![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > General
Offers research-based examples and case studies to facilitate the understanding of each IoT primitive Highlights IoT's connection to blockchain Provides an understanding of benefits and challenges of IoT and its importance to a variety of engineering disciplines
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
Offers research-based examples and case studies to facilitate the understanding of each IoT primitive Highlights IoT's connection to blockchain Provides an understanding of benefits and challenges of IoT and its importance to a variety of engineering disciplines
The main purpose of this book is to sum up the vital and highly topical research issue of knowledge representation on the Web and to discuss novel solutions by combining benefits of folksonomies and Web 2.0 approaches with ontologies and semantic technologies. The book contains an overview of knowledge representation approaches in past, present and future, introduction to ontologies, Web indexing and in first case the novel approaches of developing ontologies. combines aspects of knowledge representation for both the Semantic Web (ontologies) and the Web 2.0 (folksonomies). Currently there is no monographic book which provides a combined overview over these topics. focus on the topic of using knowledge representation methods for document indexing purposes. For this purpose, considerations from classical librarian interests in knowledge representation (thesauri, classification schemes etc.) are included, which are not part of most other books which have a stronger background in computer science.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
Cinematic Virtual Reality brings a combination of documentary, narrative and game design principles to the medical profession and, in the healthcare arena, collaboration is a key component for creating intellectually- and emotionally- rich immersive experiences. "The Power of Virtual Reality Cinema for Healthcare Training" gathers more than a dozen experts from both the production and healthcare fields to break down best practices for creating successful cine-VR projects. Designed for multi-disciplinary teams interested in integrating cine-VR production into their healthcare training and educational programs, this book has been written for two audiences: the healthcare professional interested in what production experts consider when approaching a project, and the media expert curious about how this new technology can be used in the medical field. Highlights include: Cutting edge medical education techniques developed by Ohio University's GRID Lab, including: PREality (creating a forced sense of deja-vu to increase acclimation time), a unique approach to eye-tracking to enhance team performance, and the low-CRIS technique (a low-cost rapid implementation strategy to capture patient care for rapid graduate student training). Insightful production techniques that will enhance your cine-VR projects including advanced plating methods to hide lighting set-ups, immersive audio considerations, and new ways to consider 360 storytelling including the Lovrick montage and the Christmas Carol continuum for story development. Detailed explanations of the production considerations and results of specific cine-VR productions (from funding approaches to distribution) including access to more than five hours of cine-VR examples of the actual productions available for download. Details on a wide variety of medical cine-VR projects, including 100 images that illustrate best practices for topics such as recording in active medical facilities, building successful multi-disciplinary teams, working within HIPAA regulations, conceptualizing cine-VR libraries for graduate education, and implementing innovative distribution models.
- The book shows you what 'data science' actually is and focuses uniquely on how to minimize the negatives of (bad) data science - It discusses the actual place of data science in a variety of companies, and what that means for the process of data science - It provides 'how to' advice to both individuals and managers - It takes a critical approach to data science and provides widely-relatable examples
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
* Fills a gap in the current Business and Management literature by addressing the relationship between a brand's visual identity and their stakeholders. * Combines a literature-based and theoretical approach with real life case studies from a broad range of industries. * Covers the full process of corporate brand design management, making the book suitable recommended reading for a broad range of modules and disciplines.
Today, an ever-expanding set of human activities, ranging from business processes to healthcare to education and research, is dependent upon the Internet. Most processes involve a workflow, the coordinated execution of multiple activities. In a given application, once the key stages of the workflow have been isolated, an infrastructure to coordinate the handling of individual cases is necessary. Internet-Based Workflow Management shows how to understand, develop, and use societal services for process coordination in an information grid with a rich set of hardware and software resources. In such a semantic web, individual services offered by autonomous service providers can be composed to perform the complex tasks involved in emerging new applications. The book is designed to be accessible to IT practitioners and researchers as well as to those without formal training in computer science. Businesspeople, scientists, engineers, or anyone else involved in the development of Internet-centric applications will find the book an invaluable resource. The coverage includes:
In the final chapter of the book, Dan Marinescu brings together all these elements in a case study that shows the step-by-step development of middleware for process coordination. This middleware is available under an open source license at www.wiley.com.
