Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
This book brings together papers from the 2018 International Conference on Communications, Signal Processing, and Systems, which was held in Dalian, China on July 14-16, 2018. Presenting the latest developments and discussing the interactions and links between these multidisciplinary fields, the book spans topics ranging from communications, signal processing and systems. It is aimed at undergraduate and graduate electrical engineering, computer science and mathematics students, researchers and engineers from academia and industry as well as government employees.
For courses in wireless communication networks and systems A Comprehensive Overview of Wireless Communications Wireless Communication Networks and Systems covers all types of wireless communications, from satellite and cellular to local and personal area networks. Organised into four easily comprehensible, reader-friendly parts, it presents a clear and comprehensive overview of the field of wireless communications. For those who are new to the topic, the book explains basic principles and fundamental topics concerning the technology and architecture of the field. Numerous figures and tables help clarify discussions, and each chapter includes a list of keywords, review questions, homework problems, and suggestions for further reading. The book includes an extensive online glossary, a list of frequently used acronyms, and a reference list. A diverse set of projects and other student exercises enables instructors to use the book as a component in a varied learning experience, tailoring courses to meet their specific needs.
Smart Networks comprises the proceedings of Smartnet'2002, the
seventh conference on Intelligence in Networks, which was sponsored
by the International Federation for Information Processing (IFIP)
and organized by Working Group 6.7. It was held in Saariselka,
Finland, in April 2002.
The book discusses the fundamentals of high-performance computing. The authors combine visualization, comprehensibility, and strictness in their material presentation, and thus influence the reader towards practical application and learning how to solve real computing problems. They address both key approaches to programming modern computing systems: multithreading-based parallelizing in shared memory systems, and applying message-passing technologies in distributed systems. The book is suitable for undergraduate and graduate students, and for researchers and practitioners engaged with high-performance computing systems. Each chapter begins with a theoretical part, where the relevant terminology is introduced along with the basic theoretical results and methods of parallel programming, and concludes with a list of test questions and problems of varying difficulty. The authors include many solutions and hints, and often sample code.
This volume aims to document the most important worldwide accomplishments in converging knowledge and technology, including converging platforms, methods of convergence, societal implications, and governance in the last ten years. Convergence in knowledge, technology, and society is the accelerating, transformative interaction among seemingly distinct scientific disciplines, technologies, and communities to achieve mutual compatibility, synergism, and integration, and through this process to create added value for societal benefit. It is a movement that is recognized by scientists and thought leaders around the world as having the potential to provide far-reaching solutions to many of today's complex knowledge, technology, and human development challenges. Four essential and interdependent convergence platforms of human activity are defined in the first part of this report: nanotechnology-biotechnology-information technology and cognitive science ("NBIC") foundational tools; Earth-scale environmental systems; human-scale activities; and convergence methods for societal-scale activities. The report then presents the main implications of convergence for human physical potential, cognition and communication, productivity and societal outcomes, education and physical infrastructure, sustainability, and innovative and responsible governance. As a whole, the report presents a new model for convergence. To effectively take advantage of this potential, a proactive governance approach is suggested. The study identifies an international opportunity to develop and apply convergence for technological, economic, environmental, and societal benefits. The panel also suggests an opportunity in the United States for implementing a program aimed at focusing disparate R and D energies into a coherent activity - a "Societal Convergence Initiative". This study received input from leading academic, industry, government, and NGO experts from the United States, Latin America, Europe, Asia, and Australia.
With rise of smart medical sensors, cloud computing and the health care technologies, "connected health" is getting remarkable consideration everywhere. Recently, the Internet of Things (IoT) has brought the vision of a smarter world into reality. Cloud computing fits well in this scenario as it can provide high quality of clinical experience. Thus an IoT-cloud convergence can play a vital role in healthcare by offering better insight of heterogeneous healthcare content supporting quality care. It can also support powerful processing and storage facilities of huge data to provide automated decision making. This book aims to report quality research on recent advances towards IoT-Cloud convergence for smart healthcare, more specifically to the state-of-the-art approaches, design, development and innovative use of those convergence methods for providing insights into healthcare service demands. Students, researchers, and medical experts in the field of information technology, medicine, cloud computing, soft computing technologies, IoT and the related fields can benefit from this handbook in handling real-time challenges in healthcare. Current books are limited to focus either on soft computing algorithms or smart healthcare. Integration of smart and cloud computing models in healthcare resulting in connected health is explored in detail in this book.
