![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book addresses several aspects of environmental sustainability awareness and priorization, explores ways to use resources and processes more responsibly, and describes the strategies, models and tools required to overcome various challenges. Sustainable and green IT are used to minimize the current ICT recycling problems which are harming our planet. The book discusses the new green information technologies as alternatives to conventional ICT, which have significantly harmed nature, and examines how to make recent technologies such as cloud computing; social networking; smart technology; blockchains, IoT (internet-of-things); and big data sustainable. Exploring sustainability awareness and importance among individuals and organizations in the developed and developing countries, most of the contributions conclude that sustainability should be considered a duty in order to change mindsets, attitudes and actions so as to preserve our planet. Furthermore, it examines the green information technology strategies and models.
Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.
There is no shortage of strategic reasons for taking partnering seriously in today’s converging and colliding marketplace. However, there certainly is a lack of credible explanations as to why so many fail. This book provides the ingredients for successful business partnerships. It identifies the value that effective partnerships can generate, the reasons why so many run into difficulties, and the imperatives for leaders who want to make partnering work in a globalized, digital world. A powerful series of insights into one of the major issues of our time: how to create a partnership that generates innovation and other key advantages. Original, perceptive, wise and easy to read. –Dr Charles Hampden-Turner, Cambridge University, Judge Institute of Management Studies Deering and Murphy have written with great clarity and insight on a difficult subject. Partnering will continue to grow in importance as firms shrink in size and look outside their boundaries for some of their critical resources. This book offers clear and practical guidelines for the manager who has to grapple with the multilevel and multicultural complexities of the partnering process. I highly recommend it. –Max Boisot, Snider Center for Entrepreneurial Research, Wharton Business School
The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 - 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
As a software engineer, you'll encounter countless programming challenges that initially seem confusing, difficult, or even impossible. Don't despair! Many of these "new" problems already have well-established solutions. Advanced Algorithms and Data Structures teaches you powerful approaches to a wide range of tricky coding challenges that you can adapt and apply to your own applications. Providing a balanced blend of classic, advanced, and new algorithms, this practical guide upgrades your programming toolbox with new perspectives and hands-on techniques. about the technology Data structures and algorithms are the foundations for how programs store and process information. Choosing the optimal algorithms ensures that your programs are fast, efficient, and reliable. about the book Algorithms and Data Structures in Action expands on the basic algorithms you already know to give you a better selection of solutions to different programming problems. In it, you'll discover techniques for improving priority queues, efficient caching, clustering data, and more. Each example is fully illustrated with graphics, language agnostic pseudo-code, and code samples in various languages. When you're done, you will be able to implement advanced and little-known algorithms to deliver better performance from your code. what's inside Improving on basic data structures Efficient caching Nearest neighbour search, including k-d trees and S-trees Full 'pseudo-code' and samples in multiple languages about the readerFor programmers with basic or intermediate skills. Written in a language-agnostic manner, no specific language knowledge is required. about the author Marcello La Rocca is a research scientist and a full-stack engineer focused on optimization algorithms, genetic algorithms, machine learning and quantum computing. He has contributed to large-scale web applications at companies like Twitter and Microsoft, has undertaken applied research in both academia and industry, and authored the Neatsort adaptive sorting algorithm.
