![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
Semantic web continues to be an increasingly important system for allowing end-users to share and communicate information online. Semantic Web: Ontology and Knowledge Base Enabled Tools, Services and Applications focuses on the information systems discipline and the tools and techniques utilized for the emerging use of semantic web. Covering topics on semantic search, ontologies, and recommendation systems, this publication is essential for academics, practitioners, and industry professionals.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January-1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyzykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event. The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. This book is designed to serve the computer science and the cybersecurity community including researchers, academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
Presents main concepts of mobile communication systems, both analog and digital Introduces concepts of probability, random variables and stochastic processes and their applications to the analysis of linear systems Includes five appendices covering Fourier series and transforms, GSM cellular systems and more
The present book highlights studies that show how smart cities promote urban economic development. The book surveys the state of the art of Smart City Economic Development through a literature survey. The book uses 13 in depth city research case studies in 10 countries such as the North America, Europe, Africa and Asia to explain how a smart economy changes the urban spatial system and vice versa. This book focuses on exploratory city studies in different countries, which investigate how urban spatial systems adapt to the specific needs of smart urban economy. The theory of smart city economic development is not yet entirely understood and applied in metropolitan regional plans. Smart urban economies are largely the result of the influence of ICT applications on all aspects of urban economy, which in turn changes the land-use system. It points out that the dynamics of smart city GDP creation takes 'different paths,' which need further empirical study, hypothesis testing and mathematical modelling. Although there are hypotheses on how smart cities generate wealth and social benefits for nations, there are no significant empirical studies available on how they generate urban economic development through urban spatial adaptation. This book with 13 cities research studies is one attempt to fill in the gap in knowledge base.
This volume describes the status of fractal imaging research and looks to future directions. It will be useful to researchers in the areas of fractal image compression, analysis, and synthesis, iterated function systems, and fractals in education. In particular it includes a vision for the future of these areas. It aims to provide an efficient means by which researchers can look back over the last decade at what has been achieved, and look forward towards second-generation fractal imaging. The articles in themselves are not meant to be detailed reviews or expositions, but to serve as signposts to the state of the art in their areas. What is important is what they mention and what tools and ideas are seen now to be relevant to the future. The contributors, a number of whom have been involved since the start, are active in fractal imaging, and provide a well-informed viewpoint on both the status and the future. Most were invited participants at a meeting on Fractals in Multimedia held at the IMA in January 2001. Some goals of the mini-symposium, shared with this volume, were to demonstrate that the fractal viewpoint leads to a broad collection of useful mathematical tools, common themes, new ways of looking at and thinking about existing algorithms and applications in multimedia, and to consider future developments. This book should be useful to commercial and university researchers in the rapidly evolving field of digital imaging, specifically, chief information officers, professors, software engineers, and graduate students in the mathematical sciences. While much of the content is quite technical, it contains pointers to the state-of-the-art and the future in fractal imaging.
Cooperative Computer-Aided Authoring and Learning: A Systems Approach describes in detail a practical system for computer assisted authoring and learning. Drawing from the experiences gained during the Nestor project, jointly run between the Universities of Karlsruhe, Kaiserslautern and Freiburg and the Digital Equipment Corp. Center for Research and Advanced Development, the book presents a concrete example of new concepts in the domain of computer-aided authoring and learning. The conceptual foundation is laid by a reference architecture for an integrated environment for authoring and learning. This overall architecture represents the nucleus, shell and common denominator for the R&D activities carried out. From its conception, the reference architecture was centered around three major issues: Cooperation among and between authors and learners in an open, multimedia and distributed system as the most important attribute; Authoring/learning as the central topic; Laboratory as the term which evoked the most suitable association with the envisioned authoring/learning environment. Within this framework, the book covers four major topics which denote the most important technical domains, namely: The system kernel, based on object orientation and hypermedia; Distributed multimedia support; Cooperation support, and Reusable instructional design support. Cooperative Computer-Aided Authoring and Learning: A Systems Approach is a major contribution to the emerging field of collaborative computing and is essential reading for researchers and practitioners alike. Its pedagogic flavor also makes it suitable for use as a text for a course on the subject.
Updated and Expanded for Python 3 It's easy to start developing programs with Python, which is why the language is so popular. However, Python's unique strengths, charms, and expressiveness can be hard to grasp, and there are hidden pitfalls that can easily trip you up. This second edition of Effective Python will help you master a truly "Pythonic" approach to programming, harnessing Python's full power to write exceptionally robust and well-performing code. Using the concise, scenario-driven style pioneered in Scott Meyers' best-selling Effective C++, Brett Slatkin brings together 90 Python best practices, tips, and shortcuts, and explains them with realistic code examples so that you can embrace Python with confidence. Drawing on years of experience building Python infrastructure at Google, Slatkin uncovers little-known quirks and idioms that powerfully impact code behavior and performance. You'll understand the best way to accomplish key tasks so you can write code that's easier to understand, maintain, and improve. In addition to even more advice, this new edition substantially revises all items from the first edition to reflect how best practices have evolved. Key features include 30 new actionable guidelines for all major areas of Python Detailed explanations and examples of statements, expressions, and built-in types Best practices for writing functions that clarify intention, promote reuse, and avoid bugs Better techniques and idioms for using comprehensions and generator functions Coverage of how to accurately express behaviors with classes and interfaces Guidance on how to avoid pitfalls with metaclasses and dynamic attributes More efficient and clear approaches to concurrency and parallelism Solutions for optimizing and hardening to maximize performance and quality Techniques and built-in modules that aid in debugging and testing Tools and best practices for collaborative development Effective Python will prepare growing programmers to make a big impact using Python.
