|
|
Books > Computing & IT > Internet
Peer-to-Peer Video Streaming describes novel solutions to
enhance video quality, increase robustness to errors, and reduce
end-to-end latency in video streaming systems. This book will be of
use to both academics and professionals as it presents thorough
coverage and solutions for current issues with Video Streaming and
Peer-to-Peer architectures. The book provides an overview of today
's state-of-the art video streaming technology. It presents
adaptive video coding and streaming techniques for performance
enhancement of conventional client-server systems and P2P
multicast. The detailed appendix incorporates various additional
experiments.
 |
Human Aspects of Information Security and Assurance
- 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings
(Hardcover, 1st ed. 2022)
Nathan Clarke, Steven Furnell
|
R3,147
Discovery Miles 31 470
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the proceedings of the 16th IFIP WG 11.12
International Symposium on Human Aspects of Information Security
and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in
July 2022. The 25 papers presented in this volume were carefully
reviewed and selected from 30 submissions. They are organized in
the following topical sections: cyber security education and
training; cyber security culture; privacy; and cyber security
management.
 |
ICT Systems Security and Privacy Protection
- 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings
(Hardcover, 1st ed. 2022)
Weizhi Meng, Simone Fischer-Hubner, Christian D. Jensen
|
R2,973
Discovery Miles 29 730
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 37th IFIP TC
11 International Conference on Information Security and Privacy
Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022.
The 29 full papers presented were carefully reviewed and selected
from 127 submissions. The papers present novel research on
theoretical and practical aspects of security and privacy
protection in information processing systems. They are organized in
topical sections on privacy models and preferences; network
security and IDS; network security and privacy; forensics; trust
and PETs; crypto-based solutions; usable security; blockchain;
mobile security and privacy; PETs and crypto; and vulnerabilities.
Presents main concepts of mobile communication systems, both analog
and digital Introduces concepts of probability, random variables
and stochastic processes and their applications to the analysis of
linear systems Includes five appendices covering Fourier series and
transforms, GSM cellular systems and more
This book presents novel RIS-Based Smart Radio techniques,
targeting at achieving high-quality channel links in cellular
communications via design and optimization of the RIS construction.
Unlike traditional antenna arrays, three unique characteristics of
the RIS will be revealed in this book. First, the built-in
programmable configuration of the RIS enables analog beamforming
inherently without extra hardware or signal processing. Second, the
incident signals can be controlled to partly reflect and partly
transmit through the RIS simultaneously, adding more flexibility to
signal transmission. Third, the RIS has no digital processing
capability to actively send signals nor any radio frequency (RF)
components. As such, it is necessary to develop novel channel
estimation and communication protocols, design joint digital and
RIS-based analog beamforming schemes and perform interference
control via mixed reflection and transmission. This book also
investigates how to integrate the RIS to legacy communication
systems. RIS techniques are further investigated in this book
(benefited from its ability to actively shape the propagation
environment) to achieve two types of wireless applications, i.e.,
RF sensing and localization. The influence of the sensing
objectives on the wireless signal propagation can be potentially
recognized by the receivers, which are then utilized to identify
the objectives in RF sensing. Unlike traditional sensing
techniques, RIS-aided sensing can actively customize the wireless
channels and generate a favorable massive number of independent
paths interacting with the sensing objectives. It is desirable to
design RIS-based sensing algorithms, and optimize RIS
configurations. For the second application, i.e., RIS aided
localization, an RIS is deployed between the access point (AP) and
users. The AP can then analyze reflected signals from users via
different RIS configurations to obtain accurate locations of users.
However, this is a challenging task due to the dynamic user
topology, as well as the mutual influence between multiple users
and the RIS. Therefore, the operations of the RIS, the AP, and
multiple users need to be carefully coordinated. A new RIS-based
localization protocol for device cooperation and an RIS
configuration optimization algorithm are also required. This book
targets researchers and graduate-level students focusing on
communications and networks. Signal processing engineers, computer
and information scientists, applied mathematicians and
statisticians, who work in RIS research and development will also
find this book useful.
Thanks to jQuery, almost no one remembers the bad old days when
developers had to manually manage browser inconsistencies, CSS
support, and DOM navigation, and every animation was a frustrating
exercise in hand-coded JavaScript. jQuery beautifully manages these
concerns, and more, through an elegant, instantly-intuitive library
that's become a nearly-universal part of the web. And the latest
version of jQuery adds even more features and components to make
life as a web developer smooth and productive. jQuery in Action,
Third Edition, is a fast-paced complete guide to jQuery, focused on
the tasks faced in nearly any web dev project. Written for readers
with minimal JavaScript experience, this revised edition adds new
examples and exercises, along with the deep and practical coverage
you expect from an "In Action" book. You'll learn how to traverse
HTML documents, handle events, perform animations, write plugins,
and even unit test your code. The unique lab pages anchor each
concept with real-world code. Several new chapters teach you how to
interact with other tools and frameworks to build modern
single-page web applications. RETAIL SELLING POINTS Complete,
up-to-date, fast-paced guide Focuses on tasks faced in nearly any
web dev project Revised edition adds new examples and exercises
AUDIENCE Readers need only beginning-level JavaScript knowledge. No
prior experience with jQuery is required. ABOUT THE TECHNOLOGY
jQuery is a fast and small JavaScript library that makes things
like HTML document traversal and manipulation, event handling,
animation, and Ajax much simpler than using native methods.
