![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.
In this book, the author outlines a Robust Web Parking, Truck and Transportation Portal (RWPTTP) for integrating parking and transportation services - a revolutionary approach in contrast to incremental change for managing traffic congestion. Autonomous vehicle technology, artificial intelligence, internet of things (IOT), and other interconnected hardware and software tools will assist autonomous parking and transportation services and provide next-century infrastructure for consolidated transportation customer services. The book highlights currently available autonomous parking and transportation technologies, and the development of an integrated and intelligent transportation service/system (IITS) platform, with specific use of technologies to reconfigure the transportation industry. The author also suggests many regulatory and policy changes to simplify data collection, traffic operation, introduction of a duplicate transportation system using light rail (LRs) and high speed rail (SPRs), and redistribution of parking spaces along such routes, using renewable energy.
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance offers a unique discourse and an original aesthetic theory. It argues that fusing perspectives from the philosophy of Existentialism with insights from the 'universal science' of cybernetics provides a new analytical lens and deconstructive methodology to critique art. In this study, Steve Dixon examines how a range of artists' works reveal the ideas of Existentialist philosophers including Kierkegaard, Camus, de Beauvoir, and Sartre on freedom, being and nothingness, eternal recurrence, the absurd, and being-for-others. Simultaneously, these artworks are shown to engage in complex explorations of concepts proposed by cyberneticians including Wiener, Shannon, and Bateson on information theory and 'noise', feedback loops, circularity, adaptive ecosystems, autopoiesis, and emergence. Dixon's groundbreaking book demonstrates how fusing insights and knowledge from these two fields can throw new light on pressing issues within contemporary arts and culture, including authenticity, angst and alienation, homeostasis, radical politics, and the human as system.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.
Successful technical blogging is not easy but it's also not magic. Use these techniques to attract and keep an audience of loyal, regular readers. Leverage this popularity to reach your goals and amplify your influence in your field. Get more more users for your startup or open source project, or simply find an outlet to share your expertise. This book is your blueprint, with step-by-step instructions that leave no stone unturned. Plan, create, maintain, and promote a successful blog that will have remarkable effects on your career or business. Successful people often get recognition by teaching what they know. Blogging is a reliable path to do that, while gaining influence in the process. The problem is getting it right. Far too often professionals start a blog with big hopes, only to quickly give up because they don't get speedy results. This book will spare you that fate, by outlining a careful plan of action. A plan that will bring amazing benefits to your career, new job possibilities, as well as publishing, speaking, and consulting opportunities. And if you are blogging for business, you'll attract new customers, partners, and outstanding employees. Understand what blogging is and how it can improve your professional (and personal) life. Devise a plan for your new or existing blog. Create remarkable content that ranks well in Google and is shared by readers. Beat procrastination by employing proven time-management techniques that make you an efficient and effective blogger. Promote your blog by mastering on-page and off-page SEO, as well as social media promotion, without compromising your ethics. Analyze your traffic to understand your audience and measure growth. Build a community around your blog and make the best of your newfound popularity, by maximizing its benefits for your career, business, or simply for extra income. Create and maintain a successful technical blog that will amplify your impact, influence, and reach by following Antonio's step-by-step plan.
A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks work Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? In this updated edition of Understanding the Digital World, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included. Understanding the Digital World is a must-read for readers of all backgrounds who want to know more about computers and communications.
Social Media in the Digital Age: History, Ethics, and Professional Uses details how the growth and development of social media has influenced how people interact with one another, receive news, and form social bonds. Part I of the book focuses on the history and study of social media, addressing the rise of social media, theories used to study social media, the widespread impacts of user-generated content, and more. Part II examines the legal and ethical implications of social media with chapters covering the legalities of social and digital media use, user policies, and image and brand management. Part III addresses the professional uses of social media within the disciplines of public relations, advertising, marketing, journalism, mass media, nonprofit work, and U.S. politics, as well as the role of social media in national and global movements. The second edition features new content on fake news, disinformation, conspiracy theories, bots and trolls, social media influencers, the growth of Instagram and TikTok, the Communications Decency Act, podcasts, and the confluence of social media and the 2020 United States presidential election. Social Media in the Digital Age is ideal for undergraduate courses in mass communication, broadcasting, history, and popular culture. It is also a valuable resource for communication professionals.
This book provides a comprehensive introduction of Fog Radio Access Networks (F-RANs), from both academic and industry perspectives. The authors first introduce the network architecture and the frameworks of network management and resource allocation for F-RANs. They then discuss the recent academic research achievements of F-RANs, such as the analytical results of theoretical performance limits and optimization theory-based resource allocation techniques. Meanwhile, they discuss the application and implementations of F-RANs, including the latest standardization procedure, and the prototype and test bed design. The book is concluded by summarizing the existing open issues and future trends of F-RANs. Includes the latest theoretical and technological research achievements of F-RANs, also discussing existing open issues and future trends of F-RANs toward 6G from an interdisciplinary perspective; Provides commonly-used tools for research and development of F-RANs such as open resource projects for implementing prototypes and test beds; Includes examples of prototype and test bed design and gives tools to evaluate the performance of F-RANs in simulations and experimental circumstances.
" Analyzing the Social Web "provides a framework for the analysis
of public data currently available and being generated by social
networks and social media, like Facebook, Twitter, and Foursquare.
Access and analysis of this public data about people and their
connections to one another allows for new applications of
traditional social network analysis techniques that let us identify
things like who are the most important or influential people in a
network, how things will spread through the network, and the nature
of peoples' relationships. Analyzing the Social Web introduces you
to these techniques, shows you their application to many different
types of social media, and discusses how social media can be used
as a tool for interacting with the online public.
