0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (639)
  • R250 - R500 (2,095)
  • R500+ (12,289)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Integrating IoT and AI for Indoor Air Quality Assessment (Hardcover, 1st ed. 2022): Jagriti Saini, Maitreyee Dutta, Goncalo... Integrating IoT and AI for Indoor Air Quality Assessment (Hardcover, 1st ed. 2022)
Jagriti Saini, Maitreyee Dutta, Goncalo Marques, Malka N Halgamuge
R2,532 Discovery Miles 25 320 Ships in 10 - 15 working days

This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality (IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.

The Dark Realm (Hardcover): Anthea Sharp The Dark Realm (Hardcover)
Anthea Sharp
R820 Discovery Miles 8 200 Ships in 18 - 22 working days
eHealth Solutions for Healthcare Disparities (Hardcover, 2008 ed.): Michael Christopher Gibbons eHealth Solutions for Healthcare Disparities (Hardcover, 2008 ed.)
Michael Christopher Gibbons
R1,505 Discovery Miles 15 050 Ships in 18 - 22 working days

Paralleling emerging trends in cyber-health technology, concerns are mounting about racial and ethnic disparities in health care utilization and outcomes. This book brings these themes together, challenging readers to use, promote, and develop new technology-based methods for closing these gaps. Edited by a leading urban health advocate and featuring 16 expert contributors, the book examines cyber-strategies with the greatest potential toward effective, equitable care, improved service delivery and better health outcomes for all. The rise of e-Patients and the transformation of the doctor-patient relationship are also discussed.

Memristor Computing Systems (Hardcover, 1st ed. 2022): Leon O. Chua, Ronald Tetzlaff, Angela Slavova Memristor Computing Systems (Hardcover, 1st ed. 2022)
Leon O. Chua, Ronald Tetzlaff, Angela Slavova
R4,273 Discovery Miles 42 730 Ships in 18 - 22 working days

This contributed volume offers practical solutions and design-, modeling-, and implementation-related insights that address current research problems in memristors, memristive devices, and memristor computing. The book studies and addresses related challenges in and proposes solutions for the future of memristor computing. State-of-the-art research on memristor modeling, memristive interconnections, memory circuit architectures, software simulation tools, and applications of memristors in computing are presented. Utilising contributions from numerous experts in the field, written in clear language and illustrated throughout, this book is a comprehensive reference work. Memristor Computing Systems explains memristors and memristive devices in an accessible way for graduate students and researchers with a basic knowledge of electrical and control systems engineering, as well as prompting further research for more experienced academics.

Peer-to-Peer Computing - Principles and Applications (Hardcover, 2010 ed.): Quang Hieu  Vu, Mihai Lupu, Beng Chin Ooi Peer-to-Peer Computing - Principles and Applications (Hardcover, 2010 ed.)
Quang Hieu Vu, Mihai Lupu, Beng Chin Ooi
R2,830 Discovery Miles 28 300 Ships in 18 - 22 working days

Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments.

In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes.

The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.

Is the Internet Changing the Way You Think? - the Net's Impact on Our Minds and Future (Paperback): John Brockman Is the Internet Changing the Way You Think? - the Net's Impact on Our Minds and Future (Paperback)
John Brockman
R365 Discovery Miles 3 650 Ships in 18 - 22 working days

How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.

Canadian Semantic Web (Hardcover, 2006 ed.): Mamadou Tadiou Kone, Daniel Lemire Canadian Semantic Web (Hardcover, 2006 ed.)
Mamadou Tadiou Kone, Daniel Lemire
R4,139 Discovery Miles 41 390 Ships in 18 - 22 working days

Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. It is the first edited volume based on this subject. This volume includes, but is not limited to, the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."

Peer-to-Peer Video Streaming (Hardcover, 2007 ed.): Eric Setton, Bernd Girod Peer-to-Peer Video Streaming (Hardcover, 2007 ed.)
Eric Setton, Bernd Girod
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

Peer-to-Peer Video Streaming describes novel solutions to enhance video quality, increase robustness to errors, and reduce end-to-end latency in video streaming systems. This book will be of use to both academics and professionals as it presents thorough coverage and solutions for current issues with Video Streaming and Peer-to-Peer architectures. The book provides an overview of today 's state-of-the art video streaming technology. It presents adaptive video coding and streaming techniques for performance enhancement of conventional client-server systems and P2P multicast. The detailed appendix incorporates various additional experiments.

Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings (Hardcover, 1st ed. 2022)
Nathan Clarke, Steven Furnell
R3,147 Discovery Miles 31 470 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.

ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June... ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings (Hardcover, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen
R2,973 Discovery Miles 29 730 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

Social Media in the Digital Age - History, Ethics, and Professional Uses (Hardcover): Rebecca Coates Nee Social Media in the Digital Age - History, Ethics, and Professional Uses (Hardcover)
Rebecca Coates Nee
R3,206 Discovery Miles 32 060 Ships in 10 - 15 working days
Communication Systems (Hardcover, 3rd ed. 2022): Marcelo S. Alencar, Valdemar C Da Rocha Jr Communication Systems (Hardcover, 3rd ed. 2022)
Marcelo S. Alencar, Valdemar C Da Rocha Jr
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

Presents main concepts of mobile communication systems, both analog and digital Introduces concepts of probability, random variables and stochastic processes and their applications to the analysis of linear systems Includes five appendices covering Fourier series and transforms, GSM cellular systems and more

Reconfigurable Intelligent Surface-Empowered 6G (Hardcover, 1st ed. 2021): Hongliang Zhang, Boya Di, Lingyang Song, Zhu Han Reconfigurable Intelligent Surface-Empowered 6G (Hardcover, 1st ed. 2021)
Hongliang Zhang, Boya Di, Lingyang Song, Zhu Han
R4,637 Discovery Miles 46 370 Ships in 10 - 15 working days

This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful.

A Internet No Brasil - Origens, Estrategia, Desenvolvimento E Governanca (English, Portuguese, Hardcover): Peter T. Knight A Internet No Brasil - Origens, Estrategia, Desenvolvimento E Governanca (English, Portuguese, Hardcover)
Peter T. Knight
R704 Discovery Miles 7 040 Ships in 10 - 15 working days
Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and... Co-creating for Context in the Transfer and Diffusion of IT - IFIP WG 8.6 International Working Conference on Transfer and Diffusion of IT, TDIT 2022, Maynooth, Ireland, June 15-16, 2022, Proceedings (Hardcover, 1st ed. 2022)
Amany Elbanna, Shane McLoughlin, Yogesh K. Dwivedi, Brian Donnellan, David Wastell
R2,703 Discovery Miles 27 030 Ships in 18 - 22 working days

This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Co-creating for Context in Prospective Transfer and Diffusion of IT" on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022. The 19 full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:

Machine Vision Algorithms in Java - Techniques and Implementation (Hardcover, 2001 ed.): Paul F. Whelan, Derek Molloy Machine Vision Algorithms in Java - Techniques and Implementation (Hardcover, 2001 ed.)
Paul F. Whelan, Derek Molloy
R4,174 Discovery Miles 41 740 Ships in 18 - 22 working days

Machine Vision Algorithms in Java provides a comprehensive introduction to the algorithms and techniques associated with machine vision systems. The Java programming language is also introduced, with particular reference to its imaging capabilities. The book contains explanations of key machine vision techniques and algorithms, along with the associated Java source code.Special features include: - A complete self-contained treatment of the topics and techniques essential to the understanding and implementation of machine vision.- An introduction to object-oriented programming and to the Java programming language, with particular reference to its imaging capabilities.- Java source code for a wide range of practical image processing and analysis functions.- Readers will be given the opportunity to download a fully functional Java-based visual programming environment for machine vision, available via the WWW. This contains over 200 image processing, manipulation and analysis functions and will enable users to implement many of the ideas covered in this book. - Details relating to the design of a Java-based visual programming environment for machine vision.- An introduction to the Java 2D imaging and Java Advanced Imaging (JAI) APIs- A wide range of illustrative examples.- Practical treatment of the subject matter. This book is aimed at senior undergraduate and postgraduate students in engineering and computer science as well as practitioners in machine vision who may wish to update or expand their knowledge of the subject. The techniques and algorithms of machine vision are expounded in a way that will be understood not only by specialists but also by those who are less familiar with the topic.

