![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
This book introduces physics students to concepts and methods of finance. Despite being perceived as quite distant from physics, finance shares a number of common methods and ideas, usually related to noise and uncertainties. Juxtaposing the key methods to applications in both physics and finance articulates both differences and common features, this gives students a deeper understanding of the underlying ideas. Moreover, they acquire a number of useful mathematical and computational tools, such as stochastic differential equations, path integrals, Monte-Carlo methods, and basic cryptology. Each chapter ends with a set of carefully designed exercises enabling readers to test their comprehension.
The decolonization of education necessarily involves a critique of dominant ideologies, pedagogies, and the current organization of education, to be replaced by what, in 1970, Paulo Freire called "the pedagogy of the oppressed." Critical Theory and Pedagogy presents a theory for decolonizing, democratizing, and reconstructing education in order to meet the challenges of a global and technological society. A democratic and intersectional reconstruction of education must build on and synthesize perspectives of classical philosophy of education, Deweyean radical pragmatism, Freirean critical pedagogy, poststructuralism, and critical theories of gender, race, class, sexuality, ethnicity, disability, indigeneity, and more, while criticizing obsolete idealist, elitist, and antidemocratic aspects of traditional concepts of education. Articulating a metatheory for the philosophy of education, while providing a historical genealogy and grounding of key themes, Critical Theory and Pedagogy argues for a democratic reconstruction of education that overcomes traditional, limiting, and oppressive aspects—what Marx and Engels saw as "the ruling ideas of the ruling class" and bell hooks reminds us includes the colonization of subjects into White, Patriarchal Capitalism—and embraces alternative pedagogies and principles suitable for the present age. This project includes developing multiple critical literacies as a response to digital technologies and developing critical pedagogies to meet the challenges of globalization, multiculturalism, and institutionalized racism, classism, and sexism, while promoting radical democratization to counter the trend toward the imposition of a neo-liberal business model of education.
The decolonization of education necessarily involves a critique of dominant ideologies, pedagogies, and the current organization of education, to be replaced by what, in 1970, Paulo Freire called "the pedagogy of the oppressed." Critical Theory and Pedagogy presents a theory for decolonizing, democratizing, and reconstructing education in order to meet the challenges of a global and technological society. A democratic and intersectional reconstruction of education must build on and synthesize perspectives of classical philosophy of education, Deweyean radical pragmatism, Freirean critical pedagogy, poststructuralism, and critical theories of gender, race, class, sexuality, ethnicity, disability, indigeneity, and more, while criticizing obsolete idealist, elitist, and antidemocratic aspects of traditional concepts of education. Articulating a metatheory for the philosophy of education, while providing a historical genealogy and grounding of key themes, Critical Theory and Pedagogy argues for a democratic reconstruction of education that overcomes traditional, limiting, and oppressive aspects—what Marx and Engels saw as "the ruling ideas of the ruling class" and bell hooks reminds us includes the colonization of subjects into White, Patriarchal Capitalism—and embraces alternative pedagogies and principles suitable for the present age. This project includes developing multiple critical literacies as a response to digital technologies and developing critical pedagogies to meet the challenges of globalization, multiculturalism, and institutionalized racism, classism, and sexism, while promoting radical democratization to counter the trend toward the imposition of a neo-liberal business model of education.
Data science is a highly interdisciplinary field, incorporating ideas from applied mathematics, statistics, probability, and computer science, as well as many other areas. This book gives an introduction to the mathematical methods that form the foundations of machine learning and data science, presented by leading experts in computer science, statistics, and applied mathematics. Although the chapters can be read independently, they are designed to be read together as they lay out algorithmic, statistical, and numerical approaches in diverse but complementary ways. This book can be used both as a text for advanced undergraduate and beginning graduate courses, and as a survey for researchers interested in understanding how applied mathematics broadly defined is being used in data science. It will appeal to anyone interested in the interdisciplinary foundations of machine learning and data science.
The euphoria that has accompanied the birth and expansion of the internet as a "liberation technology" is increasingly eclipsed by an explosion of vitriolic language on a global scale. Digital Hate: The Global Conjuncture of Extreme Speech provides the first distinctly global and interdisciplinary perspective on hateful language online. Moving beyond Euro-American allegations of "fake news," contributors draw attention to local idioms and practices and explore the profound implications for how community is imagined, enacted, and brutally enforced around the world. With a cross-cultural framework nuanced by ethnography and field-based research, the volume investigates a wide range of cases—from anti-immigrant memes targeted at Bolivians in Chile to trolls serving the ruling AK Party in Turkey—to ask how the potential of extreme speech to talk back to authorities has come under attack by diverse forms of digital hate cultures. Offering a much-needed global perspective on the "dark side" of the internet, Digital Hate is a timely and critical look at the raging debates around online media's failed promises.
