![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social contexts for knowledge, learning, and human development. ""Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies"" explores the potential of Web 2.0 and its synergies with the Semantic Web and provides state-of-the-art theoretical foundations and technological applications. A reference edition for academicians, practitioners, policy makers, and government officers eager for knowledge on Web 2.0 and social Web, this book emphasizes practical aspects of the integration of semantic applications into social Web technologies.
The Internet has generated a large amount of information that is created and shared between individuals and organizations. Because of the amount of information flying through cyberspace, the time to locate and digest the information increases exponentially, but the question of what information can be shared and how to share them remains unsolved. ""Advances in Electronic Business, Volume 2"" explores the semantic web and intelligent web services, two methods created to help solidify the meaning and relationship of data, and explains how they relate to business processes. Professionals, policy-makers, academics, researchers, and managers in IT, business, and commerce will find this book useful in understanding the semantic web and intelligent web services impact on e-commerce.
Whether you are a computer programming student, hobbyist or professional, Lambert's FUNDAMENTALS OF PYTHON (TM): DATA STRUCTURES, 2E offers the perfect introduction to object-oriented design and data structures using the popular Python (TM) programming language. The level of instruction is ideal if you've had at least one semester of programming experience in an object-oriented language, such as Java (TM), C++ or Python (TM). Step-by-step explanations and focused exercises clearly explain the design of collection classes with polymorphism and inheritance and multiple implementations of collection interfaces. This edition also addresses the analysis of the space/time tradeoffs of different collection implementations and, specifically, array-based implementations and link-based implementations. You learn to work with collections, including sets, lists, stacks, queues, trees, dictionaries and graphs. Prepare for success with FUNDAMENTALS OF PYTHON (TM): DATA STRUCTURES, 2E.
The popularization of the Internet, due in larger part to the advent of multifunctional cell phones, poses new challenges for health professionals, patients, and caregivers as well as creates new possibilities for all of us. This comprehensive volume analyzes how this social phenomenon is transforming long-established healthcare practices and perceptions in a country with one of the highest numbers of Internet users: Brazil. After an opening text that analyzes the Internet and E-Health Care as a field of study, the book comprises six parts. The first part introduces the emergence and development of the internet in Brazil, its pioneering experience in internet governance, digital inclusion, and online citizen participation. The second part is dedicated to internet health audiences by analyzing the cases of patients, the young, and the elderly seeking and sharing health information online, especially in virtual communities. The third part is dedicated to the challenges that the expansion of the internet in healthcare poses to all of us, such as the evaluation of the quality of health information available online and the prevention of the risks involved with online sales, cyberbullying, and consumption of prescription medicines. The fourth presents some innovative e-learning experiences carried out with different groups in Brazil, while the fifth part analyses some practical applications involving the Internet and health, including studies on M-Health, the Internet of things, serious games and the use of new information and communication technologies in health promotion. The last chapter analyses the future of healthcare in the Internet Age. The authors establish a critical and creative debate with international scholarship on the subject. This book is written in a direct and comprehensible way for professionals, researchers, students of communication and health, as well as for stakeholders and others interested in better understanding the trends and the different challenges related to the social phenomenon of the internet in health.
Sega Arcade: Pop-Up History presents six of the most iconic Sega Taiken 'body sensation' videogame cabinets - Hang-On, Space Harrier, Out Run, After Burner, Thunder Blade and Power Drift - in an innovative form: as dazzling pop-up paper sculptures. Sega Arcade: Pop-Up History is a unique book object, a delight for Sega fans and a love letter to the once-vibrant arcade game scene of the 1980s. Accompanying the 3D model showcase is a written history from Guardian games writer and best-selling novelist, Keith Stuart, punctuated by specially restored production artwork and beautifully reproduced in-game screens. The book features contributions from arcade game innovator Yu Suzuki, who offers first-hand insight into the development of these ground-breaking games and the birth of the Taiken cabinet phenomenon.
