![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The first section of Semantic Web and Education surveys the basic aspects and features of the Semantic Web. After this basic review, the book turns its focus to its primary topic of how Semantic Web developments can be used to build attractive and more successful education applications. The book analytically discusses the technical areas of architecture, metadata, learning objects, software engineering trends, and more. Integrated with these technical topics are the examinations of learning-oriented topics such as learner modeling, collaborative learning, learning management, learning communities, ontological engineering of web-based learning, and related topics. The result is a thorough and highly useful presentation on the confluence of the technical aspects of the Semantic Web and the field of Education or the art of teaching. The book will be of considerable interest to researchers and students in the fields Information Systems, Computer Science, and Education.
This book is the second edition of the popular 1996 title "Electronic Publishing and Libraries: Planning for the Impact and Growth to 2003," which is an essential update arising from the need for scholarly information dissemination in this area due to the rapid pace of change. There are two noticeable improvements to this edition compared to the last one. Firstly, the organization of the material is separated into groups involved in the electronic publishing industry, making it easier for users to find relevant information. Secondly, the book is now larger in size allowing it to present the detailed diagrams more clearly. Like the previous edition, the title still aims to quantify the future size of the electronic publishing industry and provides practical data to support investment decisions in information systems for electronic media and serves as an aid to forward planning. Plus, all the sources of the original book are revisited and updated.
Semantics and ontologies offer an extension to traditional information systems in which information is given well-defined meaning, enabling computers and people to work in cooperation. With expanding uses and integrations of semantics and ontologies, research in Semantic Web engineering has grown immensely. Semantic Web Engineering in the Knowledge Society brings together contributions from researchers and scientists from both industry and academia and representatives from different communities for the understanding and exploration of the theories, tools, and applications of semantics and ontologies. This authoritative reference serves as the platform for exchange of both practical technologies and far reaching implications, offering academicians and practitioners a compendium of knowledge in Semantic Web engineering.
The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule."
From the respected instructor and author Paul Addison, PRINCIPLES OF PROGRAM DESIGN: PROBLEM SOLVING WITH JAVASCRIPT, International Edition presents the fundamental concepts of good program design, illustrated and reinforced by hands-on examples using JavaScript. Why JavaScript? It simply illustrates the programming concepts explained in the book, requires no special editor or compiler, and runs in any browser. Little or no experience is needed because the emphasis is on learning by doing. There are examples of coding exercises throughout every chapter, varying in length and representing simple to complex problems. This book encourages you to think in terms of the logical steps needed to solve a problem, and you can take these skills with you to any programming language in the future. To help reinforce concepts, each chapter has a chapter summary, review questions, hand-on activities, and a case study hat you build on in each chapter.
'Witty, rigorous, and as urgent as a fire alarm' Dorian Lynskey 'Cooly prosecutorial' Guardian Nobody meant for this to happen. Facebook didn't mean to facilitate a genocide. Twitter didn't want to be used to harass women. YouTube never planned to radicalise young men. But with billions of users, these platforms need only tweak their algorithms to generate more 'engagement'. In so doing, they bring unrest to previously settled communities and erode our relationships. Social warming has happened gradually - as a by-product of our preposterously convenient digital existence. But the gradual deterioration of our attitudes and behaviour on- and offline - this vicious cycle of anger and outrage - is real. And it can be corrected. Here's how.
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
This book uses literature as a wrench to pry open social networks and to ask different questions than have been asked about social networks previously. The book emphasizes the story-telling aspect of social networks, as well as the connection between narrative and social networks by incorporating narrative, dynamic networks, and time. Thus, it constructs a bridge between literature, digital humanities, and social networks. This book is a pioneering work that attempts to express social and philosophic constructs in mathematical terms. The material used to test the algorithms is texts intended for performance, such as plays, film scripts, and radio plays; mathematical representations of the texts, or "literature networks", are then used to analyze the social networks found in the respective texts. By using literature networks and their accompanying narratives, along with their supporting analyses, this book allows for a novel approach to social network analysis.
This book presents Internet of Things (IoT) solutions monitoring and assessing a variety of applications areas for indoor air quality (IAQ). This book synthesizes recent developments, presents case studies, and discusses new methods in the area of air quality monitoring, all the while addressing public health concerns. The authors discuss the issues and solutions, including IoT systems that can provide a continuous flow of data retrieved from cost-effective sensors that can be used in multiple applications.The authors present the leading IoT technologies, applications, algorithms, systems, and future scope in this multi-disciplinary domain.
