![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Focusing on the two essential factors of the construction of risk, this book presents research revolving around the staging of and the coping with Internet addiction in China. Using ethnographic methods, it investigates the signs and treatment of Internet addiction and discusses the in-patient approaches used to help children overcome the addiction and to reduce the likelihood of relapse following discharge. Examining the individual level and broader social levels of the process as well as the links between the two, the findings provide valuable insights into the prevention and treatment of Internet addiction. To help readers better understand the signs of Internet addiction and preventive measures, the book addresses the following issues:Public concern and media coverage of Internet addiction in contemporary ChinaClinical assessment and risk factors of Internet addiction in adolescentsParent-narrated signs of Internet addiction in Chinese children and adolescentsCoping strategies and treatments for Internet addiction
This book shows you how to increase your web popularity, page rank, website visitor retention and internet sales through building backlinks, using link exchanges, search engine submissions, directory manual submissions, social media (i.e. RSS, forums, groups, blogging, vlogging, photoblogging, social networking sites (Facebook, MySpace etc), paid inclusion, pay-per-click, paid submissions, banner advertising, banner exchanges, news and PR article submissions, podcasting, doorway pages, referrals, affiliate networks and affiliation, eCourses, eBooks, foreign language search engines, free and low cost advertising websites, conventional marketing methods (such as, billboards, building wrapping, inflatables, vehicle wrapping, aerial banners, posters, radio and television), campaign monitoring, SEO campaign fine-tuning and more.
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary. Pattern Recognition Technologies and Applications: Recent Advances provides cutting-edge pattern recognition techniques and applications. Written by world-renowned experts in their field, this easy to understand book is a must have for those seeking explanation in topics such as on- and offline handwriting and speech recognition, signature verification, and gender classification.
Taking the reader on a journey through queer manifestations in games, this book advocates for video games as a rich, political and cultural medium, which provides us with tools to navigate the future of gaming. Situated at the intersection of New Media, Game, Cultural and Queer Studies, the book navigates diverse interspecies relationships, queer villains from the past, Pokemon memes on border politics, flanerie in post-industrial cities and one-sided erotic fights. It provides new critical engagements with the works of Jose Esteban Munoz, Bonnie Ruberg, Guy Debord and Jack Halberstam, examining queer representation, gaming subcultures and dissident play practices. Making the bold claim that video games might be the queerest medium today, this book provides organic, self-reflective and, ultimately, thought-provoking thinking in which both games and gamers are queered. This book will be of interest to scholars researching game studies, sex, gender and sexuality in new media, but also readers interested in literature, digital media, society, participatory culture and queer studies.
Replete with interviews with key practitioners (both in the book and online) will give up-to-date information on the techniques, forms and concepts used by leading figures in contemporary Live Visuals.
A groundbreaking resource for remote study of interactive electronics applications The widespread use of the Internet as a communication medium has opened up a broad range of possibilities for extending its use into new areas. One such area is remote education, a rapidly growing part of today’s university curricula. Using the Internet and Web technology, courses can be offered to students anywhere in the world with no more technical requirements than a personal computer and an Internet connection. Until recently however, lab courses have been considered impractical for remote access. But thanks to technical advances of the past decade, even these courses with their often complex interactive techniques have been made accessible to remote students. Lab on the Web: Running Real Electronics Experiments via the Internet is the first text to present, in detail, experiments that can be run over the Web, specifically in the area of electronics. The authors present detailed descriptions of approximately 100 experiments in solid state electronics that can be used by engineering and science students at all levels, anywhere in the world, as well as by researchers working on semiconductor devices. Topics covered include:
The book has achieved widespread collaboration that will enable universities around the world to participate in these remote access experiments. Enhanced by interactive Web sites which will accommodate a growing array of experimental modules from participating institutions, the text opens up a virtual Pandora’s box of possibilities for students to access a wide variety of real experiments, and for institutions, jointly or individually, to establish their own remote laboratory sites.
