Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Handheld devices (eg Palm, PocketPC)
You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference. "
The internet of things (IoT) has had a major impact on academic and industrial fields. Applying these technologies to healthcare systems reduces medical costs while enriching the patient-centric approach to medicine, allowing for better overall healthcare proficiency. However, usage of IoT in healthcare is still suffering from significant challenges with respect to the cost and accuracy of medical sensors, non-standard IoT system architectures, assorted wearable devices, the huge volume of generated data, and interoperability issues. Incorporating the Internet of Things in Healthcare Applications and Wearable Devices is an essential publication that examines existing challenges and provides solutions for building smart healthcare systems with the latest IoT-enabled technology and addresses how IoT improves the proficiency of healthcare with respect to wireless sensor networks. While highlighting topics including mobility management, sensor integration, and data analytics, this book is ideally designed for computer scientists, bioinformatics analysts, doctors, nurses, hospital executives, medical students, IT specialists, software developers, computer engineers, industry professionals, academicians, researchers, and students seeking current research on how these emerging wireless technologies improve efficiency within the healthcare domain.
Wearable continuous monitoring systems are necessary in risky environments such as mining and diving and are especially important in the medical monitoring of patients both in medical facilities and at home. All these applications of monitoring with data transmission functions can be achieved by using wearable antennas. Recently, possibilities of connecting completely independent appliances with textiles have emerged. However, full success will be achieved only when antennas and all related components are entirely converted into 100% textile materials. Design and Optimization of Sensors and Antennas for Wearable Devices provides innovative insights on the development of adaptable materials and textile antennas that can be used in the construction of wearable devices that are biocompatible and offer high conductivity, low cost, simplistic manufacturing, are comfortable for the wearer, and are water/climate safe and condition amicable. The content within this publication examines data transmission, wearable computing, and medical applications. It is designed for engineers, manufacturers, researchers, academicians, and scientists who are interested in the development of wearable technologies.
The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the opportunities, there exist constraints, challenges, and complexities in realizing the full potential of mobile computing, requiring research and experimentation. Algorithms, Methods, and Applications in Mobile Computing and Communications is a critical scholarly publication that examines the various aspects of mobile computing and communications from engineering, business, and organizational perspectives. The book details current research involving mobility challenges that hinder service applicability, mobile money transfer services and anomaly detection, and mobile fog environments. As a resource rich in information about mobile devices, wireless broadcast databases, and machine communications, it is an ideal source for computer scientists, IT specialists, service providers, information technology professionals, academicians, and researchers interested in the field of mobile computing.
A Handheld History is a unique celebration of portable platforms and their iconic games. Forty years ago, businessmen fiddling with calculators inspired Gunpei Yokoi to create the Game & Watch. Ever since then, handheld gaming has been hugely influential, spawning communities who trade Pokémon in the playground and share Miis on the subway. This introspective adventure will delve into decades of gaming memories and reconnect you to that long car journey full of discarded AA batteries before speeding ahead to the contemporary days of blockbusters in your backpack. Handheld gaming is celebrated loudly, proudly, and across hundreds of beautifully assembled pages of art and essays. Featuring words from many incredible voices, this is an unmissable ode to the gaming device that you keep close to your heart – right in your jacket pocket.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
This book gathers outstanding research papers presented at the International Joint Conference on Advances in Computational Intelligence (IJCACI 2020), organized by Daffodil International University (DIU) and Jahangirnagar University (JU) in Bangladesh and South Asian University (SAU) in India. These proceedings present novel contributions in the areas of computational intelligence and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front which focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and health care.
