|
|
Books > Computing & IT > Internet
Get the latest information about online GIS using ArcGIS apps and
functionality. Capabilities of Web GIS keep expanding, and Getting
to Know Web GIS, fifth edition, describes some of the most
cutting-edge and exciting innovations. From publishing data as
services and configuring engaging web and mobile apps to
automation, scripting, and real-world applications, this book
shares how to use the most current software and apps for using
ArcGIS in the cloud. In the newest edition of Getting to Know Web
GIS, you can work with the latest releases of ArcGIS Online, ArcGIS
Pro, ArcGIS StoryMaps , and ArcGIS mobile apps. You can experience
ArcGIS Experience Builder, ArcGIS Field Maps, ArcGIS Instant Apps,
ArcGIS Image for ArcGIS Online, ArcGIS Mission, and the latest
advances in artificial intelligence, virtual reality, and tools for
spatial data science. No programming is required, but you can learn
more about Web GIS programming in this book using JavaScript,
webhooks, and ArcGIS Arcade. Use the fifth edition to: improve your
online visual storytelling, work with 2D smart mapping and 3D web
scenes, create informative web experiences and dashboards, support
field operations and data collection using mobile apps, use new
data science tools for spatial analysis and geoprocessing, detect
objects using deep learning packages, program a triggered
notification using a visual interface, and more. GIS expert,
instructor, and author Pinde Fu provides lecture slides and
additional resources in an online story using ArcGIS StoryMaps.
Today's modern GIS is Web GIS-get onboard with one of the most
interesting and creative areas of GIS
With the rapid development of big data, it is necessary to transfer
the massive data generated by end devices to the cloud under the
traditional cloud computing model. However, the delays caused by
massive data transmission no longer meet the requirements of
various real-time mobile services. Therefore, the emergence of edge
computing has been recently developed as a new computing paradigm
that can collect and process data at the edge of the network, which
brings significant convenience to solving problems such as delay,
bandwidth, and off-loading in the traditional cloud computing
paradigm. By extending the functions of the cloud to the edge of
the network, edge computing provides effective data access control,
computation, processing and storage for end devices. Furthermore,
edge computing optimizes the seamless connection from the cloud to
devices, which is considered the foundation for realizing the
interconnection of everything. However, due to the open features of
edge computing, such as content awareness, real-time computing and
parallel processing, the existing problems of privacy in the edge
computing environment have become more prominent. The access to
multiple categories and large numbers of devices in edge computing
also creates new privacy issues. In this book, we discuss on the
research background and current research process of privacy
protection in edge computing. In the first chapter, the
state-of-the-art research of edge computing are reviewed. The
second chapter discusses the data privacy issue and attack models
in edge computing. Three categories of privacy preserving schemes
will be further introduced in the following chapters. Chapter three
introduces the context-aware privacy preserving scheme. Chapter
four further introduces a location-aware differential privacy
preserving scheme. Chapter five presents a new blockchain based
decentralized privacy preserving in edge computing. Chapter six
summarize this monograph and propose future research directions. In
summary, this book introduces the following techniques in edge
computing: 1) describe an MDP-based privacy-preserving model to
solve context-aware data privacy in the hierarchical edge computing
paradigm; 2) describe a SDN based clustering methods to solve the
location-aware privacy problems in edge computing; 3) describe a
novel blockchain based decentralized privacy-preserving scheme in
edge computing. These techniques enable the rapid development of
privacy-preserving in edge computing.
This book overviews the drivers behind the smart city vision,
describes its dimensions and introduces the reference architecture.
It further enumerates and classifies threats targeting the smart
city concept, links corresponding attacks, and traces the impact of
these threats on operations, society and the environment. This book
also introduces analytics-driven situational awareness, provides an
overview of the respective solutions and highlights the prevalent
limitations of these methods. The research agenda derived from the
study emphasizes the demand and challenges for developing holistic
approaches to transition these methods to practice equipping the
user with extensive knowledge regarding the detected attack instead
of a sole indicator of ongoing malicious events. It introduces a
cyber-situational awareness framework that can be integrated into
smart city operations to provide timely evidence-based insights
regarding cyber incidents and respective system responses to assist
decision-making. This book targets researchers working in
cybersecurity as well as advanced-level computer science students
focused on this field. Cybersecurity operators will also find this
book useful as a reference guide.
