![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Peer-to-Peer Video Streaming describes novel solutions to enhance video quality, increase robustness to errors, and reduce end-to-end latency in video streaming systems. This book will be of use to both academics and professionals as it presents thorough coverage and solutions for current issues with Video Streaming and Peer-to-Peer architectures. The book provides an overview of today 's state-of-the art video streaming technology. It presents adaptive video coding and streaming techniques for performance enhancement of conventional client-server systems and P2P multicast. The detailed appendix incorporates various additional experiments.
This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful.
Machine Vision Algorithms in Java provides a comprehensive introduction to the algorithms and techniques associated with machine vision systems. The Java programming language is also introduced, with particular reference to its imaging capabilities. The book contains explanations of key machine vision techniques and algorithms, along with the associated Java source code.Special features include: - A complete self-contained treatment of the topics and techniques essential to the understanding and implementation of machine vision.- An introduction to object-oriented programming and to the Java programming language, with particular reference to its imaging capabilities.- Java source code for a wide range of practical image processing and analysis functions.- Readers will be given the opportunity to download a fully functional Java-based visual programming environment for machine vision, available via the WWW. This contains over 200 image processing, manipulation and analysis functions and will enable users to implement many of the ideas covered in this book. - Details relating to the design of a Java-based visual programming environment for machine vision.- An introduction to the Java 2D imaging and Java Advanced Imaging (JAI) APIs- A wide range of illustrative examples.- Practical treatment of the subject matter. This book is aimed at senior undergraduate and postgraduate students in engineering and computer science as well as practitioners in machine vision who may wish to update or expand their knowledge of the subject. The techniques and algorithms of machine vision are expounded in a way that will be understood not only by specialists but also by those who are less familiar with the topic.
This book is for novices If you have never done any programming before - if you are a complete novice - this book is for you. This book assumes no prior knowledge of programming. It starts from scratch. It is written in a simple, direct style for maximum clarity. It is aimed at first level students at universities and colleges, but it is also suitable for novices studying alone. The approach of this book We explain how to use objects early in this book. Our approach is to start with the ideas of variables, assignment and methods, then introduce the use of objects created from library classes. Next we explain how to use control structures for selection and looping. Then comes the treatment of how to write your own classes. We wanted to make sure that the fun element of programming was paramount, so we use graphics right from the start. We think graphics is fun, interesting and clearly demonstrates all the important principles of programming. But we haven't ignored programs that input and output text - they are also included. The programs we present use many of the features of a graphical user interfaces (GUIs), such as buttons, scroll bars and text boxes. But we also explain how to write console programs in Java. We introduce new ideas carefully one-at-a-time, rather than all at once. So, for example, there is a single chapter on writing methods. We introduce simple ideas early and more sophisticated ideas later on.
This book develops survey data analysis tools in Python, to create and analyze cross-tab tables and data visuals, weight data, perform hypothesis tests, and handle special survey questions such as Check-all-that-Apply. In addition, the basics of Bayesian data analysis and its Python implementation are presented. Since surveys are widely used as the primary method to collect data, and ultimately information, on attitudes, interests, and opinions of customers and constituents, these tools are vital for private or public sector policy decisions. As a compact volume, this book uses case studies to illustrate methods of analysis essential for those who work with survey data in either sector. It focuses on two overarching objectives: Demonstrate how to extract actionable, insightful, and useful information from survey data; and Introduce Python and Pandas for analyzing survey data.
