![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.
This book makes the case that the changes brought about by the connectivity of the Internet have so transformed the nature of post secondary learning that we need to view it differently. Both the content and the processes of learning have been profoundly altered because of the accessibility of information and the multi-way interactivity provided by the Internet. We call this new phenomenon 'the Connecticon' - which encompasses the paradigm created by the infrastructure, the content, the multiple connection devices of the Web, as well as by the hyper-interactivity of the connected generation for whom attention is the new ourrency. It is the aim of this book to identify and document the Connecticon - its nature, its impact and its implications. We will do this in the broad domain of learning, though a similar study could be carried out in commercial, social or political fields.
This proceedings is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. The book presents the refereed conference papers from the 7th International Conference on COINs, October 8-9, 2019, in Warsaw, Poland. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs19 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This book is the world's first book on 6G Mobile Wireless Networks that aims to provide a comprehensive understanding of key drivers, use cases, research requirements, challenges and open issues that are expected to drive 6G research. In this book, we have invited world-renowned experts from industry and academia to share their thoughts on different aspects of 6G research. Specifically, this book covers the following topics: 6G Use Cases, Requirements, Metrics and Enabling Technologies, PHY Technologies for 6G Wireless, Reconfigurable Intelligent Surface for 6G Wireless Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless, Challenges in Transport Layer for Tbit/s Communications, High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native Approach for 6G Wireless Networks, Machine Type Communications in 6G, Edge Intelligence and Pervasive AI in 6G, Blockchain: Foundations and Role in 6G, Role of Open-source Platforms in 6G, and Quantum Computing and 6G Wireless. The overarching aim of this book is to explore the evolution from current 5G networks towards the future 6G networks from a service, air interface and network perspective, thereby laying out a vision for 6G networks. This book not only discusses the potential 6G use cases, requirements, metrics and enabling technologies, but also discusses the emerging technologies and topics such as 6G PHY technologies, reconfigurable intelligent surface, millimeter-wave and THz communications, visible light communications, transport layer for Tbit/s communications, high-capacity backhaul connectivity, cloud native approach, machine-type communications, edge intelligence and pervasive AI, network security and blockchain, and the role of open-source platform in 6G. This book provides a systematic treatment of the state-of-the-art in these emerging topics and their role in supporting a wide variety of verticals in the future. As such, it provides a comprehensive overview of the expected applications of 6G with a detailed discussion of their requirements and possible enabling technologies. This book also outlines the possible challenges and research directions to facilitate the future research and development of 6G mobile wireless networks.
Sie haben ein Unternehmen gegrA1/4ndet und Ihre Website geht demnAchst online? Sie sind gerA1/4stet fA1/4r zahlreiche Besucher und hoffen auf hohe UmsAtze? Dann ist es Zeit fA1/4r das Feintuning. Dieses Buch zeigt Ihnen, wie Ihre Website von Google besser gefunden wird und wie Sie bei Google ganz nach oben kommen. Finden Sie die richtigen Suchbegriffe und stimmen Sie Ihre Inhalte darauf ab, optimieren Sie Ihre Snippets und unterstA1/4tzen Sie den Google-Crawler beim Erfassen der Seiten. Zahlreiche Beispiele und Anekdoten aus der Praxis sorgen nicht nur fA1/4r ein gutes Ranking, sondern auch fA1/4r SpaA beim Lesen.
This book presents selected papers from the International Conference on Computing, Communication, Electrical and Biomedical Systems (ICCCEBS 2021), held in March 2021 at KPR College of Engineering and Technology, Coimbatore, Tamil Nadu, India. The conference explores the interface between industry and real-time environments with newly developed techniques in computing and communications engineering. The papers describe results of conceptual, constructive, empirical, experimental, and theoretical work in areas of computing, communication, electrical, and biomedical systems. Contributors include academic scientists, researchers, industry representatives, postdoctoral fellows, and research scholars from around the world.
