![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
For the past couple of years, network automation techniques that include software-defined networking (SDN) and dynamic resource allocation schemes have been the subject of a significant research and development effort. Likewise, network functions virtualization (NFV) and the foreseeable usage of a set of artificial intelligence techniques to facilitate the processing of customers' requirements and the subsequent design, delivery, and operation of the corresponding services are very likely to dramatically distort the conception and the management of networking infrastructures. Some of these techniques are being specified within standards developing organizations while others remain perceived as a "buzz" without any concrete deployment plans disclosed by service providers. An in-depth understanding and analysis of these approaches should be conducted to help internet players in making appropriate design choices that would meet their requirements as well as their customers. This is an important area of research as these new developments and approaches will inevitably reshape the internet and the future of technology. Design Innovation and Network Architecture for the Future Internet sheds light on the foreseeable yet dramatic evolution of internet design principles and offers a comprehensive overview on the recent advances in networking techniques that are likely to shape the future internet. The chapters provide a rigorous in-depth analysis of the promises, pitfalls, and other challenges raised by these initiatives, while avoiding any speculation on their expected outcomes and technical benefits. This book covers essential topics such as content delivery networks, network functions virtualization, security, cloud computing, automation, and more. This book will be useful for network engineers, software designers, computer networking professionals, practitioners, researchers, academicians, and students looking for a comprehensive research book on the latest advancements in internet design principles and networking techniques.
Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.
Complete real-world examples of gathering feedback from users and web environments; Fundamentals of text analysis using JavaScript and PHP; Harnessing JavaScript data visualisation tools; Business focused application to feedback gathering, analysis and reporting; Integration of new and existing data sources into a single bespoke web-based analysis environment
It is a general trend in computing that computers are becoming ever smaller and ever more interconnected. Sensor networks - large networks of small, simple devices - are a logical extreme of this trend. Wireless sensor networks (WSNs) are attracting an increasing degree of research interest, with a growing number of industrial applications starting to emerge. Two of these applications, personal health monitoring and emergency/disaster recovery, are the focus of the European Commission project ProSense: Promote, Mobilize, Reinforce and Integrate Wireless Sensor Networking Research and Researchers. This hands-on introduction to WSN systems development presents a broad coverage of topics in the field, contributed by researchers involved in the ProSense project. An emphasis is placed on the practical knowledge required for the successful implementation of WSNs. Divided into four parts, the first part covers basic issues of sensors, software, and position-based routing protocols. Part two focuses on multidisciplinary issues, including sensor network integration, mobility aspects, georouting, medical applications, and vehicular sensor networks. The remaining two parts present case studies and further applications. Topics and features: presents a broad overview of WSN technology, including an introduction to sensor and sensing technologies; contains an extensive section on case studies, providing details of the development of a number of WSN applications; discusses frameworks for WSN systems integration, through which WSN technology will become fundamental to the Future Internet concept; investigates real-world applications of WSN systems in medical and vehicular sensor networks; with a Foreword by the Nobel Laurate Professor Martin Perl of Stanford University. Providing holistic coverage of WSN technology, this text/reference will enable graduate students of computer science, electrical engineering and telecommunications to master the specific domains of this emerging area. The book will also be a valuable resource for researchers and practitioners interested in entering the field.
This book provides a detailed "how-to" guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book's structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.
This book constitutes the refereed proceedings of the IFIP Industry Oriented Conferences held at the 20th World Computer Congress in Milano, Italy on September 7-10, 2008. The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.
C++ is a powerful, much sought after programming language, but can be daunting to work with, even for engineering professionals. Why is this book so useful? Have you ever wondered: - How do keywords like static and virtual change their meanings according to context? - What are the similarities and differences between Pointers and References, Pointers and Arrays, Constructors and Copy Constructors, Nested and Local Inner Classes? - Why is Multiple Interface Inheritance seen to be beautiful but Multiple Implementation Inheritance considered evil? - When is Polymorphism Static or Dynamic, Bounded or Unbounded? Answers on these questions, and much more, are explained in this book, Cybernetics in C++. What makes this text so different and appealing in comparison to existing books on the market? - The Bulleted style, as opposed to Prose, produces results much faster, both in learning and reference - Rules of Thumb, and further expert Tips are given throughout in how to optimise your code - The Prospective Evils sections tell you what to avoid - The thorough coverage ensures you will be trained to expert level in each of Imperative, Procedural, Memory & Resource Management, Object Oriented and Generic Programming Cybernetics in C++ combines a theoretical overview and practical approach in one book, which should prove to be a useful reference for computer scientists, software programmers, engineers and students in this and related field.