Collecting and Conserving Net Art explores the qualities and characteristics of net art and its influence on conservation practices. By addressing and answering some of the challenges facing net art and providing an exploration of its intersection with conservation, the book casts a new light on net art, conservation, curating and museum studies. Viewing net art as a process rather than as a fixed object, the book considers how this is influenced by and executed through other systems and users. Arguing that these processes and networks are imbued with ambiguity, the book suggests that this is strategically used to create suspense, obfuscate existing systems and disrupt power structures. The rapid obsolescence of hard and software, the existence of many net artworks within restricted platforms and the fact that artworks often act as assemblages that change or mutate, make net art a challenging case for conservation. Taking the performative and interpretive roles conservators play into account, the book demonstrates how practitioners can make more informed decisions when responding to, critically analysing or working with net art, particularly software-based processes. Collecting and Conserving Net Art is intended for researchers, academics and postgraduate students, especially those engaged in the study of museum studies, conservation and heritage studies, curatorial studies, digital art and art history. The book should also be interesting to professionals who are involved in the conservation and curation of digital arts, performance, media and software.
Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources available on the Internet using the computing and storage facilities of the cloud. Coverage includes scalable data mining and knowledge discovery techniques together with cloud computing concepts, models, and systems. Specific sections focus on map-reduce and NoSQL models. The book also includes techniques for conducting high-performance distributed analysis of large data on clouds. Finally, the book examines research trends such as Big Data pervasive computing, data-intensive exascale computing, and massive social network analysis.
In the mid 1990s, the widespread adoption of the web browser led to a rapid commercialization of the Internet. In addition, initial success stories were reported from companies that learned how to create an effective direct marketing channel selling tangible products to consumers directly with the World Wide Web. By the end of the 1990s, the next revolution began called business-to-business electronic commerce. Business to Business Electronic Commerce will provide researchers and practitioners alike with a source of knowledge related to this emerging area of business. The audience for this book includes students, scholars, researchers and practitioners. Any currently engaged in the utilization and management of electronic commerce technologies will be interested in Business to Business Electronic Commerce to learn about the latest issues and challenges facing businesses throughout the world.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts. Winning the spot of #19 out of 26 on the 2020 Bookauthority Best New Industrial Management Books of All Time. Winning the spot of #3 out of 8 on the 2021 Bookauthority Best New Industrial Management Books to Read in 2021. Winning the spot of #5 out of 11 on the 2021 Bookauthority Best New Product Design Books to Read in 2021. 2020 Taylor & Francis Award Winner for Outstanding Professional Book! Product Lifecycle Management (PLM): A Digital Journey Using Industrial Internet of Things (IIot) provides a summary of the essential topics of Product Lifecycle Management (PLM) and the Industrial Internet of Things (IIoT) in the era of Industry 4.0. The book discusses emerging technologies, their contribution towards enhancing product design, development, and manufacturing. It also presents the integration of PLM, Enterprise Resource Planning (ERP), and Manufacturing Execution System (MES) along with IIoT as well the integration of mechanical, electronic components, embedded systems, firmware and software focusing on smart design, development, and manufacturing in the digital transformation journey. The book provides a high-level overview of how the smart product development through smart manufacturing materializes within the smart ecosystem. Manufacturing professionals, designers, mechanical, electrical, electronics, instrumentation and industrial engineers, information and communication technology consultants and those working in production planning, process control, and operations will find this book invaluable.
Chris Stringman gambled, and lost, GBP130,000, destroying his savings, losing his car, and almost his house...but he managed to escape his addiction just before he fell over the precipice. This is not a book about how to win, rather a book about how not to lose. Chris Stringman's personal demon was financial spread-betting - where punters trade on the price movement of a particular market. He explains how it operates, how it sucks gamblers in and keeps them there, and how it nearly cost him everything.He also takes a look at high-street bookies, fruit machines, casinos, poker and bingo, and then goes on to answer some important questions: How do we gamble? Why do we gamble? How can we spot the signs in others? How can we help them? Chris Stringman writes from the heart and tells it like it is in this searingly honest, and highly readable work. It entertains as well as educates - essentially a self-help book for the delusional gambler.
This book explores the digitization of culture as a means of experiencing and understanding cultural heritage in Namibia and from international perspectives. It provides various views and perspectives on the digitization of culture, the goal being to stimulate further research, and to rapidly disseminate related discoveries. Aspects covered here include: virtual and augmented reality, audio and video technology, art, multimedia and digital media integration, cross-media technologies, modeling, visualization and interaction as a means of experiencing and grasping cultural heritage. Over the past few decades, digitization has profoundly changed our cultural experience, not only in terms of digital technology-based access, production and dissemination, but also in terms of participation and creation, and learning and partaking in a knowledge society. Computing researchers have developed a wealth of new digital systems for preserving, sharing and interacting with cultural resources. The book provides important information and tools for policy makers, knowledge experts, cultural and creative industries, communication scientists, professionals, educators, librarians and artists, as well as computing scientists and engineers conducting research on cultural topics.
