![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
This book introduces the field of Health Web Science and presents methods for information gathering from written social media data. It explores the availability and utility of the personal medical information shared on social media platforms and determines ways to apply this largely untapped information source to healthcare systems and public health monitoring. Introducing an innovative concept for integrating social media data with clinical data, it addresses the crucial aspect of combining experiential data from social media with clinical evidence, and explores how the variety of available social media content can be analyzed and implemented. The book tackles a range of topics including social media's role in healthcare, the gathering of shared information, and the integration of clinical and social media data. Application examples of social media for health monitoring, along with its usage in patient treatment are also provided. The book also considers the ethical and legal issues of gathering and utilizing social media data, along with the risks and challenges that must be considered when integrating social media data into healthcare choices. With an increased interest internationally in E-Health, Health 2.0, Medicine 2.0 and the recent birth of the discipline of Web Science, this book will be a valuable resource for researchers and practitioners investigating this emerging topic.
In recent years, drones have been integrated with the Internet of Things to offer a variety of exciting new applications. Here is a detailed exploration of adapting and implementing Internet of Drones technologies in real-world applications, emphasizing solutions to architectural challenges and providing a clear overview of standardization and regulation, implementation plans, and privacy concerns. The book discusses the architectures and protocols for drone communications, implementing and deploying of 5G-drone setups, security issues, deep learning techniques applied on real-time footage, and more. It also explores some of the varied applications, such as for monitoring and analysis of troposphere pollutants, providing services and communications in smart cities (such as for weather forecasting, communications, transport, safety and protection), for disaster relief management, for agricultural crop monitoring, and more.
Praise for Executive’s Guide To Web Services "Finally, a very readable book about how Web services operate in the real world. This is a must-read primer for all C level executives who want to understand how Web services are fundamentally changing how enterprises integrate, collaborate, innovate, and dominate." "Following along the brilliant analytical path that he blazed with the release of his first book on IT, Business Darwinism: Evolve or Dissolve, Marks, with coauthor Mark Werrell, continues to observe, digest, analyze, and clearly explain the latest trends in IT innovation. The Executive’s Guide to Web Services is a must-read companion for any IT manager, technology innovator, or corporate executive committed to successfully navigating through the maze of technology change. With this book, Marks and Werrell deliver a timely and valuable analysis of an important IT innovation at the ideal moment–just as the necessary confluence of technology, standards, and industry acceptance is starting to make the Web services vision a reality." "Marks and Werrell have captured the true essence of Web services in their provocative new book Executive’s Guide to Web Services. Their overarching emphasis on business issues over technology issues makes Executive’s Guide essential reading for any business executive looking for new sources of competitive advantage."
This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management, healthcare and biomedical science, construction and project management, smart city development, and others. Chapters explore emerging technology to combat the ever-increasing threat of security to computer systems and offer new architectural solutions for problems encountered in data management and security. The chapters help to provide a high level of understanding of various blockchain algorithms along with the necessary tools and techniques. The novel architectural solutions in the deployment of blockchain presented here are the core of the book.
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster, more stable AI algorithms and approaches, knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water management An IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillance An IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal, social, and industrial applications.
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.