An in-depth assessment of innovations in military information technology informs hypothetical outcomes for artificial intelligence adaptations In the coming decades, artificial intelligence (AI) could revolutionize the way humans wage war. The military organizations that best innovate and adapt to this AI revolution will likely gain significant advantages over their rivals. To this end, great powers such as the United States, China, and Russia are already investing in novel sensing, reasoning, and learning technologies that will alter how militaries plan and fight. The resulting transformation could fundamentally change the character of war. In Information in War, Benjamin Jensen, Christopher Whyte, and Scott Cuomo provide a deeper understanding of the AI revolution by exploring the relationship between information, organizational dynamics, and military power. The authors analyze how militaries adjust to new information communication technology historically to identify opportunities, risks, and obstacles that will almost certainly confront modern defense organizations as they pursue AI pathways to the future. Information in War builds on these historical cases to frame four alternative future scenarios exploring what the AI revolution could look like in the US military by 2040.
This book covers the theory, modeling, and implementation of different RF energy harvesting systems. RF energy harvesting is the best choice among the existing renewable energy sources, in terms of availability, cost, size, and integration with other systems. The device used for harvesting RF energy is called rectenna. A rectenna can work at the microwave, millimeter-wave, and terahertz waves. It also has the capability to operate at optical frequencies to be used for 6G and beyond communication systems. This book covers all aspects of wireless power transfer (WPT)/wireless energy harvesting (WEH), basics, theoretical concepts, and advanced developments occurring in the field of energy harvesting. It also covers the design theory for different types of antenna, rectifier, and impedance matching circuits used in RF energy harvesting systems. Different future and present applications, such as charging of vehicles, smart medical health care, self-driven e-vehicles, self-sustainable home automation system, and wireless drones, have also been discussed in detail.
This book investigates how bodily information contributes to categorization processes for at least some conceptual classes and thus to the individual mastery of meanings for at least some word classes. The bodily information considered is mainly that provided by the so-called proprioceptive and interoceptive systems introduced by Sherrington. The authors reconsider this in a new Gibsonian fashion calling it more generally “proprioception”, which indicates the complex of all the bodily signals we are aware of and the qualitative experiences these give rise to. The book shows that proprioceptive information understood in this sense is essential for explaining (among others) how we develop broad categories such as animate vs. inanimate, concepts denoting bodily experiences such as hunger or pain as well as emotions and abstract concepts such as friendship and freedom and in accounting for how we master the meanings of the corresponding words in our language.
An engrossing origin story for the personal computer—showing how the Apple II’s software helped a machine transcend from hobbyists’ plaything to essential home appliance. Skip the iPhone, the iPod, and the Macintosh. If you want to understand how Apple Inc. became an industry behemoth, look no further than the 1977 Apple II. Designed by the brilliant engineer Steve Wozniak and hustled into the marketplace by his Apple cofounder Steve Jobs, the Apple II became one of the most prominent personal computers of this dawning industry. The Apple II was a versatile piece of hardware, but its most compelling story isn’t found in the feat of its engineering, the personalities of Apple’s founders, or the way it set the stage for the company’s multibillion-dollar future. Instead, historian Laine Nooney shows, what made the Apple II iconic was its software. In software, we discover the material reasons people bought computers. Not to hack, but to play. Not to code, but to calculate. Not to program, but to print. The story of personal computing in the United States is not about the evolution of hackers—it’s about the rise of everyday users. Recounting a constellation of software creation stories, Nooney offers a new understanding of how the hobbyists’ microcomputers of the 1970s became the personal computer we know today. From iconic software products like VisiCalc and The Print Shop to historic games like Mystery House and Snooper Troops to long-forgotten disk-cracking utilities, The Apple II Age offers an unprecedented look at the people, the industry, and the money that built the microcomputing milieu—and why so much of it converged around the pioneering Apple II.
