0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (181)
  • R250 - R500 (701)
  • R500+ (11,116)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > General

Industrial Automation Technologies (Paperback): Chanchal Dey, Sunit Kumar Sen Industrial Automation Technologies (Paperback)
Chanchal Dey, Sunit Kumar Sen
R3,704 Discovery Miles 37 040 Ships in 12 - 17 working days

The book begins with an overview of automation history and followed by chapters on PLC, DCS, and SCADA -describing how such technologies have become synonymous in process instrumentation and control. The book then introduces the niche of Fieldbuses in process industries. It then goes on to discuss wireless communication in the automation sector and its applications in the industrial arena. The book also discusses theall-pervading IoT and its industrial cousin,IIoT, which is finding increasing applications in process automation and control domain. The last chapter introduces OPC technology which has strongly emerged as a defacto standard for interoperable data exchange between multi-vendor software applications and bridges the divide between heterogeneous automation worlds in a very effective way. Key features: Presents an overall industrial automation scenario as it evolved over the years Discusses the already established PLC, DCS, and SCADA in a thorough and lucid manner and their recent advancements Provides an insight into today's industrial automation field Reviews Fieldbus communication and WSNs in the context of industrial communication Explores IIoT in process automation and control fields Introduces OPC which has already carved out a niche among industrial communication technologies with its seamless connectivity in a heterogeneous automation world Dr. Chanchal Dey is Associate Professor in the Department of Applied Physics, Instrumentation Engineering Section, University of Calcutta. He is a reviewer of IEEE, Elsevier, Springer, Acta Press, Sage, and Taylor & Francis Publishers. He has more than 80 papers in international journals and conference publications. His research interests include intelligent process control using conventional, fuzzy, and neuro-fuzzy techniques. Dr. Sunit Kumar Sen is an ex-professor, Department of Applied Physics, Instrumentation Engineering Section, University of Calcutta. He was a coordinator of two projects sponsored by AICTE and UGC, Government of India. He has published around70 papers in international and national journals and conferences and has published three books - the last one was published by CRC Press in 2014. He is a reviewer of Measurement, Elsevier. His field of interest is new designs of ADCs and DACs.

AQA AS/A-level Computer Science Workbook 1 (Paperback): Mark Clarkson AQA AS/A-level Computer Science Workbook 1 (Paperback)
Mark Clarkson
R297 Discovery Miles 2 970 Ships in 9 - 15 working days

Exam board: AQA Level: A-level Subject: Computer Science First teaching: September 2015 First exams: Summer 2016 (AS); Summer 2017 (A-level) Strengthen your students' understanding and upgrade their confidence with our AQA Computer Science workbooks, full of self-contained exercises to consolidate knowledge and improve performance. Written by an experienced Computer Science author and teacher, these full colourworkbooks provide stimulus materials on a number of AS and A-level topics, followed by sets of questions designed to develop and test skills in the unit. * With consolidation questions to reinforce knowledge and test understanding, these workbooks will raise your students' chances of achieving the highest grades. * Helps students identify their revision needs and see how to target the top grades using online answers for each question. * Saves valuable preparation time and expense, with self-contained exercises that don't need photocopying and provide instant lesson and homework solutions for specialist and non-specialist teachers. * Encourages ongoing revision throughout the course as students progressively develop their skills in class and at home.

Blockchain for Information Security and Privacy (Hardcover): Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar... Blockchain for Information Security and Privacy (Hardcover)
Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar Shukla, Zelalem Sintayehu Shibeshi
R3,089 Discovery Miles 30 890 Ships in 12 - 17 working days

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Hardcover): Rajesh Jugulum Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Hardcover)
Rajesh Jugulum
R3,381 Discovery Miles 33 810 Ships in 12 - 17 working days

Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.

Wavelet Based Approximation Schemes for Singular Integral Equations (Paperback): Madan Mohan Panja, Birendra Nath Mandal Wavelet Based Approximation Schemes for Singular Integral Equations (Paperback)
Madan Mohan Panja, Birendra Nath Mandal
R1,869 Discovery Miles 18 690 Ships in 12 - 17 working days

