![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
More objects and devices are connected to digital networks than ever before. Things - from your phone to your car, from the heating to the lights in your house - have gathered the ability to sense their environments and create information about what is happening. Things have become media, able to both generate and communicate information. This has become known as 'the internet of things'. In this accessible introduction, Graham Meikle and Mercedes Bunz observe its promises of convenience and the breaking of new frontiers in communication. They also raise urgent questions regarding ubiquitous surveillance and information security, as well as the transformation of intimate personal information into commercial data. Discussing the internet of things from a media and communication perspective, this book is an important resource for courses analysing the internet and society, and essential reading for anyone who wants to better understand the rapidly changing roles of our networked lives.
This book highlights the need for an efficient Handover Decision (HD) mechanism to perform switches from one network to another and to provide unified and continuous mobile services that include seamless connectivity and ubiquitous service access. The author shows how the HD involves efficiently combining handover initiation and network selection process. The author describes how the network selection decision is a challenging task that is a central component to making HD for any mobile user in a heterogeneous environment that involves a number of static and dynamic parameters. The author also discusses prevailing technical challenges like Dynamic Spectrum Allocation (DSA) methods, spectrum sensing, cooperative communications, cognitive network architecture protocol design, cognitive network security challenges and dynamic adaptation algorithms for cognitive system and the evolving behavior of systems in general. The book allows the reader to optimize the sensing time for maximizing the spectrum utilization, improve the lifetime of the cognitive radio network (CRN) using active scan spectrum sensing techniques, analyze energy efficiency of CRN, find a secondary user spectrum allocation, perform dynamic handovers, and use efficient data communication in the cognitive networks. Identifies energy efficient spectrum sensing techniques for Cooperative Cognitive Radio Networks (CRN); Shows how to maximize the energy capacity by minimizing the outage probability; Features end-of-chapter summaries, performance measures, and case studies.
As virtual reality approaches mainstream consumer use, new research and innovations in the field have impacted how we view and can use this technology across a wide range of industries. Advancements in this technology have led to recent breakthroughs in sound, perception, and visual processing that take virtual reality to new dimensions. As such, research is needed to support the adoption of these new methods and applications. Cases on Immersive Virtual Reality Techniques is an essential reference source that discusses new applications of virtual reality and how they can be integrated with immersive techniques and computer resources. Featuring research on topics such as 3D modeling, cognitive load, and motion cueing, this book is ideally designed for educators, academicians, researchers, and students seeking coverage on the applications of collaborative virtual environments.
The unprecedented growth in the range of multimedia services offered these days by modern telecommunication systems has been made possible only because of the advancements in signal processing technologies and algorithms. In the area of telecommunications, application of signal processing allows for new generations of systems to achieve performance close to theoretical limits, while in the area of multimedia, signal processing the underlying technology making possible realization of such applications that not so long ago were considered just a science fiction or were not even dreamed about. We all learnt to adopt those achievements very quickly, but often the research enabling their introduction takes many years and a lot of efforts. This book presents a group of invited contributions, some of which have been based on the papers presented at the International Symposium on DSP for Communication Systems held in Coolangatta on the Gold Coast, Australia, in December 2003. Part 1 of the book deals with applications of signal processing to transform what we hear or see to the form that is most suitable for transmission or storage for a future retrieval. The first three chapters in this part are devoted to processing of speech and other audio signals. The next two chapters consider image coding and compression, while the last chapter of this part describes classification of video sequences in the MPEG domain.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.
For undergraduate students who have completed a course in object-oriented programming Programming the World Wide Web provides a comprehensive introduction to the tools and skills required for both client- and server-side programming, teaching students how to develop platform-independent sites using the most current Web development technology. Essential programming exercises are presented using a manageable progression: students begin with a foundational XHTML Web site and employ new languages and technologies to add features as they are discussed in the course. Readers with previous experience programming with an object-oriented language are guided through concepts relating to client-side and server-side programming.
Social network analysis has created novel opportunities within the field of data science. The complexity of these networks requires new techniques to optimize the extraction of useful information. Graph Theoretic Approaches for Analyzing Large-Scale Social Networks is a pivotal reference source for the latest academic research on emerging algorithms and methods for the analysis of social networks. Highlighting a range of pertinent topics such as influence maximization, probabilistic exploration, and distributed memory, this book is ideally designed for academics, graduate students, professionals, and practitioners actively involved in the field of data science. The many academic areas covered in this publication include, but are not limited to: Content Specific Modeling Distributed Memory Graph Mining Influence Maximization Information Spread Control Link Prediction Probabilistic Exploration
"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches "presents methods to model 3D objects in an incremental way so as to capture more finer details at each step. The configuration of the model parameters, the rationale and solutions are described and discussed in detail so the reader has a strong understanding of the methodology. Modeling starts from data captured by 3D digitizers and makes the process even more clear and engaging. Innovative approaches, based on two popular machine learning paradigms, namely Radial Basis Functions and the Support Vector Machines, are also introduced. These paradigms are innovatively extended to a multi-scale incremental structure, based on a hierarchical scheme. The resulting approaches allow readers to achieve high accuracy with limited computational complexity, and makes the approaches appropriate for online, real-time operation. Applications can be found in any domain in which regression is required. "3D Surface Reconstruction: Multi-Scale Hierarchical Approaches" is designed as a secondary text book or reference for advanced-level students and researchers in computer science. This book also targets practitioners working in computer vision or machine learning related fields.
