![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Cell phone apps share location information; software companies store user data in the cloud; biometric scanners read fingerprints; employees of some businesses have microchips implanted in their hands. In each of these instances we trade a share of privacy or an aspect of identity for greater convenience or improved security. What Robert M. Pallitto asks in Bargaining with the Machine is whether we are truly making such bargains freely - whether, in fact, such a transaction can be conducted freely or advisedly in our ever more technologically sophisticated world. Pallitto uses the social theory of bargaining to look at the daily compromises we make with technology. Specifically, he explores whether resisting these 'bargains' is still possible when the technologies in question are backed by persuasive, even coercive, corporate and state power. Who, he asks, is proposing the bargain? What is the balance of bargaining power? What is surrendered and what is gained? And are the perceived and the actual gains and losses the same - that is, what is hidden? At the center of Pallitto's work is the paradox of bargaining in a world of limited agency. Assurances that we are in control are abundant whether we are consumers, voters, or party to the social contract. But when purchasing goods from a technological behemoth like Amazon, or when choosing a candidate whose image is crafted and shaped by campaign strategists and media outlets, how truly free, let alone informed, are our choices? The tension between claims of agency and awareness of its limits is the site where we experience our social lives - and nowhere is this tension more pronounced than in the surveillance society. This book offers a cogent analysis of how that complex, contested, and even paradoxical experience arises as well as an unusually clear and troubling view of the consequential compromises we may be making.
5G NR: The Next Generation Wireless Access Technology, Second Edition, follows the authors' highly celebrated books on 3G and 4G and provides a new level of insight into 5G NR. After background discussion of 5G, including requirements, spectrum aspects, and the standardization timeline, all technology features of the first phase of NR are described in detail. The book covers the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects, and co-existence and interworking with LTE. The book provides a good foundation in NR and different NR technology components, giving insight into why a certain solution has been selected. This second edition is updated to reflect the latest developments in Release 16 and includes brand new chapters on: NR in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in Rel-16; industrial IoT; IIoT and referring to the URLLC enhancements for PDCCH; RIM/CL; and positioning. Also included are the key radio-related requirements of NR; design principles; technical features of basic NR transmission structure-showing where it was inherited from LTE, where it deviates from it, and the reasons why- NR multi-antenna transmission functionality; detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information; random access and paging; LTE/NR co-existence in the same spectrum and the benefits of their interworking as one system; and different aspects of mobility in NR. RF requirements for NR are described for BS and UE, the legacy bands, and for the new mm-wave bands.
Based on scientific understanding and empirical evidence of how humans understand and interact with robotic and autonomous systems, the author reviews the concerns that have been raised around the deployment of AI and robots in human society, and the potential for disruption and harm. He explains why transparency ought to be a fundamental design consideration for Human Computer Interaction (HCI) and artificial intelligent systems. Starting with a survey of global research in the field and what transparency means in the wider context of trust, control and ethics, the author then introduces a transparent robot control architecture, and the impact of transparency using real-time displays. He presents a case study of a muttering robot, and covers current and upcoming standards for transparency, as well as future perspectives for the design, manufacture and operation of autonomous robotic systems. Specifically, chapters cover transparency in the wider context of trust; a transparent robot control architecture, the impact of transparency using real-time displays, transparency using audio - the Muttering Robot, the effects of appearance on transparency, synthesis and further work, and several examples of Instinct reactive planner commands. This book provides key insights into transparency in robots and autonomous systems for industry, academic researchers and engineers working on intelligent autonomous system design, human robot interaction, AI, and machine ethics. It also offers points of interest for professionals developing governmental or organisational policies and standards for the design of intelligent autonomous and AI systems, and government and standard bodies working in the emerging applications of AI.
Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.
Molecular simulation allows researchers unique insight into the structures and interactions at play in fluids. Since publication of the first edition of Molecular Simulation of Fluids, novel developments in theory, algorithms and computer hardware have generated enormous growth in simulation capabilities. This 2nd edition has been fully updated and expanded to highlight this recent progress, encompassing both Monte Carlo and molecular dynamic techniques, and providing details of theory, algorithms and both serial and parallel implementations. Beginning with a clear introduction and review of theoretical foundations, the book goes on to explore intermolecular potentials before discussing the calculation of molecular interactions in more detail. Monte Carlo simulation and integrators for molecular dynamics are then discussed further, followed by non-equilibrium molecular dynamics and molecular simulation of ensembles and phase equilibria. The use of object-orientation is examined in detail, with working examples coded in C++. Finally, practical parallel simulation algorithms are discussed using both MPI and GPUs, with the latter coded in CUDA. Drawing on the extensive experience of its expert author, Molecular Simulation of Fluids: Theory, Algorithms, Object-Orientation, and Parallel Computing 2nd Edition is a practical, accessible guide to this complex topic for all those currently using, or interested in using, molecular simulation to study fluids.
