![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
Reliability of Software Intensive Systems
Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources - a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation.
This book explores the ways in which the broad range of technologies that make up the smart city infrastructure can be harnessed to incorporate more playfulness into the day-to-day activities that take place within smart cities, making them not only more efficient but also more enjoyable for the people who live and work within their confines. The book addresses various topics that will be of interest to playable cities stakeholders, including the human-computer interaction and game designer communities, computer scientists researching sensor and actuator technology in public spaces, urban designers, and (hopefully) urban policymakers. This is a follow-up to another book on Playable Cities edited by Anton Nijholt and published in 2017 in the same book series, Gaming Media and Social Effects.
This book provides an overview of the problems involved in engineering scalable, elastic, and cost-efficient cloud computing services and describes the CloudScale method - a description of rescuing tools and the required steps to exploit these tools. It allows readers to analyze the scalability problem in detail and identify scalability anti-patterns and bottlenecks within an application. With the CloudScale method, software architects can analyze both existing and planned IT services. The method allows readers to answer questions like: * With an increasing number of users, can my service still deliver acceptable quality of service? * What if each user uses the service more intensively? Can my service still handle it with acceptable quality of service? * What if the number of users suddenly increases? Will my service still be able to handle it? * Will my service be cost-efficient? First the book addresses the importance of scalability, elasticity, and cost-efficiency as vital quality-related attributes of modern cloud computing applications. Following a brief overview of CloudScale, cloud computing applications are then introduced in detail and the aspects that need to be captured in models of such applications are discussed. In CloudScale, these aspects are captured in instances of the ScaleDL modeling language. Subsequently, the book describes the forward engineering part of CloudScale, which is applicable when developing a new service. It also outlines the reverse and reengineering parts of CloudScale, which come into play when an existing (legacy) service is modified. Lastly, the book directly focuses on the needs of both business-oriented and technical managers by providing guidance on all steps of implementing CloudScale as well as making decisions during that implementation. The demonstrators and reference projects described serve as a valuable starting point for learning from experience. This book is meant for all stakeholders interested in delivering scalable, elastic, and cost-efficient cloud computing applications: managers, product owners, software architects and developers alike. With this book, they can both see the overall picture as well as dive into issues of particular interest.
With the advent of the World Wide Web, electronic commerce has revolutionized traditional commerce, boosting sales and facilitating exchanges of merchandise and information. The emergence of wireless and mobile networks has made possible the introduction of electronic commerce to a new application and research area: mobile commerce. Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies offers 22 outstanding chapters from 71 world-renowned scholars and IT professionals covering themes such as handheld computing for mobile commerce, handheld computing research and technologies, wireless networks and handheld/mobile security, and handheld images and video. It includes research and development results of lasting significance in the theory, design, implementation, analysis, and application of handheld computing. This book is essential for IT students, researchers, and professionals seeking to better understand handheld devices and concepts, thereby producing more useful and effective handheld applications and products.
This volume presents the peer-reviewed proceedings of the international conference Imaging, Vision and Learning Based on Optimization and PDEs (IVLOPDE), held in Bergen, Norway, in August/September 2016. The contributions cover state-of-the-art research on mathematical techniques for image processing, computer vision and machine learning based on optimization and partial differential equations (PDEs). It has become an established paradigm to formulate problems within image processing and computer vision as PDEs, variational problems or finite dimensional optimization problems. This compact yet expressive framework makes it possible to incorporate a range of desired properties of the solutions and to design algorithms based on well-founded mathematical theory. A growing body of research has also approached more general problems within data analysis and machine learning from the same perspective, and demonstrated the advantages over earlier, more established algorithms. This volume will appeal to all mathematicians and computer scientists interested in novel techniques and analytical results for optimization, variational models and PDEs, together with experimental results on applications ranging from early image formation to high-level image and data analysis.
Online gaming is widely popular and gaining more user attention every day. Computer game industries have made considerable growth in terms of design and development, but the scarcity of hardware resources at player or client side is a major pitfall for the latest high-end multimedia games. Cloud gaming is one proposed solution, allowing the end-user to play games using a variety of platforms with less demanding hardware requirements. Emerging Technologies and Applications for Cloud-Based Gaming explores the opportunities for the gaming industry through the integration of cloud computing. Focusing on design methodologies, fundamental architectures, and the end-user experience, this publication is an essential reference source for IT specialists, game developers, researchers, and graduate-level students.
Creativity in Computing and DataFlow Supercomputing, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore topics in greater depth and breadth than journal articles typically allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.
The widespread use of XML in business and scientific databases has prompted the development of methodologies, techniques, and systems for effectively managing and analyzing XML data. This has increasingly attracted the attention of different research communities, including database, information retrieval, pattern recognition, and machine learning, from which several proposals have been offered to address problems in XML data management and knowledge discovery. XML Data Mining: Models, Methods, and Applications aims to collect knowledge from experts of database, information retrieval, machine learning, and knowledge management communities in developing models, methods, and systems for XML data mining. This book addresses key issues and challenges in XML data mining, offering insights into the various existing solutions and best practices for modeling, processing, analyzing XML data, and for evaluating performance of XML data mining algorithms and systems.
As systems become more prevalent and more complex, resilient adaptive systems are crucial when systems are needed in environments where change is the rule rather than the exception. Technological Innovations in Adaptive and Dependable Systems: Advancing Models and Concepts provides high quality, effective approaches to design, develop, maintain, evaluate, and benchmark adaptive and dependable systems that are built to sustain quality of service and experience despite the occurrence of potentially significant and sudden changes or failures in their infrastructure and surrounding environments. Providing academicians, practitioners, and researchers with insight, this book contains useful software and hardware aspects, conceptual models, applied and theoretical approaches, paradigms, and other technological innovations.
Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies, and investigate the use of service-oriented computing technologies. In addressing supporting infrastructure of the Cloud, including associated challenges and pressing issues, this reference source aims to present researchers, engineers, and IT professionals with various approaches in Cloud computing.
This textbook is intended as a textbook for one-semester, introductory computer science courses aimed at undergraduate students from all disciplines. Self-contained and with no prerequisites, it focuses on elementary knowledge and thinking models. The content has been tested in university classrooms for over six years, and has been used in summer schools to train university and high-school teachers on teaching introductory computer science courses using computational thinking. This book introduces computer science from a computational thinking perspective. In computer science the way of thinking is characterized by three external and eight internal features, including automatic execution, bit-accuracy and abstraction. The book is divided into chapters on logic thinking, algorithmic thinking, systems thinking, and network thinking. It also covers societal impact and responsible computing material - from ICT industry to digital economy, from the wonder of exponentiation to wonder of cyberspace, and from code of conduct to best practices for independent work. The book's structure encourages active, hands-on learning using the pedagogic tool Bloom's taxonomy to create computational solutions to over 200 problems of varying difficulty. Students solve problems using a combination of thought experiment, programming, and written methods. Only 300 lines of code in total are required to solve most programming problems in this book.
This book provides an accessible introduction to the basic theory of fluid mechanics and computational fluid dynamics (CFD) from a modern perspective that unifies theory and numerical computation. Methods of scientific computing are introduced alongside with theoretical analysis and MATLAB (R) codes are presented and discussed for a broad range of topics: from interfacial shapes in hydrostatics, to vortex dynamics, to viscous flow, to turbulent flow, to panel methods for flow past airfoils. The third edition includes new topics, additional examples, solved and unsolved problems, and revised images. It adds more computational algorithms and MATLAB programs. It also incorporates discussion of the latest version of the fluid dynamics software library FDLIB, which is freely available online. FDLIB offers an extensive range of computer codes that demonstrate the implementation of elementary and advanced algorithms and provide an invaluable resource for research, teaching, classroom instruction, and self-study. This book is a must for students in all fields of engineering, computational physics, scientific computing, and applied mathematics. It can be used in both undergraduate and graduate courses in fluid mechanics, aerodynamics, and computational fluid dynamics. The audience includes not only advanced undergraduate and entry-level graduate students, but also a broad class of scientists and engineers with a general interest in scientific computing.
Businesses must constantly adapt to a dynamically changing environment that requires choosing an adaptive and dynamic information architecture that has the flexibility to support both changes in the business environment and changes in technology. In general, information systems reengineering has the objective of extracting the contents, data structures, and flow of data and process contained within existing legacy systems in order to reconstitute them into a new form for subsequent implementation. Information Systems Reengineering for Modern Business Systems: ERP, Supply Chain and E-Commerce Management Solutions covers different techniques that could be used in industry in order to reengineer business processes and legacy systems into more flexible systems capable of supporting modern trends such as Enterprise Resource Planning (ERP), supply chain management systems and e-commerce. This reference book also covers other issues related to the reengineering of legacy systems, which include risk management and obsolescence management of requirements.
This comprehensive and timely publication aims to be an essential reference source, building on the available literature in the field of Gamification for the economic and social development of countries while providing further research opportunities in this dynamic and growing field. Thus, the book aims to provide the opportunity for a reflection on this important issue, increasing the understanding of the importance of Gamification in the context of organizations' improvements, providing relevant academic work, empirical research findings and, an overview of this relevant field of study. This text will provide the resources necessary for policymakers, technology developers, and managers to adopt and implement solutions for a more digital era.
Despite decades of research, developing software that is fit for purpose, developed on time, and within budget remains a challenge. Many researchers have advocated the use of artificial intelligence techniques such as knowledge-based systems, neural networks, and data mining as a way of addressing these difficulties. ""Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects"" provides an overview of useful techniques in artificial intelligence for future software development along with critical assessment for further advancement. A compendium of latest industry findings, this premier reference source offers researchers, academicians, and practitioners developmental ideas within the field.
This book provides comprehensive coverage of the modern methods for geometric problems in the computing sciences. It also covers concurrent topics in data sciences including geometric processing, manifold learning, Google search, cloud data, and R-tree for wireless networks and BigData. The author investigates digital geometry and its related constructive methods in discrete geometry, offering detailed methods and algorithms. The book is divided into five sections: basic geometry; digital curves, surfaces and manifolds; discretely represented objects; geometric computation and processing; and advanced topics. Chapters especially focus on the applications of these methods to other types of geometry, algebraic topology, image processing, computer vision and computer graphics. Digital and Discrete Geometry: Theory and Algorithms targets researchers and professionals working in digital image processing analysis, medical imaging (such as CT and MRI) and informatics, computer graphics, computer vision, biometrics, and information theory. Advanced-level students in electrical engineering, mathematics, and computer science will also find this book useful as a secondary text book or reference. Praise for this book: This book does present a large collection of important concepts, of mathematical, geometrical, or algorithmical nature, that are frequently used in computer graphics and image processing. These concepts range from graphs through manifolds to homology. Of particular value are the sections dealing with discrete versions of classic continuous notions. The reader finds compact definitions and concise explanations that often appeal to intuition, avoiding finer, but then necessarily more complicated, arguments... As a first introduction, or as a reference for professionals working in computer graphics or image processing, this book should be of considerable value." - Prof. Dr. Rolf Klein, University of Bonn.
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions. |
You may like...
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
|