Berkeley's philosophy has been much studied and discussed over the years, and a growing number of scholars have come to the realization that scientific and mathematical writings are an essential part of his philosophical enterprise. The aim of this volume is to present Berkeley's two most important scientific texts in a form which meets contemporary standards of scholarship while rendering them accessible to the modern reader. Although editions of both are contained in the fourth volume of the Works, these lack adequate introductions and do not provide com plete and corrected texts. The present edition contains a complete and critically established text of both De Motu and The Analyst, in addi tion to a new translation of De Motu. The introductions and notes are designed to provide the background necessary for a full understanding of Berkeley's account of science and mathematics. Although these two texts are very different, they are united by a shared a concern with the work of Newton and Leibniz. Berkeley's De Motu deals extensively with Newton's Principia and Leibniz's Specimen Dynamicum, while The Analyst critiques both Leibnizian and Newto nian mathematics. Berkeley is commonly thought of as a successor to Locke or Malebranche, but as these works show he is also a successor to Newton and Leibniz."
"Python Forensics" provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous
examples and illustrative code samples, author Chet Hosmer
discusses how to: Develop new forensic solutions independent of
large vendor software release schedules Participate in an
open-source workbench that facilitates direct involvement in the
design and implementation of new methods that augment or replace
existing tools Advance your career by creating new solutions along
with the construction of cutting-edge automation solutions to solve
old problems
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
Cybertherapy, the integration of telehealth technologies with the Internet and shared virtual reality, is used for two reasons: either because there is no alternative, or because it is in some sense better than traditional medicine. Nevertheless, the benefits of cybertherapy, due to the variety of its applications and their uneven development, are not self-evident. However, the emergence of cybertherapy is supporting the cost-effectiveness of certain applications, such as assessment, rehabilitation and therapy in clinical psychology and neuroscience. Its key advantage is the possibility of sharing different media and different health care tools in a simple to use and easily accessible Interface. To date, some cybertherapy applications have improved the quality of health care, and later they will probably lead to substantial cost savings. However, cybertherapy is not simply a technology but a complex technological and relational process. In this sense, clinicians and health care providers that want to successfully exploit cybertherapy need to give significant attention to clinical issues, technology, ergonomics, human factors and organizational changes in the structure of the relevant health service. The goal of this volume is to analyze the processes by which cybertherapy applications will contribute to the delivery of state-of-the-art health services. Particular attention is given to the clinical use of virtual reality technology. More in detail, this volume aims at supporting clinicians and scientists, interested in the cybertherapy innovative approach, providing them clinical protocols for the treatment of eating disorders, social phobias, panic disorders and sexual dysfunctions.
The papers in this volume comprise the refereed proceedings of the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA2008), in Beijing, China, 2008. The conference on the Second IFIP International Conference on Computer and Computing Technologies in Agriculture (CCTA 2008) is cooperatively sponsored and organized by the China Agricultural University (CAU), the National Engineering Research Center for Information Technology in Agriculture (NERCITA), the Chinese Society of Agricultural Engineering (CSAE) , International Federation for Information Processing (IFIP), Beijing Society for Information Technology in Agriculture, China and Beijing Research Center for Agro-products Test and Farmland Inspection, China. The related departments of China's central government bodies like: Ministry of Science and Technology, Ministry of Industry and Information Technology, Ministry of Education and the Beijing Municipal Natural Science Foundation, Beijing Academy of Agricultural and Forestry Sciences, etc. have greatly contributed and supported to this event. The conference is as good platform to bring together scientists and researchers, agronomists and information engineers, extension servers and entrepreneurs from a range of disciplines concerned with impact of Information technology for sustainable agriculture and rural development. The representatives of all the supporting organizations, a group of invited speakers, experts and researchers from more than 15 countries, such as: the Netherlands, Spain, Portugal, Mexico, Germany, Greece, Australia, Estonia, Japan, Korea, India, Iran, Nigeria, Brazil, China, etc.
Books on computation in the marketplace tend to discuss the topics within specific fields. Many computational algorithms, however, share common roots. Great advantages emerge if numerical methodologies break the boundaries and find their uses across disciplines. Interdisciplinary Computing In Java Programming Language introduces readers of different backgrounds to the beauty of the selected algorithms. Serious quantitative researchers, writing customized codes for computation, enjoy cracking source codes as opposed to the black-box approach. Most C and Fortran programs, despite being slightly faster in program execution, lack built-in support for plotting and graphical user interface. This book selects Java as the platform where source codes are developed and applications are run, helping readers/users best appreciate the fun of computation. Interdisciplinary Computing In Java Programming Language is designed to meet the needs of a professional audience composed of practitioners and researchers in science and technology. This book is also suitable for senior undergraduate and graduate-level students in computer science, as a secondary text.
Typically utilized by larger corporations, social media marketing and strategy is lacking in small and medium-sized nonprofit organizations. Although these organizations are beginning to incorporate this form of online communication, there is still a need to understand the best practices and proper tools to enhance an organization's presence on the web. Cases on Strategic Social Media Utilization in the Nonprofit Sector brings together cases and chapters in order to examine both the practical and theoretical components of creating an online social community for nonprofit organizations. The technologies discussed in this publication provide organizations with the necessary cost-effective tools for fundraising, marketing, and civic engagement. This publication is an essential reference source for practitioners, academicians, researchers, and advanced-level students interested in learning how to effectively use social media technologies in the nonprofit sector.