The book provides a systematic and in-depth introduction to distributed event-triggered cooperative control for multi-agent systems from a theoretical perspective, which will be of particular interest to the readers. The included major research topics include: a unified design and analysis framework for centralized, clustered and distributed event-triggered schemes; fully distributed design for event/self-triggered schemes; resilient event-triggered control under malicious attacks; and various methods to aovid Zeno behavior. The comprehensive and systematic treatment of event-triggered communication and control in multi-agent system is one of the major features of the book, which is particularly suited for readers who are interested in learning principles and methods to deal with communication constraints in multi-agent systems and to design energy-saving control protocols. The book can benefit researchers, engineers, and graduate students in the fields of complex networks, smart grids, applied mathematics, electrical and electronic engineering, and computer engineering, etc.
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide. It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the Internet, plus short articles to explain more complex topics. Covering both business-related and technology terms, you'll never fall victim to fuzzy thinking again. Fully updated to cover new and emerging areas such as wireless and mobile technologies, this new edition will be your constant companion. No need to risk disastrous misinterpretation when you can have total accuracy at your fingertips.
This book is devoted to the investigation of the main issues related to the sustainable realization of tele-laboratories, where real and virtual instrumentation can be shared and used in a collaborative environment. The book contains peer reviewed chapters and each presents a self-contained treatment within a framework providing an up-to-date picture of the state-of-the-art and of the most recent developments of this multi-faceted topic.
Spring Security in Action shows you how to use Spring Security to create applications you can be confident will withstand even the most dedicated attacks. Starting with essential "secure by design" principles, you'll learn common software vulnerabilities and how to avoid them right from the design stage. Through hands-on projects, you'll learn to manage system users, configure secure endpoints, and use, OAuth2 and OpenID Connect for authentication and authorization. As you go, you'll learn how to adapt Spring Security to different architectures, such as configuring Spring Security for Reactive applications and container-based applications orchestrated with Kubernetes. When you're done, you'll have a complete understanding of how to use Spring Security to protect your Java enterprise applications from common threats and attacks. Key Features * The principles of secure by design * The architecture of Spring Security * Spring Security contracts for password encoding, cryptography, and authentication * Applying Spring Security to different architecture styles For experienced Java developers with knowledge of other Spring tools. About the technology Your applications, along with the data they manage, are one of your organization's most valuable assets. No company wants their applications easily cracked by malicious attackers or left vulnerable by avoidable errors. The specialized Spring Security framework reduces the time and manpower required to create reliable authorization, authentication, and other security features for your Java enterprise software. Thanks to Spring Security, you can easily bake security into your applications, from design right through to implementation. Laurentiu Spilca is a dedicated development lead and trainer at Endava, where he leads the development of a project in the financial market of European Nordic countries. He has over ten years experience as a Java developer and technology teacher.
This book features the proceedings of the 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2021). The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on technologies from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform.
Michael Strobel worked for several years as a software engineer and consultant in the German IT industry before joining IBM Research in Switzerland, where he developed his interest in support for negotiations in electronic markets. During his career in research, he has published several articles on this topic in major international conferences and journals and received a PhD from the University of St.Gallen, Switzerland. Based on his experiences and contributions, the author discusses electronic negotiation technologies - key ingredients for the next generation of electronic markets - from a scientific as well as a practitioner's perspective. He reviews the state-of-the-art and then introduces novel support mechanisms and design elements, which are applied in a number of case studies. This book is geared towards technicians interested in E-Commerce application development but also offers extensive background reading for educational purposes. "
This second book by the author on WSNs focuses on the concepts of energy, and energy harvesting and management techniques. Definitions and terminologies are made clear without leaning on the relaxing assumption that they are already known or easily reachable, the reader is not to be diverted from the main course. Neatly drawn figures assist in viewing and imagining the offered topics. To make energy related topics felt and seen, the adopted technologies as well as their manufacturers are presented in details. With such a depth, this book is intended for a wide audience, it is meant to be helper and motivator, for the senior undergraduates, postgraduates, researchers, and practitioners; concepts and energy related applications are laid out, research and practical issues are backed by appropriate literature, and new trends are put under focus. For senior undergraduate students, it familiarizes with conceptual foundations and practical projects implementations. Also, it is intended for graduate students working on their thesis and in need of specific knowledge on WSNs and the related energy harvesting and management techniques. Moreover, it is targeting researchers and practitioners interested in features and applications of WSNs, and on the available energy harvesting and management projects and testbeds. Exercises at the end of each chapter are not just questions and answers; they are not limited to recapitulate ideas. Their design objective is not bound to be a methodical review of the provided concepts, but rather as a motivator for lot more of searching, finding, and comparing beyond what has been presented in the book.
