![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.
Just as the AutoCAD software continues to be improved and perfected, so does the Beginning AutoCAD (R) Exercise Workbook. This work is truly the ideal package from which to learn AutoCAD, whether you're a complete beginner, or simply learning about the latest features. The new AutoCAD 2022 software includes features such as Installer, which reduces the number of steps needed for the initial install, Share Current Drawing, allowing other users to view or edit a drawing in the online AutoCAD Web application, and Trace, encouraging collaboration on drawing changes using the AutoCAD Web and Mobile apps. Readers can download the provided templates used for drawings in the book from the Industrial Press website. Expert author duo Shrock and Heather share their knowledge with students and instructors, including plenty of inside tips and dozens of exercises to help users get comfortable and see real progress. NEW AND/OR IMPROVED FEATURES IN BEGINNING AUTOCAD 2022: Redesigned Start Tab-There are three main sections that provide access to recent work, enabling users to carry on where they left off, and offering them access to online saved drawing files. (Included in Lesson 1) Count-The new Count feature allows users to count the instances of objects and Blocks that are placed in their drawing. (Included in Lesson 29) Floating Drawing Tabs-Users can now drag a drawing file Tab from the main AutoCAD application window to make it a separate drawing file window. This is extremely useful for those with two or more monitors. (Included in Lesson 2)
This comprehensive text/reference presents a broad-ranging overview of device connectivity in distributed computing environments, supporting the vision of an Internet of Things (IoT). Expert perspectives are provided by an international selection of researchers from both industry and academia, covering issues of communication, security, privacy, interoperability, networking, access control, and authentication. In addition to discussing state-of-the-art research and practice, the book includes corporate analyses offering a balanced view of benefits and limitations, and numerous case studies illustrating the challenges and practical solutions. Topics and features: discusses issues of security and privacy in connected environments, with a specific focus on the impact of the IoT paradigm on enterprise information systems; examines the challenges of managing big data in IoT environments, and proposes cloud computing-based solutions to the limitations inherent in the IoT paradigm; suggests approaches to overcome service-level interoperability problems in the IoT environment; introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in the IoT; describes the use of the Essence framework to model software development methods, and highlights the benefits of integrating data from smart buildings and IoT devices; presents an asymmetric schema matching mechanism for IoT interoperability, and explores the topic of automatic provenance capture at the middleware level; reviews emerging network topologies and communication technologies, and advises on the adoption of a data distribution service as a middleware platform for IoT systems. This practically-oriented volume serves as a complete reference for students, researchers and practitioners of distributed computing, providing insights into the latest approaches, technologies, and frameworks relevant to the IoT environment.
This book provides information about wireless systems and WIMAX modeling. The authors provide various techniques for the WiMAX systems such as antenna diversity and Alamouti coding. The performance of these systems is tested using various types of data and the results of systems are presented and discussed. Additional topics include WiMAX simulation using diversity techniques and real time WiMAX system modeling. The book pertains to researchers, academics, students, and professionals. Provides information about wireless system modeling and WiMAX systems; Presents WiMAX system modeling using antenna diversity techniques and the Alamouti coding scheme; Includes real time WiMAX system modeling for speech signal and digital images.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
1) The book will discuss most relevant real-world applications and case studies of IoT. 2) The book will provide deeper knowledge regarding emerging research trends and future research directions in IoT. 3) The book will provide theoretical, algorithmic, simulation, and implementation-based research developments in IoT. 4) The book will follow theoretical approach to describe applications of IoT for the beginners as well as practical approach to depict simulation and implementation of real-world applications for intermediate and advanced readers.
Become a LinkedIn power user and harness the potential of social selling With the impact of COVID, remote working has become big, and so has the use of digital/virtual sales tools. More sales teams want and need to understand how to use social media platforms like LinkedIn to sell, and most do not use it properly. The Ultimate LinkedIn Sales Guide is the go-to book and guide for utilizing LinkedIn to sell. It covers all aspects of social and digital selling, including building the ultimate LinkedIn profile, using the searching functions to find customers, sending effective LinkedIn messages (written, audio & video), creating great content that generates sales, and all the latest tips and tricks, strategies and tools. With the right LinkedIn knowledge, you can attract customers and generate leads, improving your sales numbers from the comfort and safety of your computer. No matter what you are selling, LinkedIn can connect you to buyers. If you're savvy, you can stay in touch with clients and generate more repeat sales, build trust, and create engaging content that will spread by word-of-mouth--the most powerful sales strategy around. This book will teach you how to do all that and more. In The Ultimate LinkedIn Sales Guide you will learn how to: Use the proven 4 Pillars of Social Selling Success to improve your existing LinkedIn activities or get started on a firm footing Create the Ultimate LinkedIn Profile, complete with a strong personal brand that could catapult you to industry leader status Generate leads using LinkedIn, then build and manage relationships with connected accounts to turn those leads into customers Utilize little-known LinkedIn "power tools" to grow your network, send effective messages, and write successful LinkedIn articles And so much more! The Ultimate LinkedIn Sales Guide is a must read for anyone wishing to utilise LinkedIn to improve sales.
