![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is currently feasible. Readers are also given a vision of what these technologies can be expected to produce in the near future. The topics are covered comprehensively by experts in respective areas. Each section includes an overview that puts the research topics in perspective and integrates the sections into an overview of how technology is evolving. The book represents the proceedings of the International Symposium on Sensor Networks, Systems and Security, August 31 - September 2, 2017, Lakeland Florida.
Whether you are just starting out in web development or you would like to update your existing skills, this book gets you off to a fast start! In fact, in just the first 6 chapters, you will learn more about web development than you can from most full books. By the end of this crash course, you will be developing web pages the professional way, with HTML or XHTML for the content and CSS for the formatting and page layout. That includes sophisticated page layouts that require the use of the box model, floating, and positioning. In section 2, you will learn all the other skills that you need for developing web pages. Those skills include how to develop forms that are submitted to web servers, how to add audio or video to a page, how to use a style sheet for printing, how to develop pages for mobile devices ...everything you need for modern web pages. You will also learn how to take your web pages to the next level by using tested JavaScript code for effects like image rollovers and slide shows. In the last section, now that you know how to develop web pages, you will learn how to design an entire web site using today's best practices. You will also learn how to deploy your web site, and how to get it into the major search engines and directories. When you are done, you will have all the perspective and skills you need to develop professional web pages.
Social Media: The Academic Library Perspective provides a step-by-step guide on social media as written by somebody who has already done the work. Made up of case studies written by authors at various institutions who provide different perspectives on their institution's use of social media, the book highlights successes and failures, while also focusing on tips for social media management in the academic library that anybody in the community can interpret and adapt. Social media platforms are dealt with systematically, making this an essential guide for librarians who want to use social media to the benefit of their library.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
Internet of Things: Technologies and Applications for a New Age of Intelligence outlines the background and overall vision for the Internet of Things (IoT) and Cyber-Physical Systems (CPS), as well as associated emerging technologies. Key technologies are described including device communication and interactions, connectivity of devices to cloud-based infrastructures, distributed and edge computing, data collection, and methods to derive information and knowledge from connected devices and systems using artificial intelligence and machine learning. Also included are system architectures and ways to integrate these with enterprise architectures, and considerations on potential business impacts and regulatory requirements. New to this edition: * Updated material on current market situation and outlook. * A description of the latest developments of standards, alliances, and consortia. More specifically the creation of the Industrial Internet Consortium (IIC) and its architecture and reference documents, the creation of the Reference Architectural Model for Industrie 4.0 (RAMI 4.0), the exponential growth of the number of working groups in the Internet Engineering Task Force (IETF), the transformation of the Open Mobile Alliance (OMA) to OMA SpecWorks and the introduction of OMA LightweightM2M device management and service enablement protocol, the initial steps in the specification of the architecture of Web of Things (WoT) by World Wide Consortium (W3C), the GS1 architecture and standards, the transformation of ETSI-M2M to oneM2M, and a few key facts about the Open Connectivity Forum (OCF), IEEE, IEC/ISO, AIOTI, and NIST CPS. * The emergence of new technologies such as distributed ledgers, distributed cloud and edge computing, and the use of machine learning and artificial intelligence for IoT. * A chapter on security, outlining the basic principles for secure IoT installations. * New use case description material on Logistics, Autonomous Vehicles, and Systems of CPS
Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.
This book constitutes the refereed proceedings of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, held virtually and in Hersonissos, Crete, Greece, in June 2021. The 50 full papers and 11 short papers presented were carefully reviewed and selected from 113 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: adaptive modeling/ neuroscience; AI in biomedical applications; AI impacts/ big data; automated machine learning; autonomous agents; clustering; convolutional NN; data mining/ word counts; deep learning; fuzzy modeling; hyperdimensional computing; Internet of Things/ Internet of energy; machine learning; multi-agent systems; natural language; recommendation systems; sentiment analysis; and smart blockchain applications/ cybersecurity. Chapter "Improving the Flexibility of Production Scheduling in Flat Steel Production Through Standard and AI-based Approaches: Challenges and Perspective" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
In order to establish technical prerequisites for efficient electronic business and education on the Internet, appropriate system support is needed as a vital condition for maximization of both short-term and long-term profits. Electronic Business and Education: Recent Advances in Internet Infrastructures discusses current research topics in the domain of system support for e-business and e-education on the Internet, and stresses the synergistic interaction of these two components. Attention is given to both scientific and engineering issues. Electronic Business and Education: Recent Advances in Internet Infrastructures is suitable as a secondary text for a graduate level course and as a reference for researchers and practitioners in industry, particularly in the area of e-business and e-education on the Internet. There is no longer any question that the Internet and electronic communication are the major new tools for collaborative advances in the creation of new knowledge and in future learning.' Excerpt from Foreword by Robert C. Richardson, Nobel Laureate 1996, Cornell University, USA
In the world of e-commerce, security has quickly become of paramount importance. This unique book provides an in-depth understanding of basic security problems and relevant e-commerce solutions. From designing secure Web, e-commerce, and mobile commerce applications to securing internal networks to providing secure employee/user authentication, this cutting-edge book gives professionals the tools they need to solve their e-commerce security problems.