As a foreword, here we publish an email letter of Late Professor Herb Simon, Nobel Laureate, that he wrote on the occasion ofthe death of the fatherofa friend. This letterofcondolence, more than any other wisdom, tells about the essence of the process of scientific creation, which is so important for both, the specific subject being covered by this book, and for the general science. When asked to address an SSGRR conference in Italy, prior to his death, Professor Herb Simon agreed that these lines be presented to all those who are interested in understanding the real essence oftheir own scientific struggle. Dear Professor Milutinovic: I want to extend my deepest sympathy to you and your family on the death of your father. His career was a very distinguished one, and his life spanned a most complex and difficult sequence of epochs in your country's history. Our generation (I am just a year younger than he was), like all its predecessors, leaves many tasks - hopefully no more than it inherited - for the next generation to take up; but even knowing that it must be so does not remove one's senseofloss in the parting.
Social media has come to deeply penetrate our lives: Facebook, YouTube, Twitter and many other platforms define many of our daily habits of communication and creative production. The Culture of Connectivity studies the rise of social media in the first decade of the twenty-first century up until 2012, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Such history is needed to understand how these media have come to profoundly affect our experience of online sociality. The first stage of their development shows a fundamental shift. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Author and media scholar Jose van Dijck offers an analytical prism to examine techno-cultural as well as socio-economic aspects of this transformation. She dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecology of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, and filtering content rely on shared ideological principles. At the level of management and organization, we can also observe striking similarities between these platforms' shifting ownership status, governance strategies, and business models. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization, the author argues, is part of a larger political and ideological battle over information control in an online world where everything is bound to become social. Crossing lines of technological, historical, sociological, and cultural inquiry, The Culture of Connectivity will reshape the way we think about interpersonal connection in the digital age.
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.
William Bainbridge takes an in-depth look at the fantasy religions that exist in 34 different massively multiplayer online roleplaying games. He categorizes the religions, noting similarities across the games. He points, for instance, to the prevalence of polytheism: a system which, Bainbridge argues, can function as an effective map of reality in which each deity personifies a concept. Religions are as much about conceptualizing the self as conceptualizing the sacred. Most games allow the players to have multiple avatars, an idea Bainbridge likens to contemporary scientific ideas about personality. He also focuses on sacred spaces; the prevalence of magic and its relationship to the computer program and programmer; the fostering of a tribal morality by both religion and rules programmed into the game; the rise of cults and belief systems within the game worlds (and how this relates to social science theories of cult formation in the real world); and, of course, how the gameworld religions depict death. As avatars are immortal, death is merely a minor setback in most games. At the same time, much of the action in some gameworlds centers on the issue of mortality and the problematic nature of resurrection. Bainbridge contends that gameworlds are giving us a new perspective on the human quest, one that combines the arts and simulates most aspects of real life. The quests in gameworlds also provide meaning for human action, in terms of narratives about achieving goals by overcoming obstacles. Perhaps meaning does not naturally exist in our universe, but must be created by us, both in our fantasies and in day-to-day life. Like the games analyzed in this book, he says, traditional religions are fantasies that should be respected as works of art in a future civilization of disbelief.
