![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
The book is devoted to the analysis of promotional material of tourist activities on tourism websites, including walking, dining, and visiting natural and cultural heritage sights, as instances of multimodal texts through a case study of Croatian and Scottish tourism websites.
As innovators continue to explore and create new developments within the fields of artificial intelligence and computer science, subfields such as machine learning and the internet of things (IoT) have emerged. Now, the internet of everything (IoE), foreseen as a cohesive and intelligent connection of people, processes, data, and things, is theorized to make internet connections more valuable by converting information into wise actions that create unprecedented capabilities, richer experiences, and economic opportunities to all players in the market. Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities discusses the theoretical, design, evaluation, implementation, and use of innovative technologies within the fields of IoE, machine learning, and IoT. Featuring research on topics such as low-power electronics, mobile technology, and artificial intelligence, this book is ideally designed for computer engineers, software developers, investigators, advanced-level students, professors, and professionals seeking coverage on the various contemporary theories, technologies, and tools in IoE engineering.
The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applications. This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects. Topics appropriate for this Book include, but are not necessarily limited to: - Methods for SO development - IoT Networking - Middleware for SOs - Data Management for SOs - Service-oriented SOs - Agent-oriented SOs - Applications of SOs in Smart Environments: Smart Cities, Smart Health, Smart Buildings, etc. Advanced IoT Projects.
This book examines the internet as a form of power in global politics. Focusing on the United States' internet foreign policy, McCarthy combines analyses of global material culture and international relation theory, to reconsider how technology is understood as a form of social power.
Digital Economy: Impacts, Influences and Challenges provides information about the socioeconomic aspects of the Digital Economy. This set of 18 essays covers the effects of Digital Economy on business transactions, technology and culture, as well as on education. It also covers various aspects of global production, trade, and investment and the effects of Internet. The chapters review best practices from concept to development, through implementation and evaluation. This book is one of the few books that looks at the digital economy from a socio economic angle, offering perspectives from scholars and practitioners of digital economics around the world.
The widespread availability of technologies has increased exponentially in recent years. This ubiquity has created more connectivity and seamless integration among technology devices. Emerging Trends and Applications of the Internet of Things is an essential reference publication featuring the latest scholarly research on the surge of connectivity between computing devices in modern society, as well as the benefits and challenges of this. Featuring extensive coverage on a broad range of topics such as cloud computing, spatial cognition, and ultrasonic sensing, this book is ideally designed for researchers, professionals, and academicians seeking current research on upcoming advances in the Internet of Things (IoT).
Software Evolution with UML and XML provides a forum where expert insights are presented on the subject of linking three current phenomena: software evolution, UML and XML. Software evolution and reengineering are a real problem in the software industry; various attempts have been made in these areas and there is still room for improvement. Tackling evolution with the help of UML and XML can be very beneficial to the software community, especially as the cost of software evolution makes up a considerable proportion, sometimes even 70-80 per cent, of the total budget of a software system. Software Evolution with UML and XML not only investigates the potential powerful applications of two popularly used languages, UML and XML, in the field of software evolution, but also discovers what will happen when these three are linked to work together.
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.
Eye tracking is a widely used research method, but there are many questions and misconceptions about how to effectively apply it. Eye Tracking the User Experience--the first how-to book about eye tracking for UX practitioners--offers step-by-step advice on how to plan, prepare, and conduct eye tracking studies; how to analyze and interpret eye movement data; and how to successfully communicate eye tracking findings.
This book combines semi-physical simulation technology with an Internet of Things (IOT) application system based on novel mathematical methods such as the Fisher matrix, artificial neural networks, thermodynamic analysis, support vector machines, and image processing algorithms. The dynamic testing and semi-physical verification of the theory and application were conducted for typical IOT systems such as RFID systems, Internet of Vehicles systems, and two-dimensional barcode recognition systems. The findings presented are of great scientific significance and have wide application potential for solving bottlenecks in the development of RFID technology and IOT engineering. The book is a valuable resource for postgraduate students in fields such as computer science and technology, control science and engineering, and information science. Moreover, it is a useful reference resource for researchers in IOT and RFID-related industries, logistics practitioners, and system integrators.
If you are in charge of the user experience, development, or strategy for a web site, A Web for Everyone will help you make your site accessible without sacrificing design or innovation. Rooted in universal design principles, this book provides solutions: practical advice and examples of how to create sites that everyone can use.
Web-based training, known as e-learning, has experienced a great evolution and growth in recent years, as the capacity for education is no longer limited by physical and time constraints. The emergence of such a prized learning tool mandates a comprehensive evaluation of the effectiveness and implications of e-learning. This book explores the technical, pedagogical, methodological, tutorial, legal, and emotional aspects of e-learning, considering and analyzing its different application contexts, and providing researchers and practitioners with an innovative view of e-learning as a lifelong learning tool for scholars in both academic and professional spheres.
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments. From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn.
Just as pilots and doctors improve by studying crash reports and postmortems, experience designers can improve by learning how customer experience failures cause products to fail in the marketplace. Rather than proselytizing a particular approach to design, Why We Fail holistically explores what teams actually built, why the products failed, and how we can learn from the past to avoid failure ourselves.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
Search is not just a box and ten blue links. Search is a
journey: an exploration where what we encounter along the way
changes what we seek. But in order to guide people along this
journey, designers must understand both the art and science of
search.In "Designing the Search Experience, "authors Tony
Russell-Rose and Tyler Tate weave together the theories of
information seeking with the practice of user interface
design. Understand how people search, and how the concepts of information seeking, information foraging, and sensemaking underpin the search process. Apply the principles of user-centered design to the search box, search results, faceted navigation, mobile interfaces, social search, and much more. Design the cross-channel search experiences of tomorrow that span desktop, tablet, mobile, and other devices.
This book provides a comprehensive introduction to all major topics in digital signal processing (DSP). The book is designed to serve as a textbook for courses offered to undergraduate students enrolled in electrical, electronics, and communication engineering disciplines. The text is augmented with many illustrative examples for easy understanding of the topics covered. Every chapter contains several numerical problems with answers followed by question-and-answer type assignments. The detailed coverage and pedagogical tools make this an ideal textbook for students and researchers enrolled in electrical engineering and related programs.
This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution. |
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
|