In today's society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
Whether searching, shopping, or socializing, Web users leave behind a great deal of data revealing their information needs, mindset, and approaches used, creating vast opportunities for Web service providers as well as a host of security and privacy concerns for consumers. The Handbook of Research on Web Log Analysis reflects on the multifaceted themes of Web use and presents various approaches to log analysis. This expansive collection reviews the history of Web log analysis and examines new trends including the issues of privacy, social interaction and community building. Over XX research contributions from XX international experts comprehensively cover the latest user-behavior analytic and log analysis methodologies, and consider new research directions and novel applications. An essential holding for library reference collections, this Handbook of Research will benefit academics, researchers, and students in a variety of fields, as well as technology professionals interested in the opportunities and challenges presented by the massive collection of Web usage data.
Sektion 1: Internet als Business-Plattform.- Elektronische Koordination interorganisatorischer Geschaftsprozesse zwischen privaten Haushalten und Versicherungen im Rahmen von Tele-Insuring.- Internet-Nutzung im Business-to-Business-Bereich: Stand der Entwicklung, Typologie und Anwendungsbeispiele.- Aufbau eines Elektronischen Handelsplatzes fur Java-Applets.- Preisstrategien fur ein integriertes Universal-Internet.- Sektion 2: Optimierung von Geschaftsprozessen.- Value-Based Management of Inter-Organizational Business Processes.- A Hierarchical Planning Procedure Supporting the Selection of Service Providers in Outtasking Decisions.- A Multiagent System-Approach for the Design of Information Systems in Virtual Organizations.- Office-Automation in Municipal and County Administration with an Integrated Workflow Based Information System.- Efficiency and Cost Implications of Capital Allocation Mechanisms: A Contribution to the Market-versus-Hierarchy-Discussion.- Sektion 3: Groupware- und Workflow-Strategien.- Organisatorischer Wandel bei Einfuhrung von Groupware.- Increased Competitiveness using a Groupware based Project Controlling System.- Architektur zur informationstechnologischen Unterstutzung von Kooperationen.- Enterprise Knowledge Medium (EKM) - Konzeption und Einsatz eines computergestutzten Planungs- und Kontrollsystems im prozessorientierten Unternehmen.- Unterstutzung der Workflow-Entwicklung durch ein unternehmensweites Repository fur Geschaftsprozessrealisierungen.- Sektion 4: Groupware-Anwendungen.- New perspectives for higher education processes as a team-based approach - Back-office information technology for higher education and training.- Konfiguration des Informationsdienstes in Groupware.- Sektion 5: Wirtschaftliche Programmerstellung.- Global Production: The Case of Offshore Programming.- Metriken fur die IV-Diagnose, Konzept und prototypische Implementierung.- Produktinformationssysteme in Business Networks.- Sektion 6: SAP und Client-Server-Integration.- System Migration and System Integration: Two SAP Cases.- Unternehmensweite Datenkonsistenz durch Integration bestehender Informationssysteme.- Client/Server Architecture: what it promises - what it really provides.- IS Project Risk in Polish Organizations.- Sektion 7: Organisation und Datenmanagement.- Flexible Organizations Through Object-oriented and Transaction-oriented Information Systems.- Determinants and Outcomes of Electronic Data Interchange Integration.- Referenz-Informationsmodelle fur den Handel: Begriff, Nutzen und Empfehlungen fur die Gestaltung und unternehmensspezifische Adaption von Referenzmodellen.- Entwicklung eines Data Warehouse fur das Produktionscontrolling: Konzepte und Erfahrungen.- Sektion 8: Neue Chancen durch Multimedia.- Der Markt fur interaktive elektronische Medien aus oekonomischer Sicht.- Sektion 9: Anwendungen von Internet/Intranet.- Improving Competitiveness of Direct Banking via IT-Enabled Incentive Schemes.- Die Nutzung von Internet-Diensten im Rahmen des Elektronischen Datenaustauschs - Architekturvarianten und ein Anwendungsszenario.- Sektion 10: Organisation und Workflow.- Neue Organisationsformen und IT: Herausforderung fur die Unternehmensgestalter.- INCOME/WF - A Petri Net Based Approach to Workflow Management.- On the Object-Oriented Modelling of Distributed Workflow Applications.- Sektion 11: Reorganisation des Unternehmens.- Synthesizing Business and Information Systems (IS): Towards a Common Business-IS Model based on Agents.- Planungs- und Kontrollmodelle zur Steuerung prozessorientierter Organisationen auf der Basis einer Intranet-Anwendung.- Neue Kernprozesse fur Versicherer mit Agenturnetz.- Sponsorenverzeichnis.- Autoren- und Adressverzeichnis.