DIRECTING, DIALOGUE AND ACTING From Richard Williams' The Animator's Survival Kit comes key chapters in mini form. The Animator's Survival Kit is the essential tool for animators. However, sometimes you don't want to carry the hefty expanded edition around with you to your college or studio if you're working on just one aspect of it that day. The Animation Minis take some of the most essential chapters and make them available in smaller, lightweight, hand-bag/backpack size versions. Easy to carry. Easy to study. This Mini focuses on Directing, Dialogue and Acting. As a director, whatever your idea is, you want to put it over, so the main thing with directing is to be clear - very clear. The Director's job is to hold everything together so that the animator can give the performance. Richard Williams shows how that performance can be achieved with flexibility and contrast. With Acting and Dialogue, the temptation is to try to do everything at once - Williams' advice: do one thing at a time.
The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally. The book can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. The reader learns key elements of investigative interviewing, such as human psychology, proper interview preparation, tactical concepts, controlling the interview environment, and evaluating the evidence obtained from the interview. New to this edition will be coverage of Open Source Intelligence (OSINT) tools, workplace investigations, fraud investigations and the role of audit. Larry Fennelly joins original author Inge Sebyan Black, both well-known and respected in the field, providing everything an interviewer needs to know in order to conduct successful interviews with integrity and within the law. Written for anyone involved in investigative interviewing.
The key parameter that needs to be considered when planning the management of resources in futuristic wireless networks is a balanced approach to resource distribution. A balanced approach is necessary to provide an unbiased working environment for the distribution, sharing, allocation, and supply of resources among the devices of the wireless network. Equal resource distribution also maintains balance and stability between the operations of communication systems and thus improves the performance of wireless networks. Managing Resources for Futuristic Wireless Networks is a pivotal reference source that presents research related to the control and management of key parameters of bandwidth, spectrum sensing, channel selection, resource sharing, and task scheduling, which is necessary to ensure the efficient operation of wireless networks. Featuring topics that include vehicular ad-hoc networks, resource management, and the internet of things, this publication is ideal for professionals and researchers working in the field of networking, information and knowledge management, and communication sciences. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of work communities and environments.
The field of healthcare is seeing a rapid expansion of technological advancement within current medical practices. The implementation of technologies including neural networks, multi-model imaging, genetic algorithms, and soft computing are assisting in predicting and identifying diseases, diagnosing cancer, and the examination of cells. Implementing these biomedical technologies remains a challenge for hospitals worldwide, creating a need for research on the specific applications of these computational techniques. Deep Neural Networks for Multimodal Imaging and Biomedical Applications provides research exploring the theoretical and practical aspects of emerging data computing methods and imaging techniques within healthcare and biomedicine. The publication provides a complete set of information in a single module starting from developing deep neural networks to predicting disease by employing multi-modal imaging. Featuring coverage on a broad range of topics such as prediction models, edge computing, and quantitative measurements, this book is ideally designed for researchers, academicians, physicians, IT consultants, medical software developers, practitioners, policymakers, scholars, and students seeking current research on biomedical advancements and developing computational methods in healthcare.
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.
Digital controllers are part of nearly all modern personal, industrial, and transportation systems. Every senior or graduate student of electrical, chemical, or mechanical engineering should therefore be familiar with the basic theory of digital controllers. This new text covers the fundamental principles and applications of digital control engineering, with emphasis on engineering design. Fadali and Visioli cover analysis and design of digitally controlled systems and describe applications of digital control in a wide range of fields. With worked examples and Matlab applications in every chapter and many end-of-chapter assignments, this text provides both theory and practice for those coming to digital control engineering for the first time, whether as a student or practicing engineer.
Computer vision and machine intelligence paradigms are prominent in the domain of medical image applications, including computer assisted diagnosis, image guided radiation therapy, landmark detection, imaging genomics, and brain connectomics. Medical image analysis and understanding are daunting tasks owing to the massive influx of multi-modal medical image data generated during routine clinal practice. Advanced computer vision and machine intelligence approaches have been employed in recent years in the field of image processing and computer vision. However, due to the unstructured nature of medical imaging data and the volume of data produced during routine clinical processes, the applicability of these meta-heuristic algorithms remains to be investigated. Advanced Machine Vision Paradigms for Medical Image Analysis presents an overview of how medical imaging data can be analyzed to provide better diagnosis and treatment of disease. Computer vision techniques can explore texture, shape, contour and prior knowledge along with contextual information, from image sequence and 3D/4D information which helps with better human understanding. Many powerful tools have been developed through image segmentation, machine learning, pattern classification, tracking, and reconstruction to surface much needed quantitative information not easily available through the analysis of trained human specialists. The aim of the book is for medical imaging professionals to acquire and interpret the data, and for computer vision professionals to learn how to provide enhanced medical information by using computer vision techniques. The ultimate objective is to benefit patients without adding to already high healthcare costs.