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
Two of the most prolific and challenging authorities on the topic of competitive intelligence (CI) reflect on and respond to the changes in the field over the last decade. The authors point out that CI users have to change what they are doing, show why they are doing it, and provide ways of doing it. Their book reviews the problems in the development of CI since the 1980s, discusses the impact of the Internet and the rise in use of other secondary sources, and draws from and provides access to the growing body of CI information, knowledge, and literature. Combining a scholarly approach with hands-on advice, McGonagle and Vella have written the first work to guide CI professionals through the emerging literature of their field. Among the important changes in the field the authors cover are: the radical changes in on line database searching and ways in which the Internet has fundamentally modified how we think of accessing data. Their book explores and reports the major body of work from the Society of Competitive Intelligence Professionals, now that more businesses worldwide are using competitive intelligence and either writing about their experiences with it, or joining in new benchmarking studies. The result is newer information on what really works, what doesn't work, and who is doing what with it. The book is thus a starting point for people new to the field of CI as well as a resource to help experienced professionals do their jobs better.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
Across Africa, digital media are providing scholars with a reason and opportunity for revisiting the question, and the analytical lens, of publics with new vigour and less normative baggage. This book brings together a rich set of empirically grounded analyses of the diverse digital spaces and networks of communication springing up across the Eastern African region. The contributions offer a plural set of reflections on whether and how we can usefully think about these spaces and networks as convening publics, where citizens come together to discuss matters of common interest. The authors make clear the need to unshackle such studies from slavish acceptance of outsiders' prescriptions on what constitutes desirable publics. They highlight the importance of being attentive to rapidly changing everyday realities across Africa in which people are coming together around the circulation of ideas in ways that include digital means of communications. In so doing, the contributions bring forward new ways of thinking about, through and with publics, alongside other heritages in Africanist scholarship that have continued salience. Looking outwards from the region, such different perspectives on our digitally mediated world offer theoretical novelty that advances how we think about the notion of publics and their political significance. This book was originally published as a special issue of the Journal of Eastern African Studies.
Covers applications of AI & IoT in healthcare Discusses recent case studies Focuses on how applications can facilitate and structure the healthcare systems Promotes scholarship and research Provides how applications can unleash the potential to keep patients safe and health, and also empower physicians to deliver better care
The narrative of the birth of internet culture often focuses on the achievements of American entrepreneurs in Silicon Valley, but there is an alternative history of internet pioneers in Europe who developed their own model of network culture in the early 1990s. Drawing from their experiences in the leftist and anarchist movements of the '80s, they built DIY networks that give us a glimpse into what internet culture could have been if it were in the hands of squatters, hackers, punks, artists, and activists. In the Dutch scene, the early internet was intimately tied to the aesthetics and politics of squatting. Untethered from profit motives, these artists and activists aimed to create a decentralized tool that would democratize culture and promote open and free exchange of information.
Life without the internet, a very new technology, seems almost unimaginable for most people in western nations. Today the internet is intrinsic to media and communications, entertainment, politics, defence, business, banking, education and administrative systems as well as to social interaction. "The Internet" disentangles this extraordinarily complex information and communication technology from its place in our daily lives, allowing it to be examined anew. Technology has historically been shaped by governmental, military and commercial requirements, but the development of the internet is increasingly driven by its users. YouTube, Facebook, Twitter, Flickr and many other emerging applications are shifting the way we express ourselves, communicate with our friends, and even engage with global politics. At the same time three-quarters of the world's population remain effectively excluded from the internet. Packed with case studies drawn from around the world, "The Internet" presents a clear and up-to-date introduction to the social, cultural, technological and political worlds this new media form is creating.
Big data has been upgraded to our national strategy and has become a catalyst for national and local economic development. With the further promotion of big data and artificial intelligence (AI), the new business model needs to optimize and upgrade. The integration of the blockchain industry will fully implement the digital China strategy and promote the application of big data in China.This unique compendium gives a comprehensive understanding of the blockchain content through the path of technological innovation. It enables readers to fully understand the role of blockchain in promoting the digital economy.The volume will be a useful reference guide for relevant personnel in state ministries and commissions, state-owned enterprises, big data, AI, as well as teachers, researchers and students in higher education institutions.