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
PHP is rapidly becoming the language of choice for dynamic Web development, in particular for e-commerce and on-line database systems. It is open source software and easy to install, and can be used with a variety of operating systems, including Microsoft Windows and UNIX. This comprehensive manual covers the basic core of the language, with lots of practical examples of some of the more recent and useful features available in version 5.0. MySQL database creation and development is also covered, as it is the developer database most commonly used alongside PHP. It will be an invaluable book for professionals wanting to use PHP to develop their own dynamic web pages. Key Topics: - Basic Language Constructs - Manipulating Arrays and Strings - Errors and Buffering - Graphic Manipulation - PDF Library Extension - MySQL Database Management - Classes and Objects Concepts Features and Benefits: Explains how to use PHP to its full extent - covering the latest features and functions of PHP version 5.0, including the use of object-oriented programming Describes how to link a database to a web site, using the MySQL database management system Shows how to connect PHP to other systems and provides many examples, so that you can create powerful and dynamic web pages and applications Contains lots of illustrated, practical, real-world examples - including an e-commerce application created in PHP using many of the features described within the book The scripts used in the examples are available for download from www.phpmysql-manual.com
This book presents link-layer cooperative frameworks to improve transmission reliability and network throughput of distributed TDMA MAC protocols in vehicular ad hoc networks (VANETs). The main objective of this book is to present link-layer node cooperation schemes to enhance the link-layer performance of vehicular networks, in terms of reliability and system throughput. The authors present approaches proposed for the medium access control (MAC) and node cooperation in VANETs. The authors also cover cooperative ADHOC MAC for point-to-point communication between a pair of source and destination nodes, and cooperative relay broadcasting for broadcast services in this book. The performance of node cooperation frameworks is evaluated via mathematical analysis and computer simulations, in comparison with distributed TDMA MAC protocols without cooperation. The proposed node cooperation frameworks enhance the performance of distributed TDMA MAC and make it more robust to tackle the dynamic networking conditions in VANETs. Furthermore, with cooperation enabled transmission, the performance of distributed TMDA MAC is more suitable to support the wide range of mobile applications and their strict service requirements which is discussed in this book. The proposed node cooperation schemes and distributed cooperation decisions can be extended to wireless systems other than distributed TDMA MAC, such as cellular communication, for vehicular communications introduced in this book. This book is useful for researchers from academia and industry, as well as advanced level students interested in vehicular communication networks. It is also useful for professionals and engineers developing applications that use cooperative wireless communication systems.
Despite the pervasiveness of the Internet and its importance to a wide range of state functions, we still have little understanding of its implications in the context of International Relations. Combining the Philosophy of Technology with IR theories of power, this study explores state power in the information age.
This proceedings volume presents selected papers from the 7th International Conference on Emerging Databases: Technologies, Applications, and Theory (EDB 2017), which was held in Busan, Korea from 7 to 9 August, 2017. This conference series was launched by the Korean Institute of Information Scientists and Engineers (KIISE) Database Society of Korea as an annual forum for exploring novel technologies, applications, and research advances in the field of emerging databases. This forum has evolved into the premier international venue for researchers and practitioners to discuss current research issues, challenges, new technologies, and solutions.
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
The Semantic Web has evolved as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegating tasks to software agents. Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking communicates relevant recent research in Semantic Web-based personalization as applied to the context of information systems. This book reviews knowledge engineering for organizational applications, and Semantic Web approaches to information systems and ontology-based information systems research, as well as the diverse underlying database and knowledge representation aspects that impact personalization and customization.
The emergence of Web technologies for the distribution of an immense amount of data and knowledge has given rise to the need for supportive frameworks for kno- edge management. Semantic Web technologies aim at providing shared semantic spaces for Web contents, such that people, applications and communities can use a common platform to share information. Canadian Semantic Web: Technologies and Applications aims at contributing to the advancement of the Semantic Web by providing the most recent signi?cant - search on Semantic Web theory, techniques and applications in academia, industry and government in Canada and all over the world. It also enlightens possible - mantic Web research directions in future by reporting some works in-progress that presenton-goingresearchonprinciplesandapplicationsoftheSemanticWeb, while their implementation or deployment may have not been completed. This book consists of ten chapters. The chapters are extended versions of a - lected set of papers from the second Canadian Semantic Web Working Symposium (CSWWS 2009) and the twenty-?rst international Conference on Software En- neering and Knowledge Engineering (SEKE 2009). CSWWS 2009 was held in Kelowna, British Columbia in May 2009. Since many of the challenging aspects of the research problems tackled in the Semantic Web area fall in the realm of Ar- ?cial Intelligence or employ of AI techniques, CSWWS 2009 was organized in - nd sociation with the 22 Canadian Conference on Arti?cial Intelligence
Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.
