![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
This book provides insights on how to approach and utilize data science tools, technologies and methodologies related to artificial intelligence (AI) in industrial contexts. It explains the essence of distributed computing and AI-technologies, and their inter-connections. Description of various technology and methodology approaches, and their purpose and benefits when developing AI-solution in industrial contexts is included. In addition, it summarizes experiences from AI technology deployment projects from several industrial sectors. Features: Presents compendium of methodologies and technologies in Industrial AI and digitalization. Illustrates sensor to actuation approach showing complete cycle, that defines and differences AI and digitalization concept. Covers a broad range of academic and industrial issues within the field of asset management. Discusses impact of Industry 4.0 in other sectors. Includes a dedicated chapter on real-time case studies. This book is aimed at researchers and professionals in industrial and software engineering, network security, AI and ML, engineering managers, operational and maintenance specialists, asset managers, digital and AI manufacturing specialists.
Gives broad perspective on 5G communications with a focus on smart cities Discusses artificial intelligence in future wireless communication and its applications Provides a systemic and comprehensive coverage of 6G technologies, challenges and use cases Explores role of future wireless in safety, health, and transport in smart cities Includes case studies of future wireless communications
This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
This book introduces novel methods and approaches for semantic integration. In addition to developing ground-breaking new methods for ontology alignment, the author provides extensive explanations of up-to-date case studies. It includes a thorough investigation of the foundations and provides pointers to future steps in ontology alignment with conclusion linking this work to the knowledge society.
Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM. The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience. The 2nd edition of IP Address Management also covers topics like such as: Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of IP Address Management also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.
Focusses on prospective scenarios in health to foresight possible futures Addresses the urgent needs of the key population, socio-technical, and health themes Covers health innovative practices as 3D models for surgeries, big data to treat rare diseases, AI robot for heart treatments Explores telemedicine using big data, deep learning, robotics, mobile and remote applications Reviews public health based on predictive analytics and disease trends
This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless communication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia.
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node diversity, and /or dynamical evolution. This is the first book entirely devoted to the new and emerging field of nonlinear dynamics of TCP/IP networks. It addresses both scientists and engineers working in the general field of communication networks.
Unique selling point: • Complete coverage of intelligent vehicle networks with deep learning tools. Core audience: • Researchers and postgraduates studying UAV communication systems, as well as industry engineers and technicians Place in the market: • Many advanced UAV communication protocols and modeling details will be provided. Thus, it is more like an engineering/science design reference instead of a common introduction book.
Unique selling point: A rigorous examination of the influence of software development on competitiveness among small firms Core audience: Researchers and academics in business and MIS Place in the market: Academic reference with audiences in social science and computer science
The two-volume set IFIP AICT 639 and 640 constitutes the refereed post-conference proceedings of the 18th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2021, held in Curitiba, Brazil, during July 11-14, 2021. The conference was held virtually due to the COVID-19 crisis.The 107 revised full papers presented in these proceedings were carefully reviewed and selected from 133 submissions. The papers are organized in the following topical sections: Volume I: Sustainability, sustainable development and circular economy; sustainability and information technologies and services; green and blue technologies; AI and blockchain integration with enterprise applications; PLM maturity, PLM implementation and adoption within industry 4.0; and industry 4.0 and emerging technologies: Volume II: Design, education and management; lean, design and innovation technologies; information technology models and design; and models, manufacturing and information technologies and services.
This book presents the outcome of the European project "SERENA", involving fourteen partners as international academics, technological companies, and industrial factories, addressing the design and development of a plug-n-play end-to-end cloud architecture, and enabling predictive maintenance of industrial equipment to be easily exploitable by small and medium manufacturing companies with a very limited data analytics experience. Perspectives and new opportunities to address open issues on predictive maintenance conclude the book with some interesting suggestions of future research directions to continue the growth of the manufacturing intelligence.
This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2020, held in Salt Lake City, UT, USA, in October 2020.*The 16 full papers included in this volume were carefully reviewed and selected from the 38 papers (out of 74 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system
The book is distinctive in its application of the early philosophy of Ludwig Wittgenstein to misinformation analysis. It also proposes a new theory of information quality. The book is timely as the issue of online information quality (especially on social media platforms) is now front-page news. The book proffers an alternative to the algorithmic engagement-based ranking of content by social media platforms: a new system for ranking online content based on information quality. The book also introduced two new concepts to the scholarly literature: “off-information” and “non-information”.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Replete with detailed illustrations and helpful examples, this book covers a host of cutting edge topics such as the core function, the quotient function, new Chinese Remainder theorems, and large integer operations. It also features many significant applications to practical communication systems and cryptography such as FIR filters and elliptic curve cryptography. Starting with a comprehensive introduction to the basics and leading up to current research trends that are not yet widely distributed in other publications, this book will be of interest to both researchers and students alike.