In surrealist artist Paul Klee's The Twittering Machine, the bird-song of a diabolical machine acts as bait to lure humankind into a pit of damnation. Leading political writer and broadcaster Richard Seymour argues that this is a chilling metaphor for our relationship with social media. Former social media executives tell us that the system is an addiction-machine. We are users, waiting for our next hit as we like, comment and share. We write to the machine as individuals, but it responds by aggregating our fantasies, desires and frailties into data, and returning them to us as a commodity experience. Through journalism, psychoanalytic reflection and insights from users, developers, security experts and others, Seymour probes the human side of the machine, asking what we're getting out of it, and what we're getting into.
Paralleling emerging trends in cyber-health technology, concerns are mounting about racial and ethnic disparities in health care utilization and outcomes. This book brings these themes together, challenging readers to use, promote, and develop new technology-based methods for closing these gaps. Edited by a leading urban health advocate and featuring 16 expert contributors, the book examines cyber-strategies with the greatest potential toward effective, equitable care, improved service delivery and better health outcomes for all. The rise of e-Patients and the transformation of the doctor-patient relationship are also discussed.
How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.
This contributed volume offers practical solutions and design-, modeling-, and implementation-related insights that address current research problems in memristors, memristive devices, and memristor computing. The book studies and addresses related challenges in and proposes solutions for the future of memristor computing. State-of-the-art research on memristor modeling, memristive interconnections, memory circuit architectures, software simulation tools, and applications of memristors in computing are presented. Utilising contributions from numerous experts in the field, written in clear language and illustrated throughout, this book is a comprehensive reference work. Memristor Computing Systems explains memristors and memristive devices in an accessible way for graduate students and researchers with a basic knowledge of electrical and control systems engineering, as well as prompting further research for more experienced academics.
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing. Yet the scale and dynamism that characterize P2P systems demand that we reexamine traditional distributed technologies. A paradigm shift that includes self-reorganization, adaptation and resilience is called for. On the other hand, the increased computational power of such networks opens up completely new applications, such as in digital content sharing, scientific computation, gaming, or collaborative work environments. In this book, Vu, Lupu and Ooi present the technical challenges offered by P2P systems, and the means that have been proposed to address them. They provide a thorough and comprehensive review of recent advances on routing and discovery methods; load balancing and replication techniques; security, accountability and anonymity, as well as trust and reputation schemes; programming models and P2P systems and projects. Besides surveying existing methods and systems, they also compare and evaluate some of the more promising schemes. The need for such a book is evident. It provides a single source for practitioners, researchers and students on the state of the art. For practitioners, this book explains best practice, guiding selection of appropriate techniques for each application. For researchers, this book provides a foundation for the development of new and more effective methods. For students, it is an overview of the wide range of advanced techniques for realizing effective P2P systems, and it can easily be used as a text for an advanced course on Peer-to-Peer Computing and Technologies, or as a companion text for courses on various subjects, such as distributed systems, and grid and cluster computing.
Canadian Semantic Web is an edited volume based on the first Canadian Web Working Symposium, June 2006, in Quebec, Canada. It is the first edited volume based on this subject. This volume includes, but is not limited to, the following popular topics: "Trust, Privacy, Security on the Semantic Web," "Semantic Grid and Semantic Grid Services" and "Semantic Web Mining."
Peer-to-Peer Video Streaming describes novel solutions to enhance video quality, increase robustness to errors, and reduce end-to-end latency in video streaming systems. This book will be of use to both academics and professionals as it presents thorough coverage and solutions for current issues with Video Streaming and Peer-to-Peer architectures. The book provides an overview of today 's state-of-the art video streaming technology. It presents adaptive video coding and streaming techniques for performance enhancement of conventional client-server systems and P2P multicast. The detailed appendix incorporates various additional experiments.
This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
Presents main concepts of mobile communication systems, both analog and digital Introduces concepts of probability, random variables and stochastic processes and their applications to the analysis of linear systems Includes five appendices covering Fourier series and transforms, GSM cellular systems and more
This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful. |
You may like...
Sets and Extensions in the Twentieth…
Dov M. Gabbay, Akihiro Kanamori, …
Hardcover
R4,823
Discovery Miles 48 230
Logic and African Philosophy - Seminal…
Jonathan O. Chimakonam
Hardcover
R1,542
Discovery Miles 15 420
Supervenience and Normativity
Bartosz Brozek, Antonino Rotolo, …
Hardcover
R3,926
Discovery Miles 39 260
|