![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features.
The progression of information and communication technology (ICT) eGovernment systems has substantial implications for the future of government as we know it. eGov presents major challenges and advantages for policy makers as fundamentally different nations are adopting ICT in public administration reforms in order to capitalize on the benefits of transformational government or electronic government technology. This book investigates the modern political, technological, economic, social, and cultural issues of transformational government. It discusses in detail how interaction through advancing technology such as e-participation, mobile government, social media, web 2.0, and cloud computing has been successfully incorporated into eGov practice. International in scope this book gives practical examples and case studies of eGov implementation in countries across the globe and is the essential reference text for this important topic.
An IT survival guide for CEOs from the leader of PricewaterhouseCoopers' IT Business Risk Management Practice Managing IT as a Business is a comprehensive guide for CEOs and other executives looking to link corporate strategy with information technology. Until now, the inability of companies to meld IT organizations, systems, and technology and to link these to strategic business drivers has been one of the major obstacles to achieving sustainable IT business value. In this book, Lutchen provides practical advice to executives seeking to make the link between IT and strategy and to minimize key IT business risks. For leaders who want to maximize their IT investment, Managing IT as a Business offers the most enlightened guidance available. Mark D. Lutchen (Harrison, NY) leads PricewaterhouseCoopers' IT Business Risk Management Practice and was the firm's Global CIO during its massive merger (1997 - 98). He has almost 30 years of experience advising key executives in the areas of technology management, globalization, and mergers and acquisitions.
Covers latest developments in deep learning techniques as applied to audio analysis, computer vision, and Natural Language Processing Introduces contemporary applications of deep learning techniques as applied to audio, textual, and visual processing Discovers deep learning frameworks and libraries for NLP, Speech and Computer vision in Python Gives insights into using the tools and libraries in python for real-world applications. Provides easily accessible tutorials, and real-world case studies with code to provide hands-on experience.
‘Joan Didion at a startup’ Rebecca Solnit ‘Impossibly pleasurable’ Jia Tolentino ‘This is essential reading’ Stylist At twenty-five years old, Anna Wiener was beginning to tire of her assistant job in New York publishing. There was no room to grow, and the voyeuristic thrill of answering someone else’s phone had worn thin. Within a year she had moved to Silicon Valley to take up a job at a data analytics startup in San Francisco. Leaving her business casual skirts and shirts in the wardrobe, she began working in company-branded T-shirts. She had a healthy income for the first time in her life. She felt like part of the future. But a tide was beginning to turn. People were speaking of tech startups as surveillance companies. Out of sixty employees, only eight of her colleagues were women. Casual sexism was rife. Sexual harassment cases were proliferating. And soon, like everyone else, she was addicted to the internet, refreshing the news, refreshing social media, scrolling and scrolling and scrolling. Slowly, she began to realise that her blind faith in ambitious, arrogant young men from America’s soft suburbs wasn’t just her own personal pathology. It had become a global affliction. Uncanny Valley is a coming of age story set against the backdrop of our generation’s very own gold rush. It’s a story about the tension between old and new, between art and tech, between the quest for money and the quest for meaning – about how our world is changing forever.
Now you can master investments by both learning and doing with Adair/Nofsinger's unique FOUNDATIONS OF INVESTMENTS. From theory to practice to implementation, the authors use clear descriptions, real examples, interactive learning features and MindTap and Excel digital resources to strengthen your understanding and skills to confidently implement investment ideas. You learn trusted places on the internet to obtain information and data as you work with data from companies such as Tesla, Apple and Walmart. You then use that data in spreadsheets to create investment solutions that lead to good decision making. Even if you have limited Excel experience, Excel Expert example boxes guide you through how to analyze investment spreadsheets. Applications from today's headlines highlight examples such as Bitcoin and GameStop. With this edition, you develop your own personal investment strategies to use in your personal portfolio or in your professional job.
This book constitutes the proceedings of the First International Conference on 5G for Future Wireless Networks, 5GWN 2017, held in Beijing, China, in April 2017. The 64 full papers were selected from 135 submissions and present the state of the art and practical applications of 5G technologies. The exponentially growing data traffic caused by the development of mobile Internet and smart phones requires powerful networks. The fifth generation (5G) techniques are promising to meet the requirements of this explosive data traffic in future mobile communications.
