Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > General
This book constitutes the thoroughly refereed proceedings of the 17th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2022, held in Tampa, FL, USA, in June 2022. The 37 revised full research papers, included in the volume were carefully reviewed and selected from 103 submissions. They are organized in the following topical sections: Transdisciplinary Research & DSR (theme Track); Blockchain Information Systems; Intelligent Systems and Human Interaction; Healthcare Systems and Quality of Life; Innovation and Entrepreneurship; Sustainability and Responsible Design (Environmental Issues, Human Values and ethical Design); Human Safety and Cybersecurity; Emerging DSR Methods and Processes; Designers and Collaborative DSR; and Education and DSR.
By 2020, experts forecast that up to 28 billion devices will be connected to the Internet, with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other "devices" - sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other "things", which traditionally have not been Internet enabled. This "Internet of Things" (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. Secure and Smart IoT explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog Computing, AI and Blockchain technology. The topics discussed in the book include: - Internet of Things (IoT) - Industrial Internet of Things (IIoT) - Fog Computing - Artificial Intelligence - Blockchain Technology - Network Security - Zero-Trust Model - Data Analytics - Digital Transformation - DDoS - Smart Devices - Cybersecurity
Comprehensive textbook resource on distributed systems--integrates foundational topics with advanced topics of contemporary importance within the field Distributed Computing: Theory and Applications is organized around three aspects of distributed systems: networks, middleware tools, and applications. It presents architectural uniform methods to implement a distributed shared memory system for realization data consistency models suited to distributed applications' requirements. To aid in understanding how these concepts apply to real-world situations, the work illustrates topics with practical applications and includes references for further reading. Downloadable lecture slides are also included to help professors and instructors convey key concepts to their students. Additional topics discussed in Distributed Computing: Theory and Applications include: The abstractions and the implementations of several middleware for distributed computing, which constitute the bulk of core foundational topics Network issues and high-level connection tools Distributed knowledge management and distributed multi-agent systems Gossip Protocol, peer-to-peer systems and block-chain technology, and techniques for unstructured data management P2P, coordinated architectures, and advanced middleware for building large modern distributed applications Researchers, industry professionals, and students in the fields of science, technology, and medicine will be able to use Distributed Computing: Theory and Applications as a comprehensive textbook resource for understanding distributed systems, the specifics behind the modern elements which relate to them, and their practical applications.
Learn how to build logic into your apps by configuring Salesforce.com Lightning Process Builder and Visual Workflow software tools to meet the needs of your organization without the use of code. You will be able to build workflow diagrams on the Salesforce.com platform and perform complex logic. Individuals who have created workflow diagrams in other applications (e.g., Microsoft Visio) will feel very comfortable using these two tools from Salesforce. If you find yourself in a situation where a standard Salesforce configuration does not meet your needs, you can always rely on a developer to extend the functionality through Visualforce and Apex code. What if you could take back that control and not rely on a developer or consultant? With two new technologies-Process Builder and Visual Workflow-introduced onto the Salesforce.com platform, you can accomplish much of what was normally handled with Apex code. Lightning Process Builder and Visual workflow both allow for advanced logic that standard configuration such as Salesforce.com Workflow cannot do. Salesforce.com Lightning Process Builder and Visual Workflow details how these technologies can be used to: Create a call center application that guides operators through a call with screens that change based on the caller's responses. Automatically submit approvals to speed up and streamline your business. Update related records for any object being modified, including standard and custom objects.
Performance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. It presents many concepts and results of probability theory and stochastic processes. After an introduction to queues in computer networks, this self-contained book covers important random variables, such as Pareto and Poisson, that constitute models for arrival and service disciplines. It then deals with the equilibrium M/M/1/∞queue, which is the simplest queue that is amenable for analysis. Subsequent chapters explore applications of continuous time, state-dependent single Markovian queues, the M/G/1 system, and discrete time queues in computer networks. The author then proceeds to study networks of queues with exponential servers and Poisson external arrivals as well as the G/M/1 queue and Pareto interarrival times in a G/M/1 queue. The last two chapters analyze bursty, self-similar traffic, and fluid flow models and their effects on queues.
