![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication (CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is new, relevant, and cutting edge in the areas of CMC and social media, authors critically explore topics ranging from social media theories to civil rights. Divided into three parts, the handbook begins with theory and methods, which sets the foundation for the text and then moves into the applicability of strategy, tactics, and measurement. The final focus is toward the future of CMC and social media and its impact on the study and practice of communication. Uniquely relating social media communication research to its computer-mediated communication foundation, as well as digital and emerging media trends, this handbook is an indispensable resource whether you're a graduate student or a seasoned practitioner.
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, in Neos Marmaras, Greece, in June 2020: the 9th Mining Humanistic Data Workshop, MHDW 2020, and the 5th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2020.* The 6 full papers and 3 short papers presented at MHDW 2020 were carefully reviewed and selected from 16 submissions; out of the 23 papers submitted to 5G-PINE 2020, 11 were accepted as full papers and 1 as a short paper. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and deal with topics such as the Internet of Things, intelligence fusion in 5G networks, and 5G media. *The workshops were held virtually due to the COVID-19 pandemic.
This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes. Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book. This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well.
The goal of this textbook is to provide enough background into the inner workings of the Internet to allow a novice to understand how the various protocols on the Internet work together to accomplish simple tasks, such as a search. By building an Internet with all the various services a person uses every day, one will gain an appreciation not only of the work that goes on unseen, but also of the choices made by designers to make life easier for the user. Each chapter consists of background information on a specific topic or Internet service, and where appropriate a final section on how to configure a Raspberry Pi to provide that service. While mainly meant as an undergraduate textbook for a course on networking or Internet protocols and services, it can also be used by anyone interested in the Internet as a step-by-step guide to building one's own Intranet, or as a reference guide as to how things work on the global Internet
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
In the late 1990s, AI witnessed an increasing use of the term 'argumentation' within its bounds: in natural language processing, in user interface design, in logic programming and nonmonotonic reasoning, in Al's interface with the legal community, and in the newly emerging field of multi-agent systems. It seemed to me that many of these uses of argumentation were inspired by (of ten inspired) guesswork, and that a great majority of the AI community were unaware that there was a maturing, rich field of research in Argumentation Theory (and Critical Thinking and Informal Logic) that had been steadily re building a scholarly approach to the area over the previous twenty years or so. Argumentation Theory, on its side; was developing theories and approaches that many in the field felt could have a role more widely in research and soci ety, but were for the most part unaware that AI was one of the best candidates for such application."
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
From theory to application, this book presents research on biologically and brain-inspired networking and machine learning based on Yuragi, which is the Japanese term describing the noise or fluctuations that are inherently used to control the dynamics of a system. The Yuragi mechanism can be found in various biological contexts, such as in gene expression dynamics, molecular motors in muscles, or the visual recognition process in the brain. Unlike conventional network protocols that are usually designed to operate under controlled conditions with a predefined set of rules, the probabilistic behavior of Yuragi-based control permits the system to adapt to unknown situations in a distributed and self-organized manner leading to a higher scalability and robustness.The book consists of two parts. Part 1 provides in four chapters an introduction to the biological background of the Yuragi concept as well as how these are applied to networking problems. Part 2 provides additional contributions that extend the original Yuragi concept to a Bayesian attractor model from human perceptual decision making. In the six chapters of the second part, applications to various fields in information network control and artificial intelligence are presented, ranging from virtual network reconfigurations, a software-defined Internet of Things, and low-power wide-area networks. This book will benefit those working in the fields of information networks, distributed systems, and machine learning who seek new design mechanisms for controlling large-scale dynamically changing systems.
"Pro Java EE 5 Performance Management and Optimization" features proven methodology to guarantee top-performing Java EE 5 applications, and explains how to measure performance in your specific environment. The book also details performance integration points throughout the development and deployment lifecycles that are crucial for application success. For QA and preproduction stages, this book guides you through testing and optimally deploying your Java EE 5 applications, with a focus on assessing capacity and discovering saturation points. It defines the concept and application of wait-based tuningone of the most effective approaches to application server tuning. The book also helps you assess and improve the health of your applications upon deployment. The topics covered include trending, forecasting, and capacity assessing and planning. When production issues arise, youll be armed with troubleshooting methodology and solutions to common problems that have been observed in real-world environments. This book even guides you through the creation of a formal Java EE 5 Performance Management Plancustomized to your environment to help you interpret and react to changing trends in usage patterns.
