![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
Successful technical blogging is not easy but it's also not magic. Use these techniques to attract and keep an audience of loyal, regular readers. Leverage this popularity to reach your goals and amplify your influence in your field. Get more more users for your startup or open source project, or simply find an outlet to share your expertise. This book is your blueprint, with step-by-step instructions that leave no stone unturned. Plan, create, maintain, and promote a successful blog that will have remarkable effects on your career or business. Successful people often get recognition by teaching what they know. Blogging is a reliable path to do that, while gaining influence in the process. The problem is getting it right. Far too often professionals start a blog with big hopes, only to quickly give up because they don't get speedy results. This book will spare you that fate, by outlining a careful plan of action. A plan that will bring amazing benefits to your career, new job possibilities, as well as publishing, speaking, and consulting opportunities. And if you are blogging for business, you'll attract new customers, partners, and outstanding employees. Understand what blogging is and how it can improve your professional (and personal) life. Devise a plan for your new or existing blog. Create remarkable content that ranks well in Google and is shared by readers. Beat procrastination by employing proven time-management techniques that make you an efficient and effective blogger. Promote your blog by mastering on-page and off-page SEO, as well as social media promotion, without compromising your ethics. Analyze your traffic to understand your audience and measure growth. Build a community around your blog and make the best of your newfound popularity, by maximizing its benefits for your career, business, or simply for extra income. Create and maintain a successful technical blog that will amplify your impact, influence, and reach by following Antonio's step-by-step plan.
Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and development of social media has influenced how people interact with one another, receive news, and form social bonds. Part I of the book focuses on the history and study of social media, addressing the rise of social media, theories used to study social media, the widespread impacts of user-generated content, and more. Part II examines the legal and ethical implications of social media with chapters covering the legalities of social and digital media use, user policies, and image and brand management. Part III addresses the professional uses of social media within the disciplines of public relations, advertising, marketing, journalism, mass media, nonprofit work, and U.S. politics, as well as the role of social media in national and global movements. The second edition features new content on fake news, disinformation, conspiracy theories, bots and trolls, social media influencers, the growth of Instagram and TikTok, the Communications Decency Act, podcasts, and the confluence of social media and the 2020 United States presidential election. Social Media in the Digital Age is ideal for undergraduate courses in mass communication, broadcasting, history, and popular culture. It is also a valuable resource for communication professionals.
This book provides a comprehensive introduction of Fog Radio Access Networks (F-RANs), from both academic and industry perspectives. The authors first introduce the network architecture and the frameworks of network management and resource allocation for F-RANs. They then discuss the recent academic research achievements of F-RANs, such as the analytical results of theoretical performance limits and optimization theory-based resource allocation techniques. Meanwhile, they discuss the application and implementations of F-RANs, including the latest standardization procedure, and the prototype and test bed design. The book is concluded by summarizing the existing open issues and future trends of F-RANs. Includes the latest theoretical and technological research achievements of F-RANs, also discussing existing open issues and future trends of F-RANs toward 6G from an interdisciplinary perspective; Provides commonly-used tools for research and development of F-RANs such as open resource projects for implementing prototypes and test beds; Includes examples of prototype and test bed design and gives tools to evaluate the performance of F-RANs in simulations and experimental circumstances.
" Analyzing the Social Web "provides a framework for the analysis
of public data currently available and being generated by social
networks and social media, like Facebook, Twitter, and Foursquare.
Access and analysis of this public data about people and their
connections to one another allows for new applications of
traditional social network analysis techniques that let us identify
things like who are the most important or influential people in a
network, how things will spread through the network, and the nature
of peoples' relationships. Analyzing the Social Web introduces you
to these techniques, shows you their application to many different
types of social media, and discusses how social media can be used
as a tool for interacting with the online public.
