Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet
This book provides key ideas for the design and analysis of complex energy management systems (EMS) for distributed power networks. Future distributed power networks will have strong coupling with (electrified) mobility and information-communication technology (ICT) and this book addresses recent challenges for electric vehicles in the EMS, and how to synthesize the distributed power network using ICT. This book not only describes theoretical developments but also shows many applications using test beds and provides an overview of cutting edge technologies by leading researchers in their corresponding fields. Describes design and analysis of energy management systems; Illustrates the synthesis of distributed energy management systems based on aggregation of local agents; Discusses dependability issues of the distributed EMS with emphasis on the verification scheme based on remote-operational hardware-in-the-loop (HIL) simulation and cybersecurity.
This volume constitutes the refereed post-conference proceedings of the 5th International Conference on Machine Learning and Intelligent Communications, MLICOM 2020, held in Shenzhen, China, in September 2020. Due to COVID-19 pandemic the conference was held virtually. The 55 revised full papers were carefully selected from 133 submissions. The papers are organized thematically in intelligent resource ( spectrum, power) allocation schemes; applications of neural network and deep learning; decentralized learning for wireless communication systems; intelligent antennas design and dynamic configuration; intelligent communications; intelligent positioning and navigation systems; smart unmanned vehicular technology; intelligent space and terrestrial integrated networks; machine learning algorithm and Intelligent networks.
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.
This edited book presents point of view and the work being undertaken by active researchers in the domain of IOT and its applications with societal impact. The book is useful to other researchers for the understanding of the research domain and different points of views expressed by the experts in their contributed chapters. The contributions are from both industry and academia; hence, it provides a rich source of both theoretical and practical work going on in the research domain of IOT.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.
Test your knowledge and prepare for the OCA/OCP exams OCA/OCP Java SE 8 Programmer Practice Tests complements the Sybex OCA: Oracle Certified Associate Java SE 8 Programmer I Certification Study Guide and the OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide for exams 1Z0-808 and 1ZO-809 by providing last minute review of 100% of exam objectives. Get the advantage of over 1,000 expert crafted questions that not only provide the answer, but also give detailed explanations. You will have access to unique practice questions that cover all 21 objective domains in the OCA/OCP exams in the format you desire--test questions can also be accessed via the Sybex interactive learning environment. Two additional practice exams will ensure that you are ready for exam day. Whether you have studied with Sybex study guides for your OCA/OCP or have used another brand, this is your chance to test your skills. * Access to all practice questions online with the Sybex interactive learning environment * Over 1,000 unique practice questions and 2 practice exams include expert explanations * Covers 100% of all 21 OCA/OCP objective domains for Exams 1Z0-809 and 1Z0-809 Studying the objectives are one thing, but diving deeper and uncovering areas where further attention is needed can increase your chance of exam day success. Full coverage of all domains shows you what to expect on exam day, and accompanying explanations help you pinpoint which objectives deserve another look.
Micronesia, Hawaii, Polynesia, Bora Bora, Seychelles, Maldives, Australia - where does the mind go when imagining such places. Drawn from the best travel blogs and Instagram images, this book brings together the most beautiful locations near, on, or under water. From eco resorts to remote, pristine islands; from sailing on ultra-blue oceans to diving in translucent waters; in aerial and underwater photography, the focus is on finding paradise. Whether thinking about a trip or longing for sun and sand, this book is where those daydreams begin.
HTML and CSS remain the linchpin of the Web. Every beginning web
developer needs to understand them thoroughly - including the latest
advances in these standards, and the newest techniques based on them.
For decades, web professionals have turned to HTML and CSS: Visual
QuickStart Guide as the fastest and most practical way to gain that
understanding. Now, this fullcolor guide has been thoroughly updated by
a new author who's taught thousands of beginning web developers. Joe
Casabona combines expert introductions to the latest HTML and CSS
technologies, new examples and projects, and extensive online video
content for a true multimodal learning experience.
This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.
This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.
This book constitutes the refereed proceedings of the 23rd International Conference on Distributed and Computer and Communication Networks, DCCN 2020, held in Moscow, Russia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 43 papers were carefully reviewed and selected from 167 submissions.The papers are organized in the following topical sections: computer and communication networks and technologies; analytical modeling of distributed systems, and distributed systems applications.
This Palgrave Pivot analyzes how six countries in Central America-Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua and Panama-connected to and through computer networks such as UUCP, BITNET and the Internet from the 80s to the year 2000. It argues that this story can only be told from a transnational perspective. To connect to computer networks, Central America built a regional integration project with great implications for its development. By revealing the beginnings of the Internet in this part of the world, this study broadens our understanding of the development of computer networks in the global south. It also demonstrates that transnational flows of knowledge, data, and technologies are a constitutive feature of the historical development of the Internet.
This book constitutes the revised selected papers of the 17th Smoky Mountains Computational Sciences and Engineering Conference, SMC 2020, held in Oak Ridge, TN, USA*, in August 2020.The 36 full papers and 1 short paper presented were carefully reviewed and selected from a total of 94 submissions. The papers are organized in topical sections of computational applications: converged HPC and artificial intelligence; system software: data infrastructure and life cycle; experimental/observational applications: use cases that drive requirements for AI and HPC convergence; deploying computation: on the road to a converged ecosystem; scientific data challenges. *The conference was held virtually due to the COVID-19 pandemic.
This book covers challenges and solutions in establishing Industry 4.0 standards for Internet of Things. It proposes a clear view about the role of Internet of Things in establishing standards. The sensor design for industrial problem, challenges faced, and solutions are all addressed. The concept of digital twin and complexity in data analytics for predictive maintenance and fault prediction is also covered. The book is aimed at existing problems faced by the industry at present, with the goal of cost-efficiency and unmanned automation. It also concentrates on predictive maintenance and predictive failures. In addition, it includes design challenges and a survey of literature.