This textbook grew out of notes for the ECE143 Programming for Data Analysis class that the author has been teaching at University of California, San Diego, which is a requirement for both graduate and undergraduate degrees in Machine Learning and Data Science. This book is ideal for readers with some Python programming experience. The book covers key language concepts that must be understood to program effectively, especially for data analysis applications. Certain low-level language features are discussed in detail, especially Python memory management and data structures. Using Python effectively means taking advantage of its vast ecosystem. The book discusses Python package management and how to use third-party modules as well as how to structure your own Python modules. The section on object-oriented programming explains features of the language that facilitate common programming patterns. After developing the key Python language features, the book moves on to third-party modules that are foundational for effective data analysis, starting with Numpy. The book develops key Numpy concepts and discusses internal Numpy array data structures and memory usage. Then, the author moves onto Pandas and details its many features for data processing and alignment. Because strong visualizations are important for communicating data analysis, key modules such as Matplotlib are developed in detail, along with web-based options such as Bokeh, Holoviews, Altair, and Plotly. The text is sprinkled with many tricks-of-the-trade that help avoid common pitfalls. The author explains the internal logic embodied in the Python language so that readers can get into the Python mindset and make better design choices in their codes, which is especially helpful for newcomers to both Python and data analysis. To get the most out of this book, open a Python interpreter and type along with the many code samples.
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
This newly revised edition of the highly successful 1997 book offers professionals and students an up-to-date, in-depth understanding of how payments are made electronically across the Internet. The second edition explores the very latest developments in this quickly expanding area, including the newest security techniques and methods, and features a completely new chapter on the exciting advances in mobile commerce. Pub 8/01.
Step into the Animus and prepare to be transported to the world of Assassin's Creed! With 40 recipes across ten full menus - each inspired by the times and places where the most famous Assassins lived and fought - you can relive the highlights of the Italian Renaissance, the French Revolution and even Victorian London. Follow Altair, Ezio, Arno, Evie, Jacob and all the Assassins of the Brotherhood while enjoying their most celebrated dishes: Masyaf Moutabel, Davenport Homestead Soup, Boston Apple Pie, Colonial Coleslaw, Meringues Mirabeau, Rooks' Bread Pudding and many more.
Full coverage of functional programming and all OCA Java Programmer exam objectives OCA, Oracle Certified Associate Java SE 8 Programmer I Study Guide, Exam 1Z0-808 is a comprehensive study guide for those taking the Oracle Certified Associate Java SE 8 Programmer I exam (1Z0-808). With complete coverage of 100% of the exam objectives, this book provides everything you need to know to confidently take the exam. The release of Java 8 brought the language's biggest changes to date, and for the first time, candidates are required to learn functional programming to pass the exam. This study guide has you covered, with thorough functional programming explanation and information on all key topic areas Java programmers need to know. You'll cover Java inside and out, and learn how to apply it efficiently and effectively to create solutions applicable to real-world scenarios. * Work confidently with operators, conditionals, and loops * Understand object-oriented design principles and patterns * Master functional programming fundamentals
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. Focusing on Facebook pages dedicated to hosting footage of street fights, brawls, and other forms of bareknuckle violence, Wood demonstrates that to properly grapple with antisocial media, we must address not only their content, but also their software. In doing so, this study goes a long way to addressing the fundamental question: how have social media changed the way we consume crime? Synthesizing criminology, media theory, software studies, and digital sociology, Antisocial Media is media criminology for the Facebook age. It is essential reading for students and scholars interested in social media, cultural criminology, and the crime-media interface.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
Get to know WordPress with this simple and approachable reference WordPress For Dummies, 9th Edition helps readers discover the power of the WordPress web content building tool. Web builders have created 75 million websites using WordPress and this book will show you how to add your blogs and websites to that count. WordPress For Dummies, 9th Edition drops you right into the fast lane to publishing your first website or blog by teaching you to: - Customize a theme - Create your first post - Use WordPress as a content management system - Work with multimedia formats - Add plugins to your site - Establish a publishing routine Perfect for new bloggers, experienced bloggers converting to WordPress for the first time, and people accustomed to WordPress who want to learn more about the full potential of the technology, WordPress for Dummies, 9th Edition is an indispensable addition to the library of every blogger and webmaster.
