![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This contributed volume discusses essential topics and the fundamentals for Big Data Emergency Management and primarily focusses on the application of Big Data for Emergency Management. It walks the reader through the state of the art, in different facets of the big disaster data field. This includes many elements that are important for these technologies to have real-world impact. This book brings together different computational techniques from: machine learning, communication network analysis, natural language processing, knowledge graphs, data mining, and information visualization, aiming at methods that are typically used for processing big emergency data. This book also provides authoritative insights and highlights valuable lessons by distinguished authors, who are leaders in this field. Emergencies are severe, large-scale, non-routine events that disrupt the normal functioning of a community or a society, causing widespread and overwhelming losses and impacts. Emergency Management is the process of planning and taking actions to minimize the social and physical impact of emergencies and reduces the community's vulnerability to the consequences of emergencies. Information exchange before, during and after the disaster periods can greatly reduce the losses caused by the emergency. This allows people to make better use of the available resources, such as relief materials and medical supplies. It also provides a channel through which reports on casualties and losses in each affected area, can be delivered expeditiously. Big Data-Driven Emergency Management refers to applying advanced data collection and analysis technologies to achieve more effective and responsive decision-making during emergencies. Researchers, engineers and computer scientists working in Big Data Emergency Management, who need to deal with large and complex sets of data will want to purchase this book. Advanced-level students interested in data-driven emergency/crisis/disaster management will also want to purchase this book as a study guide.
This book provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and reports four novel DCNs, including a switch-centric DCN, a modular DCN, a wireless DCN, and a hybrid DCN. Furthermore another important factor in DCN targets at managing and optimizing the network activity at the level of transfers to aggregate correlated data flows and thus directly to lower down the network traffic resulting from such data transfers. In particular, the book reports the in-network aggregation of incast transfer, shuffle transfer, uncertain incast transfer, and the cooperative scheduling of uncertain multicast transfer.
Combining theory and practice, Website Design and Development with HTML5 and CSS3 is aimed at both beginners who want to design their first website, and experienced developers who want to consolidate their technical skills. This book addresses the theoretical aspects of HTML5 and CSS3, including: HTML elements, semantic containers, semantic text formatting, multimedia elements, forms, tables, definition and integration of CSS styles, text formatting, and container and box styles. It also encompasses a practical section which presents the process of creating a website, as well as the key rules to apply in order to not only achieve project success, but also to meet user needs. Illustrated by numerous examples, this book includes corrected practical work, structured according to an evolutionary logic ranging from the design of a simple HTML5 page to the creation of a professional website.
This book develops survey data analysis tools in Python, to create and analyze cross-tab tables and data visuals, weight data, perform hypothesis tests, and handle special survey questions such as Check-all-that-Apply. In addition, the basics of Bayesian data analysis and its Python implementation are presented. Since surveys are widely used as the primary method to collect data, and ultimately information, on attitudes, interests, and opinions of customers and constituents, these tools are vital for private or public sector policy decisions. As a compact volume, this book uses case studies to illustrate methods of analysis essential for those who work with survey data in either sector. It focuses on two overarching objectives: Demonstrate how to extract actionable, insightful, and useful information from survey data; and Introduce Python and Pandas for analyzing survey data.
This handbook is a comprehensive overview of the burgeoning podcast industry. It covers the history of podcasting from its roots in radio; the variety of genres, topics and styles of today's podcasts (both individual and corporate); and the steps required to build your own podcast. The handbook covers all the elements needed to create a successful podcast including platform options, programming, advertising and sponsorships. Supplemental essays from professionals in various industries provide information and tips to enhance the podcasting experience. The structure of the book is easily adapted into lesson plans, and the exercises included for readers make it a book well suited for classes on podcasting.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical systems, and the Internet of things which is expected to have a tremendous impact on our daily lives. It contains a total of thirteen peer-reviewed and edited chapters. This book covers topics such as context-aware cyber-physical systems, sustainable cloud computing, fog computing, and cloud monitoring; both the theoretical and practical aspects belonging to these topics are discussed. All the chapters also discuss open research challenges in the areas mentioned above. Finally, the handbook presents three use cases regarding healthcare, smart buildings and disaster management to assist the audience in understanding how to develop next-generation IoT- and cloud-enabled cyber-physical systems. This timely handbook is edited for students, researchers, as well as professionals who are interested in the rapidly growing fields of cloud computing, cyber-physical systems, and the Internet of things.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
Deliver rich audio and video real-time communication and peer-to-peer data exchange right in the browser, without the need for proprietary plug-ins. This concise hands-on guide shows you how to use the emerging Web Real-Time Communication (WebRTC) technology to build a browser-to-browser application, piece by piece. The authors' learn-by-example approach is perfect for web programmers looking to understand real-time communication, and telecommunications architects unfamiliar with HTML5 and JavaScript-based client-server web programming. You'll use a ten-step recipe to create a complete WebRTC system, with exercises that you can apply to your own projects.Tour the WebRTC development cycle and trapezoid architectural modelUnderstand how and why VoIP is shifting from standalone functionality to a browser componentUse mechanisms that let client-side web apps interact with browsers through the WebRTC APITransfer streaming data between browser peers with the RTCPeerConnection APICreate a signaling channel between peers for setting up a WebRTC sessionPut everything together to create a basic WebRTC system from scratchLearn about conferencing, authorization, and other advanced WebRTC features
This book makes the case that the changes brought about by the connectivity of the Internet have so transformed the nature of post secondary learning that we need to view it differently. Both the content and the processes of learning have been profoundly altered because of the accessibility of information and the multi-way interactivity provided by the Internet. We call this new phenomenon 'the Connecticon' - which encompasses the paradigm created by the infrastructure, the content, the multiple connection devices of the Web, as well as by the hyper-interactivity of the connected generation for whom attention is the new ourrency. It is the aim of this book to identify and document the Connecticon - its nature, its impact and its implications. We will do this in the broad domain of learning, though a similar study could be carried out in commercial, social or political fields.
