![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This thesis focuses on the problem of optimizing the quality of network multimedia services. This problem spans multiple domains, from subjective perception of multimedia quality to computer networks management. The work done in this thesis approaches the problem at different levels, developing methods for modeling the subjective perception of quality based on objectively measurable parameters of the multimedia coding process as well as the transport over computer networks. The modeling of subjective perception is motivated by work done in psychophysics, while using Machine Learning techniques to map network conditions to the human perception of video services. Furthermore, the work develops models for efficient control of multimedia systems operating in dynamic networked environments with the goal of delivering optimized Quality of Experience. Overall this thesis delivers a set of methods for monitoring and optimizing the quality of multimedia services that adapt to the dynamic environment of computer networks in which they operate.
This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.
This book covers various algorithmic developments in the perfect reconstruction cosine/sine-modulated filter banks (TDAC-MDCT/MDST or MLT, MCLT, low delay MDCT, complex exponential/cosine/sine-modulated QMF filter banks), and near-perfect reconstruction QMF banks (pseudo-QMF banks) in detail, including their general mathematical properties, matrix representations, fast algorithms and various methods to integer approximations being recently a new transform technology for lossless audio coding. Each chapter will contain a number of examples and will conclude with problems and exercises. The book reflects the research efforts/activities and achieved results of the authors in the time period over the last 20 years.
Wireless Information Highways provides an excellent introduction and balanced coverage of the most important topics related to the methodologies developed to support data management in asymmetric communication environments. This book is based on a number of self-contained chapters and provides an opportunity for practitioners and researchers to explore the connection between various computer science techniques and develop solutions to problems that arise in the rapidly emerging field of wireless networks.
This book presents different perspectives of online business education - how it is designed, delivered and how it supports advances in management disciplines. The authors describe online platforms in their provision of timely, excellent and relevant business education. The book starts by examining the emergence of online business education. It offers insights for use to business educators in design and implementation of online learning. It presents and discusses technologies for class facilitation and collaboration including tools used to bring content and issues to life. Disruptive approaches and new directions in online business education are examined. The book is ideal for business educators, administrators, as well as business practitioners that have an interest in delivering high quality business education using online platforms and tools. On the Line: Business Education in the Digital Age is divided into three sections. Section 1 presents papers on "why" business education is viable and sustainable in today's context. Treating education as a service, this section describes new techniques for creating a better online business education experience. It also looks at the role advanced data analytics can play in enhancing the quality of online business education. Section 2 delves into "how" online business education works. It presents conceptual models for teaching in specific disciplines, learning design that describes what business educators do and how programs work. This section also addresses performance assessments and quality assurance measures that help to demonstrate the efficacy of online pedagogy. Practical applied papers are used in this section to highlight the use of learning platforms, tools and their application specific to businesses that build knowledge and skills and make students 'work ready'. Finally Section 3 of the book addresses the "so what?" or the outcomes and impacts of online business education. This section targets where business education needs to take learning next, for example to support sustainable business, ethical decision making and inclusive and collaborative leadership. Chapters deal with topics such as how distributed online environments may work better to support knowledge and soft skill building directly relevant for organizations today. Other learning outcomes showing the value of online business education are discussed. Academics, alumni and consultants from over fifteen institutions and organizations around the world contributed to this book.
This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
Theory is considered to be the bedrock of academic research, often being viewed as the foundation upon which scientific enquiry is organized and built. Despite its ubiquity throughout information systems research, there is much that remains unknown about theory. The Handbook of Research on Contemporary Theoretical Models in Information Systems provides a comprehensive overview and coverage of various theories, models, and related approaches used within information systems research. A defining collection of field advancements, this Handbook of Research offers examples and descriptions of real-world applications of various theories based on empirical studies.
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy
This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.
This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.
This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).
Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.
Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.
The book presents a broad overview of emerging smart grid technologies and communication systems, offering a helpful guide for future research in the field of electrical engineering and communication engineering. It explores recent advances in several computing technologies and their performance evaluation, and addresses a wide range of topics, such as the essentials of smart grids for fifth generation (5G) communication systems. It also elaborates the role of emerging communication systems such as 5G, internet of things (IoT), IEEE 802.15.4 and cognitive radio networks in smart grids. The book includes detailed surveys and case studies on current trends in smart grid systems and communications for smart metering and monitoring, smart grid energy storage systems, modulations and waveforms for 5G networks. As such, it will be of interest to practitioners and researchers in the field of smart grid and communication infrastructures alike.
An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.
Combating Spyware in the Enterprise is the first book published on
defending enterprise networks from increasingly sophisticated and
malicious spyware.
Data Communications and Networks uses a top-down, Internet-focussed approach to tackle the problem of communication system design. An integrated approach is taken to networks and data communications, with an emphasis that starts from the top level requirements and works downwards, describing how such requirements are fulfilled by lower layers of the transmission chain. While the book contains sufficient detail to provide an excellent foundation, clarity is paramount and care is taken not to swamp the reader with information to the point where the underlying concepts are obscured. The Internet is used as the principle example of a communication system, allowing the reader to follow the system from the application layers, with source coding and security, through the network, with naming and routing algorithms, down to transport and physical aspects of a communication system. Modern techniques such as mobile radio, Voice over IP, and ASDL, are covered, while more traditional aspects such as circuit switching, which still form a significant part of current systems, are not overlooked. By providing a technical introduction and including application examples, this text will have significant appeal to final year students, postgraduates and professionals with a science or engineering background wishing to gain a basic understanding of the key concepts behind data communications engineering.
This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP. |
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd
Paperback
R2,283
Discovery Miles 22 830
|