Packed with projects and inspirational ideas you can do any time, any place, become an accomplished photographer while feeding your creativity with this guide that reveals what just what your smartphone camera is capable of. A camera phone is something we always have on us and creativity is something we all have in us but often we struggle to use them properly, feeling like we don't have the time, space or inclination to dedicate to it. Here, photography expert and bestselling author Jo Bradford supplies a collection of practical exercises that allow you to master the features on your smartphone camera to take incredible images and also help you to easily reconnect with your creative side. By encouraging you to try something different with your camera and seek out creative opportunities - from light painting to collage, image stacking to time-lapse landscapes - soon you will once again feel the satisfaction of thinking and acting creatively, with the added benefit of taking you from a snapper to an accomplished photographer with visual literacy. Smartphone photography is addictive with a tangible feel-good factor; it's time to embrace it and capture the moments that matter to you in all their glory.
This book introduces readers to Web content credibility evaluation and evaluation support. It highlights empirical research and establishes a solid foundation for future research by presenting methods of supporting credibility evaluation of online content, together with publicly available datasets for reproducible experimentation, such as the Web Content Credibility Corpus. The book is divided into six chapters. After a general introduction in Chapter 1, including a brief survey of credibility evaluation in the social sciences, Chapter 2 presents definitions of credibility and related concepts of truth and trust. Next, Chapter 3 details methods, algorithms and user interfaces for systems supporting Web content credibility evaluation. In turn, Chapter 4 takes a closer look at the credibility of social media, exemplified in sections on Twitter, Q&A systems, and Wikipedia, as well as fake news detection. In closing, Chapter 5 presents mathematical and simulation models of credibility evaluation, before a final round-up of the book is provided in Chapter 6. Overall, the book reviews and synthesizes the current state of the art in Web content credibility evaluation support and fake news detection. It provides researchers in academia and industry with both an incentive and a basis for future research and development of Web content credibility evaluation support services.
The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.
The Internet is already more widely deployed than any other computing system in history and continues to grow rapidly. New technologies, including high speed wide area network and improved software support for distribution, promise to make the Internet much more useful for general purpose distributed computing in the future. Web Information Systems is dedicated to the new era of information systems on web environments, due to not only the growing popularity of the web technology but also the roles that web technology play in modern information systems. The major elements of web information systems include web semantics, XML technologies, web mining and querying, web-based information systems, information extraction, and web semantics.
Like many other incipient technologies, Web services are still surrounded by a tremendous level of noise. This noise results from the always dangerous combination of wishful thinking on the part of research and industry and of a lack of clear understanding of how Web services came to be. On the one hand, multiple contradictory interpretations are created by the many attempts to realign existing technology and strategies with Web services. On the other hand, the emphasis on what could be done with Web services in the future often makes us lose track of what can be really done with Web services today and in the short term. These factors make it extremely difficult to get a coherent picture of what Web services are, what they contribute, and where they will be applied. Alonso and his co-authors deliberately take a step back. Based on their academic and industrial experience with middleware and enterprise application integration systems, they describe the fundamental concepts behind the notion of Web services and present them as the natural evolution of conventional middleware, necessary to meet the challenges of the Web and of B2B application integration. Rather than providing a reference guide or a "how to write your first Web service" kind of book, they discuss the main objectives of Web services, the challenges that must be faced to achieve them, and the opportunities that this novel technology provides. Established, as well as recently proposed, standards and techniques (e.g., WSDL, UDDI, SOAP, WS-Coordination, WS-Transactions, and BPEL), are then examined in the context of this discussion in order to emphasize their scope, benefits, and shortcomings. Thus, the book is ideally suited both for professionals considering the development of application integration solutions and for research and students interesting in understanding and contributing to the evolution of enterprise application technologies.
