![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Autonomous underwater vehicles (AUVs) are emerging as a promising solution to help us explore and understand the ocean. The global market for AUVs is predicted to grow from 638 million dollars in 2020 to 1,638 million dollars by 2025 - a compound annual growth rate of 20.8 percent. To make AUVs suitable for a wider range of application-specific missions, it is necessary to deploy multiple AUVs to cooperatively perform the localization, tracking and formation tasks. However, weak underwater acoustic communication and the model uncertainty of AUVs make achieving this challenging. This book presents cutting-edge results regarding localization, tracking and formation for AUVs, highlighting the latest research on commonly encountered AUV systems. It also showcases several joint localization and tracking solutions for AUVs. Lastly, it discusses future research directions and provides guidance on the design of future localization, tracking and formation schemes for AUVs. Representing a substantial contribution to nonlinear system theory, robotic control theory, and underwater acoustic communication system, this book will appeal to university researchers, scientists, engineers, and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of AUVs. Moreover, the practical localization, tracking and formation schemes presented provide guidance on exploring the ocean. The book is intended for those with an understanding of nonlinear system theory, robotic control theory, and underwater acoustic communication systems.
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services--such as e-commerce, e-health, social networks, and other major cyber applications--it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy. Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology. Cybersecurity in Intelligent Networking Systems readers will also find: Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption Key areas in adversarial machine learning, from both offense and defense perspectives Descriptions of network anomalies and cyber threats Background information on data-driven network intelligence for cybersecurity Robust and secure edge intelligence for network anomaly detection against cyber intrusions Detailed descriptions of the design of privacy-preserving security protocols Cybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields.
This book is a collection of selected proceedings from the EUNICE Summer School which took place in Colmenarejo in July of 2005. The book explores the theme of Networked Applications in depth. It covers topics of advanced engineering such as ubiquitous computing, full mobility and real-time multimedia, into real services, applications, protocols and networks.
Network flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application fields including transportation, telecommunication, computer networking, financial planning, logistics and supply chain management, energy systems, etc. However, to date, most network optimization problems that have been studied are static network optimization problems. But real world networks are time-varying in essence, and therefore any flow within a network must take a certain amount of time to traverse an arc. Moreover, the parameters of real world networks may change over time. Problems such as how to plan and control the transmission of flow becomes very important, because waiting at a node, or traveling along a particular arc with different speed, may allow one to catch the best timing along the path; thus, achieving the objective and changing the decision making process. It should be noted that there are a host of decision making problems in practice that should be formulated as optimization models on time-varying networks. The express purpose of TIME-VARYING NETWORK OPTIMIZATION is to describe, in a unified and self-contained manner, a series of models, propositions, and algorithms developed in recent years on time-varying networks. References and discussions on relevant problems and studies that have appeared in the literature are integrated in the book. The book consists of eight chapters, in which the following problems are formulated and examined: (1) the shortest path problem, (2) minimum-spanning tree problem, (3) maximum flow problem, (4) minimum cost flow problem, (5)maximum capacity path problem, (6) quickest path problem, (7) multi-criteria problem, and (8) the generalized flow problem. The time-varying traveling salesman problem and the Chinese postman problem are presented in a chapter together with the time-varying generalized problem. While these topics will be described all within the framework of time-varying networks, our plan is to make each chapter relatively self-contained so that each can be read separately. The book will be useful for researchers, practitioners, graduate students and senior undergraduates, as a unified reference and textbook on time-varying network optimization. While the book describes the structure of the algorithms, the authors also have developed the software that implements the algorithms. This software can be made available for academic study purposes upon request.
Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. Focus on the expertise measured by these objectives: Design identity, governance, and monitoring solutions Design data storage solutions Design business continuity solutions Design infrastructure solutions This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have advanced experience and knowledge of IT operations, as well as experience in Azure administration, Azure development, and DevOps processes About the Exam Exam AZ-305 focuses on knowledge needed to design logging, monitoring, authentication, and authorization solutions; design governance, identities, and application access; design relational and non-relational data storage solutions; design data integration; recommend data storage solutions; design backup and disaster recovery solutions; design for high availability; design compute and network solutions, application architecture, and migration. About Microsoft Certification If you hold Microsoft Certified: Azure Administrator Associate certification, passing this exam fulfills your requirements for the Microsoft Certified: Azure Solutions Architect Expert credential. Passing this exam demonstrates your expert-level skills in advising stakeholders and translating business requirements into designs for secure, scalable, and reliable Azure solutions; and in partnering with others to implement these solutions. See full details at: microsoft.com/learn
This book is the first attempt to bring together current research findings in the domain of interactive horizontal displays. The novel compilation will integrate and summarise findings from the most important international tabletop research teams. It will provide a state-of-the art overview of this research domain and therefore allow for discussion of emerging and future directions in research and technology of interactive horizontal displays. Latest advances in interaction and software technologies and their increasing availability beyond research labs, refuels the interest in interactive horizontal displays. In the early 1990s Mark Weiser s vision of Ubiquitous Computing redefined the notion of Human Computer Interaction. Interaction was no longer considered to happen only with standard desktop computers but also with elements of their environment. This book is structured in three major areas: under, on/above and around tabletops. These areas are associated with different research disciplines such as Hardware/Software and Computer Science, Human Computer Interaction (HCI) and Computer Supported Collaborative Work (CSCW). However, the comprehensive and compelling presentation of the topic of the book results from its interdisciplinary character. The book addresses fellow researchers who are interested in this domain and practitioners considering interactive tabletops in real-world projects. It will also be a useful introduction into tabletop research that can be used for the academic curriculum."
Service and network providers must be able to satisfy the demands for new services, improve the quality of service, reduce the cost of network service operations and maintenance, control performance and adapt to user demands. These challenges are so important for the future of our communication environment that it is essential to investigate different approaches for controlling and optimizing network resources. Network Control and Engineering for QoS, Security and Mobility II addresses the problem of network control and engineering with a focus on control of quality of service, management of security, and supervision of mobility. New trends in these different fields are also investigated. This volume contains the proceedings of the Second International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which convened in Oman in October 2003. The conference was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP's Working Groups 6.2 on Network and Internetwork Architecture, 6.6 on Network Management, and 6.7 on Smart Networks.
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book first aims to discuss and outline various aspects of tackling climate change. The authors then discuss how Cloud and IoT can help for digital health and learning from industrial aspects. The next part of book discusses technical improvements in the fields of security and privacy. The book also covers Smart Homes and IoT in agriculture. The book is targeted towards advancing undergraduate, graduate, and post graduate students, researchers, academicians, policymakers, various government officials, NGOs, and industry research professionals who are currently working in the field of science and technology either directly or indirectly to benefit common masses.
This book covers the design and optimization of computer networks applying a rigorous optimization methodology, applicable to any network technology. It is organized into two parts. In Part 1 the reader will learn how to model network problems appearing in computer networks as optimization programs, and use optimization theory to give insights on them. Four problem types are addressed systematically - traffic routing, capacity dimensioning, congestion control and topology design. Part 2 targets the design of algorithms that solve network problems like the ones modeled in Part 1. Two main approaches are addressed - gradient-like algorithms inspiring distributed network protocols that dynamically adapt to the network, or cross-layer schemes that coordinate the cooperation among protocols; and those focusing on the design of heuristic algorithms for long term static network design and planning problems. Following a hands-on approach, the reader will have access to a large set of examples in real-life technologies like IP, wireless and optical networks. Implementations of models and algorithms will be available in the open-source Net2Plan tool from which the user will be able to see how the lessons learned take real form in algorithms, and reuse or execute them to obtain numerical solutions. An accompanying link to the author's own Net2plan software enables readers to produce numerical solutions to a multitude of real-life problems in computer networks (www.net2plan.com).
