![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The goal of this textbook is to provide enough background into the inner workings of the Internet to allow a novice to understand how the various protocols on the Internet work together to accomplish simple tasks, such as a search. By building an Internet with all the various services a person uses every day, one will gain an appreciation not only of the work that goes on unseen, but also of the choices made by designers to make life easier for the user. Each chapter consists of background information on a specific topic or Internet service, and where appropriate a final section on how to configure a Raspberry Pi to provide that service. While mainly meant as an undergraduate textbook for a course on networking or Internet protocols and services, it can also be used by anyone interested in the Internet as a step-by-step guide to building one's own Intranet, or as a reference guide as to how things work on the global Internet
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, in Neos Marmaras, Greece, in June 2020: the 9th Mining Humanistic Data Workshop, MHDW 2020, and the 5th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2020.* The 6 full papers and 3 short papers presented at MHDW 2020 were carefully reviewed and selected from 16 submissions; out of the 23 papers submitted to 5G-PINE 2020, 11 were accepted as full papers and 1 as a short paper. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and deal with topics such as the Internet of Things, intelligence fusion in 5G networks, and 5G media. *The workshops were held virtually due to the COVID-19 pandemic.
Have you ever wondered what specific strategies the world's highest-paid Internet entrepreneurs are using to get rich? Are you tired of working forty hours per week at a job you dislike and not getting paid what you're worth? Would you like to learn how to package the knowledge already in your head and put it into high-earning digital products (ebooks, online courses, coaching programs, software, etc.)? Wouldn't it be great to make a bigger impact in the world by helping others and doing what you love? If you answered yes to any of these questions, read Matthew Loop's Social Media Made Me Rich. This tactical blueprint shares the common denominators of the wealthiest movers and shakers online. You'll learn: - How to profit big from Facebook, Instagram, YouTube, Twitter, Pinterest, Amazon, and Google. - The biggest (and dumbest) mistakes to avoid when using high-leverage social platforms. - A million-dollar plan so you can start from scratch and monetize who you are along with what you know. - The most sought after scripts that grow your brand, influence, and bottom line fast. - How to become the celebrity expert in your industry. - The secret to attracting greater numbers of clients and sales without spending money. Social Media Made Me Rich is a comprehensive resource that helps you achieve prosperity and abundance on your terms, even if you're starting from zero.
This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes. Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book. This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
From theory to application, this book presents research on biologically and brain-inspired networking and machine learning based on Yuragi, which is the Japanese term describing the noise or fluctuations that are inherently used to control the dynamics of a system. The Yuragi mechanism can be found in various biological contexts, such as in gene expression dynamics, molecular motors in muscles, or the visual recognition process in the brain. Unlike conventional network protocols that are usually designed to operate under controlled conditions with a predefined set of rules, the probabilistic behavior of Yuragi-based control permits the system to adapt to unknown situations in a distributed and self-organized manner leading to a higher scalability and robustness.The book consists of two parts. Part 1 provides in four chapters an introduction to the biological background of the Yuragi concept as well as how these are applied to networking problems. Part 2 provides additional contributions that extend the original Yuragi concept to a Bayesian attractor model from human perceptual decision making. In the six chapters of the second part, applications to various fields in information network control and artificial intelligence are presented, ranging from virtual network reconfigurations, a software-defined Internet of Things, and low-power wide-area networks. This book will benefit those working in the fields of information networks, distributed systems, and machine learning who seek new design mechanisms for controlling large-scale dynamically changing systems.
Der Domainname ist SchlA1/4ssel und AushAngeschild jeder Website. Je durchdachter die Wahl der Domain, um so besser die Kommunikation. Dieses Buch bietet einen Rundum-Service: ausgehend von der Bedeutung eines guten Domain-Namens bis hin zu Suche, Registrierung, Handel, Rechtsfragen und Zukunftsprognosen soll das BewuAtsein fA1/4r den Domain-Namen als Grundlage von Marketingstrategien im Internet geschArft werden. Das Buch bietet auAerdem eine Basis fA1/4r das Management von Domain-Portfolios und richtet sich an Internetverantwortliche in Unternehmen ebenso wie an AnwAlte mit Schwerpunkt Online-Recht.
The state of the art in space-time code design This cutting-edge text presents the state of the art in space-time (ST) coded multi-antenna systems operating over broadband wireless mobile channels, including an analysis of the most recent research findings. Specifically, the authors focus on the algorithms and performance analysis of ST coded systems at the physical layer. This text is a complement to previously published works covering ST coded multi-antenna systems and offers several unique features and benefits: Systematic coverage of one of the most promising techniques that will support the next generation of broadband multimedia services Unified and comprehensive exposition on the design of ST codes, which places all the latest research in context Thorough designs of ST codes for the gamut of frequency-selective, time-selective, and doubly-selective MIMO channels that are encountered with broadband wireless mobile links, in addition to ST codes for flat fading MIMO channels Recent advances in complex field coded transmissions, sphere decoding algorithms, closed-loop ST coded systems, operation in the presence of colored interference, and multi-user, multi-antenna systems Development and analysis of novel algorithms and techniques that have arisen from recent research Numerical and simulated examples are given for most of the algorithms presented in the text to help readers better visualize and understand how they work. In addition, the authors provide background information on wireless communications basics, diversity techniques, and capacity of MIMO channels, giving readers the necessary foundation to grasp all the key concepts and techniques presentedin the text. This text will not only bring engineers, network designers, and graduate students in wireless communications up to date with the latest findings, it will also provide them with the latest applications.
