![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory > General
Daten werden uberall gesammelt. Jeder Kauf, ob online oder offline, jede Autofahrt und jede Benutzung des Smartphones erzeugt Daten, die gespeichert werden. So entstehen Datenberge, die in atemberaubendem Tempo wachsen - fur 2020 geht man von 40 Billionen Gigabytes aus. Aber was passiert dann mit diesen Daten? Wie werden sie ausgewertet? Und wer macht das? Holger Aust nimmt Sie mit auf einen unterhaltsamen Ausflug in die wunderbare Welt der Data Science. Sein Buch richtet sich an alle, die schon immer wissen wollten, wie Maschinen anhand von Daten lernen und ob sie dadurch (kunstliche) Intelligenz erlangen. Sie erfahren naturlich auch, was neuronale Netze und Deep Learning eigentlich mit all dem zu tun haben. In leicht verstandlichem Stil erhalten Sie ausserdem Einblicke in die Funktionsweise der wichtigsten Algorithmen und lernen konkrete Beispiele, Herausforderungen und Risiken aus der Praxis kennen: Sie erfahren etwa, wie Mobilfunkanbieter ihre Kunden bei Laune halten, wie Erdbebenvorhersage funktioniert und warum auch Computer zum Schubladendenken neigen.
2013 Reprint of 1949 Edition. Full facsimile of the original edition, not reproduced with Optical Recognition Software. This is the second book by Norbert Wiener on time series and communication engineering. While the first one, "Cybernetics," treated the subject from a general standpoint and was more philosophical than mathematical, the present volume is more technical than theoretical, and forms a kind of companion piece to the first. It is intended as a tool for engineers working in the field of electrical communication and related subjects. The book consists of an introduction, five chapters, and three appendices. After explaining the general outline of the problem in the introduction, the author gives in Chapter I a review of generalized harmonic analysis which is necessary for the understanding of the following chapters. Chapters II and III are devoted to the problems of prediction and filtering respectively. In Chapter IV there is given a brief account of the theory of multiple prediction, that is, the theory of prediction when we deal with more than one time series at the same time. Finally, in Chapter V there is given a short discussion on the application of similar methods to a problem of approximate differentiation.
This book analyzes the methods, technologies, standards, and languages to structure and describe data in their entirety. It reveals common features, hidden assumptions, and ubiquitous patterns among these methods and shows how data are actually structured and described independently from particular trends and technologies. Examples of data structuring methods analyzed critically include: Encodings (e.g. Unicode) Identifiers and Identifier systems (e.g. ISBN) File systems Database Systems (record databases, relational databases, NoSQL...) Data structuring languages (JSON, XML, CSV, RDF...) markup languages (SGML, HTML, TEI, Markdown...) Schema languages (BNF, XSD, RDFS, OWL, SQL...) Conceptual modeling languages (ERM, ORM, UML, DSL...) Conceptual diagrams It is shown how particular method of data structuring and description can best be categorized by their primary purpose. The study further exposes five basic paradigms that deeply shape how data is structured and described in practice. The third results is a pattern language of data structuring. Patterns show problems and solutions which occur over and over again in data. Each pattern is described with its benefits, consequences, pitfalls, and relations to other patterns. The results can help to better understand data and its actual forms, both for consumption and creation of data. Possible applications include data analysis, data modeling, data archaeology, and data literacy.
"Using its interdisciplinary approach, Informationalism is a major contribution to our understanding of the interaction of technology and its economic impact on contemporary life. In achieving this, it is one of the break-through scholarly works of the 21st Century. It educates about the dynamics of the gains-in-profits vs. the exploitation-of-surplus-labor in the production process within the current Age-of-Information management arrangement. In doing this, it also provides an historical analysis to compare the two distinct modes (management and production) in the systems of the past Industrial and the contemporary Age-of-Information structures. This is accompanied by an incisive critique of the surplus-labor exploitation mechanisms in both periods." Dr. Charles S. J. White, American University, Washington, D.C.
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in Geographic Information Science (GIScience). Michael Goodchild offers an afterword and Waldo Tobler contributes a preface. The book is intended for advanced undergraduate and graduate student readers.
A theoretical examination of the surprising emergence of software as a guiding metaphor for our neoliberal world. New media thrives on cycles of obsolescence and renewal: from celebrations of cyber-everything to Y2K, from the dot-com bust to the next big things-mobile mobs, Web 3.0, cloud computing. In Programmed Visions, Wendy Hui Kyong Chun argues that these cycles result in part from the ways in which new media encapsulates a logic of programmability. New media proliferates "programmed visions," which seek to shape and predict-even embody-a future based on past data. These programmed visions have also made computers, based on metaphor, metaphors for metaphor itself, for a general logic of substitutability. Chun argues that the clarity offered by software as metaphor should make us pause, because software also engenders a profound sense of ignorance: who knows what lurks behind our smiling interfaces, behind the objects we click and manipulate? The combination of what can be seen and not seen, known (knowable) and not known-its separation of interface from algorithm and software from hardware-makes it a powerful metaphor for everything we believe is invisible yet generates visible, logical effects, from genetics to the invisible hand of the market, from ideology to culture.