As well as highlighting potentially useful applications for network analysis, this volume identifies new targets for mathematical research that promise to provide insights into network systems theory as well as facilitating the cross-fertilization of ideas between sectors. Focusing on financial, security and social aspects of networking, the volume adds to the growing body of evidence showing that network analysis has applications to transportation, communication, health, finance, and social policy more broadly. It provides powerful models for understanding the behavior of complex systems that, in turn, will impact numerous cutting-edge sectors in science and engineering, such as wireless communication, network security, distributed computing and social networking, financial analysis, and cyber warfare. The volume offers an insider s view of cutting-edge research in network systems, including methodologies with immense potential for interdisciplinary application. The contributors have all presented material at a series of workshops organized on behalf of Canada s MITACS initiative, which funds projects and study grants in mathematics for information technology and complex systems . These proceedings include papers from workshops on financial networks, network security and cryptography, and social networks. MITACS has shown that the partly ghettoized nature of network systems research has led to duplicated work in discrete fields, and thus this initiative has the potential to save time and accelerate the pace of research in a number of areas of network systems research. "
There are many data communications titles covering design,
installation, etc, but almost none that specifically focus on
industrial networks, which are an essential part of the day-to-day
work of industrial control systems engineers, and the main focus of
an increasingly large group of network specialists.
Elaborating on the concept of context awareness, this book presents up-to-date research and novel framework designs for context-aware mobile sensing. Generic and Energy-Efficient Context-Aware Mobile Sensing proposes novel context-inferring algorithms and generic framework designs that can help readers enhance existing tradeoffs in mobile sensing, especially between accuracy and power consumption. The book presents solutions that emphasize must-have system characteristics such as energy efficiency, accuracy, robustness, adaptability, time-invariance, and optimal sensor sensing. Numerous application examples guide readers from fundamental concepts to the implementation of context-aware-related algorithms and frameworks. Covering theory and practical strategies for context awareness in mobile sensing, the book will help readers develop the modeling and analysis skills required to build futuristic context-aware framework designs for resource-constrained platforms. Includes best practices for designing and implementing practical context-aware frameworks in ubiquitous/mobile sensing Proposes a lightweight online classification method to detect user-centric postural actions Examines mobile device-based battery modeling under the scope of battery nonlinearities with respect to variant loads Unveils a novel discrete time inhomogeneous hidden semi-Markov model (DT-IHS-MM)-based generic framework to achieve a better realization of HAR-based mobile context awareness Supplying theory and equation derivations for all the concepts discussed, the book includes design tips for the implementation of smartphone programming as well as pointers on how to make the best use of MATLAB® for the presentation of performance analysis. Coverage includes lightweight, online, and unsupervised pattern recognition methods; adaptive, time-variant, and optimal sensory sampling strategies; and energy-efficient, robust, and inhomogeneous context-aware framework designs. Researchers will learn the latest modeling and analysis research on mobile sensing. Students will gain access to accessible reference material on mobile sensing theory and practice. Engineers will gain authoritative insights into cutting-edge system designs.
Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human Resources Performance explains why it is essential to account for the human factor when determining the various risks in the software engineering process. The book presents an IT human resources evaluation approach that is rooted in existing research and describes how to enhance existing approaches through strict use of software measurement and statistical principles and criteria. Discussing IT human factors from a risk assessment point of view, the book identifies, analyzes, and evaluates the basics of IT human performance. It details the IT human factors required to achieve desired levels of human performance prediction. It also provides a rigorous investigation of existing human factors evaluation methods, including IT expertise and Big Five, in combination with powerful statistical methods, such as failure mode and effect analysis (FMEA) and design of experiment (DoE). Supplies an overview of existing methods of human risk evaluation Provides a detailed analysis of IT role-based human factors using the well-known Big Five method for software engineering Models the human factor as a risk factor in the software engineering process Summarizes emerging trends and future directions In addition to applying well-known human factors methods to software engineering, the book presents three models for analyzing psychological characteristics. It supplies profound analysis of human resources within the various software processes, including development, maintenance, and application under consideration of the Capability Maturity Model Integration (CMMI) process level five.
This book offers a selection of the best papers presented at the 13th International Symposium on Location Based Services (LBS 2016), which was held in Vienna (Austria) from November 14 to 16, 2016. It provides an overview of recent research in the field, including the latest advances in outdoor/indoor positioning, smart environment, spatial modeling, personalization and context awareness, cartographic communication, novel user interfaces, crowd sourcing, social media, big data analysis, usability and privacy.