Many mathematical problems in science and engineering are defined by ordinary or partial differential equations with appropriate initial-boundary conditions. Among the various methods, boundary integral equation method (BIEM) is probably the most effective. It's main advantage is that it changes a problem from its formulation in terms of unbounded differential operator to one for an integral/integro-differential operator, which makes the problem tractable from the analytical or numerical point of view. Basically, the review/study of the problem is shifted to a boundary (a relatively smaller domain), where it gives rise to integral equations defined over a suitable function space. Integral equations with singular kernels areamong the most important classes in the fields of elasticity, fluid mechanics, electromagnetics and other domains in applied science and engineering. With the advancesin computer technology, numerical simulations have become important tools in science and engineering. Several methods have been developed in numerical analysis for equations in mathematical models of applied sciences. Widely used methods include: Finite Difference Method (FDM), Finite Element Method (FEM), Finite Volume Method (FVM) and Galerkin Method (GM). Unfortunately, none of these are versatile. Each has merits and limitations. For example, the widely used FDM and FEM suffers from difficulties in problem solving when rapid changes appear in singularities. Even with the modern computing machines, analysis of shock-wave or crack propagations in three dimensional solids by the existing classical numerical schemes is challenging (computational time/memory requirements). Therefore, with the availability of faster computing machines, research into the development of new efficient schemes for approximate solutions/numerical simulations is an ongoing parallel activity. Numerical methods based on wavelet basis (multiresolution analysis) may be regarded as a confluence of widely used numerical schemes based on Finite Difference Method, Finite Element Method, Galerkin Method, etc. The objective of this monograph is to deal with numerical techniques to obtain (multiscale) approximate solutions in wavelet basis of different types of integral equations with kernels involving varieties of singularities appearing in the field of elasticity, fluid mechanics, electromagnetics and many other domains in applied science and engineering.

Digital Future of Healthcare (Hardcover): Nilanjan Dey, Nabanita Das, Jyotismita Chaki Digital Future of Healthcare (Hardcover)
Nilanjan Dey, Nabanita Das, Jyotismita Chaki
R3,235 Discovery Miles 32 350 Ships in 12 - 17 working days

Discusses various aspects of digitization of healthcare systems Examines deployment of machine learning including IoT and medical analytics Provides studies on the design, implementation, development, and management of intelligent healthcare systems Includes sensor-based digitization of healthcare data Reviews real-time advancements and challenges of digital communication in the field of healthcare

Infinite Words, Volume 141 - Automata, Semigroups, Logic and Games (Hardcover): Dominique Perrin, Jean-Eric Pin Infinite Words, Volume 141 - Automata, Semigroups, Logic and Games (Hardcover)
Dominique Perrin, Jean-Eric Pin
R4,285 Discovery Miles 42 850 Ships in 12 - 17 working days

Infinite Words is an important theory in both Mathematics and Computer Sciences. Many new developments have been made in the field, encouraged by its application to problems in computer science. Infinite Words is the first manual devoted to this topic.
Infinite Words explores "all" aspects of the theory, including Automata, Semigroups, Topology, Games, Logic, Bi-infinite Words, Infinite Trees and Finite Words. The book also looks at the early pioneering work of Buchi, McNaughton and Schutzenberger.
Serves as both an introduction to the field and as a reference book.
Contains numerous exercises desgined to aid students and readers.
Self-contained chapters provide helpful guidance for lectures.

Smart Innovation of Web of Things (Paperback): Aarti Jain, Ruben Gonzalez Crespo, Manju Khari Smart Innovation of Web of Things (Paperback)
Aarti Jain, Ruben Gonzalez Crespo, Manju Khari
R3,832 Discovery Miles 38 320 Ships in 12 - 17 working days

The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.

Coaching Online - A Practical Guide (Hardcover): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Hardcover)
Kate Anthony, DeeAnna Merz Nagel
R3,978 Discovery Miles 39 780 Ships in 12 - 17 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R4,744 Discovery Miles 47 440 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R5,934 Discovery Miles 59 340 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,906 Discovery Miles 19 060 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

DIY Wedding Photo and Video - Professional Techniques for the Amateur Documentarian (Paperback): Joanna Silber DIY Wedding Photo and Video - Professional Techniques for the Amateur Documentarian (Paperback)
Joanna Silber
R910 R739 Discovery Miles 7 390 Save R171 (19%) Ships in 12 - 17 working days

