![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
This book looks at the history of computing in education from two points of view - as a history of the impact of computing on education over the past forty years and as the use of the history of computing as a pedagogical tool in computing education. These two intertwined views look back at computer education and the ways in which organizations have attempted to use computers to enhance teaching and learning from elementary education through university studies in several countries. The topics include: considerations of cybernetics and informatics; government sponsored open source software for school education; learning with the artificial sciences; technology leading to historic changes; ICT in Catalan schools; streams in the history of computer education in Australia; growth of computing technology for education in India; computing and education in the UK; evolution of e-inclusion for the disabled; educational hypermedia computing; keyboard training; studies of educational computing projects; and using computing history to enhance teaching. History of Computing in Education is unique in its topic, the field having not been the subject of extensive study in the past. the impact of computing on education is only now receiving due attention. This book derives from contributions made at the History of Computing in Education conference at the IFIP 18th World Computer Congress, held in August 2004 in Toulouse, France and sponsored by the International Federation for Information Processing (IFIP). Teachers, students, researchers, authors, and education developers should find this work as a welcome addition to their educational repertoire. It will also provide new dimensions of breadth and depth in the evolution of computing in education.
As part of the best-selling Pocket Primer series, this book is meant to familiarize readers with regular expressions as part of their data-related tasks. Regular expressions (regex) are used in search engines, search and replace dialogs of word processors and text editors, in text processing utilities such as sed and awk, and in lexical analysis. Many programming languages provide regex capabilities, either built-in or via libraries. Readers will learn how to use bash commands grep, awk, and sed in order to use regular expressions in conjunction with datasets and data-related tasks. Companion files with source code are available for downloading from the publisher. Features: A practical introduction to using flexible, bash commands to perform common data cleaning tasks. Assumes the reader has no prior experience, but the topic is covered comprehensively enough to teach a pro some new tricks. Simple yet powerful shell scripts for data cleaning tasks.
This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors. Specifically, the book provides a comprehensive overview of several key issue areas: The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation and defense An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of IR, security studies, psychology and science, technology and society (STS) studies Current national perspectives, policies, doctrines and strategies relevant to cyber warfare An examination of key challenges in international law, norm development and deterrence; and The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and IR in general.
With the advent of advanced hand-held technology and the widespread nature of the Internet, the world of animated filmmaking is more exciting and accessible than ever. Due to this cultural and technological development, the success of independent animated film makers is on the rise. Independent Animation: Developing, Producing and Distributing Your Animated Films, Second Edition showcases some of the greatest, most innovative giants in the field and helps guide readers through the artistic process and production techniques. Story development, casting, color theory, distribution and the intimidating aspects of production are elucidated using various examples of acclaimed, viral and award-winning animated films from all over the world. Readers will also explore the changing nature of audiences, festivals and distributors’ relationships with animation and be granted first-hand guidance in navigating the diverse fields of animated filmmaking. Key Features: Covers the entire process of creating an independent animated film from story development and casting to editing and distribution Presents a comprehensive array of classic and contemporary case studies covering all manner of production methods from traditional pipelines to avant-garde, auteur and experimental approaches Features input and exclusive insight into the working processes of some of the industry’s most noteworthy indie animation talents, including Signe Baumane, Adam Elliot, Don Hertzfeldt, Kirsten Lepore, Robert Morgan, David OReilly, PES, Bill Plympton, Rosto, Chris Shepherd and dozens more Additional resources and interviews are available through a special section of Skwigly Online Animation Magazine.
This is the 3rd volume of Advances in Telecommunication Management, focusing on Information Technology and Crisis Management.