This proceedings is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. The book presents the refereed conference papers from the 7th International Conference on COINs, October 8-9, 2019, in Warsaw, Poland. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs19 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
Sie haben ein Unternehmen gegrA1/4ndet und Ihre Website geht demnAchst online? Sie sind gerA1/4stet fA1/4r zahlreiche Besucher und hoffen auf hohe UmsAtze? Dann ist es Zeit fA1/4r das Feintuning. Dieses Buch zeigt Ihnen, wie Ihre Website von Google besser gefunden wird und wie Sie bei Google ganz nach oben kommen. Finden Sie die richtigen Suchbegriffe und stimmen Sie Ihre Inhalte darauf ab, optimieren Sie Ihre Snippets und unterstA1/4tzen Sie den Google-Crawler beim Erfassen der Seiten. Zahlreiche Beispiele und Anekdoten aus der Praxis sorgen nicht nur fA1/4r ein gutes Ranking, sondern auch fA1/4r SpaA beim Lesen.
This book presents selected papers from the International Conference on Computing, Communication, Electrical and Biomedical Systems (ICCCEBS 2021), held in March 2021 at KPR College of Engineering and Technology, Coimbatore, Tamil Nadu, India. The conference explores the interface between industry and real-time environments with newly developed techniques in computing and communications engineering. The papers describe results of conceptual, constructive, empirical, experimental, and theoretical work in areas of computing, communication, electrical, and biomedical systems. Contributors include academic scientists, researchers, industry representatives, postdoctoral fellows, and research scholars from around the world.
The book provides a systematic and in-depth introduction to distributed event-triggered cooperative control for multi-agent systems from a theoretical perspective, which will be of particular interest to the readers. The included major research topics include: a unified design and analysis framework for centralized, clustered and distributed event-triggered schemes; fully distributed design for event/self-triggered schemes; resilient event-triggered control under malicious attacks; and various methods to aovid Zeno behavior. The comprehensive and systematic treatment of event-triggered communication and control in multi-agent system is one of the major features of the book, which is particularly suited for readers who are interested in learning principles and methods to deal with communication constraints in multi-agent systems and to design energy-saving control protocols. The book can benefit researchers, engineers, and graduate students in the fields of complex networks, smart grids, applied mathematics, electrical and electronic engineering, and computer engineering, etc.
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide. It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the Internet, plus short articles to explain more complex topics. Covering both business-related and technology terms, you'll never fall victim to fuzzy thinking again. Fully updated to cover new and emerging areas such as wireless and mobile technologies, this new edition will be your constant companion. No need to risk disastrous misinterpretation when you can have total accuracy at your fingertips.
This book is devoted to the investigation of the main issues related to the sustainable realization of tele-laboratories, where real and virtual instrumentation can be shared and used in a collaborative environment. The book contains peer reviewed chapters and each presents a self-contained treatment within a framework providing an up-to-date picture of the state-of-the-art and of the most recent developments of this multi-faceted topic.
Spring Security in Action shows you how to use Spring Security to create applications you can be confident will withstand even the most dedicated attacks. Starting with essential "secure by design" principles, you'll learn common software vulnerabilities and how to avoid them right from the design stage. Through hands-on projects, you'll learn to manage system users, configure secure endpoints, and use, OAuth2 and OpenID Connect for authentication and authorization. As you go, you'll learn how to adapt Spring Security to different architectures, such as configuring Spring Security for Reactive applications and container-based applications orchestrated with Kubernetes. When you're done, you'll have a complete understanding of how to use Spring Security to protect your Java enterprise applications from common threats and attacks. Key Features * The principles of secure by design * The architecture of Spring Security * Spring Security contracts for password encoding, cryptography, and authentication * Applying Spring Security to different architecture styles For experienced Java developers with knowledge of other Spring tools. About the technology Your applications, along with the data they manage, are one of your organization's most valuable assets. No company wants their applications easily cracked by malicious attackers or left vulnerable by avoidable errors. The specialized Spring Security framework reduces the time and manpower required to create reliable authorization, authentication, and other security features for your Java enterprise software. Thanks to Spring Security, you can easily bake security into your applications, from design right through to implementation. Laurentiu Spilca is a dedicated development lead and trainer at Endava, where he leads the development of a project in the financial market of European Nordic countries. He has over ten years experience as a Java developer and technology teacher.