Do-it-yourself wedding photography and videography is not only a great way to save money, it's also a fresh way to capture your special occasion from start to finish with a uniquely personal creative vision. Written to help the bride, groom, and their DIY documentarian navigate the world of wedding photography and videography, DIY WEDDING PHOTO AND VIDEO: PROFESSIONAL TECHNIQUES FOR THE AMATEUR DOCUMENTARIAN is your step-by-step guide to shooting, editing, and delivering a finished photo/video wedding package on a DIY budget and with exceptional results. Working with a DIY documentarian--a friend with photo and/or video skills and equipment--provides many advantages for the wedding couple: * DIY delivers a customized end result--one that's not locked into the package deals and old working habits of wedding-industry pros. * Going DIY means you're working with a friend, making for a more relaxed, low-key working relationship on the big day. * The DIY documentarian can capture more interesting and personal photos and footage, spanning a longer period of time, than the typical hired photographer. Whether you're the bride, the groom, or the documentarian, DIY Wedding Photo and Video will help you through the many large and small details of wedding photography and videography, from planning through post production, including specifics like building a shot list and coming to agreement on costs, equipment, and expectations. Also included are many wedding-tested tips for DIYers. Specific "DIY Idea" sections in each chapter offer creative ideas for techniques and shots that will give your wedding photos and video that special, personal touch.

Photography - The Definitive Visual History (Hardcover): Tom Ang Photography - The Definitive Visual History (Hardcover)
Tom Ang
R390 R312 Discovery Miles 3 120 Save R78 (20%) Ships in 5 - 10 working days

This lavish coffee-table book traces the history of photography from the first black and white images to celebrated examples of 21st-century digital photography. Photography celebrates the most iconic photographs of the past 200 years and includes more than 50 biographies of the most famous photographers, explaining how they pushed the bounds of the medium. It also showcases examples of the extraordinary cameras that photographers experimented with, from the daguerreotype to the latest camera phones! Charting the influence of social and cultural change, as well as the impact of science and technology, this beautiful book follows the history of photographs from the first grainy attempts at portrait and landscape photography to gritty photojournalism, street photography, and digital photography, with special features delving into the stories behind photographic images that changed how people saw the world. This fantastic photography book promises: - A selection of the most important "lost" cultural artefacts from ancient times to the present day - Features images of the artworks where available, or specially commissioned illustrations of them based on written accounts - Includes details of the ongoing debate about whether looted art should be returned to its country of origin Packed with information and full of inspiration, Photography is the perfect reference for budding photographers, seasoned professionals, and anyone with an interest in the subject. Whether you're looking for a riveting reference book to display on your coffee table or gift to a friend, or you're a life-longer learner with a thirst for knowledge - Photography is sure to delight!

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover)
Karl Cox
R3,983 Discovery Miles 39 830 Ships in 12 - 17 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

The Power of Virtual Reality Cinema for Healthcare Training - A Collaborative Guide for Medical Experts and Media Professionals... The Power of Virtual Reality Cinema for Healthcare Training - A Collaborative Guide for Medical Experts and Media Professionals (Paperback)
John Bowditch, Eric R Williams
R1,418 Discovery Miles 14 180 Ships in 12 - 17 working days

Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,381 Discovery Miles 33 810 Ships in 12 - 17 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Interpretation of Algebraic Inequalities - Practical Engineering Optimisation and Generating New Knowledge (Hardcover): Michael... Interpretation of Algebraic Inequalities - Practical Engineering Optimisation and Generating New Knowledge (Hardcover)
Michael Todinov
R2,330 Discovery Miles 23 300 Ships in 12 - 17 working days

1) Enables engineers to enhance system performance through interpreting algebraic inequalities. 2) Demonstrates how to optimise systems through mathematical modelling, aiding engineers in cost saving and weight reduction 3) Shows the clear link between mathematics and reality to aid engineers in practically applications of algebraic inequalities 4) Aids professional engineers in correctly mapping operating costs- correct application of the mathematics minimises the risk of underestimating costs and overestimating profits.

Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover): Andrew Jenkinson Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover)
Andrew Jenkinson
R3,242 Discovery Miles 32 420 Ships in 12 - 17 working days

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,670 Discovery Miles 16 700 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Information and Knowledge Organisation in Digital Humanities - Global Perspectives (Hardcover): Koraljka Golub, Ying-Hsang Liu Information and Knowledge Organisation in Digital Humanities - Global Perspectives (Hardcover)
Koraljka Golub, Ying-Hsang Liu
R4,146 Discovery Miles 41 460 Ships in 12 - 17 working days

Including contributions from Asia, Australia, Europe, North America and the Middle East, the volume explores the potential uses of, and challenges involved in, applying the organisation of information and knowledge in the various areas of Digital Humanities. The book also includes chapters that focus on machine learning, knowledge graphs, text analysis, text annotations, and network analysis. Other topics covered include: semantic technologies, conceptual schemas, and data augmentation, digital scholarly editing, metadata creation, browsing, visualisation and relevance ranking. The book also provides a starting point for discussions about the impact of information and knowledge organisation and related tools on the methodologies used in the Digital Humanities field. Information and Knowledge Organisation is intended for use by researchers, students and professionals interested in the role information and knowledge organisation plays in the Digital Humanities. It will be essential reading for those working in library and information science, computer science and across the humanities.