A new era of complexity science is emerging, in which nature- and bio-inspired principles are being applied to provide solutions. At the same time, the complexity of systems is increasing due to such models like the Internet of Things (IoT) and fog computing. Will complexity science, applying the principles of nature, be able to tackle the challenges posed by highly complex networked systems? Bio-Inspired Optimization in Fog and Edge Computing: Principles, Algorithms, and Systems is an attempt to answer this question. It presents innovative, bio-inspired solutions for fog and edge computing and highlights the role of machine learning and informatics. Nature- or biological-inspired techniques are successful tools to understand and analyze a collective behavior. As this book demonstrates, algorithms, and mechanisms of self-organization of complex natural systems have been used to solve optimization problems, particularly in complex systems that are adaptive, ever-evolving, and distributed in nature. The chapters look at ways of enhancingto enhance the performance of fog networks in real-world applications using nature-based optimization techniques. They discuss challenges and provide solutions to the concerns of security, privacy, and power consumption in cloud data center nodes and fog computing networks. The book also examines how: The existing fog and edge architecture is used to provide solutions to future challenges. A geographical information system (GIS) can be used with fog computing to help users in an urban region access prime healthcare. An optimization framework helps in cloud resource management. Fog computing can improve the quality, quantity, long-term viability, and cost-effectiveness in agricultural production. Virtualization can support fog computing, increase resources to be allocated, and be applied to different network layers. The combination of fog computing and IoT or cloud computing can help healthcare workers predict and analyze diseases in patients.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
This book systematically reviews world Internet development over the past 50 years, and comprehensively discusses the great contributions it has made to economic and social advances. Further, it describes the development, status and trends related to the Internet in major countries around the globe in 2019, and provides an in-depth analysis of the latest conditions, dynamics and development trends in key areas, including information infrastructure, information technology, digital economy, digital government, Internet media, cyberspace security, and international cyberspace governance. Moreover, the book further modifies and enhances the Global Internet Development Index System, in order to better show the Internet development strengths and advantages in various countries, and to reflect the global development trends more comprehensively, accurately and objectively. This book reviews the significant developments and summarizes the lessons learned as well as the future challenges. From a global perspective, it offers a vision of building a community with a shared future in cyberspace based on the new concepts, new ideas and new achievements of various countries participating in cyberspace development and construction. As such it is a valuable reference resource for anyone working in Internet related fields, such as those in government departments, internet enterprises, scientific research institutions, colleges and universities wanting to fully understand world Internet development.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
This book provides basic knowledge of the programming and interfacing of devices with IoT modem and programming. The aim is to explain the basic steps to understand the IoT and its application in agriculture field. It will serve be a reference book for postgraduate and undergraduate Engineering students. Students from Electronics, Electrical, Mechatronics, Robotics, Mechanical, Computer science can use the book for their projects and research. This book is based entirely on the practical experience of the authors while undergoing projects with the students and industries. This book is co-published with NIPA. Taylor and Francis does not sell or distribute its print and electronic editions in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
Internet of Things: Principles and Paradigms captures the state-of-the-art research in Internet of Things, its applications, architectures, and technologies. The book identifies potential future directions and technologies that facilitate insight into numerous scientific, business, and consumer applications. The Internet of Things (IoT) paradigm promises to make any electronic devices part of the Internet environment. This new paradigm opens the doors to new innovations and interactions between people and things that will enhance the quality of life and utilization of scarce resources. To help realize the full potential of IoT, the book addresses its numerous challenges and develops the conceptual and technological solutions for tackling them. These challenges include the development of scalable architecture, moving from closed systems to open systems, designing interaction protocols, autonomic management, and the privacy and ethical issues around data sensing, storage, and processing.
Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.
Netizens, one of the first books detailing the Internet, looks at
the creation and development of this participatory global computer
network. The authors conducted online research to find out what
makes the Internet "tick." This research results in an informative
examination of the pioneering vision and actions that have helped
make the Net possible. The book is a detailed description of the
Net's construction and a step-by-step view of the past, present,
and future of the Internet, the Usenet and the WWW.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance offers a unique discourse and an original aesthetic theory. It argues that fusing perspectives from the philosophy of Existentialism with insights from the 'universal science' of cybernetics provides a new analytical lens and deconstructive methodology to critique art. In this study, Steve Dixon examines how a range of artists' works reveal the ideas of Existentialist philosophers including Kierkegaard, Camus, de Beauvoir, and Sartre on freedom, being and nothingness, eternal recurrence, the absurd, and being-for-others. Simultaneously, these artworks are shown to engage in complex explorations of concepts proposed by cyberneticians including Wiener, Shannon, and Bateson on information theory and 'noise', feedback loops, circularity, adaptive ecosystems, autopoiesis, and emergence. Dixon's groundbreaking book demonstrates how fusing insights and knowledge from these two fields can throw new light on pressing issues within contemporary arts and culture, including authenticity, angst and alienation, homeostasis, radical politics, and the human as system.
