![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts in areas of research relevant to the study of complex, intelligent, and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. The book is divided into three parts focusing on complex intelligent network systems, efficient resource management in complex systems, and artificial data mining systems. Through the presentation of these diverse areas of application, the volume provides insights into the multidisciplinary nature of complex problems. Throughout the entire book, special emphasis is placed on optimization and efficiency in resource management, network interaction, and intelligent system design. This book presents the most recent interdisciplinary results in this area of research and can serve as a valuable tool for researchers interested in defining and resolving the types of complex problems that arise in networking, optimization, and artificial intelligence.
The unrelenting growth of wireless communications continues to raise new research and development problems that require unprecedented interactions among communication engineers. In particular, specialists in transmission and specialists in networks must often cross each other's boundaries. This is especially true for CDMA, an access technique that is being widely accepted as a system solution for next-generation mobile cellular systems, but it extends to other system aspects as well. Major challenges lie ahead, from the design of physical and radio access to network architecture, resource management, mobility management, and capacity and performance aspects. Several of these aspects are addressed in this volume, the fourth in the edited series on Multiaccess, Mobility and Teletraffic for Wireless Communications. It contains papers selected from MMT'99, the fifth Workshop held on these topics in October 1999 in Venezia, Italy. The focus of this workshop series is on identifying, presenting, and discussing the theoretical and implementation issues critical to the design of wireless communication networks. More specifically, these issues are examined from the viewpoint of the impact each one of them can have on the others. Specific emphasis is given to the evolutionary trends of universal wireless access and software radio. Performance improvements achieved by spectrally efficient codes and smart antennas in experimental GSM testbeds are presented. Several contributions address critical issues regarding multimedia services for Third-Generation Mobile Radio Networks ranging from high rate data transmission with CDMA technology to resource allocation for integrated Voice/WWW traffic.
This is an examination of the history and the state of the art of the quest for visualizing scientific knowledge and the dynamics of its development. Through an interdisciplinary perspective this book presents profound visions, pivotal advances, and insightful contributions made by generations of researchers and professionals, which portrays a holistic view of the underlying principles and mechanisms of the development of science. This updated and extended second edition: highlights the latest advances in mapping scientific frontiers examines the foundations of strategies, principles, and design patterns provides an integrated and holistic account of major developments across disciplinary boundaries "Anyone who tries to follow the exponential growth of the literature on citation analysis and scientometrics knows how difficult it is to keep pace. Chaomei Chen has identified the significant methods and applications in visual graphics and made them clear to the uninitiated. Derek Price would have loved this book which not only pays homage to him but also to the key players in information science and a wide variety of others in the sociology and history of science." - Eugene Garfield "This is a wide ranging book on information visualization, with a specific focus on science mapping. Science mapping is still in its infancy and many intellectual challenges remain to be investigated and many of which are outlined in the final chapter. In this new edition Chaomei Chen has provided an essential text, useful both as a primer for new entrants and as a comprehensive overview of recent developments for the seasoned practitioner." - Henry Small Chaomei Chen is a Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA, and a ChangJiang Scholar at Dalian University of Technology, Dalian, China. He is the Editor-in-Chief of Information Visualization and the author of Turning Points: The Nature of Creativity (Springer, 2012) and Information Visualization: Beyond the Horizon (Springer, 2004, 2006).
The twentieth century ended with the vision of smart dust: a network of wirelessly connected devices whose size would match that of a dust particle, each one a se- containedpackageequippedwithsensing, computation, communication, andpower. Smart dust held the promise to bridge the physical and digital worlds in the most unobtrusive manner, blending together realms that were previously considered well separated. Applications involved scattering hundreds, or even thousands, of smart dust devices to monitor various environmental quantities in scenarios ranging from habitat monitoring to disaster management. The devices were envisioned to se- organize to accomplish their task in the most ef?cient way. As such, smart dust would become a powerful tool, assisting the daily activities of scientists and en- neers in a wide range of disparate disciplines. Wireless sensor networks (WSNs), as we know them today, are the most no- worthy attempt at implementing the smart dust vision. In the last decade, this ?eld has seen a fast-growing investment from both academia and industry. Signi?cant ?nancial resources and manpower have gone into making the smart dust vision a reality through WSNs. Yet, we still cannot claim complete success. At present, only specialist computerscientists or computerengineershave the necessary background to walk the road from conception to a ?nal, deployed, and running WSN syst
Today, the information systems (IS) discipline faces new challenges. Emerging technologies as well as matured approaches for the social, technical, and developmental role of IS provide a new context for the evolution of the discipline over the next few years. ""Emerging Topics and Technologies in Information Systems"" communicates the challenges and opportunities that information systems research is dealing with today while promoting cutting-edge research on how current IS support is creating the critical backbone for the knowledge society. This book is an essential reference for policy makers, government officers, academicians, and practitioners thirsty for knowledge on IS and IT beyond traditional textbooks.
