![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
During the last two decades, computer and information technologies have forced great changes in the ways businesses manage operations in meeting the desired quality of products and services, customer demands, competition, and other challenges.
This monograph introduces recent developments in formation control of distributed-agent systems. Eschewing the traditional concern with the dynamic characteristics of individual agents, the book proposes a treatment that studies the formation control problem in terms of interactions among agents including factors such as sensing topology, communication and actuation topologies, and computations. Keeping pace with recent technological advancements in control, communications, sensing and computation that have begun to bring the applications of distributed-systems theory out of the industrial sphere and into that of day-to-day life, this monograph provides distributed control algorithms for a group of agents that may behave together. Unlike traditional control laws that usually require measurements with respect to a global coordinate frame and communications between a centralized operation center and agents, this book provides control laws that require only relative measurements and communications between agents without interaction with a centralized operator. Since the control algorithms presented in this book do not require any global sensing and any information exchanges with a centralized operation center, they can be realized in a fully distributed way, which significantly reduces the operation and implementation costs of a group of agents. Formation Control will give both students and researchers interested in pursuing this field a good grounding on which to base their work.
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
This book examines the origins and dynamical characteristics of atmospheric inertia-gravity waves in the Antarctic mesosphere. Gravity waves are relatively small-scale atmospheric waves with a restoring force of buoyancy that can transport momentum upward from the troposphere to the middle atmosphere. In previous studies, the dynamical characteristics of mesospheric gravity waves have not been fully examined using numerical simulations, since performing a numerical simulation with a high resolution and a high model-top requires considerable computational power. However, recent advances in computational capabilities have allowed us to perform numerical simulations using atmospheric general circulation models, which cover the troposphere to the mesosphere with a sufficiently fine horizontal resolution to resolve small-scale gravity waves. The book first describes the simulation of mesospheric gravity waves using a high-resolution non-hydrostatic atmospheric model with a high model top. The accuracy of the numerical results was confirmed by the first Mesosphere-Stratosphere-Troposphere/Incoherent Scattering (MST/IS) radar observation in the Antarctic. It also depicts the origins and propagation processes of mesospheric gravity waves on the basis of the results of the high-resolution numerical model. The behaviors of mesospheric gravity waves can be clearly explained using both fundamental and cutting-edge theories of fluid dynamics
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
This is an information science reference. Distance learning technologies have reshaped the diffusion of communication within the educational system. Within this expanding field, the possibilities for an interactive, cross-boundary education are endless.""Strategic Applications of Distance Learning Technologies"" provides tactical uses of distance education technologies to assist instructors and researchers in their quest to provide a progressive, alternative approach to traditional education techniques. This collection of advanced research incorporates global challenges and opportunities of technology integration while outlining strategies for distance learning within developing countries.
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.
This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms. The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks.
Expansive growth and use of the Internet in recent years has led to computational networking and an increased use of e-collaborative technologies leading to many possibilities including collaboration of tasks from remote locations. Interdisciplinary Perspectives on E-Collaboration: Emerging Trends and Applications focuses on e-collaboration technologies that enable group-based interaction, and the impact that those technologies have on group work. A defining body of research, this reference addresses a range of e-collaboration topics including interdisciplinary perspectives on e-collaboration, and adaptation and creativity in e-collaboration.
This book gathers a collection of the latest research, applications, and proposals, introducing readers to innovations and concepts from diverse environments and systems. As such, it will provide students and professionals alike with not only cutting-edge information, but also new inspirations and potential research directions. Each chapter focuses on a specific aspect of applied decision making, e.g. in complex systems, computational intelligence, security, and ubiquitous computing.
This book gathers papers presented at the 5th International Conference on Sustainable Design and Manufacturing (SDM-18), held in Gold Coast, Australia in June 2018. The conference covered a wide range of topics, including: sustainable product design and service innovation, sustainable processes and technology for the manufacturing of sustainable products, sustainable manufacturing systems and enterprises, decision support for sustainability, and the study of the societal impact of sustainability including research on the circular economy. The corresponding application areas are wide and varied. The aim of cutting-edge research into sustainable design and manufacturing is to enable the manufacturing industry to grow by adopting more advanced technologies, and at the same time improve its sustainability by reducing its environmental impact. With these goals in mind, the book provides an excellent overview of the latest research and development in the area of Sustainable Design and Manufacturing.
There is a large increase in the amount of information available on World Wide Web and also in number of online databases. This information abundance increases the complexity of locating relevant information. Such a complexity drives the need for improved and intelligent systems for search and information retrieval. Intelligent Agents are currently used to improve the search and retrieval information on World Wide Web. The use of existing search and retrieval engines with the addition of intelligent agents allows a more comprehensive search with a performance that can be measured. Intelligent Agents for Mining and Information Retrieval discusses the foundation as well as the pratical side of intelligent agents and their theory and applications for web data mining and information retrieval. The book can used for researchers at the undergraduate and post-graduate levels as well as a reference of the state-of-art for cutting edge researchers.
