![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
This title includes a number of Open Access chapters. Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.
Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.
This book presents the Android plug-in technology used in Android development. This technology is widely used by a majority of Chinese internet companies, and is becoming more widely used worldwide. The book fully describes the history of Android plug-in technology, the installation and startup process, and new features of the Android plug-in technology. It also explores plug-in solutions for peripheral technologies. The book is designed to help Android app developers better understand the underlying technology of the Android system. Features Introduces Android system knowledge, including the communication between AMS and four components Describes the Hook technique by Proxy.newProxyInstance and reflection, to modify Android system behavior, for example, to launch an activity not declared in the AndroidManifest. Shows how to use the Hook apk packaging process in Gradle Covers how to merge the resources in the plugin app and the host app, and how to merge dex of the host app and all the plugin apps Presents the SO technique and how to launch SO files dynamically
This multi-contributed handbook focuses on the latest workings of IoT (internet of Things) and Big Data. As the resources are limited, it's the endeavor of the authors to support and bring the information into one resource. The book is divided into 4 sections that covers IoT and technologies, the future of Big Data, algorithms, and case studies showing IoT and Big Data in various fields such as health care, manufacturing and automation. Features Focuses on the latest workings of IoT and Big Data Discusses the emerging role of technologies and the fast-growing market of Big Data Covers the movement toward automation with hardware, software, and sensors, and trying to save on energy resources Offers the latest technology on IoT Presents the future horizons on Big Data
Learn how to write R code with fewer bugs. The problem with programming is that you are always one typo away from writing something silly. Likewise with data analysis, a small mistake in your model can lead to a big mistake in your results. Combining the two disciplines means that it is all too easy for a missed minus sign to generate a false prediction that you don't spot until it's too late. Testing is the only way to be sure that your code, and your results, are correct. Testing R Code teaches you how to perform development-time testing using the testthat package, allowing you to ensure that your code works as intended. The book also teaches run-time testing using the assertive package; enabling your users to correctly run your code. After beginning with an introduction to testing in R, the book explores more advanced cases such as integrating tests into R packages; testing code that accesses databases; testing C++ code with Rcpp; and testing graphics. Each topic is explained with real-world examples, and has accompanying exercises for readers to practise their skills - only a small amount of experience with R is needed to get started!
Today's organizations find themselves in a race to adopt new technologies in order to keep up with their competition. However, two questions must be answered: Are these organizations ready for new technological advancements, and are these new technologies appropriate for every organization? Technological Challenges and Management: Matching Human and Business Needs focuses on the new advances and challenges that today's organizations face in the areas of human resources and business, resulting from continuous and highly complex changes in technological resources. Organizations need to implement a more proactive and flexible management, matching their human and business needs. Due to this reality, it is important to study and understand varied contributions made by researchers, academics, and practitioners in this field of study worldwide. With the focus of this reality, this book exchanges experiences and perspectives about the state of technological challenges and management research, and future directions for this field of study. It also takes into account the deep implications that these challenges have in the organization of human resources. The authors support academics and researchers and those operating in the management field in dealing with different challenges that organizations face today. This is especially true concerning the relationship between technological changes, human resources management, and business. They propose the sharing of knowledge, through debate and information exchange, about technological challenges and management, matching the critical items of human and business needs. The book is divided into seven chapters that span from evaluating new technologies to finding the perfect fit.
