![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book presents the application of a comparatively simple nonparametric regression algorithm, known as the multivariate adaptive regression splines (MARS) surrogate model, which can be used to approximate the relationship between the inputs and outputs, and express that relationship mathematically. The book first describes the MARS algorithm, then highlights a number of geotechnical applications with multivariate big data sets to explore the approach's generalization capabilities and accuracy. As such, it offers a valuable resource for all geotechnical researchers, engineers, and general readers interested in big data analysis.
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.
Broadband Fixed Wireless Access provides a systematic overview of the emerging WiMAX technology, and much of the material is based on the practical experiences of the authors in building new systems. This material will be of significant interest to network architects and developers of broadband fixed wireless access products. With the advent of the IEEE 802.16 standard (has the standard or any part of it been adopted or is likely to be adopted soon) and next generation equipment, this technology has been growing in interest. The authors discuss applications at microwave frequencies between 2 and 11 GHz that could be attractive options for operators without an existing access infrastructure for reaching end users. This introductory volume demystifies the technology and provides technical exposure to the various system trade-offs. Additionally, the book features the following highlights: detailed modeling of broadband fixed wireless access propagation channel, including new measurements for its time variation; an extensive overview of the IEEE 802.1 discussion of the suitability of various multi-antenna techniques; and elaboration of various techniques, i.e. autodirecting antennas, bridging with WLAN, and multi-hop networking, that can be used to reduce the cost of ownership of a WiMAX network for an operator. The authors cover a wide range of topics, from network deployment to implementation of terminals. Wireless professionals will gain a head start from the information on WiMAX technology. This is a must read book when starting with broadband fixed wireless access.
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007. The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management. The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.
The vast reduction in size and power consumption of CMOS circuitry
has led to a large research effort based around the vision of
ubiquitous networks of wireless communication nodes. The wireless
devices are usually designed to run on batteries. However, as the
networks increase in number and the devices decrease in size, the
replacement of depleted batteries is not practical. Furthermore, a
battery that is large enough to last the lifetime of the device
would dominate the overall system size, and thus is not very
attractive. There is clearly a need to explore alternative methods
of powering these small communication nodes. This book, therefore,
focuses on potential "ambient" sources of power that can be
scavenged or harvested and subsequently used to run low power
electronics and wireless transceivers.
With the rapid growth of bandwidth demand from network users and the advances in optical technologies, optical networks with multiterabits per-second capacity has received significant interest from both researchers and practitioners. Optical networks deployment raises a number of challenging problems that require innovative solutions, including net work architectures, scalable and fast network management, resource efficient routing and wavelength assignment algorithms, QoS support and scheduling algorithms, and switch and router architectures. In this book, we put together some important developments in this exiting area during last several years. Some of the articles are research papers and some are surveys. All articles were reviewed by two reviewers. The paper, "On Dynamic Wavelength Assignment in WDM Optical Networks," by Alanyali gives an overview of some issues in the analy sis and synthesis of dynamic wavelength assignment policies for optical WDM networks and illustrates a new method of analysis. The paper by Ellinas and Bala, "Wavelength Assignment Algorithms for WDM Ring Architectures," presents two optimal wavelength assignment algorithms that assign the minimum number of wavelengths between nodes on WDM rings to achieve full mesh connectivity. In the paper, "Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems," Jia et al."
This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.
This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks in both theory and application aspects. The contributors specify the importance and position of the interdependent networks in the context of developing the sustainable smart cities and provide a comprehensive investigation of recently developed optimization methods for large-scale networks. There has been an emerging concern regarding the optimal operation of power and transportation networks. In the second volume of Sustainable Interdependent Networks book, we focus on the interdependencies of these two networks, optimization methods to deal with the computational complexity of them, and their role in future smart cities. We further investigate other networks, such as communication networks, that indirectly affect the operation of power and transportation networks. Our reliance on these networks as global platforms for sustainable development has led to the need for developing novel means to deal with arising issues. The considerable scale of such networks, due to the large number of buses in smart power grids and the increasing number of electric vehicles in transportation networks, brings a large variety of computational complexity and optimization challenges. Although the independent optimization of these networks lead to locally optimum operation points, there is an exigent need to move towards obtaining the globally-optimum operation point of such networks while satisfying the constraints of each network properly. The book is suitable for senior undergraduate students, graduate students interested in research in multidisciplinary areas related to future sustainable networks, and the researchers working in the related areas. It also covers the application of interdependent networks which makes it a perfect source of study for audience out of academia to obtain a general insight of interdependent networks.
