![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Wireless Distributed Computing and Cognitive Sensing defines high-dimensional data processing in the context of wireless distributed computing and cognitive sensing. This book presents the challenges that are unique to this area such as synchronization caused by the high mobility of the nodes. The author will discuss the integration of software defined radio implementation and testbed development. The book will also bridge new research results and contextual reviews. Also the author provides an examination of large cognitive radio network; hardware testbed; distributed sensing; and distributed computing.
This book has brought 24 groups of experts and active researchers around the world together in image processing and analysis, video processing and analysis, and communications related processing, to present their newest research results, exchange latest experiences and insights, and explore future directions in these important and rapidly evolving areas. It aims at increasing the synergy between academic and industry professionals working in the related field. It focuses on the state-of-the-art research in various essential areas related to emerging technologies, standards and applications on analysis, processing, computing, and communication of multimedia information. The target audience of this book is researchers and engineers as well as graduate students working in various disciplines linked to multimedia analysis, processing and communications, e.g., computer vision, pattern recognition, information technology, image processing, and artificial intelligence. The book is also meant to a broader audience including practicing professionals working in image/video applications such as image processing, video surveillance, multimedia indexing and retrieval, and so on. We hope that the researchers, engineers, students and other professionals who read this book would find it informative, useful and inspirational toward their own work in one way or another.
This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart grids and micro-grids include mis-recordings power consumption/generation information and exposures of personally identifiable information or sensitive information. Attack models based on mis-recorded generation and/or consumption data and exposure of personally identifiable information, are also studied. In each case, countermeasures are proposed to circumvent the power theft attacks raised. Researchers in Smart Micro-grids security, cyber-physical systems, and critical infrastructure will want to purchase this book as a reference. Professionals, Researchers, Academics and students working in security general and Security of Critical Infrastructure, Privacy, and Data Sharing will also want to purchase this book as a reference.
In addition to capital infrastructure and consumers, digital information created by individual and corporate consumers of information technology is quickly being recognised as a key economic resource and an extremely valuable asset to a company. Organizational, Legal, and Technological Dimensions of Information System Administration recognises the importance of information technology by addressing the most crucial issues, challenges, opportunities, and solutions related to the role and responsibility of an information system. Highlighting various aspects of the organizational and legal implications of system administration, this reference work will be useful to managers, IT professionals, and graduate students who seek to gain an understanding in this discipline.
Image communication technologies have advanced rapidly in recent years and the book series, Advances in Image Communication is dedicated to documenting these developments. Third in the series, this publication contributes as effectively as its forerunners to the multidisciplinary overview afforded by the series as a whole. At the same time, it stands alone as a comprehensive synopsis of its own particular area of interest. The book specifically explores two complementary topics, namely: the coding algorithms made to compress the data rate of digital moving-picture sequences (video-telephony, television TV] and high-definition television HDTV]) and the transmission on Asynchronous Transfer Mode ATM] networks (packet-switching transmission media). It provides an in-depth view of the current state-of-the-art and endeavors to stimulate increasing research efforts for the future.
This book answers a question which came about while the author was work ing on his diploma thesis [1]: would it be better to ask for the available band width instead of probing the network (like TCP does)? The diploma thesis was concerned with long-distance musical interaction ("NetMusic"). This is a very peculiar application: only a small amount of bandwidth may be necessary, but timely delivery and reduced loss are very important. Back then, these require ments led to a thorough investigation of existing telecommunication network mechanisms, but a satisfactory answer to the question could not be found. Simply put, the answer is "yes" - this work describes a mechanism which indeed enables an application to "ask for the available bandwidth". This obvi ously does not only concern online musical collaboration any longer. Among others, the mechanism yields the following advantages over existing alterna tives: * good throughput while maintaining close to zero loss and a small bottleneck queue length * usefulness for streaming media applications due to a very smooth rate * feasibility for satellite and wireless links * high scalability Additionally, a reusable framework for future applications that need to "ask the network" for certain performance data was developed.
The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications. Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications. Topics Covered: Assistive Technologies Context-Aware Computing Systems Health Risk Management Healthcare Support Systems Reliability Concerns Smart Healthcare Wearable Sensors
Written by one of the founding fathers of Quantum Information, this book gives an accessible (albeit mathematically rigorous), self-contained introduction to quantum information theory. The central role is played by the concept of quantum channel and its entropic and information characteristics. In this revised edition, the main results have been updated to reflect the most recent developments in this very active field of research.