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
Portable Biosensors and Point-of-Care Systems describes the principles, design and applications of a new generation of analytical and diagnostic biomedical devices, characterized by their very small size, ease of use, multi-analytical capabilities and speed to provide handheld and mobile point-of-care (POC) diagnostics. The book is divided in four Parts. Part I is an in-depth analysis of the various technologies upon which portable diagnostic devices and biosensors are built. In Part II, advances in the design and optimization of special components of biosensor systems and handheld devices are presented. In Part III, a wide scope of applications of portable biosensors and handheld POC devices is described, ranging from the support of primary healthcare to food and environmental safety screening. Diverse topics are covered, including counterterrorism, travel medicine and drug development. Finally, Part IV of the book is dedicated to the presentation of commercially available products including a review of the products of point-of-care in-vitro-diagnostics companies, a review of technologies which have achieved a high Technology Readiness Level, and a special market case study of POC infusion systems combined with intelligent patient monitoring. This book is essential reading for researchers and experts in the healthcare diagnostic and analytical sector, and for electronics and material engineers working on portable sensors.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
<> Learn On-Demand TV, DVRs, Music, Games, Books, and More! With My Digital Entertainment for Seniors, you'll discover easy ways to access and experience entertainment using today's technology, without getting confused or bogged down with techno-babble-and without spending a fortune. This easy-to-follow guide covers all aspects of entertainment-movies, TV shows, radio, music, newspapers and magazines, books, and more-whether you're using a computer, mobile device, or other technology. Specifically, you'll: Get acquainted with all forms of digital entertainment that are available in everyday life, including on-demand TV shows, movies, music and radio programming, podcasts, eBooks and audiobooks, digital editions of newspapers and magazines, YouTube videos, and interactive games.Discover the difference between streaming and downloading content from the Internet to your computer or mobile device. Learn what equipment you'll need and how to use this equipment, no matter how tech-savvy you are-or aren't. Find out how to watch, listen to, and read what you want, when you want it, on your TV, desktop computer, notebook computer, smartphone, tablet, eBook reader, or gaming console. Learn what types of entertainment are available to use on eBook readers, digital video recorders, digital music players, high-definition television sets, cable/satellite TV service providers, what types of entertainment are readily available via the Internet, and how to use your computer, smartphone or tablet as an entertainment device. Find ways to stay safe and protect yourself from identity theft or online crime when surfing the Internet, shopping online, playing games, doing online banking, and handling other Internet-related tasks.
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.
This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.
The second generation of cloud computing systems, known as domain-specific clouds, are emerging based on application-specific processors and serverless computing paradigm. As multimedia streaming services are increasingly growing in popularity and diversity, this book is authored to introduce "multimedia clouds" as a domain-specific cloud that operates in the intersection of cloud computing technologies and digital media streaming. The book concentrates on the architectural aspects of multimedia clouds and describes development of high-level abstractions that will mitigate the burden of programmers, cloud architects, and system administrators. Multimedia clouds not only democratize multimedia streaming and add flexibility to the streaming services, they also help stream providers to offer robust and reliable streaming services in a cost- and energy-efficient manner.
If you're grounded in the basics of Swift, Xcode, and the Cocoa framework, this book provides a structured explanation of all essential real-world iOS app components. Through deep exploration and copious code examples, you'll learn how to create views, manipulate view controllers, and add features from iOS frameworks. Create, arrange, draw, layer, and animate views that respond to touch Use view controllers to manage multiple screens of interface Master interface classes for scroll views, table views, text, popovers, split views, web views, and controls Dive into frameworks for sound, video, maps, and sensors Access user libraries: music, photos, contacts, and calendar Explore additional topics, including files, networking, and threads Stay up-to-date on iOS 11 innovations, such as: Drag and drop Autolayout changes (including the new safe area) Stretchable navigation bars Table cell swipe buttons Dynamic type improvements Offline sound file rendering, image picker controller changes, new map annotation types, and more |
You may like...
Technology for Success - Computer…
Mark Ciampa, Jill West, …
Paperback
(1)
Post-disaster Navigation and Allied…
Suman Bhattacharjee, Siuli Roy, …
Hardcover
R2,788
Discovery Miles 27 880
Emerging Wireless Communication and…
Karm Veer Arya, Robin Singh Bhadoria, …
Hardcover
R4,521
Discovery Miles 45 210
When Compressive Sensing Meets Mobile…
Linghe Kong, Bowen Wang, …
Hardcover
R2,789
Discovery Miles 27 890
Mobile Health - Sensors, Analytic…
James M. Rehg, Susan.A Murphy, …
Hardcover
R5,541
Discovery Miles 55 410
Communication, Devices, and Computing…
Jaydeb Bhaumik, Indrajit Chakrabarti, …
Hardcover
R5,470
Discovery Miles 54 700
|