From the Forward by Michael Lesk: Google has now developed services far beyond text search. Google software will translate languages and support collaborative writing. The chapters in this book look at many Google services, from music to finance, and describe how they can be used by students and other library users. Going beyond information resources, there are now successful collaboration services available from Google and others. You can make conference calls with video and shared screens using Google Hangouts, Writing documents with small numbers of colleagues often involved delays while each author in sequence took over the writing and made edits. Today Google Docs enables multiple people to edit the same document at once. An ingenious use of color lets each participant watch in real time as the other participants edit, and keeps track of who is doing what. If the goal is to create a website rather than to write a report, Google Sites is now one of the most popular platforms. Google is also involved in social networking, with services such as Google+ Other tools view social developments over time and space. The Google Trends service, for example, will show you when and where people are searching for topics. Not surprisingly, searches for "swimwear" peak in June and searches for "snowmobile" peak in January. The Complete Guide to Using Google in Libraries, Volume 2: Research, User Applications, and Networking has 30 chapters divided into four parts: Research, User Applications, Networking, Searching. The contributors are practitioners who use the services they write about and they provide how-to advice that will help public, school, academic, and special librarians; library consultants, LIS faculty and students, and technology professionals.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
This book demonstrates to managers the strategic significance of intra-organizational social networks. It argues that strategic management is embedded in the complexity of social relations that shape the strategic direction of a company. Currently there are few tools available to systematically collect information about the social functioning of an organization. This book fills this gap by shifting attention to the social relations that contribute to strategic advantage and that build on relationships that provide unique resources and create value for the business. It considers three perspectives on how social networks have a strategic function: first, social networks constitute everyday strategic action; second, social networks convey cultural meanings; and third, how social networks depict social processes that continually illustrate what the organization is and what it can become. The book shows top and upper-middle management how cultivating an understanding of intra-firm social relations can help them to build unique strategic advantage and make use of the day-to-day knowledge that emerges in the social connections and interactions within an organization.
This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world-and businesses-work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.
Internet Governance: Origins, Current Issues, and Future Possibilities deals with Internet governance and includes computer history, Internet beginnings, institutions and stakeholders, proposed models of governance, and human rights. The concept of Internet governance covers an exceptionally complex and rapidly changing field of norms and rules. Its origins and conflicts engage many disciplines and give rise to technical standards with contributions from a wide range of stakeholders. At the same time, the Internet has increasingly become the dominant reality for all the information processing industries. The ultimate goal of the book is to establish a foundation for identifying a new model of governance for the Internet. In doing so, the book honors the efforts of previous scholars who have considered and proposed other models for the governance of the Internet. Among its aims, the book is intended as an introduction for the novice to the subject of internet governance. The first two chapters offer a historical foundation of the institutions and the debate. The next two chapters discuss the evolution of that debate over the last twenty years. The final two discuss the present and future ramifications of the debate and include the author's attempts to sketch a practical plan for a new concept of Internet governance. This book provides an introductory, multidisciplinary account of the forces at work in the evolving concept of internet governance for scholars in the information studies fields, including computer, information and library science. It should also be useful for scholars in the fields of international law, international relations, diplomacy studies and political science.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
What opportunities do digital technologies present? How do developments in digital media support scholarship and teaching yet further social justice? Written by two experts in the field, this accessible book is the first to look at scholarly practice in the digital era and consider how it can connect academics, journalists and activists in ways that foster transformation on issues of social justice. The terra firma of scholarly practice is changing. This book offers both a road map and a vision of what being a scholar can be when reimagined in the digital era to enliven the public good, as it discusses digital innovations in higher education as well as reflecting upon what these mean in an age of austerity. It is ideal for students and academics working in any field of humanities or social sciences with a social justice focus.
