![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
In the late 1990s, AI witnessed an increasing use of the term 'argumentation' within its bounds: in natural language processing, in user interface design, in logic programming and nonmonotonic reasoning, in Al's interface with the legal community, and in the newly emerging field of multi-agent systems. It seemed to me that many of these uses of argumentation were inspired by (of ten inspired) guesswork, and that a great majority of the AI community were unaware that there was a maturing, rich field of research in Argumentation Theory (and Critical Thinking and Informal Logic) that had been steadily re building a scholarly approach to the area over the previous twenty years or so. Argumentation Theory, on its side; was developing theories and approaches that many in the field felt could have a role more widely in research and soci ety, but were for the most part unaware that AI was one of the best candidates for such application."
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
From theory to application, this book presents research on biologically and brain-inspired networking and machine learning based on Yuragi, which is the Japanese term describing the noise or fluctuations that are inherently used to control the dynamics of a system. The Yuragi mechanism can be found in various biological contexts, such as in gene expression dynamics, molecular motors in muscles, or the visual recognition process in the brain. Unlike conventional network protocols that are usually designed to operate under controlled conditions with a predefined set of rules, the probabilistic behavior of Yuragi-based control permits the system to adapt to unknown situations in a distributed and self-organized manner leading to a higher scalability and robustness.The book consists of two parts. Part 1 provides in four chapters an introduction to the biological background of the Yuragi concept as well as how these are applied to networking problems. Part 2 provides additional contributions that extend the original Yuragi concept to a Bayesian attractor model from human perceptual decision making. In the six chapters of the second part, applications to various fields in information network control and artificial intelligence are presented, ranging from virtual network reconfigurations, a software-defined Internet of Things, and low-power wide-area networks. This book will benefit those working in the fields of information networks, distributed systems, and machine learning who seek new design mechanisms for controlling large-scale dynamically changing systems.
"Pro Java EE 5 Performance Management and Optimization" features proven methodology to guarantee top-performing Java EE 5 applications, and explains how to measure performance in your specific environment. The book also details performance integration points throughout the development and deployment lifecycles that are crucial for application success. For QA and preproduction stages, this book guides you through testing and optimally deploying your Java EE 5 applications, with a focus on assessing capacity and discovering saturation points. It defines the concept and application of wait-based tuningone of the most effective approaches to application server tuning. The book also helps you assess and improve the health of your applications upon deployment. The topics covered include trending, forecasting, and capacity assessing and planning. When production issues arise, youll be armed with troubleshooting methodology and solutions to common problems that have been observed in real-world environments. This book even guides you through the creation of a formal Java EE 5 Performance Management Plancustomized to your environment to help you interpret and react to changing trends in usage patterns.
The state of the art in space-time code design This cutting-edge text presents the state of the art in space-time (ST) coded multi-antenna systems operating over broadband wireless mobile channels, including an analysis of the most recent research findings. Specifically, the authors focus on the algorithms and performance analysis of ST coded systems at the physical layer. This text is a complement to previously published works covering ST coded multi-antenna systems and offers several unique features and benefits: Systematic coverage of one of the most promising techniques that will support the next generation of broadband multimedia services Unified and comprehensive exposition on the design of ST codes, which places all the latest research in context Thorough designs of ST codes for the gamut of frequency-selective, time-selective, and doubly-selective MIMO channels that are encountered with broadband wireless mobile links, in addition to ST codes for flat fading MIMO channels Recent advances in complex field coded transmissions, sphere decoding algorithms, closed-loop ST coded systems, operation in the presence of colored interference, and multi-user, multi-antenna systems Development and analysis of novel algorithms and techniques that have arisen from recent research Numerical and simulated examples are given for most of the algorithms presented in the text to help readers better visualize and understand how they work. In addition, the authors provide background information on wireless communications basics, diversity techniques, and capacity of MIMO channels, giving readers the necessary foundation to grasp all the key concepts and techniques presentedin the text. This text will not only bring engineers, network designers, and graduate students in wireless communications up to date with the latest findings, it will also provide them with the latest applications.