Based on years of research and 121 real-life first dates,
relationship expert Wendy Newman dishes up practical wisdom for
navigating the online dating trenches with grace, efficiency, and a
strong dose of humour. Wendy Newman has made every imaginable
dating mistake so you don't have to. Part guidebook, part personal
tell-all, 121 First Dates chronicles Wendy's funny, real-life
misadventures and the practical wisdom she gained from them. Her
dating tales will find you laughing, commiserating, and nodding
your head as you learn how to stay in the dating game until you
find the right man, just like Wendy did. This book busts myths,
answers age-old questions, and examines pitfalls that make you want
to give up on dating altogether. Just when you're about to submit
to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns,
121 First Dates will inspire you to keep stepping out. Wendy
discusses how to date successfully and efficiently, avoid the most
common dating pitfalls, have an amazing first date with anyone, end
uncomfortable situations with grace, and much, much more. She
offers up realistic Dos and Don'ts as well as tips for making the
most of any situation you find yourself in-whether you want to run
or you think he's the one. Brimming with humour, hope, and
authenticity, 121 First Dates will give every woman the tools,
confidence, and determination to be and stay real when dating. How
else will you find the best match for you?
Containing the edited research papers resulting from an ambitious, cross-disciplinary research project, this volume examines the spatiality of virtual inhabited 3D worlds - virtual reality and cyberspace. (Three other volumes look at Interaction, Staging and Methodology.) It is about the communication spaces emerging at the Internet and supported by special 3D interfaces. It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted display systems etc.) and software.Virtual Space: Spatiality in Virtual Inhabited 3D Worlds is interdisciplinary. It deals with philosophical, psychological, communicational, technological and aesthetic aspects of space. While philosophy raises the question concerning the ontology of space - what is space - psychology deals with our perception of space. Communication theory looks at the way in which space supports communication (i.e. that space is a medium for communication), and finally aesthetic analyses exemplify the use of virtual space in virtual cities, in museums and in art.
The papers in this volume comprise the refereed proceedings of the
Second IFIP International Conference on Computer and Computing
Technologies in Agriculture (CCTA2008), in Beijing, China, 2008.
The conference on the Second IFIP International Conference on
Computer and Computing Technologies in Agriculture (CCTA 2008) is
cooperatively sponsored and organized by the China Agricultural
University (CAU), the National Engineering Research Center for
Information Technology in Agriculture (NERCITA), the Chinese
Society of Agricultural Engineering (CSAE) , International
Federation for Information Processing (IFIP), Beijing Society for
Information Technology in Agriculture, China and Beijing Research
Center for Agro-products Test and Farmland Inspection, China. The
related departments of China's central government bodies like:
Ministry of Science and Technology, Ministry of Industry and
Information Technology, Ministry of Education and the Beijing
Municipal Natural Science Foundation, Beijing Academy of
Agricultural and Forestry Sciences, etc. have greatly contributed
and supported to this event. The conference is as good platform to
bring together scientists and researchers, agronomists and
information engineers, extension servers and entrepreneurs from a
range of disciplines concerned with impact of Information
technology for sustainable agriculture and rural development. The
representatives of all the supporting organizations, a group of
invited speakers, experts and researchers from more than 15
countries, such as: the Netherlands, Spain, Portugal, Mexico,
Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran,
Nigeria, Brazil, China, etc.
This book provides an overview of the emerging smart connected
world, and discusses the roles and the usage of underlying semantic
computing and Internet-of-Things (IoT) technologies. The book
comprises ten chapters overall, grouped in two parts. Part I "Smart
Connected World: Overview and Technologies" consists of seven
chapters and provides a holistic overview of the smart connected
world and its supporting tools and technologies. Part II
"Applications and Case Studies" consists of three chapters that
describe applications and case studies in manufacturing, smart
cities, health, and more. Each chapter is self-contained and can be
read independently; taken together, readers get a bigger picture of
the technological and application landscape of the smart connected
world. This book is of interest for researchers, lecturers, and
practitioners in Semantic Web, IoT and related fields. It can serve
as a reference for instructors and students taking courses in
hybrid computing getting abreast of cutting edge and future
directions of a connected ecosystem. It will also benefit industry
professionals like software engineers or data scientists, by
providing a synergy between Web technologies and applications. This
book covers the most important topics on the emerging field of the
smart connected world. The contributions from leading active
researchers and practitioners in the field are thought provoking
and can help in learning and further research. The book is a
valuable resource that will benefit academics and industry. It will
lead to further research and advancement of the field. Bharat K.