This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint.
What the international phenomenon of The Rules did for conventional dating, The Rules for Online Dating does for the search for love on the Internet. You'll never hit the "reply" button the same way again. Millions of women around the world are meeting men on the Internet, or they've met in person and are corresponding by e-mail. But though e-mail and Net-based dating services have revolutionized the dating landscape, they've created their own pitfalls and challenges. Women need new strategies that will improve their chances of capturing Mr. Right. Boasting the same time-tested formula and romantic spirit that made The Rules an international bestseller and launched thousands of women down the path to committed relationships, The Rules for Online Dating shows all women -- regardless of age, status, or computer savvy -- how to use electronic communication to relate to men in a way that maintains self-esteem and leads to a healthy relationship. Here is a comprehensive list of dos and don'ts that will help every woman conduct an e-courtship safely and successfully; find and keep the interest of suitable mates; and save time, energy, and potential heartache by weeding out dead wood. The Rules for Online Dating takes women through the process -- step by step, Rule by Rule -- to the ultimate goal: a relationship based on mutual attraction, interest, and respect.
The project of writing this monograph was conceived in August 2006. It is a m- ter of delight and satisfaction that this monograph would be published during the centenary year (May 27, 2008 - May 26, 2009) of our dear alma mater, the Indian Institute of Science, which is truly a magni cent temple and an eternal source of inspiration, with a splendid ambiance for research. Studying the rational behavior of entities interacting with each other in or- nized or ad-hoc marketplaces has been the bread and butter of our research group here at the Electronic Commerce Laboratory, Department of Computer Science and Automation, Indian Institute of Science. Speci cally, the application of game th- retic modeling and mechanism design principles to the area of network economics was an area of special interest to the authors. In fact, the dissertations of the s- ond, third, and fourth authors (Dinesh Garg, Ramasuri Narayanam, and Hastagiri Prakash) were all in this area. Dinesh Garg's Doctoral Thesis, which later won the Best Dissertation Award at the Department of Computer Science and Automation, Indian Institute of Science for the academic year 2006-07, included an interesting chapter on applying the brilliant work of Roger Myerson (Nobel laureate in E- nomic Sciences in 2007) to the topical problem of sponsored search auctions on the web. Ramasuri's Master's work applied mechanism design to develop robust broadcastprotocolsin wireless adhoc networkswhile Hastagiri's Master's work - veloped resource allocation mechanisms for computational grids.
This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history of podcasting from its roots in radio; the variety of genres, topics and styles of today's podcasts (both individual and corporate); and the steps required to build your own podcast. The handbook covers all the elements needed to create a successful podcast including platform options, programming, advertising and sponsorships. Supplemental essays from professionals in various industries provide information and tips to enhance the podcasting experience. The structure of the book is easily adapted into lesson plans, and the exercises included for readers make it a book well suited for classes on podcasting.
Mining the World Wide Web: An Information Search Approach explores the concepts and techniques of Web mining, a promising and rapidly growing field of computer science research. Web mining is a multidisciplinary field, drawing on such areas as artificial intelligence, databases, data mining, data warehousing, data visualization, information retrieval, machine learning, markup languages, pattern recognition, statistics, and Web technology. Mining the World Wide Web presents the Web mining material from an information search perspective, focusing on issues relating to the efficiency, feasibility, scalability and usability of searching techniques for Web mining. Mining the World Wide Web is designed for researchers and developers of Web information systems and also serves as an excellent supplemental reference to advanced level courses in data mining, databases and information retrieval. |
![]() ![]() You may like...
Cloud Computing and Services Science
Ivan Ivanov, Marten Van Sinderen, …
Hardcover
R4,639
Discovery Miles 46 390
Probability - An Introduction
Geoffrey Grimmett, Dominic Welsh
Hardcover
R4,464
Discovery Miles 44 640
Mobile Devices in Education…
Information Reso Management Association
Hardcover
R9,347
Discovery Miles 93 470
Principles Of Statistical Inference From…
Luigi Pace, Alessandra Salvan
Paperback
R1,518
Discovery Miles 15 180
Research Anthology on Developments in…
Information R Management Association
Hardcover
R10,268
Discovery Miles 102 680
Methodologies of Mobility - Ethnography…
Alice Elliot, Roger Norum, …
Paperback
R902
Discovery Miles 9 020
|