Der Domainname ist SchlA1/4ssel und AushAngeschild jeder Website. Je durchdachter die Wahl der Domain, um so besser die Kommunikation. Dieses Buch bietet einen Rundum-Service: ausgehend von der Bedeutung eines guten Domain-Namens bis hin zu Suche, Registrierung, Handel, Rechtsfragen und Zukunftsprognosen soll das BewuAtsein fA1/4r den Domain-Namen als Grundlage von Marketingstrategien im Internet geschArft werden. Das Buch bietet auAerdem eine Basis fA1/4r das Management von Domain-Portfolios und richtet sich an Internetverantwortliche in Unternehmen ebenso wie an AnwAlte mit Schwerpunkt Online-Recht.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
Enterprise Architecture, Integration, and Interoperability and the Networked enterprise have become the theme of many conferences in the past few years. These conferences were organised by IFIP TC5 with the support of its two working groups: WG 5. 12 (Architectures for Enterprise Integration) and WG 5. 8 (Enterprise Interoperability), both concerned with aspects of the topic: how is it possible to architect and implement businesses that are flexible and able to change, to interact, and use one another's s- vices in a dynamic manner for the purpose of (joint) value creation. The original qu- tion of enterprise integration in the 1980s was: how can we achieve and integrate - formation and material flow in the enterprise? Various methods and reference models were developed or proposed - ranging from tightly integrated monolithic system - chitectures, through cell-based manufacturing to on-demand interconnection of bu- nesses to form virtual enterprises in response to market opportunities. Two camps have emerged in the endeavour to achieve the same goal, namely, to achieve interoperability between businesses (whereupon interoperability is the ability to exchange information in order to use one another's services or to jointly implement a service). One school of researchers addresses the technical aspects of creating dynamic (and static) interconnections between disparate businesses (or parts thereof).
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, Model-View-Controller architecture by using Spring JPA, JSPs, and Spring MVC controllers. These three technologies use Java, so that a student with a background in programming will be able to master them with ease, with the end result of being able to create web applications that use MVC, validate user input,and save data to a database. Topics and features: * Presents web development topics in an accessible, easy-to-follow style, focusing on core information first, and allowing the reader to gain basic understanding before moving forwards * Contains many helpful pedagogical tools for students and lecturers, such as questions and exercises at the end of each chapter, detailed illustrations, chapter summaries, and a glossary * Uses existing powerful technologies that are freely available on the web to speed up web development, such as Spring Boot, Spring MVC, Spring JPA, Hibernate, JSP, JSTL, and Java 1.8 * Discusses HTML, HTML forms, and Cascading Style Sheets * Starts with the simplest technology for web development (JSP) and gradually introduces the reader to more complex topics * Introduces core technologies from the outset, such as the Model-View-Controller architecture * Includes examples for accessing common web services * Provides supplementary examples and tutorials
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book addresses the Internet of Things (IoT), an essential topic in the technology industry, policy, and engineering circles, and one that has become headline news in both the specialty press and the popular media. The book focuses on energy efficiency concerns in IoT and the requirements related to Industry 4.0. It is the first-ever "how-to" guide on frequently overlooked practical, methodological, and moral questions in any nations' journey to reducing energy consumption in IoT devices. The book discusses several examples of energy-efficient IoT, ranging from simple devices like indoor temperature sensors, to more complex sensors (e.g. electrical power measuring devices), actuators (e.g. HVAC room controllers, motors) and devices (e.g. industrial circuit-breakers, PLC for home, building or industrial automation). It provides a detailed approach to conserving energy in IoT devices, and comparative case studies on performance evaluation metrics, state-of-the-art approaches, and IoT legislation.
The buzz about The ebay Phenomenon "David Bunnell’s portrayal of eBay paints a picture of one of the most daring, fanatically innovative, customer-centric companies on the planet. It demonstrates how a small, driven group of people can listen to customers and reinvent the world–inspiring!"–David Siegel, author, Futurize Your Enterprise "Read The eBay Phenomenon if you want the inside account of how this innovative company became one of the decade’s greatest business success stories. Regardless of what business you’re in, David Bunnell’s exciting chronicle offers valuable lessons and a riveting narrative."–Eric Nee, Senior Writer, Fortune
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
The book discusses the evolution of cellular technology, then focusing in on 5G and its architecture and what it means for current engineers. The book first focuses on 4G and how it changed the industry, allowing people to communicate by connecting devices to the internet. The authors detail the emergence of services and applications that have revolutionized communication and continue to impact the daily habits of majority of the world's population. The authors endeavor to tell this story by showing the path taken until the arrival of 5G, detailing how technological and architectural progress evolved in all these years. It is a technical book, but the authors take care to explain in detail each aspect related to technology in order to allow everyone interested in the subject to delve into this important topic. Presents a comprehensive explanation about 4G and 5G architecture, modulation and protocols; Includes a thorough explanation of modern antennas technology and O-RAN; Relevant to technology professionals and students interested in 5G, but with little background in telecommunications; The English translation of this book from its Portuguese original manuscript was done with the help of artificial intelligence (machine translation by the service provider DeepL.com). A subsequent human revision of the content was done by the author.
This title instructs the reader how to script dynamic web pages using the popular jQuery JavaScript library, giving complete examples that illustrate each aspect with colourised source code.
By now, you've probably heard lots of stories about the thousands of individuals worldwide who, armed with little more than their PCs, are making a killing day trading stocks online. Could electronic day trading be your ticket to financial independence? Here's your chance to find out.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks. |
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|