![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
This book investigates how bodily information contributes to categorization processes for at least some conceptual classes and thus to the individual mastery of meanings for at least some word classes. The bodily information considered is mainly that provided by the so-called proprioceptive and interoceptive systems introduced by Sherrington. The authors reconsider this in a new Gibsonian fashion calling it more generally “proprioception”, which indicates the complex of all the bodily signals we are aware of and the qualitative experiences these give rise to. The book shows that proprioceptive information understood in this sense is essential for explaining (among others) how we develop broad categories such as animate vs. inanimate, concepts denoting bodily experiences such as hunger or pain as well as emotions and abstract concepts such as friendship and freedom and in accounting for how we master the meanings of the corresponding words in our language.
An in-depth assessment of innovations in military information technology informs hypothetical outcomes for artificial intelligence adaptations In the coming decades, artificial intelligence (AI) could revolutionize the way humans wage war. The military organizations that best innovate and adapt to this AI revolution will likely gain significant advantages over their rivals. To this end, great powers such as the United States, China, and Russia are already investing in novel sensing, reasoning, and learning technologies that will alter how militaries plan and fight. The resulting transformation could fundamentally change the character of war. In Information in War, Benjamin Jensen, Christopher Whyte, and Scott Cuomo provide a deeper understanding of the AI revolution by exploring the relationship between information, organizational dynamics, and military power. The authors analyze how militaries adjust to new information communication technology historically to identify opportunities, risks, and obstacles that will almost certainly confront modern defense organizations as they pursue AI pathways to the future. Information in War builds on these historical cases to frame four alternative future scenarios exploring what the AI revolution could look like in the US military by 2040.
This book looks at the growing segment of Internet of Things technology (IoT) known as Internet of Medical Things (IoMT), an automated system that aids in bridging the gap between isolated and rural communities and the critical healthcare services that are available in more populated and urban areas. Many technological aspects of IoMT are still being researched and developed, with the objective of minimizing the cost and improving the performance of the overall healthcare system. This book focuses on innovative IoMT methods and solutions being developed for use in the application of healthcare services, including post-surgery care, virtual home assistance, smart real-time patient monitoring, implantable sensors and cameras, and diagnosis and treatment planning. It also examines critical issues around the technology, such as security vulnerabilities, IoMT machine learning approaches, and medical data compression for lossless data transmission and archiving. Internet of Medical Things is a valuable reference for researchers, students, and postgraduates working in biomedical, electronics, and communications engineering, as well as practicing healthcare professionals.
This book covers the theory, modeling, and implementation of different RF energy harvesting systems. RF energy harvesting is the best choice among the existing renewable energy sources, in terms of availability, cost, size, and integration with other systems. The device used for harvesting RF energy is called rectenna. A rectenna can work at the microwave, millimeter-wave, and terahertz waves. It also has the capability to operate at optical frequencies to be used for 6G and beyond communication systems. This book covers all aspects of wireless power transfer (WPT)/wireless energy harvesting (WEH), basics, theoretical concepts, and advanced developments occurring in the field of energy harvesting. It also covers the design theory for different types of antenna, rectifier, and impedance matching circuits used in RF energy harvesting systems. Different future and present applications, such as charging of vehicles, smart medical health care, self-driven e-vehicles, self-sustainable home automation system, and wireless drones, have also been discussed in detail.
An engrossing origin story for the personal computer—showing how the Apple II’s software helped a machine transcend from hobbyists’ plaything to essential home appliance. Skip the iPhone, the iPod, and the Macintosh. If you want to understand how Apple Inc. became an industry behemoth, look no further than the 1977 Apple II. Designed by the brilliant engineer Steve Wozniak and hustled into the marketplace by his Apple cofounder Steve Jobs, the Apple II became one of the most prominent personal computers of this dawning industry. The Apple II was a versatile piece of hardware, but its most compelling story isn’t found in the feat of its engineering, the personalities of Apple’s founders, or the way it set the stage for the company’s multibillion-dollar future. Instead, historian Laine Nooney shows, what made the Apple II iconic was its software. In software, we discover the material reasons people bought computers. Not to hack, but to play. Not to code, but to calculate. Not to program, but to print. The story of personal computing in the United States is not about the evolution of hackers—it’s about the rise of everyday users. Recounting a constellation of software creation stories, Nooney offers a new understanding of how the hobbyists’ microcomputers of the 1970s became the personal computer we know today. From iconic software products like VisiCalc and The Print Shop to historic games like Mystery House and Snooper Troops to long-forgotten disk-cracking utilities, The Apple II Age offers an unprecedented look at the people, the industry, and the money that built the microcomputing milieu—and why so much of it converged around the pioneering Apple II.
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.
Learn favorite techniques from this group of twenty-two Excel MVPs. The Excel MVPs are friends and competitors who each pulled out their favorite tricks to impress you and their fellow MVPs.