This book systematically presents the wireless sensing technology, which has become a promising sensing paradigm in recent years. It includes the introduction of underlying sensing principles, wireless signals, sensing methodologies and enabled applications. Meanwhile, it provides case studies to demonstrate how wireless sensing is applied for representative human and object sensing applications. This book also provides a wireless sensing framework as a guidance to understand and design a wireless sensing system or prototype based on their needs. It also presents a critical investigation of the challenges in achieving wireless sensing in both signal-level and application-level contexts. Accordingly, it summarizes the typical solutions to tackle the related challenges. Researchers and advanced-level students in computer science or electrical engineering working on the design of a wireless system will find this book useful as a reference. Professionals working in the wireless sensing industry will also find this book valuable as a reference tool.
This book constitutes the refereed proceedings of the 23rd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2022, held in Lisbon, Portugal, in September 2022. The 55 papers presented were carefully reviewed and selected from 119 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
The methodological needs of environmental studies are unique in the breadth of research questions that can be posed, calling for a textbook that covers a broad swath of approaches to conducting research with potentially many different kinds of evidence. Fully updated to address new developments such as the effects of the internet, recent trends in the use of computers, remote sensing, and large data sets, this new edition of Research Methods for Environmental Studies is written specifically for social science-based research into the environment. This revised edition contains new chapters on coding, focus groups, and an extended treatment of hypothesis testing. The textbook covers the best-practice research methods most used to study the environment and its connections to societal and economic activities and objectives. Over five key parts, Kanazawa introduces quantitative and qualitative approaches, mixed methods, and the special requirements of interdisciplinary research, emphasizing that methodological practice should be tailored to the specific needs of the project. Within these parts, detailed coverage is provided on key topics including the identification of a research project, hypothesis testing, spatial analysis, the case study method, ethnographic approaches, discourse analysis, mixed methods, survey and interview techniques, focus groups, and ethical issues in environmental research. Drawing on a variety of extended and updated examples to encourage problem-based learning and fully addressing the challenges associated with interdisciplinary investigation, this book will be an essential resource for students embarking on courses exploring research methods in environmental studies.
This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world-and businesses-work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.
This book is devoted to the investigation of the main issues related to the sustainable realization of tele-laboratories, where real and virtual instrumentation can be shared and used in a collaborative environment. The book contains peer reviewed chapters and each presents a self-contained treatment within a framework providing an up-to-date picture of the state-of-the-art and of the most recent developments of this multi-faceted topic.
William Bainbridge takes an in-depth look at the fantasy religions that exist in 34 different massively multiplayer online roleplaying games. He categorizes the religions, noting similarities across the games. He points, for instance, to the prevalence of polytheism: a system which, Bainbridge argues, can function as an effective map of reality in which each deity personifies a concept. Religions are as much about conceptualizing the self as conceptualizing the sacred. Most games allow the players to have multiple avatars, an idea Bainbridge likens to contemporary scientific ideas about personality. He also focuses on sacred spaces; the prevalence of magic and its relationship to the computer program and programmer; the fostering of a tribal morality by both religion and rules programmed into the game; the rise of cults and belief systems within the game worlds (and how this relates to social science theories of cult formation in the real world); and, of course, how the gameworld religions depict death. As avatars are immortal, death is merely a minor setback in most games. At the same time, much of the action in some gameworlds centers on the issue of mortality and the problematic nature of resurrection. Bainbridge contends that gameworlds are giving us a new perspective on the human quest, one that combines the arts and simulates most aspects of real life. The quests in gameworlds also provide meaning for human action, in terms of narratives about achieving goals by overcoming obstacles. Perhaps meaning does not naturally exist in our universe, but must be created by us, both in our fantasies and in day-to-day life. Like the games analyzed in this book, he says, traditional religions are fantasies that should be respected as works of art in a future civilization of disbelief.
This book makes the case that the changes brought about by the connectivity of the Internet have so transformed the nature of post secondary learning that we need to view it differently. Both the content and the processes of learning have been profoundly altered because of the accessibility of information and the multi-way interactivity provided by the Internet. We call this new phenomenon 'the Connecticon' - which encompasses the paradigm created by the infrastructure, the content, the multiple connection devices of the Web, as well as by the hyper-interactivity of the connected generation for whom attention is the new ourrency. It is the aim of this book to identify and document the Connecticon - its nature, its impact and its implications. We will do this in the broad domain of learning, though a similar study could be carried out in commercial, social or political fields.
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide. It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the Internet, plus short articles to explain more complex topics. Covering both business-related and technology terms, you'll never fall victim to fuzzy thinking again. Fully updated to cover new and emerging areas such as wireless and mobile technologies, this new edition will be your constant companion. No need to risk disastrous misinterpretation when you can have total accuracy at your fingertips.
|
![]() ![]() You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
Indexing - From Thesauri to the Semantic…
Piet de Keyser
Paperback
Social Reading - Platforms…
Jose Antonio Cordon Garcia, Julio Alonso Arevalo, …
Paperback
R1,551
Discovery Miles 15 510
|