![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
Due to unawareness of the development cycle of systems from its conceptualization to implementation, almost half of corporate IS projects are delayed or abandoned before completion. The introduction of system analysis and design concepts and their implementations have proven to significantly enhance the success rate of system delivery.""The Handbook of Research on Modern Systems Analysis and Design Technologies and Applications"" provides a compendium of terms, definitions, and explanations of concepts in various areas of systems and design, as well as a vast collection of cutting-edge research articles from the field's leading experts that, together, convey the current state of knowledge on systems analysis and design. Further, this incisive reference source fully contextualizes the best contemporary understanding of current and emerging tools by guiding readers through the evolution of systems analysis and design practices.
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
This it the first technical reference book available on the PSoC,
and it offers the most comprehensive combination of technical data,
example code, and descriptive prose you ll find anywhere.
Cases on Progressions and Challenges in ICT Utilization for Citizen-Centric Governance is a collection of case studies on the advancements and challenges of information technology in the involvements of citizens with the government. With contributions from authors around the world, this compilation is relevant to researchers, academics, and practitioners who wish to stay informed of the new world of technology in the government.
Yours can be the first APPLE house on the block! Learn how to save time and money by using your Apple II computer to control your home: the security, lights, temperature, telephone, and much more. With John Blankenship's system of software and hardware, your house can accept verbal commands and respond with its own voice. It does not need human instruction and performs many useful tasks on its own. Once you get used to an intelligent house, you will wonder how you ever got along without one. Even though devices featured in The Apple House can be purchased, the author shows how you can save money by building some from scratch. He also points out that you can substitute equipment you already own because of the system's modularity. Although written with an Apple II computer in mind, the principles discussed can easily be transferred to other computer systems.
Agent technologies are believed to be one of the most promising tools to conduct business via networks and the Web in an autonomous, intelligent, and efficient way. The ever-expanding application of business automation necessitates clarification of the methods and techniques of agent-based electronic business systems.
As the healthcare industry continues to expand, it must utilize technology to ensure efficiencies are maintained. Healthcare needs to move in a direction where computational methods and algorithms can relieve the routine work of medical doctors, leaving them more time to carry out more important and skilled tasks such as surgery. Computational Methods and Algorithms for Medicine and Optimized Clinical Practice discusses some of the most interesting aspects of theoretical and applied research covering complementary facets of computational methods and algorithms to achieve greater efficiency and support medical personnel. Featuring research on topics such as healthcare reform, artificial intelligence, and disease detection, this book will particularly appeal to medical professionals and practitioners, hospitals, administrators, students, researchers, and academicians.
Services both as a science and as a practice in today's corporate environments are suffering from many suboptimalities. A compromise of both organizational and technological aspects provides the answer to many pitfalls and shortcomings currently faced. ""Service Science for Socio-Economical and Information Systems Advancement: Holistic Methodologies"" sheds light on a variety of issues and shortcomings of service-based economies by analyzing situations and modern practices that improve the way researchers, field practitioners, and ICT professionals account for their core business service-related activities. This defining body of research provides a broad perspective of how to improve service creation, production, and management of assets.
This book presents a variety of techniques designed to enhance and empower multi-disciplinary and multi-institutional machine learning research in healthcare informatics. It is intended to provide a unique compendium of current and emerging machine learning paradigms for healthcare informatics, reflecting the diversity, complexity, and depth and breadth of this multi-disciplinary area.
Not only have educators and trainers alike begun to harness the power of instructional technology and human performance techniques, but now businesses and industries have incorporated these technologies for training development and performance improvement. ""The Handbook of Research on Human Performance and Instructional Technology"" provides theoretical understanding of the essential link between education, training development, organization development, performance improvement, and instructional technology. An innovative publication useful to worldwide businesses, industry, schools, and higher academic institutions, this Handbook of Research is instrumental in providing the latest knowledge related to instructional technology and human performance in order to meet the needs and challenges of tomorrow.
In the past, project success has been defined too narrowly as simply meeting time and cost constraints for a given scope of work. However, in order for an IT project to be completely successful that basic definition of success needs to be extended to include meeting return on investment expectations, product quality, stakeholder satisfaction, security, maintainability and adaptability. Also, the formal methods and tools of the project management discipline need to evolve to address the changes in modern software engineering and our hightech global workplaces. With this broader and more appropriate definition of success, IT project management techniques and tools can be modernized, extended, and otherwise focused to be more effective. ""Project Management for Modern Information Systems"" describes and illustrates practices, procedures, methods, and tools for IT project management that address this extended definition of project success for modern times.
In this technological era, failure to address application-layer fault-tolerance, a key ingredient to crafting truly dependable computer services, leaves the door open to unfortunate consequences in quality of service.""Application-Layer Fault-Tolerance Protocols"" increases awareness of the need for application-layer fault-tolerance (ALFT) through introduction of problems and qualitative analysis of solutions. A necessary read for researchers, practitioners, and students in dependability engineering, this book collects emerging research to offer a systematic, critical organization of the current knowledge in ALFT.
"Birthday Tracker and Journal" is a special place to record important birthdays for family, friends, and others, month by month. It includes an informative introduction on birthday celebration traditions and lists birthday birthstones and flowers by month for gift-giving considerations. There is also a place to keep track of birthday cards or presents that you send, or receive, lined blank pages for your birthday reflections, and a place for birthday photos. Color illustrations by author/artist Jan Yager appear throughout. This unique book is a perfect gift or for one's own use to organize this special birthday information.
This book systematically presents the operating principles and technical characteristics of the main radio navigating systems (RNSs) that make it possible to adequately evaluate the corresponding scratch indexes and levels of air safety for air vehicles, the chief concern of the International Civil Aviation Organization (ICAO). The book discusses how RNS systems substantially determine navigation accuracy and reliability, and therefore air safety; in addition, it presents practical solutions to problems arising in the operation and development of RNS systems.
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
Tired of writing all your user IDs and passwords on sticky notes and pieces of scrap paper? This convenient address book stores them all in one place. This is not your typical address book There are also special sections for online banking info and one for storing e-mail addresses. |
You may like...
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
|