![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
"To design future networks that are worthy of society's trust, we must put the 'discipline' of computer networking on a much stronger foundation. This book rises above the considerable minutiae of today's networking technologies to emphasize the long-standing mathematical underpinnings of the field." -Professor Jennifer Rexford, Department of Computer Science, Princeton University "This book is exactly the one I have been waiting for the last couple of years. Recently, I decided most students were already very familiar with the way the net works but were not being taught the fundamentals-the math. This book contains the knowledge for people who will create and understand future communications systems." -Professor Jon Crowcroft, The Computer Laboratory, University of Cambridge The Essential Mathematical Principles Required to Design, Implement, or Evaluate Advanced Computer Networks Students, researchers, and professionals in computer networking require a firm conceptual understanding of its foundations. Mathematical Foundations of Computer Networking provides an intuitive yet rigorous introduction to these essential mathematical principles and techniques. Assuming a basic grasp of calculus, this book offers sufficient detail to serve as the only reference many readers will need. Each concept is described in four ways: intuitively; using appropriate mathematical notation; with a numerical example carefully chosen for its relevance to networking; and with a numerical exercise for the reader. The first part of the text presents basic concepts, and the second part introduces four theories in a progression that has been designed to gradually deepen readers' understanding. Within each part, chapters are as self-contained as possible. The first part covers probability; statistics; linear algebra; optimization; and signals, systems, and transforms. Topics range from Bayesian networks to hypothesis testing, and eigenvalue computation to Fourier transforms. These preliminary chapters establish a basis for the four theories covered in the second part of the book: queueing theory, game theory, control theory, and information theory. The second part also demonstrates how mathematical concepts can be applied to issues such as contention for limited resources, and the optimization of network responsiveness, stability, and throughput.
This book is designed to help telecommunications managers prepare themselves and their companies for the 1990s by providing a practical guide to researching, buying, and consulting on office telecommunications systems. The author covers voice communications technologies and products, local, metropolitan, and wide area networks for data transmission, and the various bypass technologies available today, including satellite, microwave, and fiber optic based systems. A detailed section on management aspects of telecommunications discusses the process of defining company telecommunications requirements, strategic telecommunications planning, and future trends in telecommunications. Must reading for every telecommunications manager this book provides a solid basis for successful systems planning and trouble-free implementation.
This book highlights cutting-edge research into emergency early warning management and decision-making for severe accidents. Using toxic gas leakages as examples, it puts forward new design methods for emergency early warning systems, as well as a systematic description of emergency early warning information communication mechanisms and characteristics of regional evacuation, based on a wide range of theories, including safety engineering, information engineering, communication, behaviorology and others. The book applies a range of methods, such as case analysis, questionnaire interviews, and multi-objective optimization modeling. Drawing on this basis, it subsequently proposes a multi-objective optimization modeling and algorithm for emergency path selection, together with an evacuation risk assessment method. Divided into six chapters prepared by an international team of researchers, the book addresses the design of early warning systems, communication and dissemination mechanisms of early warning information, characteristics of regional evacuation, multi-objective optimization of emergency paths, and evacuation risk assessment. The book offers an essential reference guide for engineering technicians and researchers in a wide range of fields, including emergency management, safety science and engineering, disaster relief engineering, and transportation optimization, as well as graduate students in related majors at colleges and universities.
This book constitutes the refereed proceedings of the 20th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2019, held in Turin, Italy, in September 2019. The 56 revised full papers were carefully reviewed and selected from 141 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: collaborative models, platforms and systems for digital revolution; manufacturing ecosystem and collaboration in Industry 4.0; big data analytics and intelligence; risk, performance, and uncertainty in collaborative networked systems; semantic data/service discovery, retrieval, and composition in a collaborative networked world; trust and sustainability analysis in collaborative networks; value creation and social impact of collaborative networks on the digital revolution; technology development platforms supporting collaborative systems; collective intelligence and collaboration in advanced/emerging applications; and collaborative manufacturing and factories of the future, e-health and care, food and agribusiness, and crisis/disaster management.