The advent of the digital economy has the potential to dramatically change the conventional interrelationships among individuals, enterprises and society. There can be little doubt that to achieve vigorous socioeconomic developments in the 21st century, people will have to aggressively use information technology to boost innovation and to organically link the results of that innovation to solutions to global environmental issues and social challenges such as the opportunity divide. We are responsible for taking advantage of the opportunities opened up by the digital economy and for turning those opportunities into things that reflect our values and goals. The book examines the overall impact of the digital economy and the development of a practical institutional design.
Testing of Communicating Systems presents the latest worldwide results in both the theory and practice of the testing of communicating systems. This volume provides a forum that brings together the substantial volume of research on the testing of communicating systems, ranging from conference testing through interoperability testing to performance and QoS testing. The following topics are discussed in detail: Types of testing; Phases of the testing process; Classes of systems to be tested; and Theory and practice of testing.GBP/LISTGBP This book contains the selected proceedings of the 12th International Workshop on the Testing of Communicating Systems (formerly the International Workshop on Protocol Test Systems), sponsored by the International Federation for Information Processing (IFIP), and held in Budapest, Hungary, in September 1999. The book contains not only interesting research on testing different communication technologies from telecom and datacom systems to distributed systems, but also presents reports on the application of these results in industry. Testing of Communicating Systems will be essential reading for engineers, IT managers and research personnel working in computer science and telecommunications.
ThisvolumecontainstheproceedingsofIFIPTM2009, theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly global platform for the reporting of research, development, policyandpracticeintheinterdependentareasofprivacy, security, and trust. Building on the traditions inherited from the highly successful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, and the IFIPTM 2008conferencein Trondheim, Norway, IFIPTM 2009 focusedontrust, privacyand security from multidisciplinary perspectives. The conferenceisanarenafor discussionaboutrelevantproblemsfromboth research and practice in the areas of academia, business, and government. IFIPTM 2009 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2009 received 44 submissions. The ProgramCommittee selected 17 - pers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include one invited paper and ?ve demo descriptions. The highlights of IFIPTM 2009 included invited talks and tutorials by academic and governmental experts in the ?elds of trust management, privacy and security, including Eugene Spa?ord, Marianne Winslett, and Michael Novak. Running an international conference requires an immense e?ort from all p- ties involved. We would like to thank the Program Committee members and external referees for having provided timely and in-depth reviews of the subm- ted papers.We wouldalsolike to thank the Workshop, Tutorial, Demonstration, Local Arrangements, and Website Chairs, for having provided great help or- nizing the con
This book brings together papers presented at the 2016 International Conference on Communications, Signal Processing, and Systems, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics ranging from communications to signal processing and systems, this book is aimed at undergraduate and graduate students in electrical engineering, computer science and mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
Survivable Networks: Algorithms for Diverse Routing provides algorithms for diverse routing to enhance the survivability of a network. It considers the common mesh-type network and describes in detail the construction of physically disjoint paths algorithms for diverse routing. The algorithms are developed in a systematic manner, starting with shortest path algorithms appropriate for disjoint paths construction. Key features of the algorithms are optimality and simplicity. Although the algorithms have been developed for survivability of communication networks, they are in a generic form, and thus applicable in other scientific and technical disciplines to problems that can be modeled as a network. A notable highlight of this book is the consideration of real-life telecommunication networks in detail. Such networks are described not only by nodes and links, but also by the actual physical elements, called span nodes and spans. The sharing of spans (the actual physical links) by the network (logical) links complicates the network, requiring new algorithms. This book is the first one to provide algorithms for such networks. Survivable Networks: Algorithms for Diverse Routing is a comprehensive work on physically disjoint paths algorithms. It is an invaluable resource and reference for practicing network designers and planners, researchers, professionals, instructors, students, and others working in computer networking, telecommunications, and related fields.
The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.
The huge bandwidth of optical fiber was recognized back in the 1970s during the early development of fiber optic technology. For the last two decades, the capacity of experimental and deployed systems has been increasing at a rate of 100-fold each decade-a rate exceeding the increase of integrated circuit speeds. Today, optical communication in the public communication networks has developed from the status of a curiosity into being the dominant technology. Various great challenges arising from the deployment of the wavelength division multiplexing (WDM) have attracted a lot of efforts from many researchers. Indeed, the optical networking has been a fertile ground for both theoretical researches and experimental studies. This monograph presents the contribution from my past and ongoing research in the optical networking area. The works presented in this book focus more on graph-theoretical and algorithmic aspects of optical networks. Although this book is limited to the works by myself and my coauthors, there are many outstanding achievements made by other individuals, which will be cited in many places in this book. Without the inspiration from their efforts, this book would have never been possible. This monograph is divided into four parts: * Multichannel Optical Networking Architectures, * Broadcast-and-Select Passive Optical Networks, * Wavelength-Switched Optical Networks, * SONET/WDM Optical Networks. The first part consists of the first three chapters. Chapter 1 pro vides a brief survey on the networking architectures of optical trans- XVll xvm MULTICHANNEL OPTICAL NETWORKS port networks, optical access networks and optical premise networks.