Proven Patterns for Designing Evolvable High-Quality APIs--For Any Domain, Technology, or Platform APIs enable breakthrough innovation and digital transformation in organizations and ecosystems of all kinds. To create user-friendly, reliable and well-performing APIs, architects, designers, and developers need expert design guidance. This practical guide cuts through the complexity of API conversations and their message contents, introducing comprehensive guidelines and heuristics for designing APIs sustainably and specifying them clearly, for whatever technologies or platforms you use. In Patterns for API Design: Simplifying Integration with Loosely Coupled Message Exchanges, five expert architects and developers cover the entire API lifecycle, from launching projects and establishing goals through defining requirements, elaborating designs, planning evolution, and creating useful documentation. They crystallize the collective knowledge of many practitioners into 44 API design patterns, consistently explained with context, pros and cons, conceptual solutions, and concrete examples. To make their pattern language accessible, they present a domain model, a running case study, decision narratives with pattern selection options and criteria, and walkthroughs of real-world projects applying the patterns in two different industries. Identify and overcome API design challenges with patterns Size your endpoint types and operations adequately Design request and response messages and their representations Refine your message design for quality Plan to evolve your APIs Document and communicate your API contracts Combine patterns to solve real-world problems and make the right tradeoffs "This book provides a healthy mix of theory and practice, containing numerous nuggets of deep advice but never losing the big picture . . . grounded in real-world experience and documented with academic rigor applied and practitioner community feedback incorporated. I am confident that [it] will serve the community well, today and tomorrow." --Prof. Dr. Dr. h. c. Frank Leymann, Managing Director, Institute of Architecture of Application Systems, University of Stuttgart
Communications and Controls in Cyber Physical Systems: Theory, Design and Applications in Smart Grids provides readers with all they need to know about cyber physical systems (CPSs), such as smart grids, which have attracted intensive studies in recent years. Communications and controls are of key importance for maintaining and stabilizing the operation of the physical dynamics in these complicated systems. This book presents a systematic treatment on the communication and control aspects of CPSs, along with applications to the smart grid in four parts, including the basics of CPS, communications and controls, an explanation of the integration with CPS, coverage of controls with information constraints in CPS, and an applications oriented focus on smart grids as a CPS. Drawing upon years of practical experience and using numerous examples and illustrations, the authors' discuss key communication and controls design methods that can be integrated into a CPS, how communication and control schemes can be applied in practical systems such as smart grids, new directions and approaches for traditional engineers and researchers in communications, and controls and power systems as they relates to CPSs.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
This book systematically presents the wireless sensing technology, which has become a promising sensing paradigm in recent years. It includes the introduction of underlying sensing principles, wireless signals, sensing methodologies and enabled applications. Meanwhile, it provides case studies to demonstrate how wireless sensing is applied for representative human and object sensing applications. This book also provides a wireless sensing framework as a guidance to understand and design a wireless sensing system or prototype based on their needs. It also presents a critical investigation of the challenges in achieving wireless sensing in both signal-level and application-level contexts. Accordingly, it summarizes the typical solutions to tackle the related challenges. Researchers and advanced-level students in computer science or electrical engineering working on the design of a wireless system will find this book useful as a reference. Professionals working in the wireless sensing industry will also find this book valuable as a reference tool.
This book presents MOSFET-based current mode logic (CML) topologies, which increase the speed, and lower the transistor count, supply voltage and power consumption. The improved topologies modify the conventional PDN, load, and the current source sections of the basic CML gates. Electronic system implementation involves embedding digital and analog circuits on a single die shifting towards mixed-mode circuit design. The high-resolution, low-power and low-voltage analog circuits are combined with high-frequency complex digital circuits, and the conventional static CMOS logic generates large current spikes during the switching (also referred to as digital switching noise), which degrade the resolution of the sensitive analog circuits via supply line and substrate coupling. This problem is exacerbated further with scaling down of CMOS technology due to higher integration levels and operating frequencies. In the literature, several methods are described to reduce the propagation of the digital switching noise. However, in high-resolution applications, these methods are not sufficient. The conventional CMOS static logic is no longer an effective solution, and therefore an alternative with reduced current spikes or that draws a constant supply current must be selected. The current mode logic (CML) topology, with its unique property of requiring constant supply current, is a promising alternative to the conventional CMOS static logic.
Understanding Decentralized Finance demystifies DeFi, locating the integration points between decentralised and centralized finance to help finance professionals unlock valuable opportunities. DeFi - the next evolution of cryptocurrency - has brought a new wave of investors into the world of finance. As fintechs and financial institutions seek to integrate with DeFi, this book explores its history, its present context, and its future. It explains the world of DeFi by comparing it to the traditional finance sector, highlighting points of similarity, difference and integration. Understanding Decentralized Finance explores the technologies underlying the DeFi market and how they differ from those of traditional financial markets. It scrutinizes the difference between centralized and decentralized cryptocurrency exchanges, how NFTs fit into DeFi and how collectibles can be financialized. Readers will also find out how collateralized loans, derivatives, margin trading and liquidity provision work in a world where there is no centralized institution to coordinate these activities - and how regulators in different jurisdictions are ensuring that financial regulations keep up with these innovations. With examples from key actors in the field, including the movement of luxury organizations like Christie's and Sotheby's into the NFT space and the SushiSwap vampire attack, this is an essential read for anyone working in finance, fintech and technology who needs to understand the fast-moving world of DeFi.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
This book constitutes the refereed proceedings of the 23rd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2022, held in Lisbon, Portugal, in September 2022. The 55 papers presented were carefully reviewed and selected from 119 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
This book is based on the authors' research on the stabilization and fault-tolerant control of batch processes, which are flourishing topics in the field of control system engineering. It introduces iterative learning control for linear/nonlinear single/multi-phase batch processes; iterative learning optimal guaranteed cost control; delay-dependent iterative learning control; and iterative learning fault-tolerant control for linear/nonlinear single/multi-phase batch processes. Providing important insights and useful methods and practical algorithms that can potentially be applied in batch process control and optimization, it is a valuable resource for researchers, scientists, and engineers in the field of process system engineering and control engineering.