This book offers a selection of the best papers presented at the 13th International Symposium on Location Based Services (LBS 2016), which was held in Vienna (Austria) from November 14 to 16, 2016. It provides an overview of recent research in the field, including the latest advances in outdoor/indoor positioning, smart environment, spatial modeling, personalization and context awareness, cartographic communication, novel user interfaces, crowd sourcing, social media, big data analysis, usability and privacy.
Wide-band systems will be the next significant generation in wireless communications. Those include both wireless local area networks and cellular systems with a large coverage area. They will provide a higher data rate and access to internet and video services, for example. Although most of the data processing is performed digitally, also the requirements and possibilities to implement the analog part of the radio receiver will be different compared to the second-generation narrow-band receivers. Direct conversion architecture is a distinct candidate for wide-band systems because some non-idealities involved in baseband signal processing are significantly relaxed. The requirements and feasibility of direct conversion in wide-band systems are analyzed in this work. The main emphasis is on cellular systems based on direct sequence code division multiple access, but the same principles are generally valid in all receivers for different applications. The basic principles and design methods involved in receiver design are overviewed as well as the most common radio architectures. In a detailed analysis, the fundamental limitations of the direct conversion architecture are analyzed in wide-band signal processing. Especially, the effect of envelope distortion is characterized both with respect to the specific modulation and to the implementation of a downconversion mixer. Downconversion mixer is the key component in direct conversion because it transfers the radio frequency signal immediately down into the baseband after a relatively small gain at the preceding signal processing blocks, which do not provide filtering of the unwanted radio channels within the system band. Both switching mixersand subsampling mixers are analyzed. Direct Conversion Receivers in Wide-Band Systems consists of four different circuit implementations. A subharmonic sampler operating up to 2 GHz is implemented with a GaAs MESFET technology. The second IC is a CMOS low-noise amplifier with an optimized interface to a subsampling mixer. Two BiCMOS implementations of the wide-band direct conversion receiver are given. The first consists of four different chips: RF front-end, analog baseband circuitry and two analog-to-digital converters. In the second chip, all blocks from the low-noise amplifier to the A/D converters are placed on the same die. In that case, an excellent isolation is required between rail-to-rail clock signals and the sensitive RF input.
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.
This book introduces novel solutions to the rendezvous problem in distributed systems, a fundamental problem that underpins the construction of many important functions in distributed systems and networks. The book covers rendezvous theories, distributed rendezvous algorithms, and rendezvous applications in practical systems, presents state-of-the-art rendezvous results and highlights the latest methods of rendezvous in distributed systems. It provides in particular an in-depth treatment of the blind rendezvous and oblivious blind rendezvous problems and their solutions. Further, it sheds new light on rendezvous applications in cognitive radio networks and rendezvous search in graphs. As such, it will also be of interest to readers from other research fields such as robotics, wireless sensor networks, and game theory.
This book introduces a new scheduler to fairly and efficiently distribute system resources to many users of varying usage patterns compete for them in large shared computing environments. The Rawlsian Fair scheduler developed for this effort is shown to boost performance while reducing delay in high performance computing workloads of certain types including the following four types examined in this book: i. Class A - similar but complementary workloads ii. Class B - similar but steady vs intermittent workloads iii. Class C - Large vs small workloads iv. Class D - Large vs noise-like workloads This new scheduler achieves short-term fairness for small timescale demanding rapid response to varying workloads and usage profiles. Rawlsian Fair scheduler is shown to consistently benefit workload Classes C and D while it only benefits Classes A and B workloads where they become disproportionate as the number of users increases. A simulation framework, dSim, simulates the new Rawlsian Fair scheduling mechanism. The dSim helps achieve instantaneous fairness in High Performance Computing environments, effective utilization of computing resources, and user satisfaction through the Rawlsian Fair scheduler.