Electronic commerce has overcome the tech-wrecks of recent times and is now accepted as the future of business, yet a major barrier to its more widespread and successful implementation remains - the continuing uncertainty among organizations of how best to put e-commerce principles into practice. Based on research in six economies - the UK, USA, Denmark, Greece, Hong Kong (China) and Australia - the book addresses the documented uncertainties of business and consumers with Internet retailing by presenting the experiences of leading examples of B2C electronic commerce in each economy. Demonstrating 'best practice' by examining and comparing these international examples of success, the book provides entrepreneurs and senior managers with insights that will help them plan and implement strategy for successful internet-based business innovation.
Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries. This book provides a roadmap for semantic web technologies (SWTs) and highlights their role in a wide range of domains including cloud computing, Internet of Things, big data, sensor network, and so forth. It also explores the prospects of these technologies including different data interchange formats, query languages, ontologies, Linked Data, and notations. The role of SWTs in 'epidemic Covid-19', 'e-learning platforms and systems', 'block chain', 'open online courses', and 'visual analytics in healthcare' is described as well. This book: Explores all the critical aspects of semantic web technologies (SWTs) Discusses the impact of SWTs on cloud computing, Internet of Things, big data, and sensor network Offers a comprehensive examination of the emerging research in the areas of SWTs and their related domains Provides a template to develop a wide range of smart and intelligent applications Includes latest applications and examples with real data This book is aimed at researchers and graduate students in computer science, informatics, web technology, cloud computing, and Internet of Things.
Images of faces, bodies, selves and digital subjectivities abound on new media platforms like Snapchat, Instagram, YouTube, and others-these images represent our new way of being online and of becoming socially mediated. Although researchers are examining digital embodiment, digital representations, and visual vernaculars as a mode of identity performance and management online, there exists no cohesive collection that compiles all these contemporary philosophies into one reader for use in graduate level classrooms or for scholars studying the field. The rationale for this book is to produce a scholarly fulcrum that pulls together scholars from disparate fields of inquiry in the humanities doing work on the common theme of the socially mediated body. The chapters in Mediated Interfaces: The Body on Social Media represent a diverse list of contributors in terms of author representation, inclusivity of theoretical frameworks of analysis, and geographic reach of empirical work. Divided into three sections representing three dominant paradigms on the socially mediated body: representation, presentation, and embodiment, the book provides classic, creative, and contemporary reworkings of these paradigms.
This book analyzes the Internet from the perspective of philosophy of science. Conceived in a broad sense, it includes three major layers: (i) the technological infrastructure, (ii) the Web, and (iii) cloud computing, along with apps and mobile Internet.
How are our societies being transformed by internet and digital economics? This book provides an accessible introduction to the economics of the internet and a comprehensive account of the mechanisms of the digital economy. Leading scholars examine the original economic and business models being developed as a result of the internet system, and explore their impact on our economies and societies. Key issues are analysed, including the development of open source software and on-line communities, peer-to-peer and online sharing of cultural goods, electronic markets and the rise of new information intermediaries, e-retailing and e-banking. The volume examines how internet and digital economics have transformed the organization of firms, industries, markets, commerce, modes of distribution, money, finance, and innovation processes, and provides the analytical tools to understand both these recent transformations and the likely future directions of the 'New Economy'.
This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. "This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1." Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs." Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania "Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Through clear explanations and practical code examples, the authors take you on a progressive journey to discover the technology foundations and build your own blockchain. From an operations perspective, you can learn the principles behind the distributed ledger technology relevant for transitioning towards blockchain-enabled supply chains. Reading this book, you'll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples." Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD |
You may like...
Build Location Apps on iOS with Swift…
Jeffrey Linwood
Paperback
3D and 4D Printing of Polymer…
Kishor Kumar Sadasivuni, Kalim Deshmukh, …
Paperback
R5,549
Discovery Miles 55 490
Qualitative Theory of Hybrid Dynamical…
Alexey S. Matveev, Andrey V. Savkin
Hardcover
R4,204
Discovery Miles 42 040
Machine Learning and Artificial…
Benjamin Moseley, Lion Krischer
Hardcover
R5,114
Discovery Miles 51 140
|