored by European Commission (EC) and conducted during 2006 - 2009. The book highlights the achievements of BRAHMATWINN to carry out a harmonised integrated water resources management (IWRM) approach as addressed by the European Water Initiative (EWI) in headwater river systems of alpine mountain massifs. The latter are already impacted from climate change, and the BRAHMATWINN project established transfer of professional IWRM expertise, approaches and tools based on case studies carried out in twinning European and Asian river basins. The project addresses all important IWRM issues in a balanced way, including conflict resolution in the trans- boundary Danube and Brahmaputra River Basins in Europe and South Asia respectively. This book will be useful to researchers, professionals, managers and decision makers associated with study and application of sustainable integrated land and water resources management (ILWRM) in the backdrop of climate change.
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful."
This series, since its first volume in 1960 and now the oldest
series still being published, covers new developments in computer
technology. Each volume contains from 5 to 7 chapters and 3 volumes
are produced annually. Most chapters present an overview of a
current subfield within computer science, include many citations,
and often new developments in the field by the authors of the
individual chapters. Topics include hardware, software, web
technology, communications, theoretical underpinnings of computing,
and novel applications of computers. The book series is a valuable
addition to university courses that emphasize the topics under
discussion in that particular volume as well as belonging on the
bookshelf of industrial practitioners who need to implement many of
the technologies that are described. |
You may like...
New Perspectives on Microsoft (R) Access…
Joseph Adamski, Kathy Finnegan
Paperback
New Perspectives Microsoft (R)Office 365…
Mark Shellman, Sasha Vodnik
Paperback
|