![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This book provides an in-depth coverage of the most recent developments in the field of wireless underground communications, from both theoretical and practical perspectives. The authors identify technical challenges and discuss recent results related to improvements in wireless underground communications and soil sensing in Internet of Underground Things (IOUT). The book covers both existing network technologies and those currently in development in three major areas of SitS: wireless underground communications, subsurface sensing, and antennas in the soil medium. The authors explore novel applications of Internet of Underground Things in digital agriculture and autonomous irrigation management domains. The book is relevant to wireless researchers, academics, students, and decision agriculture professionals. The contents of the book are arranged in a comprehensive and easily accessible format. Focuses on fundamental issues of wireless underground communication and subsurface sensing; Includes advanced treatment of IOUT custom applications of variable-rate technologies in the field of decision agriculture, and covers protocol design and wireless underground channel modeling; Provides a detailed set of path loss, antenna, and wireless underground channel measurements in various novel Signals in the Soil (SitS) testbed settings.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019) took place in Coimbatore, India on December 12-13, 2019. Contains proceedings from 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019), Coimbatore, India, December 12-13, 2019; Features topics ranging from Data Science for Cognitive Analysis to Internet-Based Cognitive Platforms; Includes contributions from researchers, academics, and professionals from around the world.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.
Contesting Media Power is the most ambitious international collection to date on the worldwide growth of alternative media that are challenging the power concentration in large media corporations. Media scholars and political scientists develop a broad comparative framework for analyzing alternative media in Australia, Chile, China, Indonesia, Malaysia, Russia, Sweden, South Africa, the United Kingdom, and the United States. Topics include independent media centers, gay online networks and alternative web discussion forums, feminist film, political journalism and social networks, indigenous communication, and church-sponsored media. This important book will help shape debates on the media's role in current global struggles, such as the anti-globalization movement.
Since the dawn of the digital era, the transfer of knowledge has shifted from analog to digital, local to global, and individual to social. Complex networked communities are a fundamental part of these new information-based societies. Emerging Pedagogies in the Networked Knowledge Society: Practices Integrating Social Media and Globalization examines the production, dissemination, and consumption of knowledge within networked communities in the wider global context of pervasive Web 2.0 and social media services. This book will offer insight for business stakeholders, researchers, scholars, and administrators by highlighting the important concepts and ideas of information- and knowledge-based economies.
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work. Chapters are written by researchers from around the world, bringing perspectives from diverse fields and subject areas. The respective authors describe their work, their research, and their learning. Topics include semantic web for cultural heritage valorization, machine learning for parody detection by classification, psychological text analysis, crowdsourcing imagery coding in natural disasters, and creating inheritable digital codebooks.Designed for researchers and academics, this book is suitable for those interested in methodologies and analytics that can be applied in literature, history, philosophy, linguistics, and related disciplines. Professionals such as librarians, archivists, and historians will also find the content informative and instructive.
Although the field of mixed reality has grown significantly over the last decade, there have been few published books about augmented reality, particularly the interface design aspects. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" provides a foundation of the main concepts of augmented reality (AR), with a particular emphasis on user interfaces, design, and practical AR techniques, from tracking algorithms to design principles for AR interfaces. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" contains comprehensive information focusing on the following topics: technologies that support AR, development environments, interface design and evaluation of applications, and case studies of AR applications.
Cyber-physical systems play a crucial role in connecting aspects of online life to physical life. By studying emerging trends in these systems, programming techniques can be optimized and strengthened to create a higher level of effectiveness. Solutions for Cyber-Physical Systems Ubiquity is a critical reference source that discusses the issues and challenges facing the implementation, usage, and challenges of cyber-physical systems. Highlighting relevant topics such as the Internet of Things, smart-card security, multi-core environments, and wireless sensor nodes, this scholarly publication is ideal for engineers, academicians, computer science students, and researchers that would like to stay abreast of current methodologies and trends involving cyber-physical system progression. Topics Covered The many academic areas covered in this publication include, but are not limited to: Automotive Domain Internet of Things Multi-Core Environments Safety Concerns Security strategies Smart Card Security System Verification Wireless Sensor Nodes
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.