Focusing on the two essential factors of the construction of risk, this book presents research revolving around the staging of and the coping with Internet addiction in China. Using ethnographic methods, it investigates the signs and treatment of Internet addiction and discusses the in-patient approaches used to help children overcome the addiction and to reduce the likelihood of relapse following discharge. Examining the individual level and broader social levels of the process as well as the links between the two, the findings provide valuable insights into the prevention and treatment of Internet addiction. To help readers better understand the signs of Internet addiction and preventive measures, the book addresses the following issues:Public concern and media coverage of Internet addiction in contemporary ChinaClinical assessment and risk factors of Internet addiction in adolescentsParent-narrated signs of Internet addiction in Chinese children and adolescentsCoping strategies and treatments for Internet addiction
An abundance of unique, interesting examples, use of the Unified Modeling Language throughout, and the newest Java 1.5 features characterize this text. Drake provides a concise and engaging introduction to Java and object-oriented programming, assuming familiarity with the basic control structures of Java or C and only a pre-calculus level of mathematics.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book shows you how to increase your web popularity, page rank, website visitor retention and internet sales through building backlinks, using link exchanges, search engine submissions, directory manual submissions, social media (i.e. RSS, forums, groups, blogging, vlogging, photoblogging, social networking sites (Facebook, MySpace etc), paid inclusion, pay-per-click, paid submissions, banner advertising, banner exchanges, news and PR article submissions, podcasting, doorway pages, referrals, affiliate networks and affiliation, eCourses, eBooks, foreign language search engines, free and low cost advertising websites, conventional marketing methods (such as, billboards, building wrapping, inflatables, vehicle wrapping, aerial banners, posters, radio and television), campaign monitoring, SEO campaign fine-tuning and more.
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary. Pattern Recognition Technologies and Applications: Recent Advances provides cutting-edge pattern recognition techniques and applications. Written by world-renowned experts in their field, this easy to understand book is a must have for those seeking explanation in topics such as on- and offline handwriting and speech recognition, signature verification, and gender classification.
This book provides insights into recent trends and innovation of technologies aiming to provide sustainable and energy efficient computing. The authors discuss approaches to provide solutions to real life societal issues and problems using sustainable and energy efficient computing approaches. The book gathers research and state of the art reviews on solutions for societal benefits by using sustainable approaches of computing. The book also intends to provide use-cases for certain real life societal problems. The book can be used by researchers of similar areas, technologists, environmentalists, educationists, research scholars and UG/PG Students as well.
Inspired by the success of their best-selling introductory programming text, Java Software Solutions, authors Lewis, DePasquale, and Chase now release Java Foundations, Third Edition. This text is a comprehensive resource for instructors who want a two-or three-semester introduction to programming textbook that includes detail on data structures topics. Java Foundations introduces a Software Methodology early on and revisits it throughout to ensure students develop sound program development skills from the beginning. Control structures are covered before writing classes, providing a solid foundation of fundamental concepts and sophisticated topics.
Three approaches can be applied to determine the performance of parallel and distributed computer systems: measurement, simulation, and mathematical methods. This book introduces various network architectures for parallel and distributed systems as well as for systems-on-chips, and presents a strategy for developing a generator for automatic model derivation. It will appeal to researchers and students in network architecture design and performance analysis.
Taking the reader on a journey through queer manifestations in games, this book advocates for video games as a rich, political and cultural medium, which provides us with tools to navigate the future of gaming. Situated at the intersection of New Media, Game, Cultural and Queer Studies, the book navigates diverse interspecies relationships, queer villains from the past, Pokemon memes on border politics, flanerie in post-industrial cities and one-sided erotic fights. It provides new critical engagements with the works of Jose Esteban Munoz, Bonnie Ruberg, Guy Debord and Jack Halberstam, examining queer representation, gaming subcultures and dissident play practices. Making the bold claim that video games might be the queerest medium today, this book provides organic, self-reflective and, ultimately, thought-provoking thinking in which both games and gamers are queered. This book will be of interest to scholars researching game studies, sex, gender and sexuality in new media, but also readers interested in literature, digital media, society, participatory culture and queer studies. |
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|