A major investment in professional development is necessary to ensure the fundamental success of instructors in technology-integrated classrooms and in online courses. However, while traditional models of professional development rely on face-to-face instruction, online methods are also gaining traction-viable means for faculty development.Virtual Mentoring for Teachers: Online Professional Development Practices offers peer-reviewed essays and research reports contributed by an array of scholars and practitioners in the field of instructional technology and online education. It is organized around two primary themes: professional development models for faculty in online environments and understanding e-Learning and best practices in teaching and learning in online environments. The objective of this scholarship is to highlight research-based online professional development programs and best practices models that have been shown to enhance effective teaching and learning in a variety of environments.
The growth of Internet use and technologies has increased exponentially within the business sector. When utilized properly, these applications can enhance business functions and make them easier to perform. Exploring the Convergence of Big Data and the Internet of Things is a pivotal reference source featuring the latest empirical research on the business use of computing devices to send and receive data in conjunction with analytic applications to reduce maintenance costs, avoid equipment failures, and improve business operations. Including research on a broad range of topics such as supply chain, aquaculture, and speech recognition systems, this book is ideally designed for researchers, academicians, and practitioners seeking current research on various technology uses in business.
This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity. Fundamental ITS concepts include topics like global positioning system; Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P), and Vehicle to Infrastructure (V2I) communications; human-machine interface; and security and privacy. Fundamental concepts are sometimes followed by the real-life test experimental results (such as in V2P Chapter) and description of the performance metrics used to evaluate the results. This book also describes equations and math used in the development of the individual parts of the system. This book surveys current and previous publications for trending research in the ITS domain. It also covers state of the art standards that are in place for the DSRC in the US, starting from the application layer defined in SAE J2735 all the way to physical layer defined in IEEE 802.11. The authors provide a detailed discussion on what is needed to extend the current standards to accommodate future needs of the vehicle communications, such as needs for future autonomous vehicles. Programs and code examples accompany appropriate chapters, for example, after describing remote vehicle target classification function a pseudo code and description is provided. In addition, the book discusses current topics of the technology such as spectrum sharing, simulation, security, and privacy. The intended audience for this book includes engineering graduate students, automotive professionals/engineers, researchers and technology enthusiasts.
This work discusses issues relating to distance education and distributed learning. There are essays covering: rethinking assessment for the online environment; the role of collaborative learning in social and intellectual development; and the embodiment of knowledge in virtual environments.
Although the field of mixed reality has grown significantly over the last decade, there have been few published books about augmented reality, particularly the interface design aspects. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" provides a foundation of the main concepts of augmented reality (AR), with a particular emphasis on user interfaces, design, and practical AR techniques, from tracking algorithms to design principles for AR interfaces. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" contains comprehensive information focusing on the following topics: technologies that support AR, development environments, interface design and evaluation of applications, and case studies of AR applications.
To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Web 2.0 provides a useful tool in developing the relationships between business and consumer. The Handbook of Research on Integrating Social Media into Strategic Marketing explores the use of social networking and other online media in marketing communications, including both best practices and common pitfalls to provide comprehensive coverage of the topic. This book is intended for marketing professionals, business managers, and anyone interested in how social media fits into today's marketing environments.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Computer-mediated communication and cyberculture are dramatically changing the nature of social relationships. Whether cyberspace will simply retain vestiges of traditional communities with hierarchical social links and class-structured relationships or create new egalitarian social networks remains an open question. The chapters in this volume examine the issue of social justice on the Internet by using a variety of methodological and theoretical perspectives. Political scientists, sociologists, and communications and information systems scholars address issues of race, class, and gender on the Internet in chapters that do not assume any specialized training in computer technology.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution. |
You may like...
Tweeting to Power - The Social Media…
Jason Gainous, Kevin M. Wagner
Hardcover
R3,745
Discovery Miles 37 450
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|