Precharge logic is used by a variety of industries in
applications where processor speed is the primary goal, such as
VLSI (very large systems integration) applications. Also called
dynamic logic, this type of design uses a clock to synchronize
instructions in circuits. This comprehensive book covers the
challenges faced by designers when using this logic style,
including logic basics, timing, noise considerations, alternative
topologies and more. In addition advanced topics such as skew
tolerant design are covered in some detail. Overall this is a
comprehensive view of precharge logic, which should be useful to
graduate students and designers in the field alike. It might also
be considered as a supplemental title for courses covering
VLSI.
Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten years, significantly decreased its IT spending, despite an increase in workforce of nearly 300%, and its number of satisfied customers is growing and growing. Discover how it has achieved all this, and how you can realize similar benefits in your organization. Running IT like a Business, Second edition shows you how your IT function can provide much more than products and services and add real value to your business. With clear strategies, helpful diagrams and real-life examples, this book will give you the keys to unlocking your IT function's hidden potential. Your organization will grow as you save costs, improve productivity, increase revenues and gain competitive advantage. You will be able to do things faster, better and cheaper; you will manage risks more effectively, solve problems and create workable solutions. Robert E. Kress lets you in on some of Accenture's secrets to its award-winning way of running IT. He shares valuable 'tricks of the trade', including the seven keys of Accenture's IT strategy, and the building blocks and core capabilities of not only Accenture, but also of other high-performance organizations. Robert E. Kress is the COO of Accenture's high-performance Information Technology organization, which supports and advances the business goals of a $22 billion company with more than 215,000 employees in 52 countries. He has overall responsibility for running IT like a business within the company, including the direct management of IT governance, strategy, planning, risk management, audits and IT policy. Buy this book and see how Accenture's strategies can work for you too!
The theory as I see it going into the computer age. I talk about the beginning through the Y2K era.
Dieses Buch behandelt die Kernfragen und grundlegenden Verfahren der Kryptographie. Diese werden aus Sicht der modernen Kryptographie studiert, die durch eine prazise mathematische und informatische Herangehensweise gepragt ist. Die Inhalte dieser Einfuhrung sind dabei aus der Praxis motiviert und es werden wichtige, in der Praxis eingesetzte kryptographische Verfahren, vorgestellt und diskutiert.
Thomas Borys untersucht aus didaktischer Sicht, welchen Beitrag die Inhalte Codierung und Kryptologie zur mathematischen bzw. informatischen Bildung leisten. Seine epistemologische Analyse erfolgt auf Basis des genetischen Prinzips und der fundamentalen Ideen der Mathematik und der Informatik, die als Leitlinien der mathematischen bzw. informatischen Bildung dienen. An ausgewahlten Beispielen der Codierung und Kryptologie wird gezeigt, was bei der Umsetzung im Unterricht zu beachten ist."
This book provides an easy to understand knowledge, information and data (KID) management framework that is applicable in most organizations. The book consists of two parts. The first part focusus on what managers in organizations need to know about KID management. The second part aims at KID managers and discusses KID management topics at a more technical detail.
Xerox Sutra Editions presents mIEKAL aND's inconvenient disambiguation of search engines, spam, outside texts & literal displays of often loved hysteric sutras.
A brain is a list of neurons. A neuron is a mathematical function. Found are the possible functions that are necessary. A tool kit is made by making each function a microcontroller. A language is made to write the functions. All this is applied to building some robot brains.
Computing and information, and their philosophy in the broad sense, play a most important scientific, technological and conceptual role in our world. This book collects together, for the first time, the views and experiences of some of the visionary pioneers and most influential thinkers in such a fundamental area of our intellectual development. This is yet another gem in the 5 Questions Series by Automatic Press / VIP
The Triadic Continuum is the invention of Jane Mazzagatti, a mathematician and software engineer. Mazzagatti came upon the idea for this new computer data structure, which is based on the work of Charles Peirce, while working on a project for Unisys Corporation. This same structure has proven commercially valuable in the efficient way it stores and allows for the analysis of large datasets. However, while learning about the nature of the structure she discovered more far-reaching implications to areas other than computer science. Charles Peirce was fascinated with how the mind reasons and with all of the scientific and philosophical implications of the mechanisms of how the brain records experience, constructs memories, and accesses previously stored experience and knowledge. Mazzagatti believes that she has rediscovered the structure of the Triadic Continuum, which is the foundation of many of Peirce's key theories dealing with human reasoning and the logic of thought. In this book the author, who worked with Mazzagatti writing patents for the invention, explains how this structure is unlike any other computer data structure or type of Artificial Intelligence-but more importantly why this structure may very well be a model for human cognition. |
You may like...
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,967
Discovery Miles 209 670
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,961
Discovery Miles 209 610
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,954
Discovery Miles 209 540
Engineering and the Ultimate - An…
Jonathan Bartlett, Dominic Halsmer, …
Hardcover
R701
Discovery Miles 7 010
|