Systematic Design of Sigma-Delta Analog-to-Digital Converters
describes the issues related to the sigma-delta analog-to-digital
converters (ADCs) design in a systematic manner: from the top level
of abstraction represented by the filters defining signal and noise
transfer functions (STF, NTF), passing through the architecture
level where topology-related performance is calculated and
simulated, and finally down to parameters of circuit elements like
resistors, capacitors, and amplifier transconductances used in
individual integrators. The systematic approach allows the
evaluation of different loop filters (order, aggressiveness,
discrete-time or continuous-time implementation) with quantizers
varying in resolution. Topologies explored range from simple single
loops to multiple cascaded loops with complex structures including
more feedbacks and feedforwards. For differential circuits, with
switched-capacitor integrators for discrete-time (DT) loop filters
and active-RC for continuous-time (CT) ones, the passive integrator
components are calculated and the power consumption is estimated,
based on top-level requirements like harmonic distortion and noise
budget.
Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium will be of interest to network designers, developers, and operators. This book is a collection of papers given at the European Cost Telecommunications Symposium. The Symposium was broken down into four sessions: Modelling and Simulation. Teletraffic Modelling. Communications Networks Simulation. Problems in Simulation. Each session addressed a wide spectrum of subjects. The symposium covered nearly all of the important aspects of simulation modeling and tools for the design and performance evaluation of communication techniques and systems. Emerging techniques were emphasized. Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium is a useful reference work for practicing engineers and academic researchers.
Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration
Very little has been written to address the emerging trends in social software and technology. With these technologies and applications being relatively new and evolving rapidly, research is wide open in these fields. Social Software and Web 2.0 Technology Trends fills this critical research need, providing an overview of the current state of Web 2.0 technologies and their impact on organizations and educational institutions. Written for academicians and practicing managers, this estimable book presents business applications as well as implementations for institutions of higher education with numerous examples of how these technologies are currently being used. Delivering authoritative insights to a rapidly evolving domain of technology application, this book is an invaluable resource for both academic libraries and for classroom instruction.
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications. Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters. The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.
The author’s main concern is to promote understanding of the basic ideas underlying switching theory. Nothing is taken for granted, whether it is the concept of a logic variable, that of feedback in a latch or sequential circuit, or the necessity to encode internal states. This very basic and thorough approach enables the development of new concepts such as Composition, or Verification. The theoretical side is enhanced by using predicate (instead of propositional) logic allowing for formal proofs till now unattainable. On the practical side, sequential circuits that hitherto were obtained intuitively are now open to a formal synthesis procedure.
The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. This book provides significant evidence that there are multiple motivations that lead states to participate in human rights treaties.
This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?
Asynchronous Transfer Mode (ATM) has revolutionized telecommunications, and has become an integral part of the networking infrastructure. This introductory well-structured text on ATM networks describes their development, architecture, congestion control, deployment, and signalling in an intuitive, accessible way. It covers extensive background information and includes exercises that support the explanations throughout the book. The networking expert Harry G. Perros explains ATM networks, including such hot topics as:
The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.
Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. 1.1 Historical Overview We propose that Decision Support System can be considered as a design conception conceived within the computer industry to facilitate the use of computer technology in organisations (Keen, 1991). This framework, built during the late 1970s, offers computer and communication technology as support to the decision process which constitutes, in this view, the core of the management process. The DSS framework offers the following capabilities: * Access: ease of use, wide variety of data, analysis and modelling capacity. * Technological: software gel)eration tools. * Development modes: interactive and evolutionary. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process. Thus, the human being is understood metaphorically as a data processing machine. Mental processes are associated with the manipulation of symbols aOO human communication to signal transmission.