The digital subscriber line (DSL) industry is expanding rapidly and a technology once thought to be only transitional will soon clear $100 billion in total annual service revenue. From the world's leading DSL experts, Implementation and Application of DSL Technologies builds upon the theory presented in "Fundamentals of DSL Technologies "to address issues fundamental to the success of DSL technology, including those that sustain DSL development, constraints, and challenges. This highly practical text peers into the blossoming sub-industries, all born of the DSL. The editors lead with a discussion on splitter circuits and micro-filters and continue by addressing digital chipsets and the capabilities required to mix and match them with various other components. Since testing has become an industry in its own, several chapters describe the various types of testing necessary for service qualification, the evolution of testing and provisioning of services from plain old telephoneservice, loop qualification, and regulator's decree of spectrum management. The book gives adequate coverage of DSM technology and describes networks for multiple applications in video, telephony, and Internet data areas and the associated network architectures. In addition, a section on security discusses packet transfer mechanism and voice-over DSL. Offering a vast array of information not currently in the public domain, Implementation and Application of DSL Technologies provides a rigorous survey of DSL applications that illustrates the profound effect this technology is having on the communications industry. When combined with "Fundamentals of DSL Technology," this is the most comprehensive andauthoritative source of information on DSL.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.
This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fifth volume covers global fintech trends and emerging technologies such as cloud computing and quantum computing, as well as the compliance and risk management frameworks for fintech companies. Together with the first part in applications and trends (fourth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I
An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.
Executives of IT organizations are compelled to quickly implement server virtualization solutions because of significant cost savings. However, most IT professionals tasked with deploying virtualization solutions have little or no experience with the technology. This creates a high demand for information on virtualization and how to properly implement it in a datacenter. Advanced Server Virtualization: VMware(R) and Microsoft(R) Platforms in the Virtual Data Center focuses on the core knowledge needed to evaluate, implement, and maintain an environment that is using server virtualization. This book emphasizes the design, implementation and management of server virtualization from both a technical and a consultative point of view. It provides practical guides and examples, demonstrating how to properly size and evaluate virtualization technologies. This volume is not based upon theory, but instead on real world experience in the implementation and management of large scale projects and environments. Currently, there are few experts in this relatively new field, making this book a valuable resource The book is divided into major sections making it both a step-by-step guide for learning and implementing server virtualization as well as a quick reference. The chapter organization focuses first on introducing concepts and background, and then provides real-world scenarios.
Metaheuristics are widely used to solve important practical combinatorial optimization problems. Many new multicast applications emerging from the Internet-such as TV over the Internet, radio over the Internet, and multipoint video streaming-require reduced bandwidth consumption, end-to-end delay, and packet loss ratio. It is necessary to design and to provide for these kinds of applications as well as for those resources necessary for functionality. Multi-Objective Optimization in Computer Networks Using Metaheuristics provides a solution to the multi-objective problem in routing computer networks. It analyzes layer 3 (IP), layer 2 (MPLS), and layer 1 (GMPLS and wireless functions). In particular, it assesses basic optimization concepts, as well as several techniques and algorithms for the search of minimals; examines the basic multi-objective optimization concepts and the way to solve them through traditional techniques and through several metaheuristics; and demonstrates how to analytically model the computer networks presented within the text. The book then focuses on the multi-objective models in computer networks, optical networks, and wireless networks and the applied way they can be solved. This resource also contains annexes that present the source code to solve the mathematical model problems present in the book through solvers and source codes programmed in C language, which solve some of the multi-objective optimization problems presented in the book.
Artificial Intelligence for Autonomous Networks introduces the autonomous network by juxtaposing two unique technologies and communities: Networking and AI. The book reviews the technologies behind AI and software-defined network/network function virtualization, highlighting the exciting opportunities to integrate those two worlds. Outlining the new frontiers for autonomous networks, this book highlights their impact and benefits to consumers and enterprise customers. It also explores the potential of the autonomous network for transforming network operation, cyber security, enterprise services, 5G and IoT, infrastructure monitoring and traffic optimization, and finally, customer experience and care. With contributions from leading experts, this book will provide an invaluable resource for network engineers, software engineers, artificial intelligence, and machine learning researchers.
