![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Examine current methods of e-serials cataloging with an accent on online accessibility This comprehensive guide examines the state of electronic serials cataloging with special attention paid to online capacities. E-Serials Cataloging: Access to Continuing and Integrating Resources via the Catalog and the Web presents a review of the e-serials cataloging methods of the 1990s and discusses the international standards (ISSN, ISBD ER], AACR2) that are applicable. It puts the concept of online accessibility into historical perspective and offers a look at current applications to consider. Practicing librarians, catalogers and administrators of technical services, cataloging and service departments, and Web managers will find this book to be an invaluable asset.E-Serials Cataloging: Access to Continuing and Integrating Resources via the Catalog and the Web includes: an annotated bibliography of selected cataloging processes for online e-serials a complete collection of notes used in cataloging AACR2 e-serials the results of a survey on staffing for cataloging e-serials in ALR libraries a literature review of e-serials cataloging in the 1990sThis book is an essential resource for anyone involved with the day-to-day processing of electronic serials. E-Serials Cataloging: Access to Continuing and Integrating Resources via the Catalog and the Web provides a complete reference to an information phenomenon that represents a major advance in electronic library science for libraries large and small.
The recent rapid proliferation in hardware, software, and communication technologies has facilitated the spread of interconnected sensors, actuators, and heterogeneous devices to collect data for offering a new class of advanced services characterized by being available anywhere, at any time and for anyone. This ecosystem is referred to as the Internet of Things (IoT). IoT networks collect, store, and exchange a large amount of heterogeneous data. It has already shown promising outcomes in the provisioning of potentially critical services (e.g., safety applications, healthcare, manufacturing), but it raises many challenges related to the security, data analysis, and limited resources of the performed operations and provided services. Accordingly, research on the data analysis and security of IoT is attractive to both industry and academia. Thus, the central theme of this book is to report novel methodologies, theories, technologies, techniques, and solutions for security and data analytics techniques and energy-aware solutions for IoT. This book aims at addressing these topics across multiple abstraction levels, ranging from architectural models, the provisioning of services, protocols, and interfaces to specific implementation approaches. Furthermore, additional focus will be given to areas related to the role of artificial intelligence in modeling and deploying secure and trustworthy sensors, actuators, and wireless networks for IoT systems. It aims to present the most start-of-the-art technologies to overcome the challenges related to security, data analytics, and energy-aware solutions in the Internet of Things.
This thoroughly class tested text and online tutorial gives a complete introduction to the essentials of the XML standard. It will teach students how to apply web technologies to develop XML based web applications. Through the book, the student will build applications that work together to construct interesting and workable web applications.
Political blogs have grown astronomically in the last half-decade. In just one month in 2005, for example, popular blog DailyKos received more unique visitors than the population of Iowa and New Hampshire combined. But how much political impact do bloggers really have? In Blogwars, David D. Perlmutter examines this rapidly burgeoning phenomenon, exploring the degree to which blogs influence--or fail to influence--American political life. Challenging the hype, Perlmutter points out that blogs are not that powerful by traditional political measures: while bloggers can offer cogent and convincing arguments and bring before their readers information not readily available elsewhere, they have no financial, moral, social, or cultural leverage to compel readers to engage in any particular political behavior. Indeed, blogs have scored mixed results in their past political crusades. But in the end, Perlmutter argues that blogs, in their wide dissemination of information and opinions, actually serve to improve democracy and enrich political culture. He highlights a number of the particularly noteworthy blogs from the specialty to the superblog-including popular sites such as Daily Kos, The Huffington Post, Powerlineblog, Instapundit, and Talking Points Memo--and shows how blogs are becoming part of the tool kit of political professionals, from presidential candidates to advertising consultants. While the political future may be uncertain, it will not be unblogged. For many Internet users, blogs are the news and editorial sites of record, replacing traditional newspapers, magazines, and television news programs. Blogwars offers the first full examination of this new and controversial force on America's political landscape.
As innovators continue to explore and create new developments within the fields of artificial intelligence and computer science, subfields such as machine learning and the internet of things (IoT) have emerged. Now, the internet of everything (IoE), foreseen as a cohesive and intelligent connection of people, processes, data, and things, is theorized to make internet connections more valuable by converting information into wise actions that create unprecedented capabilities, richer experiences, and economic opportunities to all players in the market. Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities discusses the theoretical, design, evaluation, implementation, and use of innovative technologies within the fields of IoE, machine learning, and IoT. Featuring research on topics such as low-power electronics, mobile technology, and artificial intelligence, this book is ideally designed for computer engineers, software developers, investigators, advanced-level students, professors, and professionals seeking coverage on the various contemporary theories, technologies, and tools in IoE engineering.
This book combines semi-physical simulation technology with an Internet of Things (IOT) application system based on novel mathematical methods such as the Fisher matrix, artificial neural networks, thermodynamic analysis, support vector machines, and image processing algorithms. The dynamic testing and semi-physical verification of the theory and application were conducted for typical IOT systems such as RFID systems, Internet of Vehicles systems, and two-dimensional barcode recognition systems. The findings presented are of great scientific significance and have wide application potential for solving bottlenecks in the development of RFID technology and IOT engineering. The book is a valuable resource for postgraduate students in fields such as computer science and technology, control science and engineering, and information science. Moreover, it is a useful reference resource for researchers in IOT and RFID-related industries, logistics practitioners, and system integrators.
