Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Discusses the design goals and key features switch/router manufacturers consider when designing their products Explains the design and architectural considerations, as well as the typical processes and steps used to build practical switch/routers Describes the components of a switch/router that are used in configuring, managing, and monitoring it Discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design Describes typical networking applications of switch/routers, particularly, in enterprise and Internet service provider (ISP) networks
Introduces the GUHA method of mechanizing hypothesis formation as a data mining tool. Presents examples of data mining with enhanced association rules, histograms, contingency tables and action rules. Provides examples of data mining for exception rules and examples of subgroups discovery. Outlines possibilities of GUHA in business intelligence and big data. Overviews related theoretical results and challenges related to mechanizing hypothesis formation.
The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.
Introduction to Quantum Natural Language Processing. Overview of Leadership and AI. The Age of Quantum Superiority. Challenges To Today's Leadership. AI-induced Strategic Implementation and Organizational Performance.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.
Classifies the optimization problems of the ports into five scheduling decisions. For each decision, it supplies an overview, formulates each of the decisions as constraint satisfaction and optimization problems, and then covers possible solutions, implementation, and performance. Part One explores the various optimization problems in modern container terminals, while Part Two details advanced algorithms for the minimum cost flow (MCF) problem and for the scheduling problem of AGVs in ports. A complete package that can help readers address the scheduling problems of AGVs in ports.
1) Provides the reader with self-study problems to solve, such as 2D models to model in 3D using CATIA 2) Includes access to video tutorials for further understanding of 3D technical modelling 3) Covers topics including programming, automation and scripting 4) Provides examples of realistic and commonly encountered examples, rather than complex theory
Reviews the literature of the Moth-Flame Optimization algorithm; Provides an in-depth analysis of equations, mathematical models, and mechanisms of the Moth-Flame Optimization algorithm; Proposes different variants of the Moth-Flame Optimization algorithm to solve binary, multi-objective, noisy, dynamic, and combinatorial optimization problems; Demonstrates how to design, develop, and test different hybrids of Moth-Flame Optimization algorithm; Introduces several applications areas of the Moth-Flame Optimization algorithm focusing in sustainability.
Provides an overview of the role engineering plays in climate change and environmental pollution Presents an updated overview of Green Engineering focusing on green technology Innovations Explores energy management strategies Discusses green communication technologies, green computing technologies, green smart buildings, green smart lighting, green smart mobility management, fuel-efficient transportation, paperless offices, energy efficiency measures, waste recycling, etc. Identifies the development of sustainable plans and programs at the urban level within the current legislative framework
Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.
This book discusses an important area of numerical optimization, called interior-point method. This topic has been popular since the 1980s when people gradually realized that all simplex algorithms were not convergent in polynomial time and many interior-point algorithms could be proved to converge in polynomial time. However, for a long time, there was a noticeable gap between theoretical polynomial bounds of the interior-point algorithms and efficiency of these algorithms. Strategies that were important to the computational efficiency became barriers in the proof of good polynomial bounds. The more the strategies were used in algorithms, the worse the polynomial bounds became. To further exacerbate the problem, Mehrotra's predictor-corrector (MPC) algorithm (the most popular and efficient interior-point algorithm until recently) uses all good strategies and fails to prove the convergence. Therefore, MPC does not have polynomiality, a critical issue with the simplex method. This book discusses recent developments that resolves the dilemma. It has three major parts. The first, including Chapters 1, 2, 3, and 4, presents some of the most important algorithms during the development of the interior-point method around the 1990s, most of them are widely known. The main purpose of this part is to explain the dilemma described above by analyzing these algorithms' polynomial bounds and summarizing the computational experience associated with them. The second part, including Chapters 5, 6, 7, and 8, describes how to solve the dilemma step-by-step using arc-search techniques. At the end of this part, a very efficient algorithm with the lowest polynomial bound is presented. The last part, including Chapters 9, 10, 11, and 12, extends arc-search techniques to some more general problems, such as convex quadratic programming, linear complementarity problem, and semi-definite programming.
This book provides a collection of papers from the Ninth Workshop on Computing: Theory and Practice, WCTP 2019 devoted to theoretical and practical approaches to computation, which was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, the University of the Philippines Diliman, and De La Salle University. The proceedings provide a broad overview of recent research trends in computer science research in Asia, particularly in these two countries. The papers included in the proceedings focus on both theoretical and practical aspects of computations, such as programming language theory, modeling of software systems, applications of machine learning, empathic computing, and various applications of information technology.
Data Science for Effective Healthcare Systems has a prime focus on the importance of data science in the healthcare domain. Various applications of data science in the health care domain have been studied to find possible solutions. In this period of COVID-19 pandemic data science and allied areas plays a vital role to deal with various aspect of health care. Image processing, detection & prevention from COVID-19 virus, drug discovery, early prediction, and prevention of diseases are some thrust areas where data science has proven to be indispensable. Key Features: The book offers comprehensive coverage of the most essential topics, including: Big Data Analytics, Applications & Challenges in Healthcare Descriptive, Predictive and Prescriptive Analytics in Healthcare Artificial Intelligence, Machine Learning, Deep Learning and IoT in Healthcare Data Science in Covid-19, Diabetes, Coronary Heart Diseases, Breast Cancer, Brain Tumor The aim of this book is also to provide the future scope of these technologies in the health care domain. Last but not the least, this book will surely benefit research scholar, persons associated with healthcare, faculty, research organizations, and students to get insights into these emerging technologies in the healthcare domain.
the first book on Unity for embedded systems design and robotics a comprehensive step-by-step guide packed with illustrations each chapter contains a real project
Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.
Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: * Discusses the recent advancements in Digital Forensics and Cybersecurity * Reviews detailed applications of Digital Forensics for real-life problems * Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches * Includes case studies that will be helpful for researchers * Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. * Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies
Teaching at Scale explores the characteristics and parameters of large-scale online learning by identifying, in its perceived drawbacks, a wealth of educational opportunities in disguise. Scalable learning platforms have exploded in popularity over recent years, with MOOCS (massive open online courses), online degree programs, informal learning communities, and alternative credentials all drawing significant enrollments. But, as many educators are asking, are the challenges to delivering education at scale too great and the compromises too many? This book guides instructors to leverage their complex responsibilities-open-ended assessments at scale, individuated feedback to students, academic integrity in less controlled environments, and more-into significant assets. Informed by real-world institutional experience as well as key research in cognitive science and the learning sciences, each chapter provides practical strategies for educators and administrators seeking to solve problems and fulfill the high-quality, broad-access potential of large-scale instruction for lifelong learners. |
You may like...
Discovering Computers (c)2017
Mark Frydenberg, Misty Vermaat, …
Paperback
(3)
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|