Enterprise Architecture is the inherent design and management approach essential for organizational coherence leading to alignment, agility, and assurance. Structured Enterprise Architecture approach is often used to plan and implement efficient and effective transformation efforts. However, the strongest driver for Enterprise Architecture is to improve service delivery and overall performance within the organization's business segments. Enterprise Architecture for Connected E-Government: Practices and Innovations addresses the gap in current literature in terms of linking and understanding the relationship between e-government and government Enterprise Architecture. Within this broader context, the focus is specifically on uncovering and comprehending the relationship between government Enterprise Architecture and connected government. Perfect for Government CIOs, IT/IS Managers, Chief Architects, Analysts and Designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers.
Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.
Learn how and when to apply the latest phase and phase-difference modulation (PDM) techniques with this valuable guide for systems engineers and researchers. It helps you cut design time and fine-tune system performance.
Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.
This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.
Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.
Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.
It gives me immense pleasure to introduce this timely handbook to the research/- velopment communities in the ?eld of signal processing systems (SPS). This is the ?rst of its kind and represents state-of-the-arts coverage of research in this ?eld. The driving force behind information technologies (IT) hinges critically upon the major advances in both component integration and system integration. The major breakthrough for the former is undoubtedly the invention of IC in the 50's by Jack S. Kilby, the Nobel Prize Laureate in Physics 2000. In an integrated circuit, all components were made of the same semiconductor material. Beginning with the pocket calculator in 1964, there have been many increasingly complex applications followed. In fact, processing gates and memory storage on a chip have since then grown at an exponential rate, following Moore's Law. (Moore himself admitted that Moore's Law had turned out to be more accurate, longer lasting and deeper in impact than he ever imagined. ) With greater device integration, various signal processing systems have been realized for many killer IT applications. Further breakthroughs in computer sciences and Internet technologies have also catalyzed large-scale system integration. All these have led to today's IT revolution which has profound impacts on our lifestyle and overall prospect of humanity. (It is hard to imagine life today without mobiles or Internets ) The success of SPS requires a well-concerted integrated approach from mul- ple disciplines, such as device, design, and application.
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.
In a single volume, The Mobile Communications Handbook covers the entire field, from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The tremendous scope of this second edition ensures that it will be the primary reference for every aspect of mobile communications. Details and references follow preliminary discussions, ensuring that the reader obtains the most accurate information available on the particular topic.
Peer-to-Peer (P2P) networks allow individuals to share digital content files in real time. They facilitate communication and promote community without hierarchy or strict control. This book applies economic principles to analyze and understand the P2P phenomenon. It also provides numerous contemporary examples from the US and around the world to shed light on the implications of P2P as a mass medium, considering such issues as pricing, licensing, security, and regulation.
|
You may like...
Platform Interference in Wireless…
Kevin Slattery, Harry Skinner
Hardcover
R1,815
Discovery Miles 18 150
Feedback Strategies for Wireless…
Berna OEzbek, Didier Le Ruyet
Hardcover
R4,795
Discovery Miles 47 950
Wireless Public Safety Networks 2 - A…
Daniel Camara, Navid Nikaein
Hardcover
R2,677
Discovery Miles 26 770
Compact Antennas for High Data Rate…
Jagannath Malik, Amalendu Patnaik, …
Hardcover
R2,365
Discovery Miles 23 650
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
|