Sega Arcade: Pop-Up History presents six of the most iconic Sega Taiken 'body sensation' videogame cabinets - Hang-On, Space Harrier, Out Run, After Burner, Thunder Blade and Power Drift - in an innovative form: as dazzling pop-up paper sculptures. Sega Arcade: Pop-Up History is a unique book object, a delight for Sega fans and a love letter to the once-vibrant arcade game scene of the 1980s. Accompanying the 3D model showcase is a written history from Guardian games writer and best-selling novelist, Keith Stuart, punctuated by specially restored production artwork and beautifully reproduced in-game screens. The book features contributions from arcade game innovator Yu Suzuki, who offers first-hand insight into the development of these ground-breaking games and the birth of the Taiken cabinet phenomenon.
The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applications. This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects. Topics appropriate for this Book include, but are not necessarily limited to: - Methods for SO development - IoT Networking - Middleware for SOs - Data Management for SOs - Service-oriented SOs - Agent-oriented SOs - Applications of SOs in Smart Environments: Smart Cities, Smart Health, Smart Buildings, etc. Advanced IoT Projects.
This book examines the internet as a form of power in global politics. Focusing on the United States' internet foreign policy, McCarthy combines analyses of global material culture and international relation theory, to reconsider how technology is understood as a form of social power.
Digital Economy: Impacts, Influences and Challenges provides information about the socioeconomic aspects of the Digital Economy. This set of 18 essays covers the effects of Digital Economy on business transactions, technology and culture, as well as on education. It also covers various aspects of global production, trade, and investment and the effects of Internet. The chapters review best practices from concept to development, through implementation and evaluation. This book is one of the few books that looks at the digital economy from a socio economic angle, offering perspectives from scholars and practitioners of digital economics around the world.
The widespread availability of technologies has increased exponentially in recent years. This ubiquity has created more connectivity and seamless integration among technology devices. Emerging Trends and Applications of the Internet of Things is an essential reference publication featuring the latest scholarly research on the surge of connectivity between computing devices in modern society, as well as the benefits and challenges of this. Featuring extensive coverage on a broad range of topics such as cloud computing, spatial cognition, and ultrasonic sensing, this book is ideally designed for researchers, professionals, and academicians seeking current research on upcoming advances in the Internet of Things (IoT).
The divide between UX and Web development can be stifling. "Bridging UX and Web Development "prepares you to break down those walls by teaching you how to integrate with your team s developers. You examine the process from their perspective, discovering tools and coding principles that will help you bridge the gap between design and implementation. With these tried and true approaches, you ll be able to capitalize on a more productive work environment. Whether you re a novice UX professional finding your place in
the software industry and looking to nail down your technical
skills, or a seasoned UI designer looking for practical information
on how to integrate your team with development, this is the
must-have resource for your UX library.
Software Evolution with UML and XML provides a forum where expert insights are presented on the subject of linking three current phenomena: software evolution, UML and XML. Software evolution and reengineering are a real problem in the software industry; various attempts have been made in these areas and there is still room for improvement. Tackling evolution with the help of UML and XML can be very beneficial to the software community, especially as the cost of software evolution makes up a considerable proportion, sometimes even 70-80 per cent, of the total budget of a software system. Software Evolution with UML and XML not only investigates the potential powerful applications of two popularly used languages, UML and XML, in the field of software evolution, but also discovers what will happen when these three are linked to work together.
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.
This innovative monograph focuses on a contemporary form of computer-based literature called 'literary hypertext', a digital, interactive, communicative form of new media writing. Canonizing Hypertext combines theoretical and hermeneutic investigations with empirical research into the motivational and pedagogic possibilities of this form of literature. It focuses on key questions for literary scholars and teachers: How can literature be taught in such a way as to make it relevant for an increasingly hypermedia-oriented readership? How can the rapidly evolving new media be integrated into curricula that still seek to transmit traditional literary competence? How can the notion of literary competence be broadened to take into account these current trends? This study, which argues for hypertexts integration in the literary canon, offers a critical overview of developments in hypertext theory, an exemplary hypertext canon and an evaluation of possible classroom applications.
The book is devoted to the analysis of promotional material of tourist activities on tourism websites, including walking, dining, and visiting natural and cultural heritage sights, as instances of multimodal texts through a case study of Croatian and Scottish tourism websites.
Eye tracking is a widely used research method, but there are many questions and misconceptions about how to effectively apply it. Eye Tracking the User Experience--the first how-to book about eye tracking for UX practitioners--offers step-by-step advice on how to plan, prepare, and conduct eye tracking studies; how to analyze and interpret eye movement data; and how to successfully communicate eye tracking findings.
Web-based training, known as e-learning, has experienced a great evolution and growth in recent years, as the capacity for education is no longer limited by physical and time constraints. The emergence of such a prized learning tool mandates a comprehensive evaluation of the effectiveness and implications of e-learning. This book explores the technical, pedagogical, methodological, tutorial, legal, and emotional aspects of e-learning, considering and analyzing its different application contexts, and providing researchers and practitioners with an innovative view of e-learning as a lifelong learning tool for scholars in both academic and professional spheres.
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal. |
You may like...
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|