With the widespread growth of the Internet, a new space - cyberspace - has appeared and has rapidly been integrated into every facet of life and work. It has effectively become the fourth basic living space for human beings. Although cyberspace has become a topic of increasing widespread concern, it is still difficult to understand cyberspace well because of its many definitions, vast and varied content, and differences with other similar spaces. A Brief History of Cyberspace attempts to establish a complete knowledge system about the evolution and history of cyberspace and cyber-enabled spaces (i.e., cyber-enabled physical space, cyber-enabled social space, and cyber-enabled thinking space). By providing a comprehensive overview, this book aims to help readers understand the history of cyberspace and lays a solid foundation for researchers and learners who are interested in cyberspace. The book has three main objectives: To provide a comprehensive understanding of the development of cyberspace, ranging from its origin, evolutions, and research status to open issues and future challenges, as well as related hot topics in industry and academia. To examine cyber life, cyber syndrome, and health in addition to cyber-enabled spaces designed for better living. To describe cyberspace governance from the perspective of the individual, society, and national and international levels in order to promote a more profound and reasonable direction to the development of cyberspace. Consisting of 16 chapters, the book is divided into three parts. Chapter 1 introduces the origins and basic concept of cyberspace, cyber philosophy, and cyber logic to help readers have a general understanding of cyberspace. Chapters 2 through 7 discuss a wide variety of topics related to human behavior, psychology, and health to help people better adapt to cyberspace. Chapters 8 through 16 present the history of cyberspace governance and various social and culture aspects of cyberspace. Each chapter concludes with a discussion of future development.
These days, regardless of whether a book is self-published or traditionally published, there will be an expectation on the author to take an active role in marketing their book. Based on a series of interviews with successful authors from both sides of the publishing divide and both sides of the pond, Lynn lays out in detail the marketing strategies that have worked for them, alongside an explanation of how book marketing works based on her own long-standing career as a senior marketing exec. From developing social media tactics and arranging promotional events to handling press and trying to start viral campaigns, Lynn offers practical advice designed to help an author find a book marketing strategy that best works for them, based on their personal strengths and budget.
As the Internet's presence in health care grows more pervasive, an increasing number of health care providers have begun to implement eHealth innovations in their practice. The interactive health communication system (IHCS), one such eHealth solution, provides consumers with information, informal support, and a venue for communication. Investing in eHealth: What it Takes to Sustain Consumer Health Informatics examines the evolution of the IHCS and the significant changes in organizational culture and operational systems that may be required for successful and sustained implementation. This book explores the development of a model (funded by the Agency for Healthcare Research and Quality in 1998) to predict and explain the degree of success of such implementation efforts. This model allows an institution to benchmark its progress towards IHCS implementation and advises administrators where to invest resources to increase the chance of successful implementation. A set of case studies highlights key features of the model; each study describes an attempt by an organization to implement the Comprehensive Health Enhancement Support System (CHESS), a proven IHCS.After examining the success or failure of each particular implementation, the book suggests steps that could have been taken to address weaknesses identified by the model. Investing in eHealth culminates in a set of general guidelines for any health care provider striving to successfully employ the model, and suggests directions for future research.
Take your game to the next level with the new book from the world's biggest football YouTubers, the F2. We're the F2 and in our brand new book we're going to show you how to take your football skills to the next level. In these pages we turn the spotlight on the greatest players, the biggest teams, and most jaw-dropping moments from across the football world, and teach you the skills and the tekkers it takes to be the best! Want step-overs like Sanchez? Or a piledriver like Ibrahimovic? Or quick-feet like Messi? We show you how. Our book is filled with tips and hacks, as well as the inside track on your favourite stars: Pogba, Suarez, Aguero and the rest. There's even a free app that brings the book to life and shows you how to turbo-charge your tekkers! There's not a moment to lose - open, read, learn, download and get out on the pitch and practise. Love, peace and tekkers.
Recent advances in mobile and wireless communication and personal computer technology have created a new paradigm for information processing. Today, mobile and wireless communications exit in many forms, providing different types of services. Existing forms of mobile and wireless communications continue to experience rapid growth and new applications and approaches are being spawned at an increasing rate. Recently, the mobile and wireless Internet has become one of the most important issues in the telecommunications arena. The development of the mobile and wireless Internet is the evolution of several different technologies coming together to make the Internet more accessible. Technologies such as the Internet, wireless networks, and mobile computing have merged to form the mobile and wireless Internet. The mobile and wireless Internet extends traditional Internet and World Wide Web services to wireless devices such as cellular phones, Personal Digital Assistants (PDAs) and notebooks. Mobile and wireless Internet c: an give users access to personalized information anytime and anywhere they need it, and thus empower them to make decisions more quickly, and bring them closer to friends, family, and work colleagues. Wireless data communication methods have been around for sometime
Key features Provides an in-depth understanding of emerging technologies and integration of artificial intelligence, deep learning, big data, IoT in healthcare Details specific applications for the use of AI, big data, and IoT in healthcare Discusses how AI technology can help in formulating protective measures for COVID-19 and other diseases Includes case studies |
You may like...
|