 |
Co-creating for Context in the Transfer and Diffusion of IT
- IFIP WG 8.6 International Working Conference on Transfer and Diffusion of IT, TDIT 2022, Maynooth, Ireland, June 15-16, 2022, Proceedings
(Hardcover, 1st ed. 2022)
Amany Elbanna, Shane McLoughlin, Yogesh K. Dwivedi, Brian Donnellan, David Wastell
|
R2,703
Discovery Miles 27 030
|
Ships in 18 - 22 working days
|
|
|
This volume, IFIP AICT 660, constitutes the refereed proceedings of
the IFIP WG 8.6 International Working Conference "Co-creating for
Context in Prospective Transfer and Diffusion of IT" on Transfer
and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during
June 15-16, 2022. The 19 full papers and 10 short papers presented
were carefully reviewed and selected from 60 submissions. The
papers focus on the re-imagination of diffusion and adoption of
emerging technologies. They are organized in the following parts:
Machine Vision Algorithms in Java provides a comprehensive introduction to the algorithms and techniques associated with machine vision systems. The Java programming language is also introduced, with particular reference to its imaging capabilities. The book contains explanations of key machine vision techniques and algorithms, along with the associated Java source code.Special features include: - A complete self-contained treatment of the topics and techniques essential to the understanding and implementation of machine vision.- An introduction to object-oriented programming and to the Java programming language, with particular reference to its imaging capabilities.- Java source code for a wide range of practical image processing and analysis functions.- Readers will be given the opportunity to download a fully functional Java-based visual programming environment for machine vision, available via the WWW. This contains over 200 image processing, manipulation and analysis functions and will enable users to implement many of the ideas covered in this book. - Details relating to the design of a Java-based visual programming environment for machine vision.- An introduction to the Java 2D imaging and Java Advanced Imaging (JAI) APIs- A wide range of illustrative examples.- Practical treatment of the subject matter. This book is aimed at senior undergraduate and postgraduate students in engineering and computer science as well as practitioners in machine vision who may wish to update or expand their knowledge of the subject. The techniques and algorithms of machine vision are expounded in a way that will be understood not only by specialists but also by those who are less familiar with the topic.
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book is for novices If you have never done any programming
before - if you are a complete novice - this book is for you. This
book assumes no prior knowledge of programming. It starts from
scratch. It is written in a simple, direct style for maximum
clarity. It is aimed at first level students at universities and
colleges, but it is also suitable for novices studying alone. The
approach of this book We explain how to use objects early in this
book. Our approach is to start with the ideas of variables,
assignment and methods, then introduce the use of objects created
from library classes. Next we explain how to use control structures
for selection and looping. Then comes the treatment of how to write
your own classes. We wanted to make sure that the fun element of
programming was paramount, so we use graphics right from the start.
We think graphics is fun, interesting and clearly demonstrates all
the important principles of programming. But we haven't ignored
programs that input and output text - they are also included. The
programs we present use many of the features of a graphical user
interfaces (GUIs), such as buttons, scroll bars and text boxes. But
we also explain how to write console programs in Java. We introduce
new ideas carefully one-at-a-time, rather than all at once. So, for
example, there is a single chapter on writing methods. We introduce
simple ideas early and more sophisticated ideas later on.
This book overviews the drivers behind the smart city vision,
describes its dimensions and introduces the reference architecture.
It further enumerates and classifies threats targeting the smart
city concept, links corresponding attacks, and traces the impact of
these threats on operations, society and the environment. This book
also introduces analytics-driven situational awareness, provides an
overview of the respective solutions and highlights the prevalent
limitations of these methods. The research agenda derived from the
study emphasizes the demand and challenges for developing holistic
approaches to transition these methods to practice equipping the
user with extensive knowledge regarding the detected attack instead
of a sole indicator of ongoing malicious events. It introduces a
cyber-situational awareness framework that can be integrated into
smart city operations to provide timely evidence-based insights
regarding cyber incidents and respective system responses to assist
decision-making. This book targets researchers working in
cybersecurity as well as advanced-level computer science students
focused on this field. Cybersecurity operators will also find this
book useful as a reference guide.
The papers in this volume comprise the refereed proceedings of the
Second IFIP International Conference on Computer and Computing
Technologies in Agriculture (CCTA2008), in Beijing, China, 2008.