Get the latest information about online GIS using ArcGIS apps and functionality. Capabilities of Web GIS keep expanding, and Getting to Know Web GIS, fifth edition, describes some of the most cutting-edge and exciting innovations. From publishing data as services and configuring engaging web and mobile apps to automation, scripting, and real-world applications, this book shares how to use the most current software and apps for using ArcGIS in the cloud. In the newest edition of Getting to Know Web GIS, you can work with the latest releases of ArcGIS Online, ArcGIS Pro, ArcGIS StoryMaps , and ArcGIS mobile apps. You can experience ArcGIS Experience Builder, ArcGIS Field Maps, ArcGIS Instant Apps, ArcGIS Image for ArcGIS Online, ArcGIS Mission, and the latest advances in artificial intelligence, virtual reality, and tools for spatial data science. No programming is required, but you can learn more about Web GIS programming in this book using JavaScript, webhooks, and ArcGIS Arcade. Use the fifth edition to: improve your online visual storytelling, work with 2D smart mapping and 3D web scenes, create informative web experiences and dashboards, support field operations and data collection using mobile apps, use new data science tools for spatial analysis and geoprocessing, detect objects using deep learning packages, program a triggered notification using a visual interface, and more. GIS expert, instructor, and author Pinde Fu provides lecture slides and additional resources in an online story using ArcGIS StoryMaps. Today's modern GIS is Web GIS-get onboard with one of the most interesting and creative areas of GIS
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
Design intuitive navigation for the ideal user experience Hundreds of thousands of Web designers and developers have relied on web usability expert Steve Krug's guide to help them understand the principles of intuitive navigation and information design. Witty, commonsensical, and eminently practical, it's one of the best-loved and most recommended books on the subject. Fresh perspectives and examples New chapter on mobile usability Still short, profusely illustrated...and best of all-fun to read If you've read it before, you'll rediscover what made Don't Make Me Think so essential to Web designers and developers around the world. If you've never read it, you'll see why so many people have said it should be required reading for anyone working on websites. "After reading it over a couple of hours and putting its ideas to work for the past five years, I can say it has done more to improve my abilities as a Web designer than any other book." -Jeffrey Zeldman, author of Designing with Web Standards
Based on years of research and 121 real-life first dates, relationship expert Wendy Newman dishes up practical wisdom for navigating the online dating trenches with grace, efficiency, and a strong dose of humour. Wendy Newman has made every imaginable dating mistake so you don't have to. Part guidebook, part personal tell-all, 121 First Dates chronicles Wendy's funny, real-life misadventures and the practical wisdom she gained from them. Her dating tales will find you laughing, commiserating, and nodding your head as you learn how to stay in the dating game until you find the right man, just like Wendy did. This book busts myths, answers age-old questions, and examines pitfalls that make you want to give up on dating altogether. Just when you're about to submit to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns, 121 First Dates will inspire you to keep stepping out. Wendy discusses how to date successfully and efficiently, avoid the most common dating pitfalls, have an amazing first date with anyone, end uncomfortable situations with grace, and much, much more. She offers up realistic Dos and Don'ts as well as tips for making the most of any situation you find yourself in-whether you want to run or you think he's the one. Brimming with humour, hope, and authenticity, 121 First Dates will give every woman the tools, confidence, and determination to be and stay real when dating. How else will you find the best match for you?
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
This book provides an overview of the emerging smart connected world, and discusses the roles and the usage of underlying semantic computing and Internet-of-Things (IoT) technologies. The book comprises ten chapters overall, grouped in two parts. Part I "Smart Connected World: Overview and Technologies" consists of seven chapters and provides a holistic overview of the smart connected world and its supporting tools and technologies. Part II "Applications and Case Studies" consists of three chapters that describe applications and case studies in manufacturing, smart cities, health, and more. Each chapter is self-contained and can be read independently; taken together, readers get a bigger picture of the technological and application landscape of the smart connected world. This book is of interest for researchers, lecturers, and practitioners in Semantic Web, IoT and related fields. It can serve as a reference for instructors and students taking courses in hybrid computing getting abreast of cutting edge and future directions of a connected ecosystem. It will also benefit industry professionals like software engineers or data scientists, by providing a synergy between Web technologies and applications. This book covers the most important topics on the emerging field of the smart connected world. The contributions from leading active researchers and practitioners in the field are thought provoking and can help in learning and further research. The book is a valuable resource that will benefit academics and industry. It will lead to further research and advancement of the field. Bharat K. Bhargava, Professor of Computer Science, Purdue University, United States
Contains everything that a project team needs to know about the development and deployment of Web services with the IBM WebSphere product family. Includes examples for all development artifacts in a format that can be reused in the reader’s project. The text combines the authors’ own practical experiences with consolidated information on the latest product capabilities in a unique approach that allows the book to be easily accessible to a broad spectrum of readers. Finding a balance between a euphoric/optimistic and down-to earth/realistic view on the subject, this book should sit on every Web service developer’s bookshelf.
