![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
This book gives examples from healthcare institutions that are using IT automation and innovation to drive change and provides guidance on the strategic direction of HIT over the next five years. Improving the delivery of healthcare through HIT is vital for both the economic success of healthcare organizations and the care of the patient, but most EMR systems do not have an integrated and architected approach. This book provides a detailed approach on how to leverage IT for transformation. It also shows how to build upon the experiences of other industries and helps foster innovation by providing a vision of where technology can be an enabler.
Recent computer-based tools for project planning and management focus on user-friendliness and interconnectivity. However, these programs function on the Critical Path Method, or CPM, which was created in the 1950s. These programs, which involve simplistic models and methods, ignore the fact that the underlying computations on which they function have become woefully inadequate for the complex projects of today. The product of nearly a decade of work, The Dynamic Progress Method: Using Advanced Simulation to Improve Project Planning and Management provides an overview of the research conducted while illustrating some of the issues with current approaches. It presents the Dynamic Progress Method (DPM), an innovative simulation-based approach to project management. It also includes instructions on how to use the accompanying DPM-based simulation tool pmBLOX to plan, manage, and analyze projects. This groundbreaking book is a must-have resource for project planning and management. It introduces a new and better way of planning, estimating, and managing projects that corrects some of the fundamental flaws of the CPM. It brings the computational integrity of planning simulations up to speed with modern needs, making it useful not only to current project managers but also to students who will become project managers.
This book combines traditional graph theory with the matroid view of graphs in order to throw light on the mathematical approach to network analysis. The authors examine in detail two dual structures associated with a graph, namely circuits and cutsets. These are strongly dependent on one another and together constitute a third, hybrid, vertex-independent structure called a graphoid, whose study is here termed hybrid graph theory. This approach has particular relevance for network analysis. The first account of the subject in book form, the text includes many new results as well as the synthesizing and reworking of much research done over the past thirty years (historically, the study of hybrid aspects of graphs owes much to the foundational work of Japanese researchers). This work will be regarded as the definitive account of the subject, suitable for all working in theoretical network analysis: mathematicians, computer scientists or electrical engineers.
Interactive Media is a new research field and a landmark in multimedia development. "The Era of Interactive Media "is an edited volume contributed from world experts working in academia, research institutions and industry. "The Era of Interactive Media"focuses mainlyon Interactive Media and its various applications. This book also covers multimedia analysis and retrieval; multimedia security rights and management; multimedia compression and optimization; multimedia communication and networking; and multimedia systems and applications. "The Era of Interactive Media "is designed for a professional audience composed of practitioners and researchers working in the field of multimedia. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference. "
Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
This book constitutes the refereed proceedings of the 13th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2022, held in Caparica, Portugal, during June-July 2022. The 22 full papers presented were carefully reviewed and selected from 48 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. The papers are organized into the following topical sub-headings: Smart Systems Thinking; Cyber-physical Systems; health-related Digitalization; Electric Systems and Machines; Smart Devices; and Control and Digital Platforms.
Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight. Features:- Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.
This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.
This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.
A resource on quantitative methods and methodologies for researchers, practitioners, and doctoral students Demonstrates, in a step-by-step fashion, the development of the theoretically sound general framework allowing for instantiating a variety of research models. Illustrates a process of constructing of a variety of methodological modules- components comprised of complementary quantitative data analytic methods Explores the negative societal effects of implications of ICT and discusses future research directions to mitigate such effects
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including: Preparing your environment for effective incident response Leveraging MITRE ATT&CK and threat intelligence for active network defense Local and remote triage of systems using PowerShell, WMIC, and open-source tools Acquiring RAM and disk images locally and remotely Analyzing RAM with Volatility and Rekall Deep-dive forensic analysis of system drives using open-source or commercial tools Leveraging Security Onion and Elastic Stack for network security monitoring Techniques for log analysis and aggregating high-value logs Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more Effective threat hunting techniques Adversary emulation with Atomic Red Team Improving preventive and detective controls
This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: * Multimedia Information Systems * Artificial Intelligence * Pervasive and Ubiquitous Computing * Eco and Bio Informatics * Internet and Web Applications and Services * Wireless and Mobile Communications and Services * Computer Networks, Security and Cryptography * Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.