This book looks at the growing segment of Internet of Things technology (IoT) known as Internet of Medical Things (IoMT), an automated system that aids in bridging the gap between isolated and rural communities and the critical healthcare services that are available in more populated and urban areas. Many technological aspects of IoMT are still being researched and developed, with the objective of minimizing the cost and improving the performance of the overall healthcare system. This book focuses on innovative IoMT methods and solutions being developed for use in the application of healthcare services, including post-surgery care, virtual home assistance, smart real-time patient monitoring, implantable sensors and cameras, and diagnosis and treatment planning. It also examines critical issues around the technology, such as security vulnerabilities, IoMT machine learning approaches, and medical data compression for lossless data transmission and archiving. Internet of Medical Things is a valuable reference for researchers, students, and postgraduates working in biomedical, electronics, and communications engineering, as well as practicing healthcare professionals.
Attention to design patterns is unquestionably growing in software engineering because there is a strong belief that using made to measure solutions for solving frequently occurring problems encountered throughout the design phase greatly reduces the total cost and the time of developing software products. Stable Design Patterns for Software and Systems presents a new and fresh approach for creating stable, reusable, and widely applicable design patterns. It deals with the concept of stable design patterns based on software stability as a contemporary approach for building stable and highly reusable and widely applicable design patterns. This book shows that a formation approach to discovering and creating stable design patterns accords with Alexander’s current understanding of architectural patterns. Stable design patterns are a type of knowledge pattern that underline human problem solving methods and appeal to the pattern community. This book examines software design patterns with respect to four central themes: How do we develop a solution for the problem through software stability concepts? This book offers a direct application of using software stability concepts for modeling solutions. How do we achieve software stability over time and design patterns that are effective to use? What are the unique roles of stable design patterns in modeling the accurate solution of the problem at hand and in providing stable and undisputed design for such problems? This book enumerates a complete and domain-less list of stable patterns that are useful for designing and modeling solutions for frequently recurring problems. What is the most efficient way to document the stable design patters to ensure efficient reusability? This book is an extension to the contemporary templates that are used in documenting design patterns. This book gives a pragmatic and a novel approach toward understanding the problem domain and in proposing stable solutions for engineering stable software systems, components, and frameworks.
Successful use of information and communication technologies depends on usable designs that do not require expensive training, accommodate the needs of diverse users and are low cost. There is a growing demand and increasing pressure for adopting innovative approaches to the design and delivery of education, hence, the use of online learning (also called E-learning) as a mode of study. This is partly due to the increasing number of learners and the limited resources available to meet a wide range of various needs, backgrounds, expectations, skills, levels, ages, abilities and disabilities. The advances of new technology and communications (WWW, Human Computer Interaction and Multimedia) have made it possible to reach out to a bigger audience around the globe. By focusing on the issues that have impact on the usability of online learning programs and their implementation, this specifically fills-in a gap in this area, which is particularly invaluable to practitioners.
Learn favorite techniques from this group of twenty-two Excel MVPs. The Excel MVPs are friends and competitors who each pulled out their favorite tricks to impress you and their fellow MVPs.
This volume presents the main results of the 4th International
Conference on Multivariate Approximation, which was held at
Witten-Bommerholz, September 24-29, 2000. Nineteen selected,
peer-reviewed contributions cover recent topics in constructive
approximation on varieties, approximation by solutions of partial
differential equations, application of Riesz bases and frames,
multiwavelets and subdivision.
How would the humanities change if we grappled with the ways in which digital and virtual places are designed, experienced, and critiqued? In Rethinking Virtual Places, Erik Malcolm Champion draws from the fields of computational sciences and other place-related disciplines to argue for a more central role for virtual space in the humanities. For instance, recent developments in neuroscience could improve our understanding of how people experience, store, and recollect place-related encounters. Similarly, game mechanics using virtual place design might make digital environments more engaging and learning content more powerful and salient. In addition, Champion provides a brief introduction to new and emerging software and devices and explains how they help, hinder, or replace our traditional means of designing and exploring places. Perfect for humanities scholars fascinated by the potential of virtual space, Rethinking Virtual Places challenges both traditional and recent evaluation methods to address the complicated problem of understanding how people evaluate and engage with the notion of place.