Successful use of information and communication technologies depends on usable designs that do not require expensive training, accommodate the needs of diverse users and are low cost. There is a growing demand and increasing pressure for adopting innovative approaches to the design and delivery of education, hence, the use of online learning (also called E-learning) as a mode of study. This is partly due to the increasing number of learners and the limited resources available to meet a wide range of various needs, backgrounds, expectations, skills, levels, ages, abilities and disabilities. The advances of new technology and communications (WWW, Human Computer Interaction and Multimedia) have made it possible to reach out to a bigger audience around the globe. By focusing on the issues that have impact on the usability of online learning programs and their implementation, this specifically fills-in a gap in this area, which is particularly invaluable to practitioners.
This volume presents the main results of the 4th International
Conference on Multivariate Approximation, which was held at
Witten-Bommerholz, September 24-29, 2000. Nineteen selected,
peer-reviewed contributions cover recent topics in constructive
approximation on varieties, approximation by solutions of partial
differential equations, application of Riesz bases and frames,
multiwavelets and subdivision.
How would the humanities change if we grappled with the ways in which digital and virtual places are designed, experienced, and critiqued? In Rethinking Virtual Places, Erik Malcolm Champion draws from the fields of computational sciences and other place-related disciplines to argue for a more central role for virtual space in the humanities. For instance, recent developments in neuroscience could improve our understanding of how people experience, store, and recollect place-related encounters. Similarly, game mechanics using virtual place design might make digital environments more engaging and learning content more powerful and salient. In addition, Champion provides a brief introduction to new and emerging software and devices and explains how they help, hinder, or replace our traditional means of designing and exploring places. Perfect for humanities scholars fascinated by the potential of virtual space, Rethinking Virtual Places challenges both traditional and recent evaluation methods to address the complicated problem of understanding how people evaluate and engage with the notion of place.
This book is a compact, example-based statistics textbook that closely follows contemporary curricula taught in large parts of the world. It is a user-friendly textbook without unnecessary frills, but instead filled with real-world examples, practical tips, online exercises, resources, and references to extensions, all on a level that is commonly taught at introductory postgraduate and levels. Several features clearly distinguish this book from what is currently available on the market. On the one hand, a lot of the easier textbooks available are lengthy, covering a wide range of topics that are not necessarily taught at university, some including methods that are now rarely used, particularly in the private sector. Further, most texts assume familiarity with statistical software already, and lack a gentle introduction to the specific software that is used. On the other hand, the more specialized textbooks are well outside the reach of most of today's students, even at postgraduate level, again often assuming a high level of statistical programming skills. This book aims to fill that gap, which, while in its core a traditional printed book, will come with a wealth of online teaching material for lecturers and students. The authors make use of R, quite simply the most used statistics software in science. The content structure is peculiar in the sense that statistical skills are introduced at the same time as software (programming) skills in R. This poses a challenge for students and their lecturers but seems by far the best way of teaching from the author's experience. By a careful, but concurrent, step by step introduction to both statistical principles and software skills, this text guides the student in an unprecedented way. A color coding system is used to keep the two content matters apart.
If you're a web designer or app developer interested in sophisticated page styling, improved accessibility, and less time and effort expended, this book is for you. This revised fifth edition provides a comprehensive guide to CSS implementation along with a thorough review of the latest CSS specifications. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques. We read the specs so you don't have to! This guide covers: Selectors, specificity, and the cascade, including information on the new cascade layers New and old CSS values and units, including CSS variables and ways to size based on viewports Details on font technology and ways to use any available font variants Text styling, from basic decoration to changing the entire writing mode Padding, borders, outlines, and margins, now discussed in terms of the new block- and inline-direction layout paradigm used by modern browsers Colors, backgrounds, and gradients, including the conic gradients Accessible data tables Flexible box and grid layout systems, including new subgrid capabilities 2D and 3D transforms, transitions, and animation Filters, blending, clipping, and masking Media, feature, and container queries
Designed to provide you with the knowledge and skills needed to protect your technology devices from increasingly sophisticated cyberattacks, SECURITY AWARENESS: APPLYING PRACTICAL CYBERSECURITY IN YOUR WORLD, 6th EDITION continues to present the same practical information that has made previous editions so popular. For most students, practical cybersecurity poses daunting challenges: Do I need antivirus software? How can I manage all my passwords? Can I prevent a ransomware attack? Is there a way to make my Web browser secure? What are patches? This text is designed to help you understand the answers to these questions and to protect your devices and even Wi-Fi networks from cyberattacks. In addition, hands-on projects and case studies give you the opportunity to test your knowledge and apply what you have learned.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