The sixth generation of wireless communication (6G), succeeding 5G cellular technology, opens up several possibilities in terms of technology and its offered services. 6G is expected to allow usage of available higher frequency spectrums to cater to increased capacity, throughput, and low latency (<1 µs). 6G will witness the unification of various technologies, such as artificial intelligence (AI), machine learning (ML), augmented/virtual reality (AR/VR), etc., to provide an immersive user experience. It is foreseen as the accelerator of transformation and innovation globally. To make this book a fundamental resource, we have invited world-renowned experts in 6G from the industry and academia to pen down their ideas on different aspects of 6G research. The chapters in this book cover a broader scope and various related and unrelated verticals. Specifically, this book covers the following topics: 6G use cases, requirements, and enabling technologies new spectrums and their challenges for 6G privacy preservation in 6G networks aerial infrastructure for 6G networks economic challenges associated with 6G wireless networks. The encompassing intent of this book is to explore the evolution from current 5G networks towards the future 6G networks from a service, air interface, and network perspective, thereby laying out a vision for 6G networks.
This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.
This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks.
Global Information Society: Operating Information Systems in a Dynamic Global Business Environment addresses the importance of information technology management and issues in operating information systems in the global dynamic business environment. It embraces discussions of the global information technology theory, frameworks and IT architecture, discovery of global knowledge management, improvement of the global information systems development methodologies, and applications of the latest technologies such as mobile technology and web services in the global information systems development and operations. The book features a collection of new ideas, latest technology applications and experiences in the global information systems development and operations.
Digital transformation is a business concern; it is no longer just IT that must get things done. The disruptive force of start-ups focusing on IT-based services that can be consumed through mobile devices cannot be underestimated -- These start-ups eat away at the high-margin services provided by incumbents, leaving lower margin products and services that are rapidly being commoditized. This is happening in all industry sectors and it is the ones who are best able to adjust, innovate, and improve their service offerings that will survive. The question is: What do you need to do to ensure that your organization is one of the survivors? The core of the solution to the problem is to radically improve the way the IT organization works together with the business. To be clear, the digital transformation of your business depends on that relatively small group of people in the basement, or other out-of-the-way location, who make sure that your IT services work. So, building a cooperative model is vital for the success of the business. Which model has proven its worth in many industries? It is the application of Lean principles that gives organizations an advantage in delivering their products and services to their customers. Transforming your organization to high performance is, above all, a people-based movement with the acquisition and, most importantly, application of knowledge and skills necessary for the high performance way of working at its core. In teams, from boardroom to work floor, building a new way of thinking and acting is essential. This book aims to give insight into the reasons why you and your organization must consciously act to apply Lean principles to your IT organization. It explains the phases organizations go through as they start out with their initial attempts to gain advantages from Lean tools to the phase in which they reap the strategic benefits of Lean applied to IT. The real work of the transformation is described from two different perspectives: Leadership and Team. This book describes a complete set of principles, practices and tools In order to make the right decisions along the winding route of your transformation. The people who will guide, support and drive your transformation are the leaders and tem members who understand and apply those principles, practice and tools: your Lean IT Experts.
This book covers all the relevant dictionary learning algorithms, presenting them in full detail and showing their distinct characteristics while also revealing the similarities. It gives implementation tricks that are often ignored but that are crucial for a successful program. Besides MOD, K-SVD, and other standard algorithms, it provides the significant dictionary learning problem variations, such as regularization, incoherence enforcing, finding an economical size, or learning adapted to specific problems like classification. Several types of dictionary structures are treated, including shift invariant; orthogonal blocks or factored dictionaries; and separable dictionaries for multidimensional signals. Nonlinear extensions such as kernel dictionary learning can also be found in the book. The discussion of all these dictionary types and algorithms is enriched with a thorough numerical comparison on several classic problems, thus showing the strengths and weaknesses of each algorithm. A few selected applications, related to classification, denoising and compression, complete the view on the capabilities of the presented dictionary learning algorithms. The book is accompanied by code for all algorithms and for reproducing most tables and figures. Presents all relevant dictionary learning algorithms - for the standard problem and its main variations - in detail and ready for implementation; Covers all dictionary structures that are meaningful in applications; Examines the numerical properties of the algorithms and shows how to choose the appropriate dictionary learning algorithm.