Agent technologies and multi-agent systems is an emerging field of study that is unique in the sense that all efforts to build this discipline unite knowledge from different areas of study. Developments in Intelligent Agent Technologies and Multi-Agent Systems: Concepts and Applications discusses research on emerging technologies and systems based on agent and multi-agent paradigms across various fields of science, engineering and technology. This book is a collection of work that covers conceptual frameworks, case studies, and analysis while serving as a medium of communication among researchers from academia, industry and government.
The papers contained in this volume were originally presented at the 2015 International Conference on Complex Systems in Business, Administration, Science and Engineering. Included are the latest works of practitioners from a variety of disciplines who have developed new approaches for resolving complex issues that cannot be formulated using conventional, mathematical or software models.Complex Systems occur in an infinite variety of problems, not only in the realm of physical sciences and engineering, but also in such diverse fields as economics, the environment, humanities, and social and political sciences.The papers in the book cover such topics as: Complex ecological systems; Complexity science and urban developments; Complex energy systems; Complex issues in biological and medical sciences; Extreme events: natural and human made disasters; Climate change; Complexity of the internet-based global market; Complex business processes; Supply chain complexity; Transportation complexity; Logistics complexity; Closed and open systems; Attractions and chaotic systems; Complex adaptive software; Complexity of big data; Management of complexity; Global economy as a complex system; Complexity in social systems; Complex political systems; Administrations as complex systems; Complexity in engineering; Complexity and environment; Complexity and evolution; Complexity in linguistics, literature and arts.
The book is based on interdisciplinary research on various aspects and dynamics of human multimodal signal exchanges. It discusses realistic application scenarios where human interaction is the focus, in order to identify new methods for data processing and data flow coordination through synchronization, and optimization of new encoding features combining contextually enacted communicative signals, and develop shared digital data repositories and annotation standards for benchmarking the algorithmic feasibility and successive implementation of believable human-computer interaction (HCI) systems. This book is a valuable resource for a. the research community, PhD students, early stage researchers c. schools, hospitals, and rehabilitation and assisted-living centers e. the ICT market, and representatives from multimedia industries
This is the fourth volume of the successful series Robot Operating Systems: The Complete Reference, providing a comprehensive overview of robot operating systems (ROS), which is currently the main development framework for robotics applications, as well as the latest trends and contributed systems. The book is divided into four parts: Part 1 features two papers on navigation, discussing SLAM and path planning. Part 2 focuses on the integration of ROS into quadcopters and their control. Part 3 then discusses two emerging applications for robotics: cloud robotics, and video stabilization. Part 4 presents tools developed for ROS; the first is a practical alternative to the roslaunch system, and the second is related to penetration testing. This book is a valuable resource for ROS users and wanting to learn more about ROS capabilities and features.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
Cognitive architectures represent an umbrella term to describe ways in which the flow of thought can be engineered towards cerebral and behavioral outcomes. Cognitive Architectures are meant to provide top-down guidance, a knowledge base, interactive heuristics and concrete or fuzzy policies for which the virtual character can utilize for intelligent interaction with his/her/its situated virtual environment. Integrating Cognitive Architectures into Virtual Character Design presents emerging research on virtual character artificial intelligence systems and procedures and the integration of cognitive architectures. Emphasizing innovative methodologies for intelligent virtual character integration and design, this publication is an ideal reference source for graduate-level students, researchers, and professionals in the fields of artificial intelligence, gaming, and computer science.
The book discusses the theoretical fundamentals of CAD graphics to enhance readers' understanding of surface modeling and free-form design by demonstrating how to use mathematical equations to define curves and surfaces in CAD modelers. Additionally, it explains and describes the main approaches to creating CAD models out of 3D scans of physical objects. All CAD approaches are demonstrated with guided examples and supported with comprehensive engineering explanations. Furthermore, each approach includes exercises for independent consolidation of advanced CAD skills. This book is intended for engineers and designers who are already familiar with the basics of modern CAD tools, e.g. feature based and solid based modeling in 3D space, and would like to improve and expand their knowledge and experience. It is also an easy-to use guide and excellent teaching and research aid for academics and practitioners alike.
Data Quality: The Accuracy Dimension is about assessing the quality
of corporate data and improving its accuracy using the data
profiling method. Corporate data is increasingly important as
companies continue to find new ways to use it. Likewise, improving
the accuracy of data in information systems is fast becoming a
major goal as companies realize how much it affects their bottom
line. Data profiling is a new technology that supports and enhances
the accuracy of databases throughout major IT shops. Jack Olson
explains data profiling and shows how it fits into the larger
picture of data quality.
This is the fifth volume of a sub series on Road Vehicle Automation published within the Lecture Notes in Mobility. Like in previous editions, scholars, engineers and analysts from all around the world have contributed chapters covering human factors, ethical, legal, energy and technology aspects related to automated vehicles, as well as transportation infrastructure and public planning. The book is based on the Automated Vehicles Symposium which was hosted by the Transportation Research Board (TRB) and the Association for Unmanned Vehicle Systems International (AUVSI) in San Francisco, California (USA) in July 2017.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field. |
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|