From the Forward by Michael Lesk: Google has now developed services far beyond text search. Google software will translate languages and support collaborative writing. The chapters in this book look at many Google services, from music to finance, and describe how they can be used by students and other library users. Going beyond information resources, there are now successful collaboration services available from Google and others. You can make conference calls with video and shared screens using Google Hangouts, Writing documents with small numbers of colleagues often involved delays while each author in sequence took over the writing and made edits. Today Google Docs enables multiple people to edit the same document at once. An ingenious use of color lets each participant watch in real time as the other participants edit, and keeps track of who is doing what. If the goal is to create a website rather than to write a report, Google Sites is now one of the most popular platforms. Google is also involved in social networking, with services such as Google+ Other tools view social developments over time and space. The Google Trends service, for example, will show you when and where people are searching for topics. Not surprisingly, searches for "swimwear" peak in June and searches for "snowmobile" peak in January. The Complete Guide to Using Google in Libraries, Volume 2: Research, User Applications, and Networking has 30 chapters divided into four parts: Research, User Applications, Networking, Searching. The contributors are practitioners who use the services they write about and they provide how-to advice that will help public, school, academic, and special librarians; library consultants, LIS faculty and students, and technology professionals.
The Handbook on Socially Interactive Agents provides a comprehensive overview of the research fields of Embodied Conversational Agents, Intelligent Virtual Agents, and Social Robotics. Socially Interactive Agents (SIAs), whether virtually or physically embodied, are autonomous agents that are able to perceive an environment including people or other agents, reason, decide how to interact, and express attitudes such as emotions, engagement, or empathy. They are capable of interacting with people and one another in a socially intelligent manner using multimodal communicative behaviors, with the goal to support humans in various domains. Written by international experts in their respective fields, the book summarizes research in the many important research communities pertinent for SIAs, while discussing current challenges and future directions. The handbook provides easy access to modeling and studying SIAs for researchers and students, and aims at further bridging the gap between the research communities involved. In two volumes, the book clearly structures the vast body of research. The first volume starts by introducing what is involved in SIAs research, in particular research methodologies and ethical implications of developing SIAs. It further examines research on appearance and behavior, focusing on multimodality. Finally, social cognition for SIAs is investigated using different theoretical models and phenomena such as theory of mind or pro-sociality. The second volume starts with perspectives on interaction, examined from different angles such as interaction in social space, group interaction, or long-term interaction. It also includes an extensive overview summarizing research and systems of human-agent platforms and of some of the major application areas of SIAs such as education, aging support, autism, and games.
Covers applications of AI & IoT in healthcare Discusses recent case studies Focuses on how applications can facilitate and structure the healthcare systems Promotes scholarship and research Provides how applications can unleash the potential to keep patients safe and health, and also empower physicians to deliver better care
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
This book demonstrates to managers the strategic significance of intra-organizational social networks. It argues that strategic management is embedded in the complexity of social relations that shape the strategic direction of a company. Currently there are few tools available to systematically collect information about the social functioning of an organization. This book fills this gap by shifting attention to the social relations that contribute to strategic advantage and that build on relationships that provide unique resources and create value for the business. It considers three perspectives on how social networks have a strategic function: first, social networks constitute everyday strategic action; second, social networks convey cultural meanings; and third, how social networks depict social processes that continually illustrate what the organization is and what it can become. The book shows top and upper-middle management how cultivating an understanding of intra-firm social relations can help them to build unique strategic advantage and make use of the day-to-day knowledge that emerges in the social connections and interactions within an organization.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Internet Governance: Origins, Current Issues, and Future Possibilities deals with Internet governance and includes computer history, Internet beginnings, institutions and stakeholders, proposed models of governance, and human rights. The concept of Internet governance covers an exceptionally complex and rapidly changing field of norms and rules. Its origins and conflicts engage many disciplines and give rise to technical standards with contributions from a wide range of stakeholders. At the same time, the Internet has increasingly become the dominant reality for all the information processing industries. The ultimate goal of the book is to establish a foundation for identifying a new model of governance for the Internet. In doing so, the book honors the efforts of previous scholars who have considered and proposed other models for the governance of the Internet. Among its aims, the book is intended as an introduction for the novice to the subject of internet governance. The first two chapters offer a historical foundation of the institutions and the debate. The next two chapters discuss the evolution of that debate over the last twenty years. The final two discuss the present and future ramifications of the debate and include the author's attempts to sketch a practical plan for a new concept of Internet governance. This book provides an introductory, multidisciplinary account of the forces at work in the evolving concept of internet governance for scholars in the information studies fields, including computer, information and library science. It should also be useful for scholars in the fields of international law, international relations, diplomacy studies and political science.
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world-and businesses-work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the development of novel analytic approaches and tools. This reference work deals with social network aspects of big data analytics. It covers theory, practices and challenges in social networking. The book spans numerous disciplines like neural networking, deep learning, artificial intelligence, visualization, e-learning in higher education, e-healthcare, security and intrusion detection. |
You may like...
Global Ideologies Surrounding Children's…
Icarbord Tshabangu
Hardcover
R4,816
Discovery Miles 48 160
A Research Agenda for Human Rights
Michael Stohl, Alison Brysk
Hardcover
R3,235
Discovery Miles 32 350
Autophagy and Senescence in Cancer…
Paul B. Fisher, David A. Gewirtz
Hardcover
R3,734
Discovery Miles 37 340
The Evolution of the Stock Market in…
Chien-Hsun Chen, Hui-Tzu Shih
Hardcover
R3,242
Discovery Miles 32 420
Multivariable Calculus, Metric Edition
Daniel K Clegg, James Stewart, …
Hardcover
Art and Human Rights - A…
Fiana Gantheret, Nolwenn Guibert, …
Hardcover
R4,447
Discovery Miles 44 470
|