This book brings together papers presented at The 2nd International Conference on Artificial Intelligence in China (ChinaAI) 2020, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics covering all topics in artificial intelligence with new development in China, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
Dynamic Routing in Broadband Networks focuses on routing in broadband networks based on MPLS (Multiprotocol Label Switching) and ATM (Asynchronous Transfer Mode). The routing methods are based on the theory of Markov decision processes which forms a very accurate framework for on-line route optimization. The author shows the issue of performance optimization and scalability with respect to dynamic routing of logical connections in broadband networks. The methods used are applicable to routing virtual path connections (VPC) and virtual channel connections (VCC) in ATM networks as well as label switched paths (LSP) in MPLS networks. Simulation results and a performance comparison with reference routing are given for the different schemes.
Elixir's straightforward syntax and this guided tour give you a clean, simple path to learn modern functional programming techniques. No previous functional programming experience required! This book walks you through the right concepts at the right pace, as you explore immutable values and explicit data transformation, functions, modules, recursive functions, pattern matching, high-order functions, polymorphism, and failure handling, all while avoiding side effects. Don't board the Elixir train with an imperative mindset! To get the most out of functional languages, you need to think functionally. This book will get you there. Functional programming offers useful techniques for building maintainable and scalable software that solves today's difficult problems. The demand for software written in this way is increasing - you don't want to miss out. In this book, you'll not only learn Elixir and its features, you'll also learn the mindset required to program functionally. Elixir's clean syntax is excellent for exploring the critical skills of using functions and concurrency. Start with the basic techniques of the functional way: working with immutable data, transforming data in discrete steps, and avoiding side effects. Next, take a deep look at values, expressions, functions, and modules. Then extend your programming with pattern matching and flow control with case, if, cond, and functions. Use recursive functions to create iterations. Work with data types such as lists, tuples, and maps. Improve code reusability and readability with Elixir's most common high-order functions. Explore how to use lazy computation with streams, design your data, and take advantage of polymorphism with protocols. Combine functions and handle failures in a maintainable way using Elixir features and libraries. Learn techniques that matter to make code that lives harmoniously with the language. What You Need: You'll need a computer and Elixir 1.4 or newer version installed. No previous functional programming or Elixir experience is required. Some experience with any programming language is recommended.
This book aims to provide a description of these new Artificial Intelligence technologies and approaches to the modeling and simulation of complex systems, as well as an overview of the latest scientific efforts in this field such as the platforms and/or the software tools for smart modeling and simulating complex systems. These tasks are difficult to accomplish using traditional computational approaches due to the complex relationships of components and distributed features of resources, as well as the dynamic work environments. In order to effectively model the complex systems, intelligent technologies such as multi-agent systems and smart grids are employed to model and simulate the complex systems in the areas of ecosystem, social and economic organization, web-based grid service, transportation systems, power systems and evacuation systems.
Software systems that used to be relatively autonomous entities
such as e.g. accounting systems, order-entry systems etc. are now
interlinked in large networks comprising extensive information
infrastructures. What earlier used to be stand-alone proprietary
systems are now for the most part replaced by more or less
standardized interdependent systems that form large networks of
production and use. Organizations have to make decisions about what
office suite to purchase? The easiest option is to continuously
upgrade the existing office suite to the latest version, but the
battle between WordPerfect and Microsoft Word demonstrated that the
choice is not obvious. What instant messenger network to join for
global communication? Preferably the one most colleagues and
friends use; AOL Instant Messenger, Microsoft Messenger, and ICQ
represent three satisfactory, but disjunctive alternatives.
Similarly organizations abandon their portfolio of homegrown IT
systems and replace them with a single Enterprise Resource Planning
(ERP) system. Several ERP alternatives exist on the market, but
which is the right one for you? The argumentation and rationale
behind these considerations are obviously related to the
technological and social networks we are embedded in, but it is not
always easy to specify how.