Cybernetic-Existentialism: Freedom, Systems, and Being-for-Others in Contemporary Arts and Performance offers a unique discourse and an original aesthetic theory. It argues that fusing perspectives from the philosophy of Existentialism with insights from the 'universal science' of cybernetics provides a new analytical lens and deconstructive methodology to critique art. In this study, Steve Dixon examines how a range of artists' works reveal the ideas of Existentialist philosophers including Kierkegaard, Camus, de Beauvoir, and Sartre on freedom, being and nothingness, eternal recurrence, the absurd, and being-for-others. Simultaneously, these artworks are shown to engage in complex explorations of concepts proposed by cyberneticians including Wiener, Shannon, and Bateson on information theory and 'noise', feedback loops, circularity, adaptive ecosystems, autopoiesis, and emergence. Dixon's groundbreaking book demonstrates how fusing insights and knowledge from these two fields can throw new light on pressing issues within contemporary arts and culture, including authenticity, angst and alienation, homeostasis, radical politics, and the human as system.
In this book, the author outlines a Robust Web Parking, Truck and Transportation Portal (RWPTTP) for integrating parking and transportation services - a revolutionary approach in contrast to incremental change for managing traffic congestion. Autonomous vehicle technology, artificial intelligence, internet of things (IOT), and other interconnected hardware and software tools will assist autonomous parking and transportation services and provide next-century infrastructure for consolidated transportation customer services. The book highlights currently available autonomous parking and transportation technologies, and the development of an integrated and intelligent transportation service/system (IITS) platform, with specific use of technologies to reconfigure the transportation industry. The author also suggests many regulatory and policy changes to simplify data collection, traffic operation, introduction of a duplicate transportation system using light rail (LRs) and high speed rail (SPRs), and redistribution of parking spaces along such routes, using renewable energy.
A uniquely interdisciplinary look at storytelling in digital, analogue, and hybridised contexts, this book traces different ways stories are experienced in our contemporary mediascape. It uses an engaging range of current examples to explore interactive and immersive narratives. Critical Encounters with Immersive Storytelling considers exciting new forms of storytelling that are emerging in contemporary popular culture. Here, immersion is being facilitated in a variety of ways and in a multitude of contexts, from 3D cinema to street games, from immersive theatre plays to built environments such as theme parks, as well as in a multitude of digital formats. The book explores diverse modes and practices of immersive storytelling, discussing what is gained and lost in each of these 'genres'. Building on notions of experience and immersion, it suggests a framework within which we might begin to understand the quality of being immersed. It also explores the practical and ethical aspects of this exciting and evolving terrain. This accessible and lively study will be of great interest to students and researchers of media studies, digital culture, games studies, extended reality, experience design, and storytelling.
Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. However, while social networking helps the world stay connected, its use must be further examined in order to determine any possible pitfalls associated with the use of this technology. Implications of Social Media Use in Personal and Professional Settings investigates the paradoxical nature of social networking in our personal lives and in the workplace. Highlighting emergent research and psychological impacts, this publication is an indispensable reference source for academics, researchers, and professionals interested in the application of social media, as well as the positive aspects and detrimental effects of the usage of these technologies.
Digitising Enterprise in an Information Age is an effort that focuses on a very vast cluster of Enterprises and their digitising technology involvement and take us through the road map of the implementation process in them, some of them being ICT, Banking, Stock Markets, Textile Industry & ICT, Social Media, Software Quality Assurance, Information Systems Security and Risk Management, Employee Resource Planning etc. It delves on increased instances of cyber spamming and the threat that poses to e-Commerce and Banking and tools that help and Enterprise toward of such threats. To quote Confucius, "As the water shapes itself to the vessel that contains it, so does a wise man adapts himself to circumstances." And the journey of evolution and progression will continue and institutions and enterprises will continue to become smarter and more and more technology savvy. Enterprises and businesses across all genre and spectrum are trying their level best to adopt to change and move on with the changing requirements of technology and as enterprises and companies upgrade and speed up their digital transformations and move their outdate heirloom systems to the cloud, archaic partners that don't keep up will be left behind. Note: T&F does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
Wiley Online Trading for a Living |
You may like...
Energy Harvesting for Self-Powered…
Mohammad Alhawari, Baker Mohammad, …
Hardcover
R2,863
Discovery Miles 28 630
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R3,940
Discovery Miles 39 400
Simulation Methods for ESD Protection…
Harald Gossner, Kai Esmark, …
Hardcover
R4,190
Discovery Miles 41 900
Transient and Permanent Error Control…
Qiaoyan Yu, Paul Ampadu
Hardcover
R2,649
Discovery Miles 26 490
|