This book includes the original, peer-reviewed research papers from the 2nd International Conference on Electrical Systems, Technology and Information (ICESTI 2015), held in September 2015 at Patra Jasa Resort & Villas Bali, Indonesia. Topics covered include: Mechatronics and Robotics, Circuits and Systems, Power and Energy Systems, Control and Industrial Automation, and Information Theory. It explores emerging technologies and their application in a broad range of engineering disciplines, including communication technologies and smart grids. It examines hybrid intelligent and knowledge-based control, embedded systems, and machine learning. It also presents emerging research and recent application in green energy system and storage. It discusses the role of electrical engineering in biomedical, industrial and mechanical systems, as well as multimedia systems and applications, computer vision and image and signal processing. The primary objective of this series is to provide references for dissemination and discussion of the above topics. This volume is unique in that it includes work related to hybrid intelligent control and its applications. Engineers and researchers as well as teachers from academia and professionals in industry and government will gain valuable insights into interdisciplinary solutions in the field of emerging electrical technologies and its applications.
Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.
Organizations spend large amounts of money to purchase, deploy, and optimize their Electronic Health Records (EHRs). They are not plug-n-play systems so a commitment to an ongoing improvement cycle is necessary. When done well, this responds to the people, the process, and the technology. When not done well, complete failure of the system could result in costing the organization thousands of dollars. Based on the foundational premise that EHR governance done right speeds up change and leads to a positive user experience, this book draws upon more than a decade of work with government, academic, and nonprofit organizations using Epic, Allscripts, McKesson, Meditech, and Cerner. Designed to be practical and pragmatic, it outlines a strategic process that can scale to small and large organizations alike. It begins with how to articulate a clear vision to organizational leaders so they can champion strong EHR governance both theoretically and financially. It then walks through each step required for leading successful change, calling out critical lessons learned to help the reader avoid pitfalls and achieve measurable improvement more rapidly. It concludes with a commitment to ongoing growth and refinement through benchmarked metrics, innovation, and out-of-the-box thinking.
Design Cybernetics: Navigating the New Design cybernetics offers a way of looking at ourselves - curious, creative, and ethical humans - as self-organising systems that negotiate their own goals in open-ended explorations of the previously unknown. It is a theory of and for epistemic practices (learning, designing, researching) that is deeply committed to the autonomy of others and hence offers no prescriptive methodology. Design cybernetics describes design practice as inextricable from conversation - a way of enquiring, developing shared understanding and reaching the new that harnesses reliable control as well as error and serendipity. Recognising circular causality, observer-dependency and non-determinability, design cybernetics extends beyond tenets of scientific research into the creative, ethical and aesthetic domain. From this perspective, design is not an ill-conceived subset of scientific research. Instead, scientific research emerges as a particularly restricted subset of the broader human activity of design. This volume offers a cross-section of design cybernetic theory and practice with contributions ranging across architecture, interior lighting studies, product design, embedded systems, design pedagogy, design theory, social transformation design, research epistemology, art and poetics, as well as theatre and acting. Addressing designers, design educators and researchers interested in a rigorous, practice-based epistemology, it establishes design cybernetics as a foundational perspective of design research. "This is a conceptually elegant, well structured, and comprehensive presentation of design cybernetics. It fills a gap in the literature of the field." Ken Friedman, Chair Professor, Tongji University "This book offers a valuable and timely introduction to second-order cybernetics as society grapples with complex issues like climate change and rising inequality." Joichi Ito, Director of the MIT Media Lab
In this complete introduction to the theory of finding derivatives of scalar-, vector- and matrix-valued functions with respect to complex matrix variables, Hjorungnes describes an essential set of mathematical tools for solving research problems where unknown parameters are contained in complex-valued matrices. The first book examining complex-valued matrix derivatives from an engineering perspective, it uses numerous practical examples from signal processing and communications to demonstrate how these tools can be used to analyze and optimize the performance of engineering systems. Covering un-patterned and certain patterned matrices, this self-contained and easy-to-follow reference deals with applications in a range of areas including wireless communications, control theory, adaptive filtering, resource management and digital signal processing. Over 80 end-of-chapter exercises are provided, with a complete solutions manual available online.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing. |
You may like...
Advances in Quantum Monte Carlo
Shigenori Tanaka, Stuart M. Rothstein, …
Hardcover
R5,469
Discovery Miles 54 690
Flexible Bayesian Regression Modelling
Yanan Fan, David Nott, …
Paperback
R2,427
Discovery Miles 24 270
|