Bhargava, Professor of Computer Science, Purdue University, United
States
Contains everything that a project team needs to know about the development and deployment of Web services with the IBM WebSphere product family. Includes examples for all development artifacts in a format that can be reused in the reader’s project. The text combines the authors’ own practical experiences with consolidated information on the latest product capabilities in a unique approach that allows the book to be easily accessible to a broad spectrum of readers. Finding a balance between a euphoric/optimistic and down-to earth/realistic view on the subject, this book should sit on every Web service developer’s bookshelf.
This book presents the proceedings of the 4th International
Conference on Wireless Intelligent and Distributed Environment for
Communication (WIDECOM 2021), which took place at University of
KwaZulu-Natal, South Africa, October 13-15, 2021. The book
addresses issues related to new dependability paradigms, design,
and performance of dependable network computing and mobile systems,
as well as issues related to the security of these systems. The
main tracks include infrastructure, architecture, algorithms, and
protocols. The goal of the conference is to provide a forum for
researchers, students, scientists and engineers working in academia
and industry to share their experiences, new ideas and research
results in the above-mentioned areas.
This book provides an accessible and comprehensive tutorial on the
key enabling technologies for 5G and beyond, covering both the
fundamentals and the state-of-the-art 5G standards. The book begins
with a historical overview of the evolution of cellular
technologies and addresses the questions on why 5G and what is 5G.
Following this, six tutorial chapters describe the fundamental
technology components for 5G and beyond. These include modern
advancements in channel coding, multiple access, massive
multiple-input and multiple-output (MIMO), network densification,
unmanned aerial vehicle enabled cellular networks, and 6G wireless
systems. The second part of this book consists of five chapters
that introduce the basics of 5G New Radio (NR) standards developed
by 3GPP. These include 5G architecture, protocols, and physical
layer aspects. The third part of this book provides an overview of
the key 5G NR evolution directions. These directions include
ultra-reliable low-latency communication (URLLC) enhancements,
operation in unlicensed spectrum, positioning, integrated access
and backhaul, air-to-ground communication, and non-terrestrial
networks with satellite communication.
This book is a collection of best selected research papers
presented at the Conference on Machine Learning, Deep Learning and
Computational Intelligence for Wireless Communication (MDCWC 2020)
held during October 22nd to 24th 2020, at the Department of
Electronics and Communication Engineering, National Institute of
Technology Tiruchirappalli, India. The presented papers are grouped
under the following topics (a) Machine Learning, Deep learning and
Computational intelligence algorithms (b)Wireless communication
systems and (c) Mobile data applications and are included in the
book. The topics include the latest research and results in the
areas of network prediction, traffic classification, call detail
record mining, mobile health care, mobile pattern recognition,
natural language processing, automatic speech processing, mobility
analysis, indoor localization, wireless sensor networks (WSN),
energy minimization, routing, scheduling, resource allocation,
multiple access, power control, malware detection, cyber security,
flooding attacks detection, mobile apps sniffing, MIMO detection,
signal detection in MIMO-OFDM, modulation recognition, channel
estimation, MIMO nonlinear equalization, super-resolution channel
and direction-of-arrival estimation. The book is a rich reference
material for academia and industry.
This book provides practical information about web archives, offers
inspiring examples for web archivists, raises new challenges, and
shares recent research results about access methods to explore
information from the past preserved by web archives. The book is
structured in six parts. Part 1 advocates for the importance of web
archives to preserve our collective memory in the digital era,
demonstrates the problem of web ephemera and shows how web
archiving activities have been trying to address this challenge.
Part 2 then focuses on different strategies for selecting web
content to be preserved and on the media types that different web
archives host. It provides an overview of efforts to address the
preservation of web content as well as smaller-scale but
high-quality collections of social media or audiovisual content.
Next, Part 3 presents examples of initiatives to improve access to
archived web information and provides an overview of access
mechanisms for web archives designed to be used by humans or
automatically accessed by machines. Part 4 presents research use
cases for web archives. It also discusses how to engage more
researchers in exploiting web archives and provides inspiring
research studies performed using the exploration of web archives.