In a significant contribution to the study of the brain and behavior, Coward develops a system model for the human brain based on a new physiologically based theory of learning and memory. The work is primarily intended for neuropsychologists, but will be of interest to anyone concerned with understanding the brain as a functioning system. The author has twenty years' experience in most of the different aspects of designing complex electronic systems. Such a system today has up to several billion hardware components such as individual transistors, and millions of lines of software. Coward argues that the methodology used to handle the design of such systems can be modified and adapted to understand the brain. In the design of electronic systems, the concept instruction makes it possible to rigorously translate from high level operational descriptions to detailed descriptions in terms of machine code and transistor structures. In the brain, the concept pattern can make it possible to translate between the descriptions of psychology and physiology and make functional understanding possible. Any change in the state of a neuron can be interpreted on a system level as the recognition of a pattern. Pattern is precisely defined and includes both objects and changes to objects. Based on these observations, Coward designs a model called the cascaded pattern extraction hierarchy to explain the functioning of the brain, showing that the brain can be visualized as a pattern extraction template, in which successive layers are able to extract increasingly complex patterns from relatively simple input. Coward demonstrates that as a pattern extraction template, the brain forms a hierarchy in connectivity space. Early layers--those closest to sensory input--can be interpreted as extracting patterns from simple sensory input. Later layers generate action recommendations, and later still, they select actions, all within the same pattern extraction paradigm. According to the model, the firing of a neuron at these points constitutes both pattern recognition and action recommendation. Coward's system model not only provides a framework for understanding and predicting psychological phenomena, including the functioning of personality, but also accounts for such apparent anomalies as the difference between short and long term memory and the fact that localized brain damage does not remove the memory of individual events. Widely useful for studies of brain and behavior, Pattern Thinking also suggests how to identify promising areas to investigate in the treatment of psychological illnesses.
How we interface and interact with computing, communications and entertainment devices is going through revolutionary changes, with natural user inputs based on touch, voice, and vision replacing or augmenting the use of traditional interfaces based on the keyboard, mouse, joysticks, etc. As a result, displays are morphing from one-way interface devices that merely show visual content to two-way interaction devices that provide more engaging and immersive experiences. This book provides an in-depth coverage of the technologies, applications, and trends in the rapidly emerging field of interactive displays enabled by natural human-interfaces. Key features: * Provides a definitive reference reading on all the touch technologies used in interactive displays, including their advantages, limitations, and future trends. * Covers the fundamentals and applications of speech input, processing and recognition techniques enabling voice-based interactions. * Offers a detailed review of the emerging vision-based sensing technologies, and user interactions using gestures of hands, body, face, and eye gazes. * Discusses multi-modal natural user interface schemes which intuitively combine touch, voice, and vision for life-like interactions. * Examines the requirements and technology status towards realizing true 3D immersive and interactive displays.
Purchasing and Financial Management of Information Technology aims to significantly reduce the amount of money wasted on IT by providing readers with a comprehensive guide to all aspects of planning, managing and controlling IT purchasing and finance. Starting from a recognition that IT purchasing and the financial management often needs to be treated differently from other types of expenditure, the author draws on over 25 years of experience in the field to provide readers with useful mixture of good procedures and common sense rules that have been tried, tested and found to work. Many of these are illustrated by case histories, each with a moral or a lesson. Purchasing and Financial Management of Information Technology provides useful guidelines and advice on whole range of topics including: * IT acquisitions policy * Dealing with suppliers * Budgeting and cost control * IT cost and risk management * Specification, selection and evaluation of systems * IT value for money
IT Performance Management addresses the way organizations should
balance the demand and the supply of information technology,
optimizing the cost and maximizing the business value of IT.
Recent advances in science and engineering have led to the proliferation of cyber-physical systems. Now viewed as a pivotal area of research, the application of CPS has expanded into several new and innovative areas. Challenges, Opportunities, and Dimensions of Cyber-Physical Systems explores current trends and enhancements of CPS, highlighting the critical need for further research and advancement in this field. Focusing on architectural fundamentals, interdisciplinary functions, and futuristic implications, this book is an imperative reference source for scholars, engineers, and students in the scientific community interested in the current and future advances in CPS.
Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues presents past, present and future research directions within the field. This book includes cases on the latest advances in Information Communication Technology. The authors have provided in-depth insight into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research. They explore points of good practices, while addressing potential pitfalls to avoid, and examining and evaluating solutions to some of ICT researchers' toughest challenges.