This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fifth volume covers global fintech trends and emerging technologies such as cloud computing and quantum computing, as well as the compliance and risk management frameworks for fintech companies. Together with the first part in applications and trends (fourth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I
Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market. Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package. The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distributed computing in simple terms Includes substantial vendor/tool material, especially for open source decisions Covers prominent software packages, including Hadoop and Oracle Endeca Examines GIS and machine learning applications Considers privacy and surveillance issues The book further explores basic statistical concepts that, when misapplied, can be the source of errors. Time and again, big data is treated as an oracle that discovers results nobody would have imagined. While big data can serve this valuable function, all too often these results are incorrect, yet are still reported unquestioningly. The probability of having erroneous results increases as a larger number of variables are compared unless preventative measures are taken. The approach taken by the authors is to explain these concepts so managers can ask better questions of their analysts and vendors as to the appropriateness of the methods used to arrive at a conclusion. Because the world of science and medicine has been grappling with similar issues in the publication of studies, the authors draw on their efforts and apply them to big data.
Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
Fog Computing: Concepts, Frameworks, and Applications is arranged in such a way that readers with no prior experience in Fog Computing may explore this domain. It is an accessible source of information for distributed computing researchers as well as professionals looking to improve their security and connectivity understanding in Internet of Things (IoT) devices. This book is also useful for researchers and professionals working in the field of wireless communication security and privacy research. This book is intended for students, professionals, researchers, and developers who are working in or interested in the field of Fog Computing. One of the book's distinguishing aspects is that it covers a variety of case studies and future possibilities in the field of Fog Computing. This book: Begins by covering the fundamental notions of Fog Computing to help readers grasp the technology, starting from the basics Explains Fog Computing architecture as well as the convergence of Fog, IoT, and Cloud Computing Provides an assessment of Fog Computing and its applications in the field of IoT Discusses the usage of software defined networking and machine learning algorithms as they apply to Fog Computing Describes the different security and privacy issues with Fog Computing and explores single point control systems for consumer devices using Edge-Fog Computing Outlines in detail how to leverage Blockchain technology in Fog Computing, as well as how to use Fog Computing in telemedicine and healthcare applications Examines the usage of communication protocols, simulation tools for Fog Computing implementation, and case studies in the fields of bioinformatics, disaster control, and IoT
This book is a collection of chapters from the IFIP working groups 13.8 and 9.4. The 10 papers included present experiences and research on the topic of digital transformation and innovation practices in the global south. The topics span from digital transformation initiatives to novel innovative technological developments, practices and applications of marginalised people in the global south.
Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
- Detailed examples of new technology and its important applications for global security and defence, sufficient guidelines for immediate implementations. - Aimed at system theorists, distributed algorithms designers, NASA, DARPA, and SDA network managers, defence and security personnel, university students interested in advanced MSc and PhD projects, and many others. - The book offers a concrete and very practical management solution for many problems described in other books in this area, which were presented mostly on general descriptive and qualitative levels
Because this is a book for engineers the practical coverage is
reinforced by use of the latest interanational standards, in
particular BICSI standards (USA and international) and EU
requirements. This will make the book ideal for the large number of
industry-based training courses. Coverage has also been matched to
the requirements of the revised City & Guilds 3466-04 course.
Mobile devices allow users to access information resources and services over many different distribution channels anywhere, anytime, anyhow. Technical and usage characteristics of mobile systems are highly variable with respect to user capabilities and context characteristics, therefore an immense level of flexibility is required. Barbara Pernici - with contributions by the research groups involved in the project - presents here a framework for mobile information systems, focussing on quality of service and adaptability at all architectural levels, ranging from adaptive applications to e-services, middleware, and infrastructural elements, as it was developed in the "Multichannel Adaptive Information Systems (MAIS)" project. The design models, methods, and tools developed in the project allow the realization of adaptive mobile information systems in a variety of different architectures. The book is divided into three parts: core technologies for mobile information systems (e.g., adaptive middleware and flexible e-services), enabling technologies (like data management on small devices or adaptive low-power hardware architectures or wireless networks), and methodological aspects of mobile information systems design (such as service profiling or user interface and e-service design for context-aware applications). It provides researchers in academia and industry with a comprehensive vision on innovative aspects which can be used as a basis for the development of new frameworks and applications.
This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.
As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker. |
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,838
Discovery Miles 48 380
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,808
Discovery Miles 98 080
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R6,527
Discovery Miles 65 270
|