If you're a web designer or app developer interested in sophisticated page styling, improved accessibility, and less time and effort expended, this book is for you. This revised fifth edition provides a comprehensive guide to CSS implementation along with a thorough review of the latest CSS specifications. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques. We read the specs so you don't have to! This guide covers: Selectors, specificity, and the cascade, including information on the new cascade layers New and old CSS values and units, including CSS variables and ways to size based on viewports Details on font technology and ways to use any available font variants Text styling, from basic decoration to changing the entire writing mode Padding, borders, outlines, and margins, now discussed in terms of the new block- and inline-direction layout paradigm used by modern browsers Colors, backgrounds, and gradients, including the conic gradients Accessible data tables Flexible box and grid layout systems, including new subgrid capabilities 2D and 3D transforms, transitions, and animation Filters, blending, clipping, and masking Media, feature, and container queries
Designed to provide you with the knowledge and skills needed to protect your technology devices from increasingly sophisticated cyberattacks, SECURITY AWARENESS: APPLYING PRACTICAL CYBERSECURITY IN YOUR WORLD, 6th EDITION continues to present the same practical information that has made previous editions so popular. For most students, practical cybersecurity poses daunting challenges: Do I need antivirus software? How can I manage all my passwords? Can I prevent a ransomware attack? Is there a way to make my Web browser secure? What are patches? This text is designed to help you understand the answers to these questions and to protect your devices and even Wi-Fi networks from cyberattacks. In addition, hands-on projects and case studies give you the opportunity to test your knowledge and apply what you have learned.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
Data Science, Big Data, and Artificial Intelligence are currently some of the most talked-about concepts in industry, government, and society, and yet also the most misunderstood. This book will clarify these concepts and provide you with practical knowledge to apply them. Featuring: - A comprehensive overview of the various fields of application of data science - Case studies from practice to make the described concepts tangible - Practical examples to help you carry out simple data analysis projects The book approaches the topic of data science from several sides. Crucially, it will show you how to build data platforms and apply data science tools and methods. Along the way, it will help you understand - and explain to various stakeholders - how to generate value from these techniques, such as applying data science to help organizations make faster decisions, reduce costs, and open up new markets. Furthermore, it will bring fundamental concepts related to data science to life, including statistics, mathematics, and legal considerations. Finally, the book outlines practical case studies that illustrate how knowledge generated from data is changing various industries over the long term. Contains these current issues: - Mathematics basics: Mathematics for Machine Learning to help you understand and utilize various ML algorithms. - Machine Learning: From statistical to neural and from Transformers and GPT-3 to AutoML, we introduce common frameworks for applying ML in practice - Natural Language Processing: Tools and techniques for gaining insights from text data and developing language technologies - Computer vision: How can we gain insights from images and videos with data science? - Modeling and Simulation: Model the behavior of complex systems, such as the spread of COVID-19, and do a What-If analysis covering different scenarios. - ML and AI in production: How to turn experimentation into a working data science product? - Presenting your results: Essential presentation techniques for data scientists Contributors: Stefan Papp / Wolfgang Weidinger / Katherine Munro / Bernhard Ortner / Annalisa Cadonna / Georg Langs / Roxane Licandro / Mario Meir-Huber / Danko Nikoli? / Zoltan Toth / Barbora Vesela / Rania Wazir / Günther Zauner
"Our tests are broken again!" "Why does the suite take so long to run?" "What value are we getting from these tests anyway?" Solve your testing problems by building and maintaining quality software with RSpec - the popular BDD-flavored Ruby testing framework. This definitive guide from RSpec's lead developer shows you how to use RSpec to drive more maintainable designs, specify and document expected behavior, and prevent regressions during refactoring. Build a project using RSpec to design, describe, and test the behavior of your code. Whether you're new to automated tests or have been using them for years, this book will help you write more effective tests. RSpec has been downloaded more than 100 million times and has inspired countless test frameworks in other languages. Use this influential Ruby testing framework to iteratively develop a project with the confidence that comes from well-tested code. This book guides you through creating a Ruby project with RSpec, and explores the individual components in detail. Start by learning the basics of installing and using RSpec. Then build a real-world JSON API, using RSpec throughout the process to drive a BDD-style outside-in workflow. Apply an effective test strategy to write fast, robust tests that support evolutionary design through refactoring. The rest of the book provides the definitive guide to RSpec's components. Use rspec-core's metadata to slice and dice your spec suite. Dig into rspec-expectations' matchers: compose them in flexible ways, specify expected outcomes with precision, and diagnose problems quickly with the help of good failure messages. Write fast, isolated tests with rspec-mocks' test doubles while pushing your code toward simpler interfaces. The authors, with a combined 20 years of automated testing experience, share testing wisdom that will lead to a fun, productive testing experience. What You Need: To follow along with the book, you'll need Ruby 2.2+. The book will guide you through installing RSpec 3 and setting up a new project to use it. |
You may like...
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,780 Discovery Miles 17 800
If Anyone Builds It, Everyone Dies - The…
Eliezer Yudkowsky, Nate Soares
Paperback
Technology for Success and Illustrated…
David Beskeen, Jennifer Campbell
Paperback
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
|