![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
"Focuses broadly on those aspects of the UNIX environment that are needed to provide a more global understanding, especially in its dealing with distributed and networked systems, in a very practical and hands-on manner." -- IEEE Network Magazine
The book is focused on defense mechanisms as theoretical constructs
as well as the possibilities of their empirical registration by
different methods, and the application of these constructs in
different fields of psychology with special regard to concurrent
and predictive validity. It is argued that defense mechanisms are
in many ways to be seen as integrative constructs, not necessarily
restricted to psychoanalytic theory and that the potential fields
of their application have a wide ranging scope, comprising many
fields of psychology. Consequently empirical studies are presented
from the fields of clinical and personality psychology,
psychotherapy research and psychosomatic phenomena and diseases.
Methodological questions have a heavy weight in most of these
studies.
Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services. On the other hand, Software-as-a-Service (SaaS) is gaining popularity as a software delivery model through cloud platforms due to the many benefits to software vendors, as well as their customers. Multi-tenancy, which refers to the sharing of a single application instance across multiple customers or user groups (called tenants), is an essential characteristic of the SaaS model. Written in an easy to follow style with discussions supported by real-world examples, Service Orchestration as Organization introduces a novel approach with associated language, framework, and tool support to show how service orchestration techniques can be used to engineer and deploy SaaS applications.
This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.
This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.
A new product can be easy or difficult to use, it can be efficient or cumbersome, engaging or dispiriting, it can support the way we work and think - or not. What options are available for systematically addressing such parameters and provide users with an appropriate functionality, usability and experience? In the last decades, several fields have evolved that encompass a user-centred approach to create better products for the people who use them. This book provides a comprehensible introduction to the subject. It is aimed first and foremost at people involved in software and product development - product managers, project managers, consultants and analysts, who face the major challenge of developing highly useful and usable products. Topics include: The most important user-centred techniques and their alignment in the development process Planning examples of user-centred activities for projects User-oriented approaches for organisations Real-life case studies Checklists, tips and a lot of background information provide help for practitioners
Healthcare organizations are constantly designing effective systems aiming to help achieve customer satisfaction. Web-based and mobile-based technologies are two forms of information technologies that healthcare executives are increasingly looking to merge as an opportunity to develop such systems. ""Web Mobile-Based Applications for Healthcare Management"" addresses the difficult task of managing admissions and waiting lists while ensuring a quick and convincing response to unanticipated changes of the clinical needs. ""Web Mobile-Based Applications for Healthcare Management"" tackles the limitations of traditional systems, and takes into consideration the dynamic nature of clinical needs, scarce resources, alternative strategies, and customer satisfaction in an environment that often imposes unexpected deviation from planned activities.
This book highlights technology trends and challenges that trace the evolution of antenna design, starting from 3rd generation phones and moving towards the latest release of LTE-A. The authors explore how the simple monopole and whip antenna from the GSM years have evolved towards what we have today, an antenna design that is compact, multi-band in nature and caters to multiple elements on the same patch to provide high throughput connectivity. The scope of the book targets a broad range of subjects, including the microstrip antenna, PIFA antenna, and the monopole antenna to be used for different applications over three different mobile generations. Beyond that, the authors take a step into the future and look at antenna requirements for 5G communications, which already has the 5G drive in place with prominent scenarios and use-cases emerging. They examine these, and put in place the challenges that lie ahead for antenna design, particularly in mm-Wave design. The book provides a reference for practicing engineers and under/post graduate students working in this field.
This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.
With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.
This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.
This book presents the edited proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), which was held on May 24-26, 2017 in Wuhan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, share their experiences and exchange new ideas and information. The research results included relate to all aspects (theory, applications and tools) of computer and information science, and discuss the practical challenges encountered and the solutions adopted to solve them. The work selected represents 17 of the most promising papers from the conference, written by authors who are certain to make further significant contributions to the field of computer and information science.
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions. Standards included: ETSI M2M, IEEE 802.15.4, 3GPP (GPRS, 3G, 4G), Bluetooth Low Energy/Smart, IETF 6LoWPAN, IETF CoAP, IETF RPL, Power Line Communication, Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), ZigBee, 802.11, Broadband Forum TR-069, Open Mobile Alliance (OMA) Device Management (DM), ISA100.11a, WirelessHART, M-BUS, Wireless M-BUS, KNX, RFID, Object Management Group (OMG) Business Process Modelling Notation (BPMN)Key technologies for M2M and IoTcovered: Embedded systems hardware and software, devices and gateways, capillary and M2M area networks, local and wide area networking, M2M Service Enablement, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, knowledge discovery and management, business process and enterprise integration, Software as a Service and cloud computingCombines both technical explanations together with design features of M2M/IoT and use cases. Together, these descriptions will assist you to develop solutions that will work in the real worldDetailed description of the network architectures and technologies that form the basis of M2M and IoTClear guidelines and examples of M2M and IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Participatory Sensing, and Industrial AutomationA description of the vision for M2M and its evolution towards IoT"
Focusing on connection technologies used for both single-mode and multimode fibers, this book explains multifiber connections such as mass-fusion splice and multifiber connectors. Information on fluoride glass fibers, doped fibers (EDFA), and components is included.