This guide teaches programmers who have been left behind in the IBM i's evolution to code more productively and modernize their business applications. Shirey uses a casual, humorous teaching style to explain the concepts, along with plenty of code examples. Readers will gain confidence in areas that may be new to them and use the provided examples to practice what they've learned. The manual is structured so that whether they are using the latest IBM i technology or an older version, readers will learn methods to improve coding and applications, as well as become comfortable with writing programs using ILE RPG, free-format RPG, and Model-View-Controller (MVC).
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues; Infrastructure Protection; Vehicle Infrastructure Security; Telecommunications Infrastructure Security; Cyber-Physical Systems Security; and Industrial Control Systems Security. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2019. Critical Infrastructure Protection XIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Use ontologies in Python, with the Owlready2 module developed for ontology-oriented programming. You will start with an introduction and refresher on Python and OWL ontologies. Then, you will dive straight into how to access, create, and modify ontologies in Python. Next, you will move on to an overview of semantic constructs and class properties followed by how to perform automatic reasoning. You will also learn about annotations, multilingual texts, and how to add Python methods to OWL classes and ontologies. Using medical terminologies as well as direct access to RDF triples is also covered. Python is one of the most used programming languages, especially in the biomedical field, and formal ontologies are also widely used. However, there are limited resources for the use of ontologies in Python. Owlready2, downloaded more than 60,000 times, is a response to this problem, and this book is the first one on the topic of using ontologies with Python. What You Will Learn Use Owlready2 to access and modify OWL ontologies in Python Publish ontologies on dynamic websites Perform automatic reasoning in Python Use well-known ontologies, including DBpedia and Gene Ontology, and terminological resources, such as UMLS (Unified Medical Language System) Integrate Python methods in OWL ontologies Who Is This Book For Beginner to experienced readers from biomedical sciences and artificial intelligence fields would find the book useful.
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.
This pocket reference has been updated with the new PHP 8 release. It is a condensed, code-rich scripting and syntax handbook for the PHP scripting language. You won't find any technical jargon, bloated samples, drawn-out history lessons or witty stories in this book. What you will find is a web scripting language reference that is concise, to the point, and highly accessible. The book is packed with useful information and is a must-have for any PHP programmer or web developer. In it, you will find a concise reference to the PHP 8 scripting language syntax. It includes short, simple, and focused code examples; a well-laid-out table of contents; and a comprehensive index allowing easy review. PHP 8 Quick Scripting Reference presents the essentials of PHP in a well-organized format, including new features in PHP 8 such as the just in time (JIT) compiler, union types, nullsafe operator, null coalescing assignment operator, match expressions, named arguments, throw expressions, static return type, non-capturing catches, reclassified engine warnings and constructor property promotion. What You Will Learn Discover what is new in PHP 8 and how to get started with it Work with variables, operators, strings, arrays, conditionals, loops, and other constructs Group and reuse code with functions, methods, and namespaces Use object-oriented features such as classes, inheritance, abstract classes, and interfaces Import files and retrieve user data Make use of type declarations and type conversions Test variables, create references, and use overloading methods Store user data with cookies and sessions Deal with errors through error handling, exception handling, and assertions Who This Book Is For Experienced PHP programmers and web developers who may be new to PHP.
Learn how to work with Ember Data efficiently, from APIs, adapters, and serializers to polymorphic relationships, using your existing JavaScript and Ember knowledge. This book will teach you how to adapt Ember Data to fit your custom API. Have a custom API that you aren't sure how to use with Ember Data? Interested in writing your own adapter or serializer? Want to just know more about how Ember Data works? This is the Ember Data book you have been waiting for. Lots of books and tutorials start off teaching Ember with Ember Data. This is great, especially if you are in control of your API, but what if you aren't? You do a little research and start seeing terminology like adapters, serializers, transforms, and snapshots, and quickly become overwhelmed. Maybe you've thought to yourself that Ember isn't for you. Well, if this sounds familiar, then this book is for you. What You'll Learn Review the differences between normalization and serialization Understand how the built-in adapters and serializers in Ember Data work Customize adapters and serializers to consume any API and write them from scratch Handle API errors in Ember Data Work with the Reddit API using Ember Data Learn how to use polymorphic relationships Who This Book Is For Anyone with an interest in learning more about Ember Data and how to adapt it to any API. People who read this book should be familiar with the basics of Ember and JavaScript.
Learn the principles behind object-oriented programming in Ruby and within a few chapters create a fully functional Ruby 3-based application. You'll gain a basic understanding of many ancillary technologies such as databases, XML, web frameworks, and networking - some of which will be needed for your first Ruby application. Based on the bestselling first and second editions, Beginning Ruby 3, 4th Edition is a leading guide to learn Ruby from the ground up. The new edition of this book provides the same excellent introduction to Ruby as the previous editions plus updates for the newest version of Ruby, including performance through an improved allocator, decreased heap fragmentation and more. Also, added: details on the just-in-time compiler, fewer limits on GIL (Global Interpreter Lock), and a static type checker. You'll see why the light and agile Ruby programming language remains a popular open source scripting option for developers building today's web applications. This book can also be used as a textbook or companion to a textbook on beginning Ruby programming. After reading and using this book, you'll have a firm handle to program in the Ruby language. What You Will Learn Discover the fundamentals of Ruby and its object-oriented building blocks Use the Ruby libraries, gems, and documentation Work with files and databases Write and deploy Ruby applications Harness the various Ruby web frameworks and use them effectively Do network programming with Ruby Who This Book Is For Beginning programmers, programmers new to Ruby, and web developers interested in learning the foundations of the Ruby programming language.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. |
You may like...
|