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Java For Students (Paperback, 6th edition): Douglas Bell, Mike Parr Java For Students (Paperback, 6th edition)
Douglas Bell, Mike Parr
R2,214 Discovery Miles 22 140 Ships in 9 - 17 working days

This book is for novices If you have never done any programming before - if you are a complete novice - this book is for you. This book assumes no prior knowledge of programming. It starts from scratch. It is written in a simple, direct style for maximum clarity. It is aimed at first level students at universities and colleges, but it is also suitable for novices studying alone. The approach of this book We explain how to use objects early in this book. Our approach is to start with the ideas of variables, assignment and methods, then introduce the use of objects created from library classes. Next we explain how to use control structures for selection and looping. Then comes the treatment of how to write your own classes. We wanted to make sure that the fun element of programming was paramount, so we use graphics right from the start. We think graphics is fun, interesting and clearly demonstrates all the important principles of programming. But we haven't ignored programs that input and output text - they are also included. The programs we present use many of the features of a graphical user interfaces (GUIs), such as buttons, scroll bars and text boxes. But we also explain how to write console programs in Java. We introduce new ideas carefully one-at-a-time, rather than all at once. So, for example, there is a single chapter on writing methods. We introduce simple ideas early and more sophisticated ideas later on.

Traffic Tidal Wave - 20 of the Best Known Ways to Get Traffic Online (Paperback): Jim Stephens Traffic Tidal Wave - 20 of the Best Known Ways to Get Traffic Online (Paperback)
Jim Stephens
R224 Discovery Miles 2 240 Ships in 10 - 15 working days
Analyzing Narratives in Social Networks - Taking Turing to the Arts (Hardcover, 1st ed. 2021): Zvi Lotker Analyzing Narratives in Social Networks - Taking Turing to the Arts (Hardcover, 1st ed. 2021)
Zvi Lotker
R4,655 Discovery Miles 46 550 Ships in 10 - 15 working days

This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.

Making Websites Win - Apply the Customer-Centric Methodology That Has Doubled the Sales of Many Leading Websites (Hardcover):... Making Websites Win - Apply the Customer-Centric Methodology That Has Doubled the Sales of Many Leading Websites (Hardcover)
Karl Blanks, Ben Jesson
R348 Discovery Miles 3 480 Ships in 9 - 17 working days
Smart Cities: Cyber Situational Awareness to Support Decision Making (Hardcover, 1st ed. 2022): Nataliia Neshenko, Elias... Smart Cities: Cyber Situational Awareness to Support Decision Making (Hardcover, 1st ed. 2022)
Nataliia Neshenko, Elias Bou-Harb, Borko Furht
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.

Computer and Computing Technologies in Agriculture II, Volume 3 - The Second IFIP International Conference on Computer and... Computer and Computing Technologies in Agriculture II, Volume 3 - The Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), October 18-20, 2008, Beijing, China (Hardcover, 2009 ed.)
Daoliang Li, Chunjiang Zhao
R4,175 Discovery Miles 41 750 Ships in 18 - 22 working days

The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.

Building Your Personal Brand in the Age of Social Media (Hardcover, Large Type / Large Print Ed): George Stallion Building Your Personal Brand in the Age of Social Media (Hardcover, Large Type / Large Print Ed)
George Stallion
R493 Discovery Miles 4 930 Ships in 10 - 15 working days
Social Media Marketing - How to Dominate Your Niche in 2019 with Your Small Business and Personal Brand Using Instagram... Social Media Marketing - How to Dominate Your Niche in 2019 with Your Small Business and Personal Brand Using Instagram Influencers, YouTube, Facebook Advertising, LinkedIn, Pinterest, and Twitter (Hardcover)
Matt Golden
R665 R594 Discovery Miles 5 940 Save R71 (11%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Forex Trading - Beginner's guide to the…
David Reese Hardcover R566 Discovery Miles 5 660
Website Visibility - The Theory and…
Melius Weideman Paperback R1,559 Discovery Miles 15 590
Indexing - From Thesauri to the Semantic…
Piet de Keyser Paperback R1,639 Discovery Miles 16 390
New Perspectives on HTML 5 and CSS…
Patrick Carey Paperback R1,502 R1,394 Discovery Miles 13 940
Altcoins For Beginners 2021 - How to…
Faba's Diaries Hardcover R890 R774 Discovery Miles 7 740
The Price Of Money - How To Prosper In A…
Rob Dix Paperback R438 Discovery Miles 4 380
Click2change - A Better World at Your…
Michael Norton Paperback R293 R270 Discovery Miles 2 700
Day Trading Playbook - Veteran's Guide…
David Reese Hardcover R586 Discovery Miles 5 860
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R498 R473 Discovery Miles 4 730
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450

 

Partners