Across Africa, digital media are providing scholars with a reason and opportunity for revisiting the question, and the analytical lens, of publics with new vigour and less normative baggage. This book brings together a rich set of empirically grounded analyses of the diverse digital spaces and networks of communication springing up across the Eastern African region. The contributions offer a plural set of reflections on whether and how we can usefully think about these spaces and networks as convening publics, where citizens come together to discuss matters of common interest. The authors make clear the need to unshackle such studies from slavish acceptance of outsiders' prescriptions on what constitutes desirable publics. They highlight the importance of being attentive to rapidly changing everyday realities across Africa in which people are coming together around the circulation of ideas in ways that include digital means of communications. In so doing, the contributions bring forward new ways of thinking about, through and with publics, alongside other heritages in Africanist scholarship that have continued salience. Looking outwards from the region, such different perspectives on our digitally mediated world offer theoretical novelty that advances how we think about the notion of publics and their political significance. This book was originally published as a special issue of the Journal of Eastern African Studies.
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance offers a unique discourse and an original aesthetic theory. It argues that fusing perspectives from the philosophy of Existentialism with insights from the 'universal science' of cybernetics provides a new analytical lens and deconstructive methodology to critique art. In this study, Steve Dixon examines how a range of artists' works reveal the ideas of Existentialist philosophers including Kierkegaard, Camus, de Beauvoir, and Sartre on freedom, being and nothingness, eternal recurrence, the absurd, and being-for-others. Simultaneously, these artworks are shown to engage in complex explorations of concepts proposed by cyberneticians including Wiener, Shannon, and Bateson on information theory and 'noise', feedback loops, circularity, adaptive ecosystems, autopoiesis, and emergence. Dixon's groundbreaking book demonstrates how fusing insights and knowledge from these two fields can throw new light on pressing issues within contemporary arts and culture, including authenticity, angst and alienation, homeostasis, radical politics, and the human as system.
This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.
Understanding Decentralized Finance demystifies DeFi, locating the integration points between decentralised and centralized finance to help finance professionals unlock valuable opportunities. DeFi - the next evolution of cryptocurrency - has brought a new wave of investors into the world of finance. As fintechs and financial institutions seek to integrate with DeFi, this book explores its history, its present context, and its future. It explains the world of DeFi by comparing it to the traditional finance sector, highlighting points of similarity, difference and integration. Understanding Decentralized Finance explores the technologies underlying the DeFi market and how they differ from those of traditional financial markets. It scrutinizes the difference between centralized and decentralized cryptocurrency exchanges, how NFTs fit into DeFi and how collectibles can be financialized. Readers will also find out how collateralized loans, derivatives, margin trading and liquidity provision work in a world where there is no centralized institution to coordinate these activities - and how regulators in different jurisdictions are ensuring that financial regulations keep up with these innovations. With examples from key actors in the field, including the movement of luxury organizations like Christie's and Sotheby's into the NFT space and the SushiSwap vampire attack, this is an essential read for anyone working in finance, fintech and technology who needs to understand the fast-moving world of DeFi.
Take your hobby to the next level and turn your blog into real income Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship, partnerships, and affiliate marketing options to turn your hobby into extra income, or even a full-time career. Helpful examples and featured articles with topic experts and bloggers who have built successful business demonstrate how to promote your business or build a blog-based business.Discusses finding your niche, adhering to legal considerations, establishing your disclosure and privacy policies, and dealing responsibly with review requestsIntroduces ideas for advertising and other monetization options and recommends promotional avenues to exploreSuggests creative ways to keep your blog fresh, unique, and interestingProvides tips for monitoring and measuring your success "Professional Blogging For Dummies" opens the door to a world of money-making blogging possibilities
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries. |
You may like...
Developing Linear Algebra Codes on…
Sandra Catalan Pallares, Pedro Valero-Lara, …
Hardcover
R5,317
Discovery Miles 53 170
Self-Directed Learning and the Academic…
Patrick Hughes, Jillian Yarbrough
Hardcover
R5,333
Discovery Miles 53 330
Handbook of Research on Foreign Language…
Congcong Wang, Lisa Winstead
Hardcover
R6,928
Discovery Miles 69 280
Observations on the American Treaty, in…
Thomas Peregrine Courtenay
Paperback
R374
Discovery Miles 3 740
|