|
Books > Computing & IT
The representation of abstract data and ideas can be a difficult
and tedious task to handle when learning new concepts; however, the
advances in emerging technology have allowed for new methods of
representing such conceptual data. Information Visualization
Techniques in the Social Sciences and Humanities is a critical
scholarly resource that examines the application of information
visualization in the social sciences and humanities. Featuring
coverage on a broad range of topics such as social network
analysis, complex systems, and visualization aesthetics, this book
is geared towards professionals, students, and researchers seeking
current research on information visualization.
The authors' analyses of innovations in social and socio-emotional
education contribute to systematizing distance learning to
represent children's and young people's socio-emotional competences
and to model how they can be developed. Low social capital and poor
mental health, a key feature of the COVID-19 pandemic, are leading
to an increasing number of suicides among youth and adolescents.
These factors, reflecting the changing social-emotional feelings of
children, adolescents and teachers in schools during COVID-19,
require a new vision and support for learning practices. Modelling
a SEEP in the authors' vision would integrate family support,
support for every teacher and child, success stories in the
development of emotion therapy, and integrated practice in social
pedagogical institutions, private initiatives and non-governmental
organizations (NGOs).
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Emerging technologies continue to affect a variety of industries,
making processes more effective and efficient. However, they also
impact society by promoting opportunities to encourage social
change and socioeconomic advancement. Blockchain is one that is
already influencing third world countries and disrupting the globe.
Blockchain Technology for Global Social Change is an essential
research publication that provides insight into advancements being
made in blockchain and some potential applications of the
technology that can improve the lives of individuals in emerging
markets. This publication covers a range of topics such as digital
government, health systems, and urbanization and is ideal for
policymakers, academicians, researchers, sociologists, government
officials, economists, and financial experts seeking current and
relevant research on evolving blockchain technologies.
The complex world of online piracy and peer-to-peer file sharing is
skillfully condensed into an easy-to-understand guide that provides
insight into the criminal justice approach to illegal file sharing,
while offering guidance to parents and students who have concerns
about potential legal action in response to file-sharing
activities. While the actual impact of digital piracy is nearly
impossible to precisely calculate, the threat of financial damage
from illegal peer-to-peer (P2P) file sharing to the world's
highest-grossing entertainment firms (and even entire industries!)
has garnered attention from government, industry, and academic
leaders and criminal justice professionals. Oftentimes, those
providing access to computers and file sharing
capabilities-parents, schools, libraries-don't know about or
understand these activities and, therefore, put themselves and
their families at risk for criminal and civil prosecution. This
work describes the technological, legal, social, and ethical facets
of illegal peer-to-peer file sharing. Geared toward parents,
teachers, librarians, students, and any other computer user engaged
in file sharing, this book will help readers to understand all
forms of traditional and digital copyright violations of protected
music, movies, and software. To date over 18,000 P2P users have
been sued by the Recording Industry Association of America (RIAA).
Most of these users have been college students and parents of
high-school students. While word of these law suits are spreading,
and many parents fear that their children may be using a family
computer to illegally download and share copyrighted works, few
supervising adults have the technical knowledge needed to determine
whether and to what extent pirating may be occurring via a computer
and Internet connection they are legally responsible for.
Additionally, while P2P networks are filled with millions of users
with billions of copyrighted files, few users understand the ways
in which they are illegally using computers and other mobile
electronic devices to download protected content. While describing
both technical and social issues, this book primarily focuses on
the social aspects of illegal file sharing, and provides technical
concepts at a general level. Fisk skillfully condenses the complex
nature of file sharing systems into an easy-to-understand guide,
provides insight into the criminal justice approach to illegal file
sharing, and offers guidance to parents and students who have
concerns about potential legal action in response to file sharing
activities.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
|
You may like...
A Guide To SQL
Philip Pratt, Hassan Afyouni, …
Paperback
R1,253
R1,119
Discovery Miles 11 190
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|