![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This proceedings is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. The book presents the refereed conference papers from the 7th International Conference on COINs, October 8-9, 2019, in Warsaw, Poland. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs19 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
For the past couple of years, network automation techniques that include software-defined networking (SDN) and dynamic resource allocation schemes have been the subject of a significant research and development effort. Likewise, network functions virtualization (NFV) and the foreseeable usage of a set of artificial intelligence techniques to facilitate the processing of customers' requirements and the subsequent design, delivery, and operation of the corresponding services are very likely to dramatically distort the conception and the management of networking infrastructures. Some of these techniques are being specified within standards developing organizations while others remain perceived as a "buzz" without any concrete deployment plans disclosed by service providers. An in-depth understanding and analysis of these approaches should be conducted to help internet players in making appropriate design choices that would meet their requirements as well as their customers. This is an important area of research as these new developments and approaches will inevitably reshape the internet and the future of technology. Design Innovation and Network Architecture for the Future Internet sheds light on the foreseeable yet dramatic evolution of internet design principles and offers a comprehensive overview on the recent advances in networking techniques that are likely to shape the future internet. The chapters provide a rigorous in-depth analysis of the promises, pitfalls, and other challenges raised by these initiatives, while avoiding any speculation on their expected outcomes and technical benefits. This book covers essential topics such as content delivery networks, network functions virtualization, security, cloud computing, automation, and more. This book will be useful for network engineers, software designers, computer networking professionals, practitioners, researchers, academicians, and students looking for a comprehensive research book on the latest advancements in internet design principles and networking techniques.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book addresses the Internet of Things (IoT), an essential topic in the technology industry, policy, and engineering circles, and one that has become headline news in both the specialty press and the popular media. The book focuses on energy efficiency concerns in IoT and the requirements related to Industry 4.0. It is the first-ever "how-to" guide on frequently overlooked practical, methodological, and moral questions in any nations' journey to reducing energy consumption in IoT devices. The book discusses several examples of energy-efficient IoT, ranging from simple devices like indoor temperature sensors, to more complex sensors (e.g. electrical power measuring devices), actuators (e.g. HVAC room controllers, motors) and devices (e.g. industrial circuit-breakers, PLC for home, building or industrial automation). It provides a detailed approach to conserving energy in IoT devices, and comparative case studies on performance evaluation metrics, state-of-the-art approaches, and IoT legislation.
For courses in Python programming. A clear and student-friendly introduction to the fundamentals of Python In Starting Out with Python, 5th Edition, Tony Gaddis' accessible coverage introduces students to the basics of programming in a high-level language. Python, an easy-to-learn and increasingly popular object-oriented language, allows readers to become comfortable with the fundamentals of programming without the troublesome syntax that can be challenging for novices. With the knowledge acquired using Python, students gain confidence in their skills and learn to recognize the logic behind developing high-quality programs. Starting Out with Python discusses control structures, functions, and lists before classes. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, focused explanations, and an abundance of exercises appear in every chapter. Updates to the 5th Edition include a new chapter on database programming, and new coverage of GUI programming, string processing and formatting, and turtle graphics topics.
The buzz about The ebay Phenomenon "David Bunnell’s portrayal of eBay paints a picture of one of the most daring, fanatically innovative, customer-centric companies on the planet. It demonstrates how a small, driven group of people can listen to customers and reinvent the world–inspiring!"–David Siegel, author, Futurize Your Enterprise "Read The eBay Phenomenon if you want the inside account of how this innovative company became one of the decade’s greatest business success stories. Regardless of what business you’re in, David Bunnell’s exciting chronicle offers valuable lessons and a riveting narrative."–Eric Nee, Senior Writer, Fortune
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
The book discusses the evolution of cellular technology, then focusing in on 5G and its architecture and what it means for current engineers. The book first focuses on 4G and how it changed the industry, allowing people to communicate by connecting devices to the internet. The authors detail the emergence of services and applications that have revolutionized communication and continue to impact the daily habits of majority of the world's population. The authors endeavor to tell this story by showing the path taken until the arrival of 5G, detailing how technological and architectural progress evolved in all these years. It is a technical book, but the authors take care to explain in detail each aspect related to technology in order to allow everyone interested in the subject to delve into this important topic. Presents a comprehensive explanation about 4G and 5G architecture, modulation and protocols; Includes a thorough explanation of modern antennas technology and O-RAN; Relevant to technology professionals and students interested in 5G, but with little background in telecommunications; The English translation of this book from its Portuguese original manuscript was done with the help of artificial intelligence (machine translation by the service provider DeepL.com). A subsequent human revision of the content was done by the author.
By now, you've probably heard lots of stories about the thousands of individuals worldwide who, armed with little more than their PCs, are making a killing day trading stocks online. Could electronic day trading be your ticket to financial independence? Here's your chance to find out.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.
This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
Discover why privacy is a counterproductive, if not obsolete, concept in this startling new book It's only a matter of time-- the modern notion of privacy is quickly evaporating because of technological advancement and social engagement. Whether we like it or not, all our actions and communications are going to be revealed for everyone to see. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity takes a controversial and insightful look at the concept of privacy and persuasively argues that preparing for a post-private future is better than exacerbating the painful transition by attempting to delay the inevitable. Security expert and author Ben Malisow systematically dismantles common notions of privacy and explains how: Most arguments in favor of increased privacy are wrong Privacy in our personal lives leaves us more susceptible to being bullied or blackmailed Governmental and military privacy leads to an imbalance of power between citizen and state Military supremacy based on privacy is an obsolete concept Perfect for anyone interested in the currently raging debates about governmental, institutional, corporate, and personal privacy, and the proper balance between the public and the private, Exposed also belongs on the shelves of security practitioners and policymakers everywhere.
The widespread use of web-based communities, social media, and social networking sites has brought a rapid change to the interaction between computers and users as well as the digital experience as a whole. Social Media Mining and Social Network Analysis: Emerging Research highlights the advancements made in social network analysis and social web mining and its influence in the fields of computer science, information systems, sociology, organisation science discipline and much more. This collection of perspectives on developmental practice is useful for industrial practitioners as well as researchers and scholars.
This book addresses several aspects of environmental sustainability awareness and priorization, explores ways to use resources and processes more responsibly, and describes the strategies, models and tools required to overcome various challenges. Sustainable and green IT are used to minimize the current ICT recycling problems which are harming our planet. The book discusses the new green information technologies as alternatives to conventional ICT, which have significantly harmed nature, and examines how to make recent technologies such as cloud computing; social networking; smart technology; blockchains, IoT (internet-of-things); and big data sustainable. Exploring sustainability awareness and importance among individuals and organizations in the developed and developing countries, most of the contributions conclude that sustainability should be considered a duty in order to change mindsets, attitudes and actions so as to preserve our planet. Furthermore, it examines the green information technology strategies and models. |
You may like...
|