This book focuses on the fundamentals of blockchain technology along with the means and methods of its integration with Internet of Things (IoT). The book allows the reader to have a deeper understanding of blockchain technology, IoT and various application areas wherein both technologies can be implemented. The book serves the purpose of providing knowledge about the fundamentals of blockchain and IoT to a common reader along with allowing a research scholar to identify some futuristic problem areas that emerge from the convergence of both technologies. Furthermore, the authors discuss relevant application areas such as smart city, e-healthcare, smart travel, etc. throughout the course of the book. The book also talks through a few case studies illustrating the implementation and benefits of using blockchain and IoT. Provides a comprehensive view of blockchain technology and its integration with IoT; Facilitates in having a valuable understanding of various application areas pertaining to blockchain and IoT; Assists the reader in exploring new research areas wherein blockchain and IoT can find their applicability based upon their list of benefits.
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.
The book presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), which took place on November 28-29, 2018 in Manila, Philippines. The conference featured the following tracks: Industrial Engineering and Healthcare, Sustainable Infrastructure; Water Resources Planning and Management; Heat transfer and fluids; Electronics and Electrical Engineering; and Internet of Things. Papers stem from academia and industry throughout the world, showing a variety of perspectives. Presents the proceedings of the World Congress on Engineering and Technology, Innovation and its Sustainability (WCETIS 2018), November 28-29, 2018 in Manila, Philippines Shows how engineering and technology serve to support a variety for industries from manufacturing to water resources Features papers from a variety of researchers and developers from around the world
Inter-vehicle communication (IVC) systems based on wireless ad-hoc networks have the potential to provide increased automotive safety, to achieve smooth traffic flow on the roads, and to improve passenger convenience by providing information and entertainment. However, implementing IVC systems for widespread use also presents a number of technical obstacles. Wireless Technologies in Vehicular Ad Hoc Networks: Present and Future Challenges explores different models for inter-vehicular communication, in which vehicles are equipped with on-board computers that function as nodes in a wireless network. The book covers current theories and applications in physical, medium access, and network layers of IVC systems, exploring inter-vehicle ad-hoc routing protocols and the challenges of predicting vehicular movements, particularly inter-vehicular distance and relative velocity in highly dynamic and varied real-world scenarios.
A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques. The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking. Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the IEEE 802.11/WiFi wireless local area networks as well as IEEE 802.15 Bluetooth, ZigBee, Ultra Wideband (UWB), RF Microwave and body area networks used for sensor and ad hoc networks. The principles of wireless localization techniques using time-of-arrival and received-signal-strength of the wireless signal used in military and commercial applications in smart devices operating in urban, indoor and inside the human body localization are explained and compared. Questions, problem sets and hands-on projects enhances the learning experience for students to understand and appreciate the subject. These include analytical and practical examples with software projects to challenge students in practically important simulation problems, and problem sets that use MatLab. Key features: * Provides a broad coverage of main wireless technologies including emerging technical developments such as body area networking and cyber physical systems * Written in a tutorial form that can be used by students and researchers in the field * Includes practical examples and software projects to challenge students in practically important simulation problems
This book highlights the connections between two technologies: artificial intelligence (AI) and Internet of things (IoT). It presents the application of these two technologies to solve various societal problems related to healthcare, agriculture, green environment, renewable energies, smart cities, etc. Each chapter in this book presents novel solutions to these problems along with the challenges in the application of AI and IoT to solve them. It discusses the adverse attacks on machine Learning models and how to protect sensitive data over the IoT networks. It also includes the security issues in IoT and their possible solutions.
Open Radio Access Network (O-RAN) Systems Architecture and Design gives a jump-start to engineers developing O-RAN hardware and software systems, providing a top-down approach to O-RAN systems design. It gives an introduction into why wireless systems look the way they do today before introducing relevant O-RAN and 3GPP standards. The remainder of the book discusses hardware and software aspects of O-RAN system design, including dimensioning and performance targets. |
You may like...
Radical Traditions - Reimagining Culture…
Andrew Clay McGraw
Hardcover
R3,842
Discovery Miles 38 420
Oracle PL/ SQL Developer's Workbook
Steven Feuerstein, Andrew Odewahn
Paperback
R1,425
Discovery Miles 14 250
|