Why should the digital bring about ideas of progress in the theatre arts? This question opens up a rich seam of provocative and original thinking about the uses of new media in theatre, about new forms of cultural practice and artistic innovation, and about the widening purposes of the theatre's cultural project in a changing digital world. Through detailed case-studies on the work of key international theatre companies such as the Elevator Repair Service and The Mission Business, Bill Blake explores how the digital is providing new scope for how we think about the theatre, as well as how the theatre in turn is challenging how we might relate to the digital.
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request phase in which a station reserves the communication channel and a transmission phase in which the actual data transmission takes place. Such procedures are often applied in communication networks that are characterised by a shared communication channel with large round-trip times. In this book, we propose queuing models for situations that require a reservation procedure and validate their applicability in the context of cable networks. We offer various mathematical models to better understand the performance of these reservation procedures. The book covers four key performance models, and modifications to these: Contention trees, the repairman model, the bulk service queue, and tandem queues. The relevance of this book is not limited to reservation procedures and cable networks, and performance analysts from a variety of areas may benefit, as all models have found application in other fields as well.
This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "Co-creating for Context in Prospective Transfer and Diffusion of IT" on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022. The 19 full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:
For the first time in history, the International Federation for Information Processing (IFIP) and the International Medical Informatics Association (IMIA) held the joint "E-Health" Symposium as part of "Treat IT" stream of the IFIP World Congress 2010 at Brisbane, Australia during September 22-23, 2010. IMIA is an independent organization established under Swiss law in 1989. The organization originated in 1967 from Technical Committee 4 of IFIP that is a n- governmental, non-profit umbrella organization for national societies working in the field of information processing. It was established in 1960 under the auspices of UNESCO following the First World Computer Congress held in Paris in 1959. Today, IFIP has several types of members and maintains friendly connections to specialized agencies of the UN system and non-governmental organizations. Technical work, which is the heart of IFIP's activity, is managed by a series of Technical Committees. Due to strong needs for promoting informatics in healthcare and the rapid progress of information and communication technology, IMIA President Reinhold Haux p- posed to strengthen the collaboration with IFIP. The IMIA General Assembly (GA) approved the move and an IMIA Vice President (VP) for special services (Hiroshi Takeda) was assigned as a liaison to IFIP at Brisbane during MEDINFO2007 where th the 40 birthday of IMIA was celebrated.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts. Winning the spot of #19 out of 26 on the 2020 Bookauthority Best New Industrial Management Books of All Time. Winning the spot of #3 out of 8 on the 2021 Bookauthority Best New Industrial Management Books to Read in 2021. Winning the spot of #5 out of 11 on the 2021 Bookauthority Best New Product Design Books to Read in 2021. 2020 Taylor & Francis Award Winner for Outstanding Professional Book! Product Lifecycle Management (PLM): A Digital Journey Using Industrial Internet of Things (IIot) provides a summary of the essential topics of Product Lifecycle Management (PLM) and the Industrial Internet of Things (IIoT) in the era of Industry 4.0. The book discusses emerging technologies, their contribution towards enhancing product design, development, and manufacturing. It also presents the integration of PLM, Enterprise Resource Planning (ERP), and Manufacturing Execution System (MES) along with IIoT as well the integration of mechanical, electronic components, embedded systems, firmware and software focusing on smart design, development, and manufacturing in the digital transformation journey. The book provides a high-level overview of how the smart product development through smart manufacturing materializes within the smart ecosystem. Manufacturing professionals, designers, mechanical, electrical, electronics, instrumentation and industrial engineers, information and communication technology consultants and those working in production planning, process control, and operations will find this book invaluable.
The Internet is quickly becoming a commonly used tool for business-customer interaction. Social media platforms that were once typically reserved for personal use are now becoming a vital part of a business's strategy. Maximizing Commerce and Marketing Strategies through Micro-Blogging examines the various methods and benefits of using micro-blogs within a business context, bringing together the best tools and tactics necessary to properly incorporate this approach. Highlighting current empirical research and insights from various disciplines, this book is an essential reference source for academics, graduate students, social media strategists, and business professionals interested in the positive use of social media in business environments.