Are you trying to figure out how to safely use social media but finding yourself struggling? Here’s a book specifically designed to help regular people figure out social media platforms. It begins with a chapter about social media basics: how they normally work, why people use them, and general safety tips. It is easy to get confused by the large number of options that are out there so this book breaks down each major network into its own chapter. Chapters are included for: ·Facebook ·Snapchat ·Pinterest ·LinkedIn ·Instagram ·YouTube ·Twitter ·Reddit, and ·Tumblr. Because each social media platform has its their own rules, benefits, and challenges, each chapter gives a summary of the platform and tells the reader why people use it. Next, each chapter has a glossary of terms to explain language and slang that are used. This will help people who are new to social media learn about terminology like subreddits, retweets, and more. If readers decide to use the platform (or already use it and want to learn more), each chapter guides users through a “how-to” of using each platform. This includes the basic functionality, setting up profiles, settings, and odd features that even current users may not know about. Privacy and safety are also covered, with a platform-specific section devoted to these important issues in each chapter. Two final chapters cover other notable social media platforms that readers might want to know about and archiving tips for saving social media posts and information. This book can help people new to social media, people joining new social media, and people who are already on but want to learn how to better manage and protect their accounts.
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure for data scientists to ensure data privacy. Unfortunately, integrating privacy into your data science workflow is still complicated. This essential guide will give you solid advice and best practices on breakthrough privacy-enhancing technologies such as encrypted learning and differential privacy--as well as a look at emerging technologies and techniques in the field. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my project? What does "anonymized data" really mean? Should I anonymize the data? If so, how? Which privacy techniques fit my project and how do I incorporate them? What are the differences and similarities between privacy-preserving technologies and methods? How do I utilize an open-source library for a privacy-enhancing technique? How do I ensure that my projects are secure by default and private by design? How do I create a plan for internal policies or a specific data project that incorporates privacy and security from the start?
Visual information is everywhere. We are constantly immersed in a flow of visual data that reshapes our social and inner world. Companies and individuals are competing to conquer the public’s scarce attention by inventing distinctive visual formats to stand out from the crowd. How can designers, inventors, and product managers create designs that are quick to process as well as meaningful, unique and memorable in an age characterized by constant information overload? The answer is to think aesthetically. Research insights at the intersection between cognitive science and art studies demonstrate that our minds can effectively process visual complexity by using aesthetic pleasure and judgement as a guide. Analysing the work of great artists and designers from the perspective of how our mind appreciates beauty, Elegant Design identifies actionable aesthetic strategies that will help you to design products and user experiences that are useful, beautiful and meaningful.
Advances in communications technology continue to accelerate. To maintain the competitive edge in such a dynamic environment, today's managers, professionals and engineers can expect to be challenged daily to keep pace with the technical and organizational issues, opportunities and threats surrounding the operation and management of any communications system. The purpose of this book is to enable these people to detect, understand, handle and control a communications system during a crisis.
‘Hello Computer’ is a story of a working-class girl who begins a life-long love affair with technology after seeing a computer for the first time in 1967. Her journey takes us through exciting times and epic events, from the dawn of the internet to the dotcom boom, from punch cards to the raspberry pi and virtual worlds. Linda shares her experiences of computing through real life stories where systems are designed to make a difference to people’s lives. Demonstrating that although technology changes constantly, fundamentally, people don’t change that much. Against a backdrop of unspoken bias the story captures the struggles faced by many young women, then and now. It is positive, heart-warming and full of hope that women will become more influential within tech. A story of ambition, passion and programming, inspirational for future generations of women and girls in STEM.
An incisive history of the controversial Google Books project and the ongoing quest for a universal digital library Libraries have long talked about providing comprehensive access to information for everyone. But when Google announced in 2004 that it planned to digitize books to make the world's knowledge accessible to all, questions were raised about the roles and responsibilities of libraries, the rights of authors and publishers, and whether a powerful corporation should be the conveyor of such a fundamental public good. Along Came Google traces the history of Google's book digitization project and its implications for us today. Deanna Marcum and Roger Schonfeld draw on in-depth interviews with those who both embraced and resisted Google's plans, from librarians and technologists to university leaders, tech executives, and the heads of leading publishing houses. They look at earlier digital initiatives to provide open access to knowledge, and describe how Google founders Sergey Brin and Larry Page made the case for a universal digital library and drew on their company's considerable financial resources to make it a reality. Marcum and Schonfeld examine how librarians and scholars organized a legal response to Google, and reveal the missed opportunities when a settlement with the tech giant failed. Along Came Google sheds light on the transformational effects of the Google Books project on scholarship and discusses how we can continue to think imaginatively and collaboratively about expanding the digital availability of knowledge.
After many years on the fringe, online counselling has rapidly become mainstream practice, propelled by the Covid-19 pandemic. Yet too often practitioners assume they can transition from in-person counselling without need for further training. In this essential book, Sarah Worley-James brings her many years' experience of online counselling and supervision to explore with the reader the practical and technical requirements of the work and also, importantly, the relational issues that working online brings. The book covers video, audio and text-based counselling, using vivid vignettes and case examples to bring to life its contents. All aspects, from transitioning and setting up the room and the equipment needed through to contracts, data storage and, above all, risk, are covered, with practical exercises to help you gain confidence in using these emerging media to their full creative potential.
