![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?
This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers chipless RFID components in block diagram representation and introduce FCC requirements which should be considered in the design procedure of each component. The third chapter is dedicated to the complex natural resonance-based design of chipless RFID tags. The next chapter concerns about the detection techniques introduced for the identification of chipless RFID tags. The fifth chapter is dedicated to the localization and anti-collision techniques in chipless RFID systems. Final chapter is chipless RFID tags as sensors. It provides some applications where the tag can be used as both ID and sensor. The tag specifications and detection issues are addressed in this section.
Social media has received considerable attention, and many potential benefits, as well as concerns, are now being discussed. This book explores how social media can successfully support business processes in marketing, sales and service in the context of customer relationship management (CRM). It presents the fundamentals of Social CRM and shows how small and large companies alike have implemented it. In turn, the book presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. The book concludes with an overview of essential design areas that businesses need to bear in mind when introducing social media into their CRM strategies. In this regard, it also points out key success factors, limitations, and data protection aspects.
Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ranges. Briefly, "topology control" (TC) is the art of co-ordinating nodes' decisions regarding their transmitting ranges, to generate a network with the desired features. Building an optimized network topology helps surpass the prevalent scalability and capacity problems. "Topology Control in Wireless Ad Hoc and Sensor Networks" makes the case for topology control and provides an exhaustive coverage of TC techniques in wireless ad hoc and sensor networks, considering both stationary networks, to which most of the existing solutions are tailored, and mobile networks. The author introduces a new taxonomy of topology control and gives a full explication of the applications and challenges of this important topic. "Topology Control in Wireless Ad Hoc and Sensor Networks: " Defines topology control and explains its necessity, considering both stationary and mobile networks. Describes the most representative TC protocols and their performance. Covers the critical transmitting range for stationary and mobile networks, topology optimization problems such as energy efficiency, and distributed topology control. Discusses implementation and 'open issues', including realistic models and the effect of multi-hop data traffic. Presents a case study on routing protocol design, to demonstrate how TC can ease the design of cooperative routing protocols. This invaluable text will provide graduatestudents in Computer Science, Electrical and Computer Engineering, Applied Mathematics and Physics, researchers in the field of ad hoc networking, and professionals in wireless telecoms as well as networking system developers with a single reference resource on topology control.
This book presents the new development of computation intelligence for traffic, transportation and mobility, the main contents include traffic safety, mobility analysis, intelligent transportation system, smart vehicle, transportation behavior, driver modeling and assistance, transportation risk analysis and reliability system analysis, vehicle operation and active safety, urban traffic management and planning.
Smart object technology, sometimes called the Internet of
Things, is having a profound impact on our day-to-day lives.
"Interconnecting Smart Objects with IP" is the first book that
takes a holistic approach to the revolutionary area of IP-based
smart objects. Smart objects are the intersection of networked
embedded systems, wireless sensor networks, ubiquitous and
pervasive computing, mobile telephony and telemetry, and mobile
computer networking. This book consists of three parts, Part I
focuses on the architecture of smart objects networking, Part II
covers the hardware, software, and protocols for smart objects, and
Part III provides case studies on how and where smart objects are
being used today and in the future. The book covers the
fundamentals of IP communication for smart objects, IPv6, and web
services, as well as several newly specified low-power IP standards
such as the IETF 6LoWPAN adaptation layer and the RPL routing
protocol. This book contains essential information not only for the
technical reader but also for policy makers and decision makers in
the area of smart objects both for private IP networks and the
Internet.
This book provides a complete picture of several decision support tools for predictive maintenance. These include embedding early anomaly/fault detection, diagnosis and reasoning, remaining useful life prediction (fault prognostics), quality prediction and self-reaction, as well as optimization, control and self-healing techniques. It shows recent applications of these techniques within various types of industrial (production/utilities/equipment/plants/smart devices, etc.) systems addressing several challenges in Industry 4.0 and different tasks dealing with Big Data Streams, Internet of Things, specific infrastructures and tools, high system dynamics and non-stationary environments . Applications discussed include production and manufacturing systems, renewable energy production and management, maritime systems, power plants and turbines, conditioning systems, compressor valves, induction motors, flight simulators, railway infrastructures, mobile robots, cyber security and Internet of Things. The contributors go beyond state of the art by placing a specific focus on dynamic systems, where it is of utmost importance to update system and maintenance models on the fly to maintain their predictive power.