A promising new technology, wireless mesh networks are playing an increasingly important role in the future generations of wireless mobile networks. Characterized by dynamic self-organization, self-configuration, and self-healing to enable quick deployment, easy maintenance, low cost, high scalability, and reliable services, this technology is becoming a vital mode complementary to the infrastructure-based wireless networks. Wireless Mesh Networking: Architectures, Protocols and Standards is the first book to provide engineers, students, faculties, researchers, and designers with a comprehensive technical guide covering introductory concepts. It addresses advanced and open issues in wireless mesh networks and explores various key challenges and diverse scenarios as well as emerging standards such as those for capacity, scalability, extensibility, reliability, and cognition. It focuses on concepts, effective protocols, system integration, performance analysis techniques, simulation, experiments, and future research directions. This volume contains illustrative figures and allows for complete cross-referencing on routing, security, spectrum management, MAC, cross-layer optimization, load-balancing, multimedia communication, MIMO, and smart antenna, etc. It also details information on the particular techniques for efficiently improving the performance of a wireless mesh network. Presenting a solid introduction, Wireless Mesh Networking: Architectures, Protocols and Standards elucidates problems and challenges in designing wireless mesh networks.
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix's media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta's anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
This book presents novel approaches to formulate, analyze, and solve problems in the area of distributed service networks, notably based on AI-related methods (parallel/cloud computing, declarative modeling, fuzzy methods). Distributed service networks are an important area of research and applications. The methods presented are meant to integrate both emerging and existing concepts and approaches for different types of production flows through synchronizations. An integration of logistics services (e.g., supply chains and projects portfolios), public and multimodal transport, traffic flow congestion management in ad hoc networks, design of high-performance cloud data centers, and milk-run distribution networks are shown as illustrations for the methods proposed. The book is of interest to researchers and practitioners in computer science, operations management, production control, and related fields.
The popularity of enterprise architecture (EA) has increased in the last two decades, in both business and academic domains. Despite the cumulative interest from all sectors, the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently, some organisations continue to theorise the concept, which has ramifications on practice and ROI. This has led to many studies that have been conducted, to understand the complexities impacting the implementation and practice of EA in organisations. Yet, the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now, implementation and practice of EA have been slow, despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement, sustainability, and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes, from three main fronts. First, it explains the implications that lack of understanding of EA have on organisational activities and processes. Second, it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third, it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates, researchers, academics, and professionals in the fields of EA, IT, and information systems, this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.
This book is a collection of best selected research papers presented at the 6th International Conference on Opto-Electronics and Applied Optics (OPTRONIX 2020) organized by the University of Engineering & Management, Kolkata, India, in June 2020. The primary focus is to address issues and developments in optoelectronics with particular emphasis on communication technology, IoT and intelligent systems, information processing and its different kinds. The theme of the book is in alignment with the theme of the conference "Advances in Smart Communication Technology and Information Processing." The purpose of this book is to inform the scientists and researchers of this field in India and abroad about the latest developments in the relevant field and to raise awareness among the academic fraternity to get them involved in different activities in the years ahead - an effort to realize knowledge-based society.
This introductory textbook is designed for a one-semester course on the use of the matrix and analytical methods for the performance analysis of telecommunication systems. It provides an introduction to the modelling and analysis of telecommunication systems for a broad interdisciplinary audience of students in mathematics and applied disciplines such as computer science, electronics engineering, and operations research.
This book brings together papers presented at The 2nd International Conference on Artificial Intelligence in China (ChinaAI) 2020, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics covering all topics in artificial intelligence with new development in China, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
A complete and authoritative discussion of systems engineering and neural networks In Systems Engineering Neural Networks, a team of distinguished researchers deliver a thorough exploration of the fundamental concepts underpinning the creation and improvement of neural networks with a systems engineering mindset. In the book, you'll find a general theoretical discussion of both systems engineering and neural networks accompanied by coverage of relevant and specific topics, from deep learning fundamentals to sport business applications. Readers will discover in-depth examples derived from many years of engineering experience, a comprehensive glossary with links to further reading, and supplementary online content. The authors have also included a variety of applications programmed in both Python 3 and Microsoft Excel. The book provides: A thorough introduction to neural networks, introduced as key element of complex systems Practical discussions of systems engineering and forecasting, complexity theory and optimization and how these techniques can be used to support applications outside of the traditional AI domains Comprehensive explorations of input and output, hidden layers, and bias in neural networks, as well as activation functions, cost functions, and back-propagation Guidelines for software development incorporating neural networks with a systems engineering methodology Perfect for students and professionals eager to incorporate machine learning techniques into their products and processes, Systems Engineering Neural Networks will also earn a place in the libraries of managers and researchers working in areas involving neural networks. |
You may like...
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, …
Hardcover
R2,949
Discovery Miles 29 490
Introduction to Networking Basics
Patrick Ciccarelli, Christina Faulkner, …
Paperback
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|