With the proliferation of ISDN and mobile communication systems, modern commu nication networks are becoming larger-scale, higher-speed, and more complex than ever before. Therefore, besides hardware development, extensive research on system technolo gies with respect to the performance evaluation and management is indispensable for the proper design, development and operation of future complex communication networks. The International Conference on the Performance and Management of Complex Com munication Systems (PMCCN '97) was held from November 17 to 21, 1997, at Tsukuba Science City, Japan. This was the fifth international conference on the performance as pects of communication networks held every three years in Japan (1985 in Tokyo; 1988, 1991, and 1994 in Kyoto). The conference was sponsored by the International Federa tion of Information Processing (IFIP) Working Group (WG) 6.3 Performance of Com munication Systems, and 7.3 Computer System Modelling, University of Tsukuba, Kyoto University, and The Telecommunication Advancement Foundation (TAF)."
International Conference Intelligent Network and Intelligence in Networks (2IN97) French Ministry of Telecommunication, 20 Avenue de Segur, Paris -France September 2-5, 1997 Organizer: IFIP WG 6.7 -Intelligent Networks Sponsorship: IEEE, Alcatel, Ericsson, France Telecom, Nokia, Nordic Teleoperators, Siemens, Telecom Finland, Lab. PRiSM Aim of the conference To identify and study current issues related to the development of intelligent capabilities in networks. These issues include the development and distribution of services in broadband and mobile networks. This conference belongs to a series of IFIP conference on Intelligent Network. The first one took place in Lappeeranta August 94, the second one in Copenhagen, August 95. The proceedings of both events have been published by Chapman&Hall. IFIP Working Group 6.7 on IN has concentrated with the research and development of Intelligent Networks architectures. First the activities have concentrated in service creation, service management, database issues, feature interaction, IN performance and advanced signalling for broadband services. Later on the research activities have turned towards the distribution of intelligence in networks and IN applications to multimedia and mobility. The market issues of new services have also been studied. From the system development point of view, topics from OMG and TINA-C have been considered.
Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.
This book provides unique insight into the use of intranets and extranets. Corporate intranets and the use of internet technology are relatively recent phenomena and the development of these technologies is now fuelling the most significant changes in corporate infrastructure since the development of the PC. The impact is likely to be even greater and is heralding radical changes in the way organizations operate.
Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution. The authors, graduate faculty at Penn State University, avoid an overly scholarly style and infuse the text with entertaining sidebars, cartoons, stories, and jokes. They provide names for the antipatterns that are visual, humorous, and memorable. Using real-world anecdotes, they illustrate key concepts in an engaging manner. This updated edition sheds light on new management and environmental antipattems and includes a new chapter, six updated chapters, and new discussion questions. Topics covered include leadership principles, environmental antipatterns, group patterns, management antipatterns, and team leadership. Following introductory material on management theory and human behavior, the text catalogs the full range of management, cultural, and environmental antipatterns. It includes thought-provoking exercises that each describe a situation, ask which antipatterns are present, and explain how to refactor the situation. It provides time-tested advice to help you overcome bad practices through successful interaction with your clients, customers, peers, supervisors, and subordinates. |
You may like...
Transactions on Intelligent Welding…
Shan-Ben Chen, YuMing Zhang, …
Hardcover
R4,011
Discovery Miles 40 110
Wording Robotics - Discourses and…
Jean-Paul Laumond, Emmanuelle Danblon, …
Hardcover
R4,011
Discovery Miles 40 110
Small Flying Drones - Applications for…
Gianluca Casagrande, Andras Sik, …
Hardcover
R4,853
Discovery Miles 48 530
Field and Service Robotics - Results of…
Kazuya Yoshida, Satoshi Tadokoro
Hardcover
R4,191
Discovery Miles 41 910
Autonomous Guided Vehicles - Methods and…
Hamed Fazlollahtabar, Mohammad Saidi-Mehrabad
Hardcover
|