This book features the proceedings of the 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2021). The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on technologies from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform.
Michael Strobel worked for several years as a software engineer and consultant in the German IT industry before joining IBM Research in Switzerland, where he developed his interest in support for negotiations in electronic markets. During his career in research, he has published several articles on this topic in major international conferences and journals and received a PhD from the University of St.Gallen, Switzerland. Based on his experiences and contributions, the author discusses electronic negotiation technologies - key ingredients for the next generation of electronic markets - from a scientific as well as a practitioner's perspective. He reviews the state-of-the-art and then introduces novel support mechanisms and design elements, which are applied in a number of case studies. This book is geared towards technicians interested in E-Commerce application development but also offers extensive background reading for educational purposes. "
This second book by the author on WSNs focuses on the concepts of energy, and energy harvesting and management techniques. Definitions and terminologies are made clear without leaning on the relaxing assumption that they are already known or easily reachable, the reader is not to be diverted from the main course. Neatly drawn figures assist in viewing and imagining the offered topics. To make energy related topics felt and seen, the adopted technologies as well as their manufacturers are presented in details. With such a depth, this book is intended for a wide audience, it is meant to be helper and motivator, for the senior undergraduates, postgraduates, researchers, and practitioners; concepts and energy related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes with conceptual foundations and practical projects implementations. Also, it is intended for graduate students working on their thesis and in need of specific knowledge on WSNs and the related energy harvesting and management techniques. Moreover, it is targeting researchers and practitioners interested in features and applications of WSNs, and on the available energy harvesting and management projects and testbeds. Exercises at the end of each chapter are not just questions and answers; they are not limited to recapitulate ideas. Their design objective is not bound to be a methodical review of the provided concepts, but rather as a motivator for lot more of searching, finding, and comparing beyond what has been presented in the book.
The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.
William Bainbridge takes an in-depth look at the fantasy religions that exist in 34 different massively multiplayer online roleplaying games. He categorizes the religions, noting similarities across the games. He points, for instance, to the prevalence of polytheism: a system which, Bainbridge argues, can function as an effective map of reality in which each deity personifies a concept. Religions are as much about conceptualizing the self as conceptualizing the sacred. Most games allow the players to have multiple avatars, an idea Bainbridge likens to contemporary scientific ideas about personality. He also focuses on sacred spaces; the prevalence of magic and its relationship to the computer program and programmer; the fostering of a tribal morality by both religion and rules programmed into the game; the rise of cults and belief systems within the game worlds (and how this relates to social science theories of cult formation in the real world); and, of course, how the gameworld religions depict death. As avatars are immortal, death is merely a minor setback in most games. At the same time, much of the action in some gameworlds centers on the issue of mortality and the problematic nature of resurrection. Bainbridge contends that gameworlds are giving us a new perspective on the human quest, one that combines the arts and simulates most aspects of real life. The quests in gameworlds also provide meaning for human action, in terms of narratives about achieving goals by overcoming obstacles. Perhaps meaning does not naturally exist in our universe, but must be created by us, both in our fantasies and in day-to-day life. Like the games analyzed in this book, he says, traditional religions are fantasies that should be respected as works of art in a future civilization of disbelief.
This book presents the selected peer-reviewed papers from the International Conference on Communication Systems and Networks (ComNet) 2019. Highlighting the latest findings, ideas, developments and applications in all areas of advanced communication systems and networking, it covers a variety of topics, including next-generation wireless technologies such as 5G, new hardware platforms, antenna design, applications of artificial intelligence (AI), signal processing and optimization techniques. Given its scope, this book can be useful for beginners, researchers and professionals working in wireless communication and networks, and other allied fields. |
You may like...
The Oxford Handbook of Cognitive Science
Susan E. F. Chipman
Hardcover
R4,682
Discovery Miles 46 820
Vrae & Antwoorde vir die Klaskamer Graad…
Marieta Nel, Rika Boucher, …
Paperback
Perspectives on Cognitive Science…
Janet Wiles, Terry Dartnall
Hardcover
Creativity, Spirituality, and…
Melvin E. Miller, Susanne R. Cook-Greuter
Hardcover
Rebel Ideas - The Power of Diverse…
Matthew Syed, Matthew Syed Consulting Ltd
Paperback
Skooluitgawe: Pad Na Jou Hart - 'n…
Ivan Botha, Donnalee Roberts
Paperback
R185
Discovery Miles 1 850
|