This is the first book on brain-computer interfaces (BCI) that aims to explain how these BCI interfaces can be used for artistic goals. Devices that measure changes in brain activity in various regions of our brain are available and they make it possible to investigate how brain activity is related to experiencing and creating art. Brain activity can also be monitored in order to find out about the affective state of a performer or bystander and use this knowledge to create or adapt an interactive multi-sensorial (audio, visual, tactile) piece of art. Making use of the measured affective state is just one of the possible ways to use BCI for artistic expression. We can also stimulate brain activity. It can be evoked externally by exposing our brain to external events, whether they are visual, auditory, or tactile. Knowing about the stimuli and the effect on the brain makes it possible to translate such external stimuli to decisions and commands that help to design, implement, or adapt an artistic performance, or interactive installation. Stimulating brain activity can also be done internally. Brain activity can be voluntarily manipulated and changes can be translated into computer commands to realize an artistic vision. The chapters in this book have been written by researchers in human-computer interaction, brain-computer interaction, neuroscience, psychology and social sciences, often in cooperation with artists using BCI in their work. It is the perfect book for those seeking to learn about brain-computer interfaces used for artistic applications.
Optical networks are leaving the labs and becoming a reality. Despite the current crisis of the telecom industry, our everyday life increasingly depends on communication networks for information exchange, medicine, education, data transfer, commerce, and many other endeavours. High capacity links are required by the large futemet traffic demand, and optical networks remain one of the most promising technologies for meeting these needs. WDM systems are today widely deployed, thanks to low-cost at extreme data rates and high reliability of optical components, such as optical amplifiers and fixed/tunable filters and transceivers. Access and metropolitan area networks are increasingly based on optical technologies to overcome the electronic bottleneck at the network edge. Traditional multi-layer architectures, such as the widely deployed IP/ATM/SDH protocol stack, are increasingly based on WDM transport; further efforts are sought to move at the optical layer more of the functionalities available today in higher protocol layers. New components and subsystems for very high speed optical networks offer new design opportunities to network operators and designers. The trends towards dynamically configurable all-optical network infrastructures open up a wide range of new network engineering and design choices, which must face issues such as interoperability and unified control and management.
100 Go Mistakes: How to Avoid Them introduces dozens of techniques for writing idiomatic, expressive, and efficient Go code that avoids common pitfalls. By reviewing dozens of interesting, readable examples and real-world case studies, you'll explore mistakes that even experienced Go programmers make. This book is focused on pure Go code, with standards you can apply to any kind of project. As you go, you'll navigate the tricky bits of handling JSON data and HTTP services, discover best practices for Go code organization, and learn how to use slices efficiently. Your code speed and quality will enjoy a huge boost when you improve your concurrency skills, deal with error management idiomatically, and increase the quality of your tests. About the Technology Go is simple to learn, yet hard to master. Even experienced Go developers may end up introducing bugs and inefficiencies into their code. This book accelerates your understanding of Go's quirks, helping you correct mistakes and dodge pitfalls on your path to Go mastery.
This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.
Broadband communications is widely recognized as one of the key technologies for building the next generation global network infrastructure to support ever-increasing multimedia applications. This book contains a collection of timely leading-edge research papers that address some of the important issues of providing such a broadband network infrastructure. Broadband Communications represents the selected proceedings of the Fifth International Conference on Broadband Communications, sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in November 1999. The book is organized according to the eighteen technical sessions of the conference. The topics covered include internet services, traffic modeling, internet traffic control, performance evaluation, billing, pricing, admission policy, mobile network protocols, TCP/IP performance, mobile network performance, bandwidth allocation, switching systems, traffic flow control, routing, congestion and admission control, multicast protocols, network management, and quality of service. It will serve as an essential reference for computer scientists and practitioners.
From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented at the Working Conference on Distributed and Parallel Embedded Systems - DIPES 2006, sponsored by the International Federation for Information Processing - IFIP. Coverage includes model-driven design, testing and evolution of embedded systems, timing analysis and predictability, scheduling, allocation, communication and resource management in distributed real-time systems.
With the advent of Web 2.0, e-learning has the potential to become far more personal, social, and flexible. ""Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking"" provides a valuable reference to the latest advancements in the area of educational technology and e-learning. This innovative collection includes a selection of world-class chapters addressing current research, case studies, best practices, pedagogical approaches, and strategies related to e-learning resources and projects. |
You may like...
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R7,752
Discovery Miles 77 520
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, …
Hardcover
R5,931
Discovery Miles 59 310
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
|