The conference on the Second IFIP International Conference on
Computer and Computing Technologies in Agriculture (CCTA 2008) is
cooperatively sponsored and organized by the China Agricultural
University (CAU), the National Engineering Research Center for
Information Technology in Agriculture (NERCITA), the Chinese
Society of Agricultural Engineering (CSAE) , International
Federation for Information Processing (IFIP), Beijing Society for
Information Technology in Agriculture, China and Beijing Research
Center for Agro-products Test and Farmland Inspection, China. The
related departments of China's central government bodies like:
Ministry of Science and Technology, Ministry of Industry and
Information Technology, Ministry of Education and the Beijing
Municipal Natural Science Foundation, Beijing Academy of
Agricultural and Forestry Sciences, etc. have greatly contributed
and supported to this event. The conference is as good platform to
bring together scientists and researchers, agronomists and
information engineers, extension servers and entrepreneurs from a
range of disciplines concerned with impact of Information
technology for sustainable agriculture and rural development. The
representatives of all the supporting organizations, a group of
invited speakers, experts and researchers from more than 15
countries, such as: the Netherlands, Spain, Portugal, Mexico,
Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran,
Nigeria, Brazil, China, etc.
The Internet of Things (IoT) has become a major influence on the
development of new technologies and innovations. When utilized
properly, these applications can enhance business functions and
make them easier to perform. Protocols and Applications for the
Industrial Internet of Things discusses and addresses the
difficulties, challenges, and applications of IoT in industrial
processes and production and work life. Featuring coverage on a
broad range of topics such as industrial process control, machine
learning, and data mining, this book is geared toward academicians,
computer engineers, students, researchers, and professionals
seeking current and relevant research on applications of the IoT.
This book develops survey data analysis tools in Python, to create
and analyze cross-tab tables and data visuals, weight data, perform
hypothesis tests, and handle special survey questions such as
Check-all-that-Apply. In addition, the basics of Bayesian data
analysis and its Python implementation are presented. Since surveys
are widely used as the primary method to collect data, and
ultimately information, on attitudes, interests, and opinions of
customers and constituents, these tools are vital for private or
public sector policy decisions. As a compact volume, this book uses
case studies to illustrate methods of analysis essential for those
who work with survey data in either sector. It focuses on two
overarching objectives: Demonstrate how to extract actionable,
insightful, and useful information from survey data; and Introduce
Python and Pandas for analyzing survey data.
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
This book provides an overview of the emerging smart connected
world, and discusses the roles and the usage of underlying semantic
computing and Internet-of-Things (IoT) technologies. The book
comprises ten chapters overall, grouped in two parts. Part I "Smart
Connected World: Overview and Technologies" consists of seven
chapters and provides a holistic overview of the smart connected
world and its supporting tools and technologies. Part II
"Applications and Case Studies" consists of three chapters that
describe applications and case studies in manufacturing, smart
cities, health, and more. Each chapter is self-contained and can be
read independently; taken together, readers get a bigger picture of
the technological and application landscape of the smart connected
world. This book is of interest for researchers, lecturers, and
practitioners in Semantic Web, IoT and related fields. It can serve
as a reference for instructors and students taking courses in
hybrid computing getting abreast of cutting edge and future
directions of a connected ecosystem. It will also benefit industry
professionals like software engineers or data scientists, by
providing a synergy between Web technologies and applications. This
book covers the most important topics on the emerging field of the
smart connected world. The contributions from leading active
researchers and practitioners in the field are thought provoking
and can help in learning and further research. The book is a
valuable resource that will benefit academics and industry. It will
lead to further research and advancement of the field. Bharat K.
Bhargava, Professor of Computer Science, Purdue University, United
States
The book presents the proceedings of the World Congress on
Engineering and Technology, Innovation and its Sustainability
(WCETIS 2018), which took place on November 28-29, 2018 in Manila,
Philippines. The conference featured the following tracks:
Industrial Engineering and Healthcare, Sustainable Infrastructure;
Water Resources Planning and Management; Heat transfer and fluids;
Electronics and Electrical Engineering; and Internet of Things.
Papers stem from academia and industry throughout the world,
showing a variety of perspectives. Presents the proceedings of the
World Congress on Engineering and Technology, Innovation and its
Sustainability (WCETIS 2018), November 28-29, 2018 in Manila,
Philippines Shows how engineering and technology serve to support a
variety for industries from manufacturing to water resources
Features papers from a variety of researchers and developers from
around the world
This book presents the proceedings of the 4th International
Conference on Wireless Intelligent and Distributed Environment for
Communication (WIDECOM 2021), which took place at University of
KwaZulu-Natal, South Africa, October 13-15, 2021. The book
addresses issues related to new dependability paradigms, design,
and performance of dependable network computing and mobile systems,
as well as issues related to the security of these systems. The
main tracks include infrastructure, architecture, algorithms, and
protocols. The goal of the conference is to provide a forum for
researchers, students, scientists and engineers working in academia
and industry to share their experiences, new ideas and research
results in the above-mentioned areas.
|
|