This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and bio-inspired memristor-based networks. Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive and context-aware Information Communication Technologies.
HIGHLIGHT
Virtualization technologies help IT organizations in three ways:
cost-cutting, ease of administration, and the overall effect of IT
on the environment. Virtualization cuts costs by reducing the
amount of capital resources (equipment), power, and cooling to run
an IT infrastructure. Because of the tools that are involved in
virtualization, it also reduces the burden of IT management
significantly. Finally, by reducing the amount of cooling, power,
and other emissions from these servers, virtualization can help IT
organizations become more "green."
This book focuses on information literacy for the younger generation of learners and library readers. It is divided into four sections: 1. Information Literacy for Life; 2. Searching Strategies, Disciplines and Special Topics; 3. Information Literacy Tools for Evaluating and Utilizing Resources; 4. Assessment of Learning Outcomes. Written by librarians with wide experience in research and services, and a strong academic background in disciplines such as the humanities, social sciences, information technology, and library science, this valuable reference resource combines both theory and practice. In today's ever-changing era of information, it offers students of library and information studies insights into information literacy as well as learning tips they can use for life.
This superb introduction examines all aspects of implementation from concept to reality, and spells out the pros, cons, and effects of EDI in your organization. The cost of EDI hardware, software, training, transmission, and maintenance are broken down and clearly explained to prevent problems and maximize benefits. Checklists and procedural guidelines are also offered to ease your EDI transition -- so that you're never left with a system you can't put online quickly and efficiently.
Introducing Microsoft's flagship wireless development tool
The aim of this book is to expand and improve upon the existing knowledge on discrete-time 1-bit look-ahead sigma-delta modulation in general, and to come to a solution for the above mentioned specific issues arising from 1-bit sigma-delta modulation for SA-CD. In order to achieve this objective an analysis is made of the possibilities for improving the performance of digital noise-shaping look-ahead solutions. On the basis of the insights obtained from the analysis, several novel generic 1-bit look-ahead solutions that improve upon the state-of-the-art will be derived and their performance will be evaluated and compared. Finally, all the insights are combined with the knowledge of the SA-CD lossless data compression algorithm to come to a specifically for SA-CD optimized look-ahead design.
This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).
This volume of LNCSE is a collection of the papers from the proceedings of the third workshop on sparse grids and applications. Sparse grids are a popular approach for the numerical treatment of high-dimensional problems. Where classical numerical discretization schemes fail in more than three or four dimensions, sparse grids, in their different guises, are frequently the method of choice, be it spatially adaptive in the hierarchical basis or via the dimensionally adaptive combination technique. Demonstrating once again the importance of this numerical discretization scheme, the selected articles present recent advances on the numerical analysis of sparse grids as well as efficient data structures. The book also discusses a range of applications, including uncertainty quantification and plasma physics.
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.
In today's dynamic business environment, IT departments are under permanent pressure to meet two divergent requirements: to reduce costs and to support business agility with higher flexibility and responsiveness of the IT infrastructure. Grid and Cloud Computing enable a new approach towards IT. They enable increased scalability and more efficient use of IT based on virtualization of heterogeneous and distributed IT resources. This book provides a thorough understanding of the fundamentals of Grids and Clouds and of how companies can benefit from them. A wide array of topics is covered, e.g. business models and legal aspects. The applicability of Grids and Clouds in companies is illustrated with four cases of real business experiments. The experiments illustrate the technical solutions and the organizational and IT governance challenges that arise with the introduction of Grids and Clouds. Practical guidelines on how to successfully introduce Grids and Clouds in companies are provided.
|
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd
Paperback
R2,283
Discovery Miles 22 830
|