Documentation of our cultural heritage is experiencing an explosion of innovation. New tools have appeared in recent decades including laser scanning, rapid prototyping, high dynamic range spherical and infrared imagery, drone photography, augmented and virtual reality and computer rendering in multiple dimensions. These give us visualisations and data that are at once interesting, intriguing and yet sometimes deceptive. This text provides an objective and integrated approach to the subject, bringing together the techniques of conservation with management, photographic methods, various modelling techniques and the use of unmanned aerial systems. This interdisciplinary approach addresses the need for knowledge about deploying advanced digital technologies and the materials and methods for the assessment, conservation, rehabilitation and maintenance of the sustainability of existing structures and designated historic buildings. Furthermore, this book actively provides the knowhow to facilitate the creation of heritage inventories, assessing risk, and addressing the need for sustainability.In so doing it becomes more feasible to mitigate the threats from inherent and external causes, not only for the built heritage but also for moveable objects and intangible heritage that suffer abandonment and negligence as well as looting and illegal trafficking. The book is written by a team of international experts based upon their practical experience and expertise. It therefore creates a unique book that encapsulates the knowledge of this discipline required by anyone working in this field.
Are you looking to supercharge your business and grow your online community? The key to a booming business is your community. Founder of social media consultancy The Selfhood, Daisy Morris, is here with the ultimate guide for all the side-hustlers, creators, business owners and freelancers looking to build a genuine community on social media. This book drops the jargon – Daisy will teach you how to take your community on a journey. From brand awareness through to conversion, you will have the confidence to expand your reach while nurturing your existing fans, followers, subscribers and customers to turn them in to loyal and repeat customers. You will learn how to create meaningful connections with your audience, through real-life case studies, simple exercises and top-notch business advice. A must-read for any business owner.
Explore the concepts, algorithms, and applications underlying federated learning In Federated Learning for Future Intelligent Wireless Networks, a team of distinguished researchers delivers a robust and insightful collection of resources covering the foundational concepts and algorithms powering federated learning, as well as explanations of how they can be used in wireless communication systems. The editors have included works that examine how communication resource provision affects federated learning performance, accuracy, convergence, scalability, and security and privacy. In the book, readers will explore a wide range of topics that show how federated learning algorithms, concepts, and design and optimization issues that apply to wireless communications. Readers will also find: A thorough introduction to the fundamental concepts and algorithms of federated learning, including horizontal, vertical, and hybrid FL Comprehensive explorations of wireless communication network design and optimization for federated learning Practical discussions of novel federated learning algorithms and frameworks for future wireless networks Expansive case studies in edge intelligence, autonomous driving, IoT, MEC, blockchain, and content caching and distribution Perfect for electrical and computer science engineers, researchers, professors, and postgraduate students with an interest in machine learning, Federated Learning for Future Intelligent Wireless Networks will also benefit regulators and institutional actors responsible for overseeing and making policy in the area of artificial intelligence.
With over 90 million monthly users and counting, Roblox is one of the most popular games on the planet! The Big Book of Roblox helps players get the most out of this dynamic sandbox game. Packed with tips, hints, and hacks, this complete, up-to-date guide covers basic strategy as well as advanced tricks and is essential reading for anyone who wants to play like a pro. Topics covered include navigation, combat, trading, and mini games—accompanied by over 100 full-color gameplay photos. Additional chapters focus on building mode, popular in-game experiences, and even a look behind the scenes. Take your creations to new levels and maximize the value of your playing time with The Big Book of Roblox! |
You may like...
Deep Reinforcement Learning for Wireless…
Dinh Thai Hoang, Nguyen Van Huynh, …
Hardcover
R2,918
Discovery Miles 29 180
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, …
Hardcover
R2,861
Discovery Miles 28 610
Architecture and Security Issues in Fog…
Sam Goundar, S. Bharath Bhushan, …
Hardcover
R5,924
Discovery Miles 59 240
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
Energy Efficiency in Data Centers and…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R4,212
Discovery Miles 42 120
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
|