Subsequently, Part 5 demonstrates that web archives should become
crucial infrastructures for modern connected societies. It makes
the case for developing web archives as research infrastructures
and presents several inspiring examples of added-value services
built on web archives. Lastly, Part 6 reflects on the evolution of
the web and the sustainability of web archiving activities. It
debates the requirements and challenges for web archives if they
are to assume the responsibility of being societal infrastructures
that enable the preservation of memory. This book targets academics
and advanced professionals in a broad range of research areas such
as digital humanities, social sciences, history, media studies and
information or computer science. It also aims to fill the need for
a scholarly overview to support lecturers who would like to
introduce web archiving into their courses by offering an initial
reference for students.
This comprehensive volume explores the evolving fields of consumer informatics and telemedicine as envisioned by the Institute of Medicine in its landmark reports on the electronic medical record, patient safety, and quality care. Each chapter describes the role of computers, technology, and telecommunications as enablers within a specific application focused on the needs of consumers. The applications covered are ones which empower consumers as they seek information, analyze their health care needs, and make decisions about their own health care. Such applications empower professionals in their efforts to serve patients, while increasing the knowledge of the consumer. Richly illustrated with detailed examples, this volume speaks to a wide range of audiences as it addresses issues raised by consumer informatics, the use of technology, research and development effects, and telemedicine. Chapter highlights include: Patient-Centered Communication; Using the Internet Toward Reliable Consumer Health Information; Disease Management and Home Telehealth; and Biothreats and Disaster Management. The book's audience includes all healthcare professionals, healthcare administrators, IT professionals, health informaticians, and students.
This book covers a variety of smart IoT applications for industry
and research. For industry, the book is a guide for considering the
real-time aspects of automation of application domains. The main
topics covered in the industry section include real-time tracking
and navigation, smart transport systems and application for GPS
domains, modern electric grid control for electricity industry, IoT
prospectives for modern society, IoT for modern medical science,
and IoT automation for Industry 4.0. The book then provides a
summary of existing IoT research that underlines enabling
technologies, such as fog computing, wireless sensor networks, data
mining, context awareness, real-time analytics, virtual reality,
and cellular communications. The book pertains to researchers,
outcome-based academic leaders, as well as industry leaders.
Design intuitive navigation for the ideal user experience Hundreds
of thousands of Web designers and developers have relied on web
usability expert Steve Krug's guide to help them understand the
principles of intuitive navigation and information design. Witty,
commonsensical, and eminently practical, it's one of the best-loved
and most recommended books on the subject. Fresh perspectives and
examples New chapter on mobile usability Still short, profusely
illustrated...and best of all-fun to read If you've read it before,
you'll rediscover what made Don't Make Me Think so essential to Web
designers and developers around the world. If you've never read it,
you'll see why so many people have said it should be required
reading for anyone working on websites. "After reading it over a
couple of hours and putting its ideas to work for the past five
years, I can say it has done more to improve my abilities as a Web
designer than any other book." -Jeffrey Zeldman, author of
Designing with Web Standards
Building Flickr Applications with PHP teaches you how to use
today's most popular online photo management system. You'll learn
to work with both your own photos and Flickr's enormous cache, and
create new and compelling extensions to the Flickr platform. This
book is a great pick because It's written by experienced developer
Rob Kunkle and Phlickr developer Andrew Morton. You'll learn how to
use the PHP API Phlickr to write and retrieve photos. Flicker is
growing quickly in popularity in the online photo management world.
Using the popular PHP-driven Phlickr API in conjunction with MySQL,
you'll discover how to take advantage of open source tools like
PHP, Apache, and MySQL, as well as the Flickr architecture, to
manage, retrieve, and format photos in imaginative ways. You'll
also learn how to build upon Flickr's photo collaboration features
to create interfaces for working with others on photo album
projects. And you'll learn how to format Flickr tags--taking
advantage of RSS to distribute photo updates.
An Interdisciplinary Approach to Modern Network Security presents
the latest methodologies and trends in detecting and preventing
network threats. Investigating the potential of current and
emerging security technologies, this publication is an
all-inclusive reference source for academicians, researchers,
students, professionals, practitioners, network analysts and
technology specialists interested in the simulation and application
of computer network protection. It presents theoretical frameworks
and the latest research findings in network security technologies,
while analyzing malicious threats which can compromise network
integrity. It discusses the security and optimization of computer
networks for use in a variety of disciplines and fields. Touching
on such matters as mobile and VPN security, IP spoofing and
intrusion detection, this edited collection emboldens the efforts
of researchers, academics and network administrators working in
both the public and private sectors. This edited compilation
includes chapters covering topics such as attacks and
countermeasures, mobile wireless networking, intrusion detection
systems, next-generation firewalls, web security and much more.