This book introduces Python scripting for geographic information science (GIS) workflow optimization using ArcGIS. It builds essential programming skills for automating GIS analysis. Over 200 sample Python scripts and 175 classroom-tested exercises reinforce the learning objectives. Readers will learn to: * Write and run Python in the ArcGIS Python Window, the PythonWin IDE, and the PyScripter IDE * Work with Python syntax and data types * Call ArcToolbox tools, batch process GIS datasets, and manipulate map documents using the arcpy package * Read and modify proprietary and ASCII text GIS data * Parse HTML web pages and KML datasets * Create Web pages and fetch GIS data from Web sources. * Build user-interfaces with the native Python file dialog toolkit or the ArcGIS Script tools and PyToolboxes Python for ArcGIS is designed as a primary textbook for advanced-level students in GIS. Researchers, government specialists and professionals working in GIS will also find this book useful as a reference.
Organize your life, your likes, and more with Pinterest and this fun how-to guide Now you can organize your digital life with Pinterest, a hot new site that lets you create visual bookmarks of your favorite things and "pin" them on virtual pinboards. Want to save something from a blog? Have a favorite retail website? Want to pin a quick photo you took with your phone? Organize them all with Pinterest and this fast, friendly guide that shows you just how to do it. You'll see how to set up an account and your boards, how to pin and re-pin, where to use hashtags, find ways to share pins with your other social networks, and more.Helps you get the most out of Pinterest, a visual collection of bookmarks that you can organize into virtual pinboards Shows you how to set up an account and boards, how to pin and re-pin, use hashtags and like pins, and even share pins with your other social networks Also discusses Power Pinners, using search, and finding people to follow Offers tips, trick, and techniques to make the process easy and enjoyable Pinterest is fun and easy, and even more so with "Pinterest for Dummies"
Electronic payment is the economic backbone of all e-commerce transactions. This book covers the major subjects related to e-payment such as, for example, public key infrastructure, smart cards, payment agents, digital cash, SET protocols, and micro-payment. Its first part covers the infrastructure for secure e-payment over the Internet, whereas in the second part a variety of e-payment methods and systems are described. This edited volume offers a well-written and sound technical overview of the state of the art in e-payment for e-business developers, graduate students, and consultants. It is also ideally suited for classes and training courses in e-commerce or e-payment.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities. Through oral history and archival research, Nyhan reveals a hidden history of the entanglements of gender in the intellectual and technical work of the early digital humanities. Setting feminized keypunching in its historical contexts-from the history of concordance making, to the feminization of the office and humanities computing-this book delivers new insight into the categories of work deemed meritorious of acknowledgement and attribution and, thus, how knowledge and expertise was defined in and by this field. Focalizing the overlooked yet significant data-driven labour of lesser-known individuals, this book challenges exclusionary readings of the history of computing in the Humanities. Contributing to ongoing conversations about the need for alternative genealogies of computing, this book is also relevant to current debates about diversity and representation in the Academy and the wider computing sector. Hidden and Devalued Feminized Labour in the Digital Humanities will be of interest to researchers and students studying digital humanities, library and information science, the history of computing, oral history, the history of the humanities, and the sociology of knowledge and science.
Specialists from business and academia present a meticulously researched, compelling examination of the forces of globalization, innovation, and relentless technological competition--and the profound effect they are having on the evolution of e-commerce and online marketing. The editors and contributors to this unique, wide ranging volume probe the fundamental, long-term drivers of the Internet infrastructure, e-commerce models, marketing approaches and customer behaviors, blending insights from the U.S., Europe, and the Asia-Pacific nations. They offer fresh understanding of why certain e-commerce practices work and why some don't, noting specifically Internet-based buying. With practical managerial advice, important empirical findings, and new ways to comprehend the intricacies of the fast-morphing world of today's business. The book's global perspective and interdisciplinary viewpoints provide the framework marketing executives and their top level colleagues need to make sense of an onslaught of events during coming months, even years, and the marketplace skills to help their companies prosper from them.
Electronic Multimedia Publishing brings together in one place important contributions and up-to-date research results in this fast moving area. Electronic Mulitmedia Publishing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
* Centers the experiences of designers at every stage of their careers and development. * Defines and explains the idea of professional identity for designers across contexts. * Concludes segments with specific takeaways, reflection activities, and quotes from real-world designers.