This book presents the selected peer-reviewed papers from the International Conference on Communication Systems and Networks (ComNet) 2019. Highlighting the latest findings, ideas, developments and applications in all areas of advanced communication systems and networking, it covers a variety of topics, including next-generation wireless technologies such as 5G, new hardware platforms, antenna design, applications of artificial intelligence (AI), signal processing and optimization techniques. Given its scope, this book can be useful for beginners, researchers and professionals working in wireless communication and networks, and other allied fields.
A new manifesto for the working woman, full of practical tips for making the most of your earnings as well as inspiration for harnessing the freedom and power that come with financial independence. In Think Like a Breadwinner, financial expert Jennifer Barrett dismantles the narrative that women don't - and shouldn't - take full control of their finances to create the lives they want for themselves. Featuring a wide variety of case studies from women at all stages of their careers and financial lives, Barrett shares the secrets of women who already think like breadwinners. Practical and empowering, this book includes advice on: - Changing how you think about money - Asking for promotions and raises at work - Saving and investing your money - How to combine breadwinning and parenting - Prioritising your future Perfect for anyone who thinks they're 'no good with money', Think Like a Breadwinner will show you that no matter your circumstances, you can set yourself up for financial security.
As today's most complex computing environment, the Internet confronts IT researchers, system designers, and application developers with completely new challenges and, as a fascinating new computing paradigm, agent technology has recently attracted broad interest and strong hopes for shaping the future information society. Relating both, the Internet and agents, opens up a whole new range of advanced applications in vibrant subfields of information technology such as middleware, mobile commerce, e-learning, collaborative working, and intelligent information services. Many modern advanced systems are likely to exploit Internet agents - and exploiting Internet agents mostly means dealing with coordination models and technologies of various sorts. This monograph-like anthology is the first systematic guide to models and enabling technologies for the coordination of intelligent agents on the Internet and respective applications.
The wireless mobile Internet is not just an extension of the Internet into the mobile environment - giving users access to Internet services while they are on the move. It is about integrating the Internet and other telecommunications technologies into a single system that delivers all the communications services that human beings require. The Wireless Mobile Internet - Architectures, Protocols, and Services is the first complete reference on the wireless Internet. It elegantly bridges the literary gap that exists between cellular wireless and computer communications. The author summarises the relevant standards activities (including the current status of wireless IP), provides updates on state-of-the-art technologies and protocols, describes various network models in detail and suggests specific techniques for implementing services. Key features include:
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, in Neos Marmaras, Greece, in June 2020: the 9th Mining Humanistic Data Workshop, MHDW 2020, and the 5th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2020.* The 6 full papers and 3 short papers presented at MHDW 2020 were carefully reviewed and selected from 16 submissions; out of the 23 papers submitted to 5G-PINE 2020, 11 were accepted as full papers and 1 as a short paper. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and deal with topics such as the Internet of Things, intelligence fusion in 5G networks, and 5G media. *The workshops were held virtually due to the COVID-19 pandemic.
Jackie Phamotse digs deep into the climate of law and policy in the social media landscape. After a David and Goliath social media legal battle that saw many take note tweeting about her, the result is a brace, thought-provoking and remarkably detailed social media guide and personal narrative. A first-hand approach on beating public humiliation and cyber victimization, Phamotse combines personal anecdotes, hard data and compelling research to cut through an unjust system governed by the rich and famous. The author directly addresses the question of power and obsession related to social media influencers. Written with equal doses of humor, compassion and wisdom, I Tweet What I Like is an inspiring call to action, celebrating diversity and human potential. I Tweet What I Like will inspire you!
This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes. Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book. This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well. |
You may like...
The Oxford Handbook of Cognitive Science
Susan E. F. Chipman
Hardcover
R4,682
Discovery Miles 46 820
Biophysics Of Consciousness: A…
Roman R. Poznanski, Jack A. Tuszynski, …
Hardcover
R5,731
Discovery Miles 57 310
|