This book constitutes the refereed proceedings of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, held virtually and in Hersonissos, Crete, Greece, in June 2021. The 50 full papers and 11 short papers presented were carefully reviewed and selected from 113 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: adaptive modeling/ neuroscience; AI in biomedical applications; AI impacts/ big data; automated machine learning; autonomous agents; clustering; convolutional NN; data mining/ word counts; deep learning; fuzzy modeling; hyperdimensional computing; Internet of Things/ Internet of energy; machine learning; multi-agent systems; natural language; recommendation systems; sentiment analysis; and smart blockchain applications/ cybersecurity. Chapter "Improving the Flexibility of Production Scheduling in Flat Steel Production Through Standard and AI-based Approaches: Challenges and Perspective" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.
Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint application in business processes. The applications of electronic commerce draw great attention of the practitioners in applying digital technologies to the buy-and-sell activities. This first volume addresses the importance of management and technology issues in electronic business, including collaborative design, collaborative engineering, collaborative decision making, electronic collaboration, communication and cooperation, workflow collaboration, knowledge networking, collaborative e-learning, costs and benefits analysis of collaboration, collaborative transportation, and ethics.
Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.
This work discusses issues relating to distance education and distributed learning. There are essays covering: rethinking assessment for the online environment; the role of collaborative learning in social and intellectual development; and the embodiment of knowledge in virtual environments.
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.
Your complete guide to the Joomla content management system Whether you use Joomla to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. "Joomla Bible, Second Edition" is that book. It not only brings you up to speed on the changes and extensions that are now part of Joomla 3.0, it thoroughly covers functions and tasks, including installation, configuration, management, advanced modules, and extended coverage of two key extensions. You'll learn how to obtain code and deploy it to a server; how to obtain, modify, and delete content; how to choose between the Joomla Platform and the Joomla CMS; and more. By the time you finish the "Joomla Bible, Second Edition," you'll be well prepared to build and maintain a Joomla -based website.Walks you through obtaining the Joomla 3.0 code and how to deploy it to a server, configure the site, create content, and manage content and user hierarchiesHelps you get the most out of core modules that provide advanced functionality, including the Polls Module, the Banner Manager, Content Syndication, Newsfeed Aggregation, and othersIncludes hands-on tutorials and real-world practical applications Whether you're a content manager, website manager, developer, or do-it-yourselfer, make sure you keep "Joomla Bible, Second Edition" on hand.
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Social Media has transformed the ways in which individuals keep in touch with family and friends. Likewise, businesses have identified the profound opportunities present for customer engagement and understanding through the massive data available on social media channels, in addition to the customer reach of such sites. Social Media Listening and Monitoring for Business Applications explores research-based solutions for businesses of all types interested in an understanding of emerging concepts and technologies for engaging customers online. Providing insight into the currently available social media tools and practices for various business applications, this publication is an essential resource for business professionals, graduate-level students, technology developers, and researchers. |
![]() ![]() You may like...
Natural Disaster and Reconstruction in…
Kinnia Yau Shuk-Ting
Hardcover
R3,486
Discovery Miles 34 860
Tools and Techniques for Economic…
Jelena Stankovi, Pavlos Delias, …
Hardcover
R5,603
Discovery Miles 56 030
Operations and Supply Chain Management
James Evans, David Collier
Hardcover
Problems, Methods and Tools in…
Kesra Nermend, Malgorzata Latuszynska
Hardcover
R4,395
Discovery Miles 43 950
Fuzzy Decision-Making Methods Based on…
Xiaoli Tian, Zeshui Xu
Hardcover
R3,611
Discovery Miles 36 110
|