Der Domainname ist SchlA1/4ssel und AushAngeschild jeder Website. Je durchdachter die Wahl der Domain, um so besser die Kommunikation. Dieses Buch bietet einen Rundum-Service: ausgehend von der Bedeutung eines guten Domain-Namens bis hin zu Suche, Registrierung, Handel, Rechtsfragen und Zukunftsprognosen soll das BewuAtsein fA1/4r den Domain-Namen als Grundlage von Marketingstrategien im Internet geschArft werden. Das Buch bietet auAerdem eine Basis fA1/4r das Management von Domain-Portfolios und richtet sich an Internetverantwortliche in Unternehmen ebenso wie an AnwAlte mit Schwerpunkt Online-Recht.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
Enterprise Architecture, Integration, and Interoperability and the Networked enterprise have become the theme of many conferences in the past few years. These conferences were organised by IFIP TC5 with the support of its two working groups: WG 5. 12 (Architectures for Enterprise Integration) and WG 5. 8 (Enterprise Interoperability), both concerned with aspects of the topic: how is it possible to architect and implement businesses that are flexible and able to change, to interact, and use one another's s- vices in a dynamic manner for the purpose of (joint) value creation. The original qu- tion of enterprise integration in the 1980s was: how can we achieve and integrate - formation and material flow in the enterprise? Various methods and reference models were developed or proposed - ranging from tightly integrated monolithic system - chitectures, through cell-based manufacturing to on-demand interconnection of bu- nesses to form virtual enterprises in response to market opportunities. Two camps have emerged in the endeavour to achieve the same goal, namely, to achieve interoperability between businesses (whereupon interoperability is the ability to exchange information in order to use one another's services or to jointly implement a service). One school of researchers addresses the technical aspects of creating dynamic (and static) interconnections between disparate businesses (or parts thereof).
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures. The objectives of level 4 and level 5 autonomous driving require colossal improvement in the computing for this cyber-physical system. Beginning with a definition of computing systems for autonomous driving, this book introduces promising research topics and serves as a useful starting point for those interested in starting in the field. In addition to the current landscape, the authors examine the remaining open challenges to achieve L4/L5 autonomous driving. Computing Systems for Autonomous Driving provides a good introduction for researchers and prospective practitioners in the field. The book can also serve as a useful reference for university courses on autonomous vehicle technologies.
This title instructs the reader how to script dynamic web pages using the popular jQuery JavaScript library, giving complete examples that illustrate each aspect with colourised source code.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.
This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, Model-View-Controller architecture by using Spring JPA, JSPs, and Spring MVC controllers. These three technologies use Java, so that a student with a background in programming will be able to master them with ease, with the end result of being able to create web applications that use MVC, validate user input,and save data to a database. Topics and features: * Presents web development topics in an accessible, easy-to-follow style, focusing on core information first, and allowing the reader to gain basic understanding before moving forwards * Contains many helpful pedagogical tools for students and lecturers, such as questions and exercises at the end of each chapter, detailed illustrations, chapter summaries, and a glossary * Uses existing powerful technologies that are freely available on the web to speed up web development, such as Spring Boot, Spring MVC, Spring JPA, Hibernate, JSP, JSTL, and Java 1.8 * Discusses HTML, HTML forms, and Cascading Style Sheets * Starts with the simplest technology for web development (JSP) and gradually introduces the reader to more complex topics * Introduces core technologies from the outset, such as the Model-View-Controller architecture * Includes examples for accessing common web services * Provides supplementary examples and tutorials
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book addresses the Internet of Things (IoT), an essential topic in the technology industry, policy, and engineering circles, and one that has become headline news in both the specialty press and the popular media. The book focuses on energy efficiency concerns in IoT and the requirements related to Industry 4.0. It is the first-ever "how-to" guide on frequently overlooked practical, methodological, and moral questions in any nations' journey to reducing energy consumption in IoT devices. The book discusses several examples of energy-efficient IoT, ranging from simple devices like indoor temperature sensors, to more complex sensors (e.g. electrical power measuring devices), actuators (e.g. HVAC room controllers, motors) and devices (e.g. industrial circuit-breakers, PLC for home, building or industrial automation). It provides a detailed approach to conserving energy in IoT devices, and comparative case studies on performance evaluation metrics, state-of-the-art approaches, and IoT legislation.
Machine learning has become an integral part of many commercial applications and research projects, but this field is not exclusive to large companies with extensive research teams. If you use Python, even as a beginner, this book will teach you practical ways to build your own machine learning solutions. With all the data available today, machine learning applications are limited only by your imagination. You'll learn the steps necessary to create a successful machine-learning application with Python and the scikit-learn library. Authors Andreas Muller and Sarah Guido focus on the practical aspects of using machine learning algorithms, rather than the math behind them. Familiarity with the NumPy and matplotlib libraries will help you get even more from this book. With this book, you'll learn: Fundamental concepts and applications of machine learning Advantages and shortcomings of widely used machine learning algorithms How to represent data processed by machine learning, including which data aspects to focus on Advanced methods for model evaluation and parameter tuning The concept of pipelines for chaining models and encapsulating your workflow Methods for working with text data, including text-specific processing techniques Suggestions for improving your machine learning and data science skills
|
You may like...
Mem-elements for Neuromorphic Circuits…
Christos Volos, Viet-Thanh Pham
Paperback
R3,613
Discovery Miles 36 130
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
Developmental Neuropsychology - A…
Vicki Anderson, Elisabeth Northam, …
Paperback
R1,343
Discovery Miles 13 430
The Oxford Handbook of Hoarding and…
Randy O. Frost, Gail Steketee
Hardcover
R5,137
Discovery Miles 51 370
|