This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, Model-View-Controller architecture by using Spring JPA, JSPs, and Spring MVC controllers. These three technologies use Java, so that a student with a background in programming will be able to master them with ease, with the end result of being able to create web applications that use MVC, validate user input,and save data to a database. Topics and features: * Presents web development topics in an accessible, easy-to-follow style, focusing on core information first, and allowing the reader to gain basic understanding before moving forwards * Contains many helpful pedagogical tools for students and lecturers, such as questions and exercises at the end of each chapter, detailed illustrations, chapter summaries, and a glossary * Uses existing powerful technologies that are freely available on the web to speed up web development, such as Spring Boot, Spring MVC, Spring JPA, Hibernate, JSP, JSTL, and Java 1.8 * Discusses HTML, HTML forms, and Cascading Style Sheets * Starts with the simplest technology for web development (JSP) and gradually introduces the reader to more complex topics * Introduces core technologies from the outset, such as the Model-View-Controller architecture * Includes examples for accessing common web services * Provides supplementary examples and tutorials
In the late 1990s, AI witnessed an increasing use of the term 'argumentation' within its bounds: in natural language processing, in user interface design, in logic programming and nonmonotonic reasoning, in Al's interface with the legal community, and in the newly emerging field of multi-agent systems. It seemed to me that many of these uses of argumentation were inspired by (of ten inspired) guesswork, and that a great majority of the AI community were unaware that there was a maturing, rich field of research in Argumentation Theory (and Critical Thinking and Informal Logic) that had been steadily re building a scholarly approach to the area over the previous twenty years or so. Argumentation Theory, on its side; was developing theories and approaches that many in the field felt could have a role more widely in research and soci ety, but were for the most part unaware that AI was one of the best candidates for such application."
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
Enterprise Architecture, Integration, and Interoperability and the Networked enterprise have become the theme of many conferences in the past few years. These conferences were organised by IFIP TC5 with the support of its two working groups: WG 5. 12 (Architectures for Enterprise Integration) and WG 5. 8 (Enterprise Interoperability), both concerned with aspects of the topic: how is it possible to architect and implement businesses that are flexible and able to change, to interact, and use one another's s- vices in a dynamic manner for the purpose of (joint) value creation. The original qu- tion of enterprise integration in the 1980s was: how can we achieve and integrate - formation and material flow in the enterprise? Various methods and reference models were developed or proposed - ranging from tightly integrated monolithic system - chitectures, through cell-based manufacturing to on-demand interconnection of bu- nesses to form virtual enterprises in response to market opportunities. Two camps have emerged in the endeavour to achieve the same goal, namely, to achieve interoperability between businesses (whereupon interoperability is the ability to exchange information in order to use one another's services or to jointly implement a service). One school of researchers addresses the technical aspects of creating dynamic (and static) interconnections between disparate businesses (or parts thereof).
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
"Pro Java EE 5 Performance Management and Optimization" features proven methodology to guarantee top-performing Java EE 5 applications, and explains how to measure performance in your specific environment. The book also details performance integration points throughout the development and deployment lifecycles that are crucial for application success. For QA and preproduction stages, this book guides you through testing and optimally deploying your Java EE 5 applications, with a focus on assessing capacity and discovering saturation points. It defines the concept and application of wait-based tuningone of the most effective approaches to application server tuning. The book also helps you assess and improve the health of your applications upon deployment. The topics covered include trending, forecasting, and capacity assessing and planning. When production issues arise, youll be armed with troubleshooting methodology and solutions to common problems that have been observed in real-world environments. This book even guides you through the creation of a formal Java EE 5 Performance Management Plancustomized to your environment to help you interpret and react to changing trends in usage patterns.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
The book discusses the evolution of cellular technology, then focusing in on 5G and its architecture and what it means for current engineers. The book first focuses on 4G and how it changed the industry, allowing people to communicate by connecting devices to the internet. The authors detail the emergence of services and applications that have revolutionized communication and continue to impact the daily habits of majority of the world's population. The authors endeavor to tell this story by showing the path taken until the arrival of 5G, detailing how technological and architectural progress evolved in all these years. It is a technical book, but the authors take care to explain in detail each aspect related to technology in order to allow everyone interested in the subject to delve into this important topic. Presents a comprehensive explanation about 4G and 5G architecture, modulation and protocols; Includes a thorough explanation of modern antennas technology and O-RAN; Relevant to technology professionals and students interested in 5G, but with little background in telecommunications; The English translation of this book from its Portuguese original manuscript was done with the help of artificial intelligence (machine translation by the service provider DeepL.com). A subsequent human revision of the content was done by the author.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management. |
You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R3,940
Discovery Miles 39 400
Verification Techniques for System-Level…
Masahiro Fujita, Indradeep Ghosh, …
Hardcover
R1,654
Discovery Miles 16 540
Three-Dimensional Integration of…
Kazuo Kondo, Morihiro Kada, …
Hardcover
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,027
Discovery Miles 80 270
The Foundations of Electric Circuit…
N R S Harsha, A. Prakash, …
Paperback
R760
Discovery Miles 7 600
Design of Systems on a Chip: Design and…
Ricardo Reis, Marcelo Soares Lubaszewski, …
Hardcover
R4,137
Discovery Miles 41 370
|