The main objectives of this book are to expose key aspects that have a relevance when dealing with open data viewed from different perspectives and to provide appealing examples of how open data is implemented worldwide. The concept of open data as we know it today is the result of many different initiatives, both of a legislative and non-legislative nature, and promoted by a wide range of actors. Numerous regulatory antecedents to foster the concept of open data and embed it in national and international policy agendas have been undertaken on both sides of the Atlantic, as well as at a supranational level. The book highlights a number of the efforts made to promote open data in Europe, Asia and the United States. In addition to new insights, practical guidance and multiple disciplinary perspectives on open data, the book also addresses the transformation of current developments towards open data, which may be referred to as the democratisation of data. This book will support open data practitioners as well as open data scholars in their endeavours to promote open data implementation and research. Bastiaan van Loenen is associate professor and director of the Knowledge Centre Open Data at the Faculty of Architecture and The Built Environment of Delft University of Technology in the Netherlands, as is Glenn Vancauwenberghe, who is a post-doctoral researcher, and Joep Crompvoets is a professor at the Public Governance Institute of the KU Leuven in Belgium.
Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).
Recent advances in internet architecture have led to the advent and subsequent explosion of cloud computing technologies, providing businesses with a powerful toolbox of collaborative digital resources. These technologies have fostered a more flexible, decentralized approach to IT infrastructure, enabling businesses to operate in a more agile fashion and on a globalized scale. Enterprise Management Strategies in the Era of Cloud Computing seeks to explore the possibilities of business in the cloud. Targeting an audience of research scholars, students, software developers, and business professionals, this premier reference source provides a cutting-edge look at the exciting and multifaceted relationships between cloud computing, software virtualization, collaborative technology, and business infrastructure in the 21st Century.
This volume elaborates on both the qualitative and quantitative aspects of resilience. Reviewing the literature exploring the concept of resilience in engineering, it discusses resilience in terms of the various definitions used, the methodologies proposed to characterize resilience, and the metrics put forward to quantify the resilience of specific service infrastructure systems. The review also identifies the key factors that contribute to organizational resilience. The concept of resilience is compared to other system properties such as reliability, robustness, flexibility and agility, by taking into consideration what systems are prepared against (types of failure), the causes of failure in systems (uncertainty), and how systems react to overcome failure (level of adaptability). A review is also provided of several resilience-enabling schemes, which improve resilience by reducing vulnerability and increasing adaptive capacity. The book puts forward a new framework, the Networked Infrastructure Resilience Assessment (NIRA) framework, through which the resilience of systems can be measured by assessing the impact of disruptions on key performance measures. By applying the framework to various case studies, the book demonstrates the ability of the proposed framework to assess resilience across a wide variety of networked infrastructure systems. The case studies probe the resilience of the following critical infrastructure systems in the face of specific disruptive events: telecommunication, transportation, maritime transportation and organizational networks. This text is intended for all levels of academia from undergraduate through to research level as well as professionals and decision-makers involved in the development, analysis and evaluation of infrastructure systems.
Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently. CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators. The second approach is concerned with formulation of CAC as an optimization problem to minimize call drop, satisfying a set of constraints on feasibility and availability of channels, hotness of cells, and velocity and angular displacement of mobile stations. Evolutionary techniques, including Genetic Algorithm and Biogeography Based Optimization, have been employed to solve the optimization problems. The proposed approaches outperform traditional methods with respect to grade and quality of services. |
You may like...
Combinatorial Optimization Problems in…
Michael Z. Zgurovsky, Alexander A. Pavlov
Hardcover
R4,102
Discovery Miles 41 020
Schedule-Based Modeling of…
Nigel H.M. Wilson, Agostino Nuzzolo
Hardcover
R2,690
Discovery Miles 26 900
Manufacturing Integrated Design - Sheet…
Peter Groche, Enrico Bruder, …
Hardcover
R4,107
Discovery Miles 41 070
Data Envelopment Analysis - A Handbook…
Wade D Cook, Joe Zhu
Hardcover
R4,140
Discovery Miles 41 400
Container Terminals and Cargo Systems…
Kap Hwan Kim, Hans-Otto Gunther
Hardcover
R4,389
Discovery Miles 43 890
|