Data Science, Big Data, and Artificial Intelligence are currently some of the most talked-about concepts in industry, government, and society, and yet also the most misunderstood. This book will clarify these concepts and provide you with practical knowledge to apply them. Featuring: - A comprehensive overview of the various fields of application of data science - Case studies from practice to make the described concepts tangible - Practical examples to help you carry out simple data analysis projects The book approaches the topic of data science from several sides. Crucially, it will show you how to build data platforms and apply data science tools and methods. Along the way, it will help you understand - and explain to various stakeholders - how to generate value from these techniques, such as applying data science to help organizations make faster decisions, reduce costs, and open up new markets. Furthermore, it will bring fundamental concepts related to data science to life, including statistics, mathematics, and legal considerations. Finally, the book outlines practical case studies that illustrate how knowledge generated from data is changing various industries over the long term. Contains these current issues: - Mathematics basics: Mathematics for Machine Learning to help you understand and utilize various ML algorithms. - Machine Learning: From statistical to neural and from Transformers and GPT-3 to AutoML, we introduce common frameworks for applying ML in practice - Natural Language Processing: Tools and techniques for gaining insights from text data and developing language technologies - Computer vision: How can we gain insights from images and videos with data science? - Modeling and Simulation: Model the behavior of complex systems, such as the spread of COVID-19, and do a What-If analysis covering different scenarios. - ML and AI in production: How to turn experimentation into a working data science product? - Presenting your results: Essential presentation techniques for data scientists Contributors: Stefan Papp / Wolfgang Weidinger / Katherine Munro / Bernhard Ortner / Annalisa Cadonna / Georg Langs / Roxane Licandro / Mario Meir-Huber / Danko Nikoli? / Zoltan Toth / Barbora Vesela / Rania Wazir / Günther Zauner
"Our tests are broken again!" "Why does the suite take so long to run?" "What value are we getting from these tests anyway?" Solve your testing problems by building and maintaining quality software with RSpec - the popular BDD-flavored Ruby testing framework. This definitive guide from RSpec's lead developer shows you how to use RSpec to drive more maintainable designs, specify and document expected behavior, and prevent regressions during refactoring. Build a project using RSpec to design, describe, and test the behavior of your code. Whether you're new to automated tests or have been using them for years, this book will help you write more effective tests. RSpec has been downloaded more than 100 million times and has inspired countless test frameworks in other languages. Use this influential Ruby testing framework to iteratively develop a project with the confidence that comes from well-tested code. This book guides you through creating a Ruby project with RSpec, and explores the individual components in detail. Start by learning the basics of installing and using RSpec. Then build a real-world JSON API, using RSpec throughout the process to drive a BDD-style outside-in workflow. Apply an effective test strategy to write fast, robust tests that support evolutionary design through refactoring. The rest of the book provides the definitive guide to RSpec's components. Use rspec-core's metadata to slice and dice your spec suite. Dig into rspec-expectations' matchers: compose them in flexible ways, specify expected outcomes with precision, and diagnose problems quickly with the help of good failure messages. Write fast, isolated tests with rspec-mocks' test doubles while pushing your code toward simpler interfaces. The authors, with a combined 20 years of automated testing experience, share testing wisdom that will lead to a fun, productive testing experience. What You Need: To follow along with the book, you'll need Ruby 2.2+. The book will guide you through installing RSpec 3 and setting up a new project to use it.
Product information not available.
This book presents the entire body of thought of Norbert Wiener (1894-1964), knowledge of which is essential if one wishes to understand and correctly interpret the age in which we live. The focus is in particular on the philosophical and sociological aspects of Wiener's thought, but these aspects are carefully framed within the context of his scientific journey. Important biographical events, including some that were previously unknown, are also highlighted, but while the book has a biographical structure, it is not only a biography. The book is divided into four chronological sections, the first two of which explore Wiener's development as a philosopher and logician and his brilliant interwar career as a mathematician, supported by his philosophical background. The third section considers his research during World War II, which drew upon his previous scientific work and reflections and led to the birth of cybernetics. Finally, the radical post-war shift in Wiener's intellectual path is considered, examining how he came to abandon computer science projects and commenced ceaseless public reflections on the new sciences and technologies of information, their social effects, and the need for responsibility in science.
How would the humanities change if we grappled with the ways in which digital and virtual places are designed, experienced, and critiqued? In Rethinking Virtual Places, Erik Malcolm Champion draws from the fields of computational sciences and other place-related disciplines to argue for a more central role for virtual space in the humanities. For instance, recent developments in neuroscience could improve our understanding of how people experience, store, and recollect place-related encounters. Similarly, game mechanics using virtual place design might make digital environments more engaging and learning content more powerful and salient. In addition, Champion provides a brief introduction to new and emerging software and devices and explains how they help, hinder, or replace our traditional means of designing and exploring places. Perfect for humanities scholars fascinated by the potential of virtual space, Rethinking Virtual Places challenges both traditional and recent evaluation methods to address the complicated problem of understanding how people evaluate and engage with the notion of place. |
You may like...
Principles Of Business Information…
Ralph Stair, George Reynolds, …
Paperback
(1)R1,780 Discovery Miles 17 800
If Anyone Builds It, Everyone Dies - The…
Eliezer Yudkowsky, Nate Soares
Paperback
CompTIA A+ Guide to Information…
Nicholas Pierce, Jean Andrews, …
Hardcover
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, …
Paperback
R1,150
Discovery Miles 11 500
|