This book is both a reference for engineers and scientists and a teaching resource, featuring tutorial chapters and research papers on feature extraction. Until now there has been insufficient consideration of feature selection algorithms, no unified presentation of leading methods, and no systematic comparisons.
This book is devoted to a novel approach for dimensionality reduction based on the famous nearest neighbor method that is a powerful classification and regression approach. It starts with an introduction to machine learning concepts and a real-world application from the energy domain. Then, unsupervised nearest neighbors (UNN) is introduced as efficient iterative method for dimensionality reduction. Various UNN models are developed step by step, reaching from a simple iterative strategy for discrete latent spaces to a stochastic kernel-based algorithm for learning submanifolds with independent parameterizations. Extensions that allow the embedding of incomplete and noisy patterns are introduced. Various optimization approaches are compared, from evolutionary to swarm-based heuristics. Experimental comparisons to related methodologies taking into account artificial test data sets and also real-world data demonstrate the behavior of UNN in practical scenarios. The book contains numerous color figures to illustrate the introduced concepts and to highlight the experimental results.
What is combinatorial optimization? Traditionally, a problem is considered to be c- binatorial if its set of feasible solutions is both ?nite and discrete, i. e. , enumerable. For example, the traveling salesman problem asks in what order a salesman should visit the cities in his territory if he wants to minimize his total mileage (see Sect. 2. 2. 2). The traveling salesman problem’s feasible solutions - permutations of city labels - c- prise a ?nite, discrete set. By contrast, Differential Evolution was originally designed to optimize functions de?ned on real spaces. Unlike combinatorial problems, the set of feasible solutions for real parameter optimization is continuous. Although Differential Evolution operates internally with ?oating-point precision, it has been applied with success to many numerical optimization problems that have t- ditionally been classi?ed as combinatorial because their feasible sets are discrete. For example, the knapsack problem’s goal is to pack objects of differing weight and value so that the knapsack’s total weight is less than a given maximum and the value of the items inside is maximized (see Sect. 2. 2. 1). The set of feasible solutions - vectors whose components are nonnegative integers - is both numerical and discrete. To handle such problems while retaining full precision, Differential Evolution copies ?oating-point - lutions to a temporary vector that, prior to being evaluated, is truncated to the nearest feasible solution, e. g. , by rounding the temporary parameters to the nearest nonnegative integer.
Approaches in Integrative Bioinformatics provides a basic introduction to biological information systems, as well as guidance for the computational analysis of systems biology. This book also covers a range of issues and methods that reveal the multitude of omics data integration types and the relevance that integrative bioinformatics has today. Topics include biological data integration and manipulation, modeling and simulation of metabolic networks, transcriptomics and phenomics, and virtual cell approaches, as well as a number of applications of network biology. It helps to illustrate the value of integrative bioinformatics approaches to the life sciences. This book is intended for researchers and graduate students in the field of Bioinformatics. Professor Ming Chen is the Director of the Bioinformatics Laboratory at the College of Life Sciences, Zhejiang University, Hangzhou, China. Professor Ralf Hofestädt is the Chair of the Department of Bioinformatics and Medical Informatics, Bielefeld University, Germany.
Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects that each source node exercises on the receiving concept expressed through weights. Weights take values in the interval [-1,1], which denotes the positive, negative or neutral causal relationship between two concepts. An FCM can be typically obtained through linguistic terms, inherent to fuzzy systems, but with a structure similar to the neural networks, which facilitates data processing, and has capabilities for training and adaptation. During the last 10 years, an exponential growth of published papers in FCMs was followed showing great impact potential. Different FCM structures and learning schemes have been developed, while numerous studies report their use in many contexts with highly successful modeling results. The aim of this book is to fill the existing gap in the literature concerning fundamentals, models, extensions and learning algorithms for FCMs in knowledge engineering. It comprehensively covers the state-of-the-art FCM modeling and learning methods, with algorithms, codes and software tools, and provides a set of applications that demonstrate their various usages in applied sciences and engineering.