Information and communication systems are an essential component of
our society, forcing us to become dependent on these
infrastructures. At the same time, these systems are undergoing a
convergence and interconnection process that has its benefits, but
also raises specific threats to user interests. Citizens and
organizations must feel safe when using cyberspace facilities in
order to benefit from its advantages. This book is
interdisciplinary in the sense that it covers a wide range of
topics like network security threats, attacks, tools and procedures
to mitigate the effects of malware and common network attacks,
network security architecture and deep learning methods of
intrusion detection.
The Internet of Things (IoT) has become a major influence on the
development of new technologies and innovations. When utilized
properly, these applications can enhance business functions and
make them easier to perform. Protocols and Applications for the
Industrial Internet of Things discusses and addresses the
difficulties, challenges, and applications of IoT in industrial
processes and production and work life. Featuring coverage on a
broad range of topics such as industrial process control, machine
learning, and data mining, this book is geared toward academicians,
computer engineers, students, researchers, and professionals
seeking current and relevant research on applications of the IoT.
Advances in hardware technology have lead to an ability to collect
data with the use of a variety of sensor technologies. In
particular sensor notes have become cheaper and more efficient, and
have even been integrated into day-to-day devices of use, such as
mobile phones. This has lead to a much larger scale of
applicability and mining of sensor data sets. The human-centric
aspect of sensor data has created tremendous opportunities in
integrating social aspects of sensor data collection into the
mining process. Managing and Mining Sensor Data is a contributed
volume by prominent leaders in this field, targeting advanced-level
students in computer science as a secondary text book or reference.
Practitioners and researchers working in this field will also find
this book useful.
It is a general trend in computing that computers are becoming ever
smaller and ever more interconnected. Sensor networks - large
networks of small, simple devices - are a logical extreme of this
trend. Wireless sensor networks (WSNs) are attracting an increasing
degree of research interest, with a growing number of industrial
applications starting to emerge. Two of these applications,
personal health monitoring and emergency/disaster recovery, are the
focus of the European Commission project ProSense: Promote,
Mobilize, Reinforce and Integrate Wireless Sensor Networking
Research and Researchers. This hands-on introduction to WSN systems
development presents a broad coverage of topics in the field,
contributed by researchers involved in the ProSense project. An
emphasis is placed on the practical knowledge required for the
successful implementation of WSNs. Divided into four parts, the
first part covers basic issues of sensors, software, and
position-based routing protocols. Part two focuses on
multidisciplinary issues, including sensor network integration,
mobility aspects, georouting, medical applications, and vehicular
sensor networks. The remaining two parts present case studies and
further applications. Topics and features: presents a broad
overview of WSN technology, including an introduction to sensor and
sensing technologies; contains an extensive section on case
studies, providing details of the development of a number of WSN
applications; discusses frameworks for WSN systems integration,
through which WSN technology will become fundamental to the Future
Internet concept; investigates real-world applications of WSN
systems in medical and vehicular sensor networks; with a Foreword
by the Nobel Laurate Professor Martin Perl of Stanford University.
Providing holistic coverage of WSN technology, this text/reference
will enable graduate students of computer science, electrical
engineering and telecommunications to master the specific domains
of this emerging area. The book will also be a valuable resource
for researchers and practitioners interested in entering the field.
The book presents the proceedings of the World Congress on
Engineering and Technology, Innovation and its Sustainability
(WCETIS 2018), which took place on November 28-29, 2018 in Manila,
Philippines. The conference featured the following tracks:
Industrial Engineering and Healthcare, Sustainable Infrastructure;
Water Resources Planning and Management; Heat transfer and fluids;
Electronics and Electrical Engineering; and Internet of Things.
Papers stem from academia and industry throughout the world,
showing a variety of perspectives. Presents the proceedings of the
World Congress on Engineering and Technology, Innovation and its
Sustainability (WCETIS 2018), November 28-29, 2018 in Manila,
Philippines Shows how engineering and technology serve to support a
variety for industries from manufacturing to water resources
Features papers from a variety of researchers and developers from
around the world
|
|