"This book addresses how health apps, in-home measurement devices, telemedicine, data mining, and artificial intelligence and smart medical algorithms are all enabled by the transition to a digital health infrastructure.....it provides a comprehensive background with which to understand what is happening in healthcare informatics and why."-C. William Hanson, III, MD, Chief Medical Information Officer and Vice President, University of Pennsylvania Health System. "This book is dedicated to the frontline healthcare workers, who through their courage and honor to their profession, helped maintain a reliable service to the population at large, during a chaotic time. These individuals withstood fear and engaged massive uncertainty and risk to perform their duties of providing care to those in need at a time of crisis. May the world never forget the COVID-19 pandemic and the courage of our healthcare workers".-Stephan P. Kudyba, Author Healthcare Informatics: Evolving Strategies in the Digital Era focuses on the services, technologies, and processes that are evolving in the healthcare industry. It begins with an introduction to the factors that are driving the digital age as it relates to the healthcare sector and then covers strategic topics such as risk management, project management, and knowledge management that are essential for successful digital initiatives. It delves into facets of the digital economy and how healthcare is adapting to the geographic, demographic, and physical needs of the population and highlights the emergence and importance of apps and telehealth. It also provides a high-level approach to managing pandemics by applying the various elements of the digital ecosystem. The book covers such technologies as: Computerized physician order entry (CPOE) Clinical Information Systems Alerting systems and medical sensors Electronic healthcare records (EHRs) Mobile healthcare and telehealth. Apps Business Intelligence and Decision Support Analytics Digital outreach to the population Artificial Intelligence The book then closes the loop on the efficiency enhancing process with a focus on utilizing analytics for problem solving for a variety of healthcare processes including the pharmaceutical sector. Finally, the book ends with current and futuristic views on evolving applications of AI throughout the industry.
This book is open access under a CC BY NC ND license. It addresses the most recent developments in cloud computing such as HPC in the Cloud, heterogeneous cloud, self-organising and self-management, and discusses the business implications of cloud computing adoption. Establishing the need for a new architecture for cloud computing, it discusses a novel cloud management and delivery architecture based on the principles of self-organisation and self-management. This focus shifts the deployment and optimisation effort from the consumer to the software stack running on the cloud infrastructure. It also outlines validation challenges and introduces a novel generalised extensible simulation framework to illustrate the effectiveness, performance and scalability of self-organising and self-managing delivery models on hyperscale cloud infrastructures. It concludes with a number of potential use cases for self-organising, self-managing clouds and the impact on those businesses.
Enabling Technologies for Next Generation Wireless Communications provides up-to-date information on emerging trends in wireless systems, their enabling technologies and their evolving application paradigms. This book includes the latest trends and developments toward next generation wireless communications. It highlights the requirements of next generation wireless systems, limitations of existing technologies in delivering those requirements and the need to develop radical new technologies. It focuses on bringing together information on various technological developments that are enablers vital to fulfilling the requirements of future wireless communication systems and their applications. Topics discussed include spectrum issues, network planning, signal processing, transmitter, receiver, antenna technologies, channel coding, security and application of machine learning and deep learning for wireless communication systems. The book also provides information on enabling business models for future wireless systems. This book is useful as a resource for researchers and practitioners worldwide, including industry practitioners, technologists, policy decision-makers, academicians, and graduate students.
Knowledge Architectures reviews traditional approaches to managing information and explains why they need to adapt to support 21st-century information management and discovery. Exploring the rapidly changing environment in which information is being managed and accessed, the book considers how to use knowledge architectures, the basic structures and designs that underlie all of the parts of an effective information system, to best advantage. Drawing on 40 years of work with a variety of organizations, Bedford explains that failure to understand the structure behind any given system can be the difference between an effective solution and a significant and costly failure. Demonstrating that the information user environment has shifted significantly in the past 20 years, the book explains that end users now expect designs and behaviors that are much closer to the way they think, work, and act. Acknowledging how important it is that those responsible for developing an information or knowledge management system understand knowledge structures, the book goes beyond a traditional library science perspective and uses case studies to help translate the abstract and theoretical to the practical and concrete. Explaining the structures in a simple and intuitive way and providing examples that clearly illustrate the challenges faced by a range of different organizations, Knowledge Architectures is essential reading for those studying and working in library and information science, data science, systems development, database design, and search system architecture and engineering.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
Sustainable Entrepreneurship is nowadays considered as a discipline at the cross-roads of many others. This book describes recent cases, techniques and tools proposed for leaders, entrepreneurs, and practitioners who are involved and responsible for making strategic decisions in their companies and aiming at sustainable development. This book highlights the use of new business models/methods that can be employed by organizations and researchers to save millions of dollars, to enhance the economic growth, as well as to resolve environmental and social issues, via sustainable networks, renewal energy distribution, and social/green entrepreneurship. It will provide a comprehensive discussion of practical techniques, like Machine Learning, Robotics, Photovoltaic solar energy, in the field of renewable energy, and other digital tools, such as digital marketing, crowdsourcing platforms, and digital currency. Meanwhile, it will enlighten the way for entrepreneurs and decision makers by helping them to learn how to grow their business. The focus will be on how to benefit from these techniques to develop sustainable and renewable energy-based projects, as well as digitalized new ventures. The book walks the reader through the latest emerging trends in digitalization that can support practitioners, managers, entrepreneurs, and researchers to help them appreciate the application of sustainable solutions in various functional domains.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
Computing systems are becoming highly complex, harder to understand, and therefore more prone to failure. Where such systems control aircraft for example, system failure could have disastrous consequences. It is important therefore that we are able to employ mathematical techniques to specify the behavior of critical systems. This thesis uses the theory of Communicating Sequential Processes to show how a real-time system (a system that maintains a continuous interaction with its environment) may be specified. Included is a case study in which a local area network protocol is described at two levels of abstraction, and a general method for structuring CSP descriptions of layered protocols is given. The research contained here represents the very latest work on the specification and verification of real-time systems.
Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT system
Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming. With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.
This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.
This book focuses on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It includes contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book addresses the complete functional framework and workflow in IoT-enabled RFID systems and explores basic and high-level concepts. It is based on the latest technologies and covers the major challenges, issues, and advances in the field. It presents data acquisition and case studies related to data-intensive technologies in RFID-based IoT and includes WSN-based systems and their security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and advanced aspects of IoT-based RFID-related issues. This book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and find solutions that have been adopted in the fields of IoT and analytics.
This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.
Longitudinal studies have traditionally been seen as too cumbersome and labor-intensive to be of much use in research on Human-Computer Interaction (HCI). However, recent trends in market, legislation, and the research questions we address, have highlighted the importance of studying prolonged use, while technology itself has made longitudinal research more accessible to researchers across different application domains. Aimed as an educational resource for graduate students and researchers in HCI, this book brings together a collection of chapters, addressing theoretical and methodological considerations, and presenting case studies of longitudinal HCI research. Among others, the authors: discuss the theoretical underpinnings of longitudinal HCI research, such as when a longitudinal study is appropriate, what research questions can be addressed and what challenges are entailed in different longitudinal research designs reflect on methodological challenges in longitudinal data collection and analysis, such as how to maintain participant adherence and data reliability when employing the Experience Sampling Method in longitudinal settings, or how to cope with data collection fatigue and data safety in applications of autoethnography and autobiographical design, which may span from months to several years present a number of case studies covering different topics of longitudinal HCI research, from "slow technology", to self-tracking, to mid-air haptic feedback, and crowdsourcing.
Today, it is not uncommon for practices and hospitals to be on their second or third EHR and/or contemplating a transition from the traditional on-premise model to a cloud-based system. As a follow-up to Complete Guide and Toolkit to Successful EHR Adoption ( (c)2011 HIMSS), this book builds on the best practices of the first edition, fast-forwarding to the latest innovations that are currently leveraged and adopted by providers and hospitals. We examine the role that artificial intelligence (AI) is now playing in and around EHR technology. We also address the advances in analytics and deep learning (also known as deep structured or hierarchical learning) and explain this topic in practical ways for even the most novice reader to comprehend and apply. The challenges of EHR to EHR migrations and data conversions will also be covered, including the use of the unethical practice of data blocking used as a tactic by some vendors to hold data hostage. Further, we explore innovations related to interoperability, cloud computing, cyber security, and electronic patient/consumer engagement. Finally, this book will deal with what to do with aging technology and databases, which is an issue rarely considered in any of the early publications on healthcare technology. What is the proper way to retire a legacy system, and what are the legal obligations of data archiving? Though a lot has changed since the 2011 edition, many of the fundamentals remain the same and will serve as a foundation for the next generation of EHR adopters and/or those moving on to their second, third, fourth, and beyond EHRs. |
You may like...
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
|