Learn to write C++ programs by interfacing a computer to a wide range of popular and fundamental real-world technologies. Unique and original approach to use the PC to do real things- not just number crunching and graphics – but writing programs to interact with the outside world. Learn C++ programming in an enjoyable and powerful way. Includes a purpose-designed circuit board
Accessible and practical framework for machine learning applications and solutions for civil and environmental engineers This textbook introduces engineers and engineering students to the applications of artificial intelligence (AI), machine learning (ML), and machine intelligence (MI) in relation to civil and environmental engineering projects and problems, presenting state-of-the-art methodologies and techniques to develop and implement algorithms in the engineering domain. Through real-world projects like analysis and design of structural members, optimizing concrete mixtures for site applications, examining concrete cracking via computer vision, evaluating the response of bridges to hazards, and predicating water quality and energy expenditure in buildings, this textbook offers readers in-depth case studies with solved problems that are commonly faced by civil and environmental engineers. The approaches presented range from simplified to advanced methods, incorporating coding-based and coding-free techniques. Professional engineers and engineering students will find value in the step-by-step examples that are accompanied by sample databases and codes for readers to practice with. Written by a highly qualified professional with significant experience in the field, Machine Learning includes valuable information on: The current state of machine learning and causality in civil and environmental engineering as viewed through a scientometrics analysis, plus a historical perspective Supervised vs. unsupervised learning for regression, classification, and clustering problems Explainable and causal methods for practical engineering problems Database development, outlining how an engineer can effectively collect and verify appropriate data to be used in machine intelligence analysis A framework for machine learning adoption and application, covering key questions commonly faced by practitioners This textbook is a must-have reference for undergraduate/graduate students to learn concepts on the use of machine learning, for scientists/researchers to learn how to integrate machine learning into civil and environmental engineering, and for design/engineering professionals as a reference guide for undertaking MI design, simulation, and optimization for infrastructure.
Just about any social need is now met with an opportunity to "connect" through digital means. But this convenience is not free—it is purchased with vast amounts of personal data transferred through shadowy backchannels to corporations using it to generate profit. The Costs of Connection uncovers this process, this "data colonialism," and its designs for controlling our lives—our ways of knowing; our means of production; our political participation. Colonialism might seem like a thing of the past, but this book shows that the historic appropriation of land, bodies, and natural resources is mirrored today in this new era of pervasive datafication. Apps, platforms, and smart objects capture and translate our lives into data, and then extract information that is fed into capitalist enterprises and sold back to us. The authors argue that this development foreshadows the creation of a new social order emerging globally—and it must be challenged. Confronting the alarming degree of surveillance already tolerated, they offer a stirring call to decolonize the internet and emancipate our desire for connection.
Handbook of Human-Machine Systems Insightful and cutting-edge discussions of recent developments in human-machine systems In Handbook of Human-Machine Systems, a team of distinguished researchers delivers a comprehensive exploration of human-machine systems (HMS) research and development from a variety of illuminating perspectives. The book offers a big picture look at state-of-the-art research and technology in the area of HMS. Contributing authors cover Brain-Machine Interfaces and Systems, including assistive technologies like devices used to improve locomotion. They also discuss advances in the scientific and engineering foundations of Collaborative Intelligent Systems and Applications. Companion technology, which combines trans-disciplinary research in fields like computer science, AI, and cognitive science, is explored alongside the applications of human cognition in intelligent and artificially intelligent system designs, human factors engineering, and various aspects of interactive and wearable computers and systems. The book also includes: A thorough introduction to human-machine systems via the use of emblematic use cases, as well as discussions of potential future research challenges Comprehensive explorations of hybrid technologies, which focus on transversal aspects of human-machine systems Practical discussions of human-machine cooperation principles and methods for the design and evaluation of a brain-computer interface Perfect for academic and technical researchers with an interest in HMS, Handbook of Human-Machine Systems will also earn a place in the libraries of technical professionals practicing in areas including computer science, artificial intelligence, cognitive science, engineering, psychology, and neurobiology.
Printed in full color.Software development happens in your head. Not in an editor, IDE, or designtool. You're well educated on how to work with software and hardware, but what about "wetware"--our own brains? Learning new skills and new technology is critical to your career, and it's all in your head.In this book by Andy Hunt, you'll learn how our brains are wired, and how to take advantage of your brain's architecture. You'll learn new tricks and tipsto learn more, faster, and retain more of what you learn.You need a pragmatic approach to thinking and learning. You need to "Refactor Your Wetware."Programmers have to learn constantly; not just the stereotypical new technologies, but also the problem domain of the application, the whims of the user community, the quirks of your teammates, the shifting sands of the industry, and the evolving characteristics of the project itself as it is built. We'll journey together through bits of cognitive and neuroscience, learning and behavioral theory. You'll see some surprising aspects of how our brains work, and how you can take advantage of the system to improve your own learning and thinking skills. In this book you'll learn how to: Use the Dreyfus Model of Skill Acquisition to become more expertLeverage the architecture of the brain to strengthen different thinking modesAvoid common "known bugs" in your mindLearn more deliberately and more effectivelyManage knowledge more efficiently |
You may like...
Advanced Technologies in Hydropower Flow…
Adam Adamkowski, Anton Bergant
Hardcover
|