This book presents the proceedings of the 4th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2021), which took place at University of KwaZulu-Natal, South Africa, October 13-15, 2021. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The main tracks include infrastructure, architecture, algorithms, and protocols. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.
This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. The book begins with a historical overview of the evolution of cellular technologies and addresses the questions on why 5G and what is 5G. Following this, six tutorial chapters describe the fundamental technology components for 5G and beyond. These include modern advancements in channel coding, multiple access, massive multiple-input and multiple-output (MIMO), network densification, unmanned aerial vehicle enabled cellular networks, and 6G wireless systems. The second part of this book consists of five chapters that introduce the basics of 5G New Radio (NR) standards developed by 3GPP. These include 5G architecture, protocols, and physical layer aspects. The third part of this book provides an overview of the key 5G NR evolution directions. These directions include ultra-reliable low-latency communication (URLLC) enhancements, operation in unlicensed spectrum, positioning, integrated access and backhaul, air-to-ground communication, and non-terrestrial networks with satellite communication.
This book is a collection of best selected research papers presented at the Conference on Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication (MDCWC 2020) held during October 22nd to 24th 2020, at the Department of Electronics and Communication Engineering, National Institute of Technology Tiruchirappalli, India. The presented papers are grouped under the following topics (a) Machine Learning, Deep learning and Computational intelligence algorithms (b)Wireless communication systems and (c) Mobile data applications and are included in the book. The topics include the latest research and results in the areas of network prediction, traffic classification, call detail record mining, mobile health care, mobile pattern recognition, natural language processing, automatic speech processing, mobility analysis, indoor localization, wireless sensor networks (WSN), energy minimization, routing, scheduling, resource allocation, multiple access, power control, malware detection, cyber security, flooding attacks detection, mobile apps sniffing, MIMO detection, signal detection in MIMO-OFDM, modulation recognition, channel estimation, MIMO nonlinear equalization, super-resolution channel and direction-of-arrival estimation. The book is a rich reference material for academia and industry.
This book provides practical information about web archives, offers inspiring examples for web archivists, raises new challenges, and shares recent research results about access methods to explore information from the past preserved by web archives. The book is structured in six parts. Part 1 advocates for the importance of web archives to preserve our collective memory in the digital era, demonstrates the problem of web ephemera and shows how web archiving activities have been trying to address this challenge. Part 2 then focuses on different strategies for selecting web content to be preserved and on the media types that different web archives host. It provides an overview of efforts to address the preservation of web content as well as smaller-scale but high-quality collections of social media or audiovisual content. Next, Part 3 presents examples of initiatives to improve access to archived web information and provides an overview of access mechanisms for web archives designed to be used by humans or automatically accessed by machines. Part 4 presents research use cases for web archives. It also discusses how to engage more researchers in exploiting web archives and provides inspiring research studies performed using the exploration of web archives. Subsequently, Part 5 demonstrates that web archives should become crucial infrastructures for modern connected societies. It makes the case for developing web archives as research infrastructures and presents several inspiring examples of added-value services built on web archives. Lastly, Part 6 reflects on the evolution of the web and the sustainability of web archiving activities. It debates the requirements and challenges for web archives if they are to assume the responsibility of being societal infrastructures that enable the preservation of memory. This book targets academics and advanced professionals in a broad range of research areas such as digital humanities, social sciences, history, media studies and information or computer science. It also aims to fill the need for a scholarly overview to support lecturers who would like to introduce web archiving into their courses by offering an initial reference for students. |
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|