![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
Recent advances in internet architecture have led to the advent and subsequent explosion of cloud computing technologies, providing businesses with a powerful toolbox of collaborative digital resources. These technologies have fostered a more flexible, decentralized approach to IT infrastructure, enabling businesses to operate in a more agile fashion and on a globalized scale. Enterprise Management Strategies in the Era of Cloud Computing seeks to explore the possibilities of business in the cloud. Targeting an audience of research scholars, students, software developers, and business professionals, this premier reference source provides a cutting-edge look at the exciting and multifaceted relationships between cloud computing, software virtualization, collaborative technology, and business infrastructure in the 21st Century.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.
This book explores the concept of a map as a fundamental data type. It defines maps at three levels. The first is an abstract level, in which mathematic concepts are leveraged to precisely explain maps and operational semantics. The second is at a discrete level, in which graph theory is used to create a data model with the goal of implementation in computer systems. Finally, maps are examined at an implementation level, in which the authors discuss the implementation of a fundamental map data type in database systems. The map data type presented in this book creates new mechanisms for the storage, analysis, and computation of map data objects in any field that represents data in a map form. The authors develop a model that includes a map data type capable of representing thematic and geometric attributes in a single data object. The book provides a complete example of mathematically defining a data type, ensuring closure properties of those operations, and then translating that type into a state that is suited for implementation in a particular context. The book is designed for researchers and professionals working in geography or computer science in a range of fields including navigation, reasoning, robotics, geospatial analysis, data management, and information retrieval.
Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations. ""Breakthrough Perspectives in Network and Data Communications Security, Design and Applications"" addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.
This book provides a complete picture of several decision support tools for predictive maintenance. These include embedding early anomaly/fault detection, diagnosis and reasoning, remaining useful life prediction (fault prognostics), quality prediction and self-reaction, as well as optimization, control and self-healing techniques. It shows recent applications of these techniques within various types of industrial (production/utilities/equipment/plants/smart devices, etc.) systems addressing several challenges in Industry 4.0 and different tasks dealing with Big Data Streams, Internet of Things, specific infrastructures and tools, high system dynamics and non-stationary environments . Applications discussed include production and manufacturing systems, renewable energy production and management, maritime systems, power plants and turbines, conditioning systems, compressor valves, induction motors, flight simulators, railway infrastructures, mobile robots, cyber security and Internet of Things. The contributors go beyond state of the art by placing a specific focus on dynamic systems, where it is of utmost importance to update system and maintenance models on the fly to maintain their predictive power.
This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.
When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of multi-structured streaming (real-time) data that is continuously generated by different sources at high speed. Streaming analytics allows the management, monitoring, and real-time analytics of live streaming data. The topic has grown in importance due to the emergence of online analytics and edge and IoT platforms. A real digital transformation is being achieved across industry verticals through meticulous data collection, cleansing and crunching in real time. Capturing and subjecting those value-adding events is considered to be the prime task for achieving trustworthy and timely insights. The authors articulate and accentuate the challenges widely associated with streaming data and analytics, describe data analytics algorithms and approaches, present edge and fog computing concepts and technologies and show how streaming analytics can be accomplished in edge device clouds. They also delineate several industry use cases across cloud system operations in transportation and cyber security and other business domains. The book will be of interest to ICTs industry and academic researchers, scientists and engineers as well as lecturers and advanced students in the fields of data science, cloud/fog/edge architecture, internet of things and artificial intelligence and related fields of applications. It will also be useful to cloud/edge/fog and IoT architects, analytics professionals, IT operations teams and site reliability engineers (SREs).
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
In the last decade we have seen the emergence of a new inter-disciplinary field concentrating on the understanding large networks which are dynamic, large, open, and have a structure that borders order and randomness. The field of Complex Networks has helped us better understand many complex phenomena such as spread of decease, protein interaction, social relationships, to name but a few. The field of Complex Networks has received a major boost caused by the widespread availability of huge network data resources in the last years. One of the most surprising findings is that real networks behave very distinct from traditional assumptions of network theory. Traditionally, real networks were supposed to have a majority of nodes of about the same number of connections around an average. This is typically modeled by random graphs. But modern network research could show that the majority of nodes of real networks is very low connected, and, by contrast, there exists some nodes of very extreme connectivity (hubs). The current theories coupled with the availability of data makes the field of Complex Networks (sometimes called Network Sciences) one of the most promising interdisciplinary disciplines of today. This sample of works in this book gives as a taste of what is in the horizon such controlling the dynamics of a network and in the network, using social interactions to improve urban planning, ranking in music, and the understanding knowledge transfer in influence networks."
This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.
Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance. "The Network Simulation Experiments Manual" takes this
instructional tool a step further and provides detailed experiments
on core networking topologies for use in this simulation
environment. Various scenarios are presented within each topology:
Review questions, suggested readings, a lab report, and exercises
accompanying each assignment. The manual also comes with directions
for downloading the free and easy-to-install OPNET IT Guru Academic
Edition software. This software provides a virtual environment for
modeling, analyzing, and predicting the performance of IT
infrastructures, including applications, servers, and networking
technologies. Prepared by Professor Emad Aboelela of the Taibah
University, Saudi Arabia, the experiments in the manual are closely
tied to the organization of "Computer Networks: A Systems Approach,
Fifth Edition" and, when used together, serve as a complete tool
for understanding how and why computer networks function as they
do.
Cloud computing has proven to be a successful paradigm of service-oriented computing, and has revolutionized the way computing infrastructures are abstracted and used. By means of cloud computing technology, massive data can be managed effectively and efficiently to support various aspects of problem solving and decision making. Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud. Providing timely, research-based information relating to data storage, sharing, extraction, and indexing in cloud systems, this publication is an ideal reference source for graduate students, IT specialists, researchers, and professionals working in the areas of data and knowledge engineering.