This book takes a multidisciplinary approach to the question of esports and their role in society A diverse group of authors tackle the impact of esports and the ways in which it has grown within the entertainment industry around the world. Chapters offer a coherent response to the following questions: What role do esports play in the entertainment industry? What communication skills can be learned through esports? What do the media gain from broadcasting esports? What is the relationship between social networks and esports? What are the main marketing strategies used in esports? What effect does communicative globalization have on the development of esports? What is the relationship between merchandising and esports? What do communication experts think about esports? Offering clear insights into this rapidly developing area, this volume will be of great interest to scholars, students, and anyone working in game studies, new media, leisure, sport studies, communication studies, transmedia literacy, and digital culture
This book contributes to the scholarly debate on the forms and patterns of interaction and discourse in modern digital communication by probing some of the social functions that online communication has for its users. An array of experts and scholars in the field address a range of forms of social interaction and discourses expressed by users on social networks and in public media. Social functions are reflected through linguistic and discursive practices that are either those of 'convergence' or 'controversy' in terms of how the discourse participants handle interpersonal relations or how they construct meanings in discourses. In this sense, the book elaborates on some very central concerns in the area of digital discourse analysis that have been reported within the last decade from various methodological perspectives ranging from sociolinguistics and pragmatics to corpus linguistics. This edited collection will be of particular interest to scholars and students in the fields of digital discourse analysis, pragmatics, sociolinguistics, social media and communication, and media and cultural studies.
This book looks at the two most popular ways of using Java SE 6 to write 3D games on PCs: Java 3D (a high-level scene graph API) and JOGL (a Java layer over OpenGL). Written by Java gaming expert, Andrew Davison, this book will be first Java game book to market that uses the new Java (SE) 6 platform and its features including splash screens, scripting, and the desktop tray interface. This will be first and maybe only book to market that covers Java game development using the Java 3D API and Java for OpenGL, both critical components and libraries to Java-based 3D game application development.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
This book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management.
How is the internet changing the way you think? That is one of the dominant questions of our time, one which affects almost every aspect of our life and future. And it's exactly what John Brockman, publisher of Edge.org, posed to more than 150 of the world's most influential minds. Brilliant, farsighted, and fascinating, Is the Internet Changing the Way You Think? is an essential guide to the Net-based world.
For over 1500 years books have weathered numerous cultural changes
remarkably unaltered. Through wars, paper shortages, radio, TV,
computer games, and fluctuating literacy rates, the bound stack of
printed paper has, somewhat bizarrely, remained the more robust and
culturally relevant way to communicate ideas. Now, for the first
time since the Middle Ages, all that is about to change.
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.
Towards collaborative business ecosystems Last decade was fertile in the emerging of new collaboration mechanisms and forms of dynamic virtual organizations, leading to the concept of dynamic business ecosystem, which is supported (or induced ?) by the progress of the ubiquitous I pervasive computing and networking. The new technologies, collaborative business models, and organizational forms supported by networking tools "invade" all traditional businesses and organizations what requires thinking in terms of whole systems, i. e. seeing each business as part of a wider economic ecosystem and environment. It is also becoming evident that the agile formation of very dynamic virtual organizations depends on the existence of a proper longer-term "embedding" or "nesting" environment (e. g. regional industry cluster), in order to guarantee certain basic requirements such as trust building ("Trusting your partner" is a gradual and long process); common interoperability, ontology, and distributed collaboration infrastructures; agreed business practices (requiring substantial engineering Ire-engineering efforts); a sense of community ("we vs. the others"), and some sense of stability (when is a dynamic state or a stationary state useful). The more frequent situation is the case in which this "nesting" environment is formed by organizations located in a common region, although geography is not a major facet when cooperation is supported by computer networks.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
'Boldly reactionary... What looks like feast, Carr argues, may be closer to famine' Sunday Times 'Chilling' The Economist In this ground-breaking and compelling book, Nicholas Carr argues that not since Gutenberg invented printing has humanity been exposed to such a mind-altering technology. The Shallows draws on the latest research to show that the Net is literally re-wiring our brains inducing only superficial understanding. As a consequence there are profound changes in the way we live and communicate, remember and socialise - even in our very conception of ourselves. By moving from the depths of thought to the shallows of distraction, the web, it seems, is actually fostering ignorance. The Shallows is not a manifesto for luddites, nor does it seek to turn back the clock. Rather it is a revelatory reminder of how far the Internet has become enmeshed in our daily existence and is affecting the way we think. This landmark book compels us all to look anew at our dependence on this all-pervasive technology. This 10th-anniversary edition includes a new afterword that brings the story up to date, with a deep examination of the cognitive and behavioural effects of smartphones and social media. |
![]() ![]() You may like...
Legal-Lay Communication - Textual…
Chris Heffer, Frances Rock, …
Hardcover
R4,172
Discovery Miles 41 720
Agents of God - Boundaries and Authority…
Jeffrey Guhin
Hardcover
The Dancing Dead - Ritual and Religion…
Walter E.A. van Beek
Hardcover
R4,464
Discovery Miles 44 640
|