This book analyzes novel possibilities offered to the telecommunication engineer in designing tomorrow's optical networks. Currently, optical and optoelectronic technologies make possible the realization of high-performance optical fiber communication systems and networks with the adoption of WDM configurations and both linear and nonlinear optical amplifications. The last step for increasing network throughput is represented by the implementation of multidimensional modulation formats in coherent optical communication systems, which enable increasing the bit rate/channel toward 400 Gbit/s/channel and beyond. Following this approach, the main emphasis is placed on innovative optical modulations. Multidimensional Modulations in Optical Communication Systems is an essential guide to the world of innovative optical communications from the point of view of growing capacity and security. It guides researchers and industries with the aim to exploring future applications for optical communications.
The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.
Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .
This book constitutes the refereed proceedings of the 16th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2020, which was supposed to be held in Salford, UK, in June 2020, but was held virtually instead due to the COVID-19 pandemic. The 18 revised full papers presented were carefully reviewed and selected from 29 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book is a detailed reference on biomedical applications using Deep Learning. Because Deep Learning is an important actor shaping the future of Artificial Intelligence, its specific and innovative solutions for both medical and biomedical are very critical. This book provides a recent view of research works on essential, and advanced topics. The book offers detailed information on the application of Deep Learning for solving biomedical problems. It focuses on different types of data (i.e. raw data, signal-time series, medical images) to enable readers to understand the effectiveness and the potential. It includes topics such as disease diagnosis, image processing perspectives, and even genomics. It takes the reader through different sides of Deep Learning oriented solutions. The specific and innovative solutions covered in this book for both medical and biomedical applications are critical to scientists, researchers, practitioners, professionals, and educations who are working in the context of the topics.
Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.
Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.
Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems
Issues surrounding business complexity plague organizations throughout the world. This situation is particularly true of the numerous complex projects and programs upon which organizations embark on a regular basis. Current project management processes and standards are based on Newtonian/Cartesian principles, such as linearity, reductionism, and single source problem causation. However, complex projects exhibit both Newtonian/Cartesian characteristics and complex systems characteristics, such as emergence, self-organization, non-linearity, non-reductionism, and multi-source problem causation. To conduct successful projects, complementary ways of approaching projects are required, and new competencies for those who manage projects and for those on project teams are required as well. There are a number of books available to help project managers and teams address the issue of systems behavior. However, there are none that approach complex projects from a neuroscience-based approach to human behavior and ambiguity. This book does exactly that in order to reduce project complexity and thereby increase the probability of project success. Cognitive Readiness in Project Teams looks to the concept of cognitive readiness (CR), first developed by the United States Department of Defense to better prepare and manage teams of individuals in complex battlefield situations. Its intent is to make project managers and teams more focused, responsive, resilient and adaptive through self-mastery and the mastering of interpersonal relationships. It introduces a CR framework for project managers and teams. This framework has neuroscience fundamentals and theorems as the foundation for the three pillars of CR: mindfulness, emotional intelligence, and social intelligence. The book is a compendium of chapters written by renowned authors in the fields of project management, neuroscience, mindfulness, and emotional and social intelligence. |
You may like...
Evaluating Mental Workload for Improved…
Arturo Realyvasquez Vargas, Karina Cecilia Arredondo-Soto, …
Hardcover
R7,275
Discovery Miles 72 750
The Life Cycles of the Council on…
James K Conant, Peter J. Balint
Hardcover
R3,741
Discovery Miles 37 410
Disability in the Workplace - A…
Jacqueline H. Stephenson, Natalie Persadie
Hardcover
R3,986
Discovery Miles 39 860
|