![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.
It gives me immense pleasure to introduce this timely handbook to the research/- velopment communities in the ?eld of signal processing systems (SPS). This is the ?rst of its kind and represents state-of-the-arts coverage of research in this ?eld. The driving force behind information technologies (IT) hinges critically upon the major advances in both component integration and system integration. The major breakthrough for the former is undoubtedly the invention of IC in the 50's by Jack S. Kilby, the Nobel Prize Laureate in Physics 2000. In an integrated circuit, all components were made of the same semiconductor material. Beginning with the pocket calculator in 1964, there have been many increasingly complex applications followed. In fact, processing gates and memory storage on a chip have since then grown at an exponential rate, following Moore's Law. (Moore himself admitted that Moore's Law had turned out to be more accurate, longer lasting and deeper in impact than he ever imagined. ) With greater device integration, various signal processing systems have been realized for many killer IT applications. Further breakthroughs in computer sciences and Internet technologies have also catalyzed large-scale system integration. All these have led to today's IT revolution which has profound impacts on our lifestyle and overall prospect of humanity. (It is hard to imagine life today without mobiles or Internets ) The success of SPS requires a well-concerted integrated approach from mul- ple disciplines, such as device, design, and application.
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.
In a single volume, The Mobile Communications Handbook covers the entire field, from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The tremendous scope of this second edition ensures that it will be the primary reference for every aspect of mobile communications. Details and references follow preliminary discussions, ensuring that the reader obtains the most accurate information available on the particular topic.
Peer-to-Peer (P2P) networks allow individuals to share digital content files in real time. They facilitate communication and promote community without hierarchy or strict control. This book applies economic principles to analyze and understand the P2P phenomenon. It also provides numerous contemporary examples from the US and around the world to shed light on the implications of P2P as a mass medium, considering such issues as pricing, licensing, security, and regulation.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.
Learn how and when to apply the latest phase and phase-difference modulation (PDM) techniques with this valuable guide for systems engineers and researchers. It helps you cut design time and fine-tune system performance.
This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.
Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.
This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. The book will include: Exam Objectives Fast Track Review Key words/definitions Five Toughest questions and their answers Exam Warnings What to pay attention to The only book keyed to the new SY0-201 objectives that has been
crafted for last minute cramming
In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits. Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."
"This book is by far the most comprehensive and orderly treatment
of the subject. It is the work of experts with a wealth of both
theoretical and practical experience with the subject and its
connecting disciplines. It is an integral work... concepts and
notation are at the same consistent level throughout the book.
Quality of Service (QoS) is an absolutely critical part of any
telecommunication services. This work fills a gap in the literature
of what possibilities there are for satellites in providing global
Internet services." Excerpted from the Foreword by Raymond L.
Pickholtz, The George Washington University
Computer-AidedInnovation(CAI)isayoungdomaininthearrayofCAxte- nologies. ThegoalofCAIistosupportengineersandenterprisesthroughoutthe completeinnovationprocess. AlthoughsomeexistingideasandconceptsofCAI focus on assisting product designers in their creative stage, a more compreh- sive vision conceives CAI systems beginning at the creative stage of perceiving business opportunities and customer demands, then helping in developing - ventions and, further on, providing help up to the point of turning inventions into successful innovations in the market. Following the track of the last two successful CAI conferences held in 2005, in Germany, and 2007 in USA, the ThirdIFIPWorkingConferenceonComputer-AidedInnovation(CAI)washeld in Harbin, China, and attractedparticipants fromacademia and industry. This workingconferencecontinuedthe traditionofstronglylinkingacademicand- dustrymembers. Theconferencehadseveralparallelsessions, andeightkeynote sessions. Over 100 participants attended the conference. Some famous scholars wereinvited askeynotespeakers. I would liketo takethe opportunityto thank all the authors for their quality research, the international Program Comm- teemembersfortheirsupportinreviewingthepapers, andthelocalOrganizing Committeefortheirpreparationoftheconference. Furthermore, IthanktheC- neseNaturalScienceFoundation, theDepartmentofScienceandTechnologyof HeilongjiangProvincialGovernment, theInstituteofDesignforInnovation, and Hebei University of Technology, for their ?nancial support of the conference. I wouldalsoliketothankZhuLin, YaoYihang, XueGuiying, andCaoGuozhong for their signi?cantcontributions towardthe successof the conference. August 2009 Runhua Tan Organization TheThirdIFIPWorkingConferenceonComputer-AidedInnovation(CAI)was organized by Hebei University of Technology and the Department of Science andTechnologyofHeilongjiangProvincialGovernmentincooperationwiththe National Natural Science Foundationof China. Program Committee Conference Chair Runhua Tan, (Hebei University ofTechnology, China) Noel Leon(ITESM, Campus Monterrey, Mexico) OrganizingChair T. S. Yang (Department ofScience and Technologyof Heilongjiang Provincial Government, China) Referees T. Arciszewski(USA) Y. Li (China) M. Ashtiani (USA) H. Liu (China) G. Cascini(Italy) M. L. Maher (Australia) D. Cavalucci (France) M. B. Mc Grath(USA) R. De Guio(France) G. Mukundan (USA) S. K. Cho (USA) G. Olling (USA) S. Finger (USA) J. Ovtcharova(Germany) J. Gero(Australia) E. Schueler-Hainsch(Germany) C. Gundlach(Germ
Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger's contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance studies and explores the status of blockchain technology and, through the latest technology, builds business models to secure the future direction in the field of business. This book discusses the tactics and methods, as well as their limitations and performance. Covering topics such as AI-based efficient models, digital technology and services, and financial trading, this premier reference source is a valuable resource for business leaders and managers, IT managers, students and educators of higher education, entrepreneurs, government officials, librarians, researchers, and academicians.
This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject.
This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC'2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
This book presents a selection of expanded research papers from the Fourth IFIP Workshop on the Performance Modelling and Evaluation of ATM Networks. It provides a fundamental source of reference on the latest research techniques and tools concerning ATM networks worldwide. A number of important topics are featured including: traffic modelling and characterisation, models of ATM switches, network management, high speed LANs and MANs and routing and optimization.
This book provides a thorough development of the powerful methods of heavy traffic analysis and approximations with applications to a wide variety of stochastic (e.g. queueing and communication) networks, for both controlled and uncontrolled systems. The approximating models are reflected stochastic differential equations. The analytical and numerical methods yield considerable simplifications and insights and good approximations to both path properties and optimal controls under broad conditions on the data and structure. The general theory is developed, with possibly state dependent parameters, and specialized to many different cases of practical interest. Control problems in telecommunications and applications to scheduling, admissions control, polling, and elsewhere are treated. The necessary probability background is reviewed, including a detailed survey of reflected stochastic differential equations, weak convergence theory, methods for characterizing limit processes, and ergodic problems.
Roadside Networks for Vehicular Communications: Architectures, Applications, and Test Fields attempts to close the gap between science and technology in the field of roadside backbones for VCNs. This collection will be useful not only for researchers and engineers at universities, but for students in the fields of wireless communication networks, especially vehicular communication networks, and backbone networks as well. |
You may like...
E-Learning and Digital Education in the…
M. Mahruf C. Shohel
Hardcover
R3,584
Discovery Miles 35 840
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
|