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.
Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been extensively used in data separations. Since optimization based data mining methods differ from statistics, decision tree induction, and neural networks, their theoretical inspiration has attracted many researchers who are interested in algorithm development of data mining. "Optimization based Data Mining: Theory and Applications," mainly focuses on MCP and SVM especially their recent theoretical progress and real-life applications in various fields. These include finance, web services, bio-informatics and petroleum engineering, which has triggered the interest of practitioners who look for new methods to improve the results of data mining for knowledge discovery. Most of the material in this book is directly from the research and application activities that the authors' research group has conducted over the last ten years. Aimed at practitioners and graduates who have a fundamental knowledge in data mining, it demonstrates the basic concepts and foundations on how to use optimization techniques to deal with data mining problems.
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain technology in the fields of business and international development, there is a growing body of study on other use cases. For instance, can blockchain have a significant role in preserving and improving international security? This book explores this question in the context of preventing the proliferation of some of the most dangerous materials in the world-items that if not secured can lend to the development of weapons of mass destruction. It considers how blockchain can increase efficiencies in the global trade of nuclear and chemical materials and technology, thereby increasing assurances related to compliance with international nonproliferation and disarmament treaties.
This book constitutes the refereed proceedings of the 6th International Conference on Computer, Communication, and Signal Processing, ICCSP 2022, held in Chennai, India, in February 2022.* The 21 full and 2 short papers presented in this volume were carefully reviewed and selected from 111 submissions. The papers are categorized into topical sub-headings: artificial intelligence and machine learning; Cyber security; and internet of things. *The conference was held as a virtual event due to the COVID-19 pandemic.
This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The fresh and innovative advances that demonstrate computational intelligence and IoT in practice that are discussed in this volume will be informative for academicians, scholars, scientists, industry professionals, policymakers, government and non-government organizations, and others.
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
The book discusses the fundamentals of high-performance computing. The authors combine visualization, comprehensibility, and strictness in their material presentation, and thus influence the reader towards practical application and learning how to solve real computing problems. They address both key approaches to programming modern computing systems: multithreading-based parallelizing in shared memory systems, and applying message-passing technologies in distributed systems. The book is suitable for undergraduate and graduate students, and for researchers and practitioners engaged with high-performance computing systems. Each chapter begins with a theoretical part, where the relevant terminology is introduced along with the basic theoretical results and methods of parallel programming, and concludes with a list of test questions and problems of varying difficulty. The authors include many solutions and hints, and often sample code.
This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the capabilities, application, and design of LAN switches and switched internetworks and examines the significant changes that have taken place since the publication of the first edition seven years ago. You're sure to appreciate the witty writing style and easy-to-follow format on such an often-complicated subject matter. |
You may like...
Order Statistics: Theory and Methods…
Narayanaswamy Balakrishnan, C.R. Rao
Hardcover
R5,419
Discovery Miles 54 190
Pearson Edexcel International A Level…
Joe Skrakowski, Harry Smith
Paperback
R969
Discovery Miles 9 690
Probability & Statistics 1 for Cambridge…
James Nicholson
Digital product license key
R980
Discovery Miles 9 800
Nonlinear Time Series Analysis with R
Ray Huffaker, Marco Bittelli, …
Hardcover
R2,751
Discovery Miles 27 510
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu
Paperback
Numbers, Hypotheses & Conclusions - A…
Colin Tredoux, Kevin Durrheim
Paperback
Multilevel Modeling Methods with…
Ann A O'connell, D. Betsy McCoach, …
Hardcover
R3,128
Discovery Miles 31 280
|