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
This powerful new volume explores the diverse and sometimes unexpected roles that IoT and AI technologies played during the recent COVID-19 global pandemic. The book discusses the how existing and new state-of-the art technology has been and can be applied for global health crises in a multitude of ways. The chapters in Pandemic Detection and Analysis through Smart Computing Technologies look at exciting technological solutions for virus detection, prediction, classification, prevention, and communication outreach. The book considers the various modes of transmission of the virus as well as how technology has been implemented for personalized healthcare systems and how it can be used for future pandemics. The huge importance of social and mobile communication and networks during the pandemic is addressed such as in business, education, and healthcare; in research and development; for health information and outreach; in social life; and more. A chapter also addresses using smart computing for forecasting the damage caused by COVID-19 using time series analyses. This up-to-the-minute volume illuminates on the many ways AI, IoT, machine learning, and other technologies have important roles in the diverse challenges faced during COVID-19 and how they can be enhanced for future pandemic situations. The volume will be of high interest to those in different fields of computer science and other domains as well as to data scientists, government agencies and policymakers, doctors and healthcare professionals, engineers, economists, and many other professionals. This book will also be very helpful to faculty, students, and research scholars in understanding the pre- and post-effect of this pandemic.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
This book highlights selected papers presented at the 10th International Symposium on Embedded Computing and System Design (ISED) 2021. This symposium provides a platform for researchers to share the latest scientific achievements of embedded computing and system design. The book is divided into three broad sections. The first section discusses topics like VLSI and testing, circuits and systems with a focus on emerging technologies. The second section discusses topics like embedded hardware and software systems and novel applications. The final section discusses the state-of-the-art technologies involving IoT, artificial intelligence, green and edge computing that demonstrates the issues currently.
This volume offers readers various perspectives and visions for cutting-edge research in ubiquitous healthcare. The topics emphasize large-scale architectures and high performance solutions for smart healthcare, healthcare monitoring using large-scale computing techniques, Internet of Things (IoT) and big data analytics for healthcare, Fog Computing, mobile health, large-scale medical data mining, advanced machine learning methods for mining multidimensional sensor data, smart homes, and resource allocation methods for the BANs. The book contains high quality chapters contributed by leading international researchers working in domains, such as e-Health, pervasive and context-aware computing, cloud, grid, cluster, and big-data computing. We are optimistic that the topics included in this book will provide a multidisciplinary research platform to the researchers, practitioners, and students from biomedical engineering, health informatics, computer science, and computer engineering.
Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries. This book provides a roadmap for semantic web technologies (SWTs) and highlights their role in a wide range of domains including cloud computing, Internet of Things, big data, sensor network, and so forth. It also explores the prospects of these technologies including different data interchange formats, query languages, ontologies, Linked Data, and notations. The role of SWTs in 'epidemic Covid-19', 'e-learning platforms and systems', 'block chain', 'open online courses', and 'visual analytics in healthcare' is described as well. This book: Explores all the critical aspects of semantic web technologies (SWTs) Discusses the impact of SWTs on cloud computing, Internet of Things, big data, and sensor network Offers a comprehensive examination of the emerging research in the areas of SWTs and their related domains Provides a template to develop a wide range of smart and intelligent applications Includes latest applications and examples with real data This book is aimed at researchers and graduate students in computer science, informatics, web technology, cloud computing, and Internet of Things.
This book provides scientific research into Cognitive Internet of Things for Smart Society, with papers presented at the 2nd EAI International Conference on Robotic Sensor Networks. The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, with the explosive number of networks models and increasing computational power of computers significantly extending the number of potential applications for robotic technologies while also bringing new challenges to the network's community. The 2nd EAI International Conference on Robotic Sensor Networks was held 25-26 August 2018 at the Kitakyushu International Conference Center (MICE), Kitakyushu, Japan.
This book covers all the relevant dictionary learning algorithms, presenting them in full detail and showing their distinct characteristics while also revealing the similarities. It gives implementation tricks that are often ignored but that are crucial for a successful program. Besides MOD, K-SVD, and other standard algorithms, it provides the significant dictionary learning problem variations, such as regularization, incoherence enforcing, finding an economical size, or learning adapted to specific problems like classification. Several types of dictionary structures are treated, including shift invariant; orthogonal blocks or factored dictionaries; and separable dictionaries for multidimensional signals. Nonlinear extensions such as kernel dictionary learning can also be found in the book. The discussion of all these dictionary types and algorithms is enriched with a thorough numerical comparison on several classic problems, thus showing the strengths and weaknesses of each algorithm. A few selected applications, related to classification, denoising and compression, complete the view on the capabilities of the presented dictionary learning algorithms. The book is accompanied by code for all algorithms and for reproducing most tables and figures. Presents all relevant dictionary learning algorithms - for the standard problem and its main variations - in detail and ready for implementation; Covers all dictionary structures that are meaningful in applications; Examines the numerical properties of the algorithms and shows how to choose the appropriate dictionary learning algorithm. |
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|