This book is a guide to the combination of the Internet of Things (IoT) and the Semantic Web, covering a variety of tools, technologies and applications that serve the myriad needs of the researchers in this field. It provides a multi dimensional view of the concepts, tools, techniques and issues that are involved in the development of semantics for the Web of Things. The various aspects studied in this book include Multi-Model Multi-Platform (SHM3P) databases for the IoT, clustering techniques for discovery services for the semantic IoT, dynamic security testing methods for the Semantic Web of Things, Semantic Web-enabled IoT integration for a smart city, IoT security issues, the role of the Semantic Web of Things in Industry 4.0, the integration of the Semantic Web and the IoT for e-health, smart healthcare systems to monitor patients, Semantic Web-based ontologies for the water domain, science fiction and searching for a job.
3D image reconstruction is used in many fields, such as medicine, entertainment, and computer science. This highly demanded process comes with many challenges, such as images becoming blurry by atmospheric turbulence, getting snowed with noise, or becoming damaged within foreign regions. It is imperative to remain well-informed with the latest research in this field. Recent Advances in 3D Imaging, Modeling, and Reconstruction is a collection of innovative research on the methods and common techniques of image reconstruction as well as the accuracy of these methods. Featuring coverage on a wide range of topics such as ray casting, holographic techniques, and machine learning, this publication is ideally designed for graphic designers, computer engineers, medical professionals, robotics engineers, city planners, game developers, researchers, academicians, and students.
Cultural tourism, domestic and international, is comprised of travel that takes people out of their usual environments and focuses on activities that are related to the cultural aspects of an area. Rapid progress in technology, especially the advancement of mobile applications, has changed various aspects of travel, especially in areas such as transportation. Cultural Tourism in the Wake of Web Innovation: Emerging Research and Opportunities is an essential scholarly book that examines revolutionary changes taking place in the field of cultural tourism that are a result of the applications of web-based and other information technologies including Web 2.0 innovations, locational technologies, and digital imaging. It features a wide range of topics such as economic development, mobile applications, and green development, and is intended for use by hotel management, travel agents, event organizers and planners, airline managers, academicians, researchers, students, and professionals in the tourism and hospitality industry.
The internet of things (IoT) has emerged as a trending technology that is continually being implemented into various practices within the field of engineering and science due to its versatility and various benefits. Despite the levels of innovation that IoT provides, researchers continue to search for networks that maintain levels of sustainability and require fewer resources. A network that measures up to these expectations is Narrowband IoT (NBIoT), which is a low power wide area version of IoT networks and is suitable for larger projects. Engineers and other industry professionals are in need of in-depth knowledge on this growing technology and its various applications. Principles and Applications of Narrowband Internet of Things (NBIoT) is an essential reference source that provides an in-depth understanding on the recent advancements of NBIoT as well as the crucial roles of emerging low power IoT networks in various regions of the world. Featuring research on topics such as security monitoring, sustainability, and cloud infrastructure, this book is ideally designed for developers, engineers, practitioners, researchers, students, managers, and policymakers seeking coverage on the large-scale deployment and modern applications of NBIoT.
Computational Retinal Image Analysis: Tools, Applications and Perspectives gives an overview of contemporary retinal image analysis (RIA) in the context of healthcare informatics and artificial intelligence. Specifically, it provides a history of the field, the clinical motivation for RIA, technical foundations (image acquisition modalities, instruments), computational techniques for essential operations, lesion detection (e.g. optic disc in glaucoma, microaneurysms in diabetes) and validation, as well as insights into current investigations drawing from artificial intelligence and big data. This comprehensive reference is ideal for researchers and graduate students in retinal image analysis, computational ophthalmology, artificial intelligence, biomedical engineering, health informatics, and more.
Machine learning and optimization techniques are revolutionizing our world. Other types of information technology have not progressed as rapidly in recent years, in terms of real impact. The aim of this book is to present some of the innovative techniques in the field of optimization and machine learning, and to demonstrate how to apply them in the fields of engineering. Optimization and Machine Learning presents modern advances in the selection, configuration and engineering of algorithms that rely on machine learning and optimization. The first part of the book is dedicated to applications where optimization plays a major role, and the second part describes and implements several applications that are mainly based on machine learning techniques. The methods addressed in these chapters are compared against their competitors, and their effectiveness in their chosen field of application is illustrated.
|
You may like...
A Frequency Dictionary of Dutch - Core…
Carole Tiberius, Tanneke Schoonheim
Paperback
R1,561
Discovery Miles 15 610
XploRe: An Interactive Statistical…
Wolfgang Hardle, Sigbert Klinke, …
Hardcover
R1,483
Discovery Miles 14 830
Research Software Engineering with…
Damien Irving, Kate Hertweck, …
Hardcover
R4,397
Discovery Miles 43 970
A Reference Grammar of Spanish
R.E. Batchelor, Miguel Angel San Jose
Hardcover
R3,035
Discovery Miles 30 350
|