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, as well as future ecosystems. It examines the meaning, value and effect that IoT has had and may have on ordinary life, in business, on the battlefield, and with the rise of intelligent and autonomous systems. Based on an artificial intelligence (AI) perspective, this book addresses how IoE affects sensing, perception, cognition and behavior. Each chapter addresses practical, measurement, theoretical and research questions about how these "things" may affect individuals, teams, society or each other. Of particular focus is what may happen when these "things" begin to reason, communicate and act autonomously on their own, whether independently or interdependently with other "things".
A laugh-out-loud 'best of' selection of TommyInnit's most weird and wonderful quotes - plus much more - carefully selected to BLOW YOUR MIND by him and best friend Wilbur Soot. 'Nah, I think I'd be a pretty bad shark' 'What if God was just legs?' 'We're really just chilling, fellas' Born sometime in the early 2000s, TommyInnit's first job was a YouTuber. No, really, we're not joking, the very first job he had was a YouTuber. For the last three years, he's been mouthing off on the internet to anyone who will listen. So far, that's over 40 million followers. Will there ever be an end to TommyInnit's rampant flurry of success? Probably. And Wilbur Soot has been right by his side. Wilbur first started his career as a young man staring at the wall until he also became a YouTuber. He also discovered a little activity some may call 'singing'. In The Quote Book, TommyInnit covers a wealth of topics from cars-that-grow-teeth to slime people, and from things that be crazy to octopi. Curated and edited by Wilbur Soot, TommyInnit is about to change your life one word at a time. Unless, dear reader, you read two words at a time, like he does. Featuring: A day in the life Inside TommyInnit's brain What TommyInnit would do if he was God Life advice from Wilbur Love poetry and history lessons, TommyInnit style Wilbur's attempts to reason with TommyInnit
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 5th International Conference on ICT for Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24 July 2020. The conference provided a valuable forum for cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.
Is Your Company Getting the Most from Its Investment in Change? Many companies have already invested heavily in infrastructure change, some are making that investment now, and all are contemplating the costs of becoming or evolving as an e-business. Is your company a "greenfield" organization with no back-end systems, or one whose infrastructure support systems are integrated across the enterprise? Are you just beginning to think about e-business capabilities, or are you on the leading edge of convergence? Whatever your company’s position on the ERP/E-Business Matrix, E-Business and ERP: Transforming the Enterprise provides the proven techniques you need to know to meld enterprise resource planning capabilities with the communications power of the Internet. Is Your Company Positioned for E-Business Success? The Internet has revolutionized twenty-first century business. Organizations today can communicate with customers, suppliers, and sellers at e-speed with the click of a mouse. Yet, with all of the excitement about the external possibilities of the Internet, companies still need efficient internal processes to make and move products, manage finances, recruit and motivate employees, and excel. E-Business and ERP: Transforming the Enterprise covers the skills and tools you will need to combine existing ERP software and capabilities with emerging Web-based technologies. In this forward-thinking outline for a new business structure, executives and managers will discover:
The companies best positioned to succeed in the near future are those that can balance existing ERP-based infrastructures and capabilities with exciting new e-business innovations. E-Business and ERP: Transforming the Enterprise examines the changing but essential role of ERP, places it in the context of the Web-based technologies defining today’s e-business environment, and reveals how to blend the best aspects of both to create a strong and flexible twenty-first century business enterprise. |
You may like...
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
|