Uncertainty Quantification in Variational Inequalities - Theory, Numerics, and Applications (Hardcover): Joachim Gwinner,... Uncertainty Quantification in Variational Inequalities - Theory, Numerics, and Applications (Hardcover)
Joachim Gwinner, Baasansuren Jadamba, Akhtar A. Khan, Fabio Raciti
R3,272 Discovery Miles 32 720 Ships in 12 - 17 working days

Features First book on uncertainty quantification in variational inequalities emerging from various network, economic, and engineering models. Completely self-contained and lucid in style Aimed for a diverse audience including applied mathematicians, engineers, economists, and professionals from academia Includes the most recent developments on the subject which so far have only been available in the research literature.

Industry 4.0 Technologies for Business Excellence - Frameworks, Practices, and Applications (Hardcover): Shivani Bali, Sugandha... Industry 4.0 Technologies for Business Excellence - Frameworks, Practices, and Applications (Hardcover)
Shivani Bali, Sugandha Aggarwal, Sunil Sharma
R3,392 Discovery Miles 33 920 Ships in 12 - 17 working days

This book captures deploying Industry 4.0 technologies for business excellence and moving towards Society 5.0. It addresses applications of Industry 4.0 in the areas of marketing, operations, supply chain, finance, and HR to achieve business excellence. Industry 4.0 Technologies for Business Excellence: Frameworks, Practices, and Applications focuses on the use of AI in management across different sectors. It explores the benefits through a human-centered approach to resolving social problems by integrating cyberspace and physical space. It discusses the framework for moving towards Society 5.0 and keeping a balance between economic and social gains. This book brings together researchers, developers, practitioners, and users interested in exploring new ideas, techniques, and tools and exchanging their experiences to provide the most recent information on Industry 4.0 applications in the field of business excellence. Graduate or postgraduate students, professionals, and researchers in the fields of operations management, manufacturing, healthcare, supply chain, marketing, finance, and HR will find this book full of new ideas, techniques, and tools related to Industry 4.0.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,434 Discovery Miles 44 340 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Bioinformation Worlds and Futures (Hardcover): EJ Gonzalez-Polledo, Silvia Posocco Bioinformation Worlds and Futures (Hardcover)
EJ Gonzalez-Polledo, Silvia Posocco
R4,141 Discovery Miles 41 410 Ships in 12 - 17 working days

This book sets out to define and consolidate the field of bioinformation studies in its transnational and global dimensions, drawing on debates in science and technology studies, anthropology and sociology. It provides situated analyses of bioinformation journeys across domains and spheres of interpretation. As unprecedented amounts of data relating to biological processes and lives are collected, aggregated, traded and exchanged, infrastructural systems and machine learners produce real consequences as they turn indeterminate data into actionable decisions for states, companies, scientific researchers and consumers. Bioinformation accrues multiple values as it transverses multiple registers and domains, and as it is transformed from bodies to becoming a subject of analysis tied to particular social relations, promises, desires and futures. The volume harnesses the anthropological sensibility for situated, fine-grained, ethnographically grounded analysis to develop an interdisciplinary dialogue on the conceptual, political, social and ethical dimensions posed by bioinformation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Program Construction - Calculating…
Roland Backhouse Paperback R1,315 R1,177 Discovery Miles 11 770
Introduction to Information Systems
R.Kelly Rainer, Brad Prince Paperback R1,361 Discovery Miles 13 610
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,280 R1,147 Discovery Miles 11 470
Introduction to Information Systems, 9th…
Rainer Paperback R1,687 Discovery Miles 16 870
Security Awareness For Dummies
I Winkler Paperback R714 R507 Discovery Miles 5 070
Performance, Reliability and…
Paulo Romero Martins Maciel Hardcover R5,902 Discovery Miles 59 020
Introduction to the Theory of…
Michael Sipser Hardcover R1,263 R1,131 Discovery Miles 11 310
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,207 R1,088 Discovery Miles 10 880
English Insights 2
Jane Bailey, Paul Dummett, … Paperback R840 Discovery Miles 8 400

 

Partners