Most of the literature on 5G has been in the form of standards, reports, and industry papers and articles. Because of this, researchers from non-scientific or non-engineering disciplines have struggled to understand how it is or could be operationalized and standardized across the globe. Here Peter Curwen and Jason Whalley offer the first manageable overview of 5G for a non-technical audience. This book provides a full review of the current literature, both academic and professional; an in-depth but non-technical discussion of the historical background of the development of 5G; and a broad, multidisciplinary survey of major issues including spectrum, and the licensing and launch of 5G networks throughout the world, distinguishing standalone 5G from non-standalone 5G. Throughout, there is consideration given to how operators and equipment vendors make money from mobile networks, and where money is potentially to be made in the years to come. Understanding 5G Mobile Networks: A Multidisciplinary Primer is a must-read not only for researchers and students in economics, business, strategy, and operations and logistics, but also for regulators, mobile companies, vertical operators, and anyone else interested in the development of this vital technology.
A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.
The volume "The UNESCO Memory of the World Programme: Key Aspects and Recent Developments" responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which has received little attention from scholarship so far. This sixth publication in the Heritage Studies Series provides a first collection of differing approaches (including reflected reports, essays, research contributions, and theoretical reflections) for the study of the MoW Programme, offering a basis for follow-up activities. The volume, edited by Ray Edmondson, Lothar Jordan and Anca Claudia Prodan, brings together 21 scholars from around the globe to present aspects deemed crucial for understanding MoW, its development, relevance and potential. The aim is to encourage academic research on MoW and to enhance the understanding of its potential and place within Heritage Studies and beyond.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint. Provides the background necessary to understand current generation multi-play applications and their service requirements Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.
This book on Infectious Disease Informatics (IDI) and biosurveillance is intended to provide an integrated view of the current state of the art, identify technical and policy challenges and opportunities, and promote cross-disciplinary research that takes advantage of novel methodology and what we have learned from innovative applications. This book also fills a systemic gap in the literature by emphasizing informatics driven perspectives (e.g., information system design, data standards, computational aspects of biosurveillance algorithms, and system evaluation). Finally, this book attempts to reach policy makers and practitioners through the clear and effective communication of recent research findings in the context of case studies in IDI and biosurveillance, providing "hands-on" in-depth opportunities to practitioners to increase their understanding of value, applicability, and limitations of technical solutions. This book collects the state of the art research and modern perspectives of distinguished individuals and research groups on cutting-edge IDI technical and policy research and its application in biosurveillance. The contributed chapters are grouped into three units. Unit I provides an overview of recent biosurveillance research while highlighting the relevant legal and policy structures in the context of IDI and biosurveillance ongoing activities. It also identifies IDI data sources while addressing information collection, sharing, and dissemination issues as well as ethical considerations. Unit II contains survey chapters on the types of surveillance methods used to analyze IDI data in the context of public health and bioterrorism. Specific computational techniques covered include: text mining, time series analysis, multiple data streams methods, ensembles of surveillance methods, spatial analysis and visualization, social network analysis, and agent-based simulation. Unit III examines IT and decision support for public health event response and bio-defense. Practical lessons learned in developing public health and biosurveillance systems, technology adoption, and syndromic surveillance for large events are discussed. The goal of this book is to provide an understandable interdisciplinary IDI and biosurveillance reference either used as a standalone textbook or reference for students, researchers, and practitioners in public health, veterinary medicine, biostatistics, information systems, computer science, and public administration and policy.
This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.
The governance of global communications is consolidating as a field where innovative political practices of multi-actor collaboration are being experimented. Within this broad political landscape, the Internet governance domain is emerging as one of the most relevant areas where institutional and non-institutional actors are converging in order to reform collectively governance mechanisms that will determine the future developments of the Internet technology. This book adopts a network approach to study the progressive and collective construction of a new discourse on Internet governance fostered by the realization of the United Nations Internet Governance Forum, a new "space for multi-stakeholder policy-dialogue" (WSIS Tunis Agenda 2005, art. 72). Looking both at how semantic and social connections are created in the online and the offline discursive spaces, this book seeks to provide insights on how principles of democratic collaboration between institutional and non-institutional actors are translated into actual political dynamics; on how the global political agenda on the governance of the Internet comes to be shaped thanks to the provision of heterogeneous and sometimes opposite thematic inputs; and, finally, on how the roles of States, intergovernmental bodies, civil society entities in participatory supra-national politics are progressively being (re)defined. Starting form the Internet governance case study, this books aims at providing an alternative approach to the study of supra-national politics as well as of global communication governance processes: one that considers simultaneously contents and processes of political dynamics and examines how immaterial resources, such as information and communication, become a new field for multi-actor politics experiments, conflicts and network construction.
This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers chipless RFID components in block diagram representation and introduce FCC requirements which should be considered in the design procedure of each component. The third chapter is dedicated to the complex natural resonance-based design of chipless RFID tags. The next chapter concerns about the detection techniques introduced for the identification of chipless RFID tags. The fifth chapter is dedicated to the localization and anti-collision techniques in chipless RFID systems. Final chapter is chipless RFID tags as sensors. It provides some applications where the tag can be used as both ID and sensor. The tag specifications and detection issues are addressed in this section. |
You may like...
Cloud Computing Applications and…
Saikat Gochhait, David Tawei Shou, …
Hardcover
R5,931
Discovery Miles 59 310
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,370
Discovery Miles 53 700
|