![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
Eye tracking is a widely used research method, but there are many questions and misconceptions about how to effectively apply it. Eye Tracking the User Experience--the first how-to book about eye tracking for UX practitioners--offers step-by-step advice on how to plan, prepare, and conduct eye tracking studies; how to analyze and interpret eye movement data; and how to successfully communicate eye tracking findings.
The implementation of virtual environments in education has been rapidly increasing in frequency after the COVID-19 pandemic. As these technologies rise in popularity, it is essential to understand the roles digital technologies play in fostering connections and learning, the affordances of digital texts and spaces for virtual classroom experiences, the difficulties educators have faced and how these practices have been crafted to meet these challenges, and more. Innovations in Digital Instruction Through Virtual Environments advances knowledge about the pedagogical decisions and lived experiences of researchers and educators both before and after the COVID-19 pandemic. It features research from those who have worked to sustain and develop digital/media pedagogical practices. Covering topics such as active learning environments, emotional labor, and textual engagements, this premier reference source is an excellent resource for educators and administrators of both K-12 and higher education, pre-service teachers, teacher educators, librarians, researchers, and academicians.
Web-based training, known as e-learning, has experienced a great evolution and growth in recent years, as the capacity for education is no longer limited by physical and time constraints. The emergence of such a prized learning tool mandates a comprehensive evaluation of the effectiveness and implications of e-learning. This book explores the technical, pedagogical, methodological, tutorial, legal, and emotional aspects of e-learning, considering and analyzing its different application contexts, and providing researchers and practitioners with an innovative view of e-learning as a lifelong learning tool for scholars in both academic and professional spheres.
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments. From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn.
Just as pilots and doctors improve by studying crash reports and postmortems, experience designers can improve by learning how customer experience failures cause products to fail in the marketplace. Rather than proselytizing a particular approach to design, Why We Fail holistically explores what teams actually built, why the products failed, and how we can learn from the past to avoid failure ourselves.
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
Search is not just a box and ten blue links. Search is a
journey: an exploration where what we encounter along the way
changes what we seek. But in order to guide people along this
journey, designers must understand both the art and science of
search.In "Designing the Search Experience, "authors Tony
Russell-Rose and Tyler Tate weave together the theories of
information seeking with the practice of user interface
design. Understand how people search, and how the concepts of information seeking, information foraging, and sensemaking underpin the search process. Apply the principles of user-centered design to the search box, search results, faceted navigation, mobile interfaces, social search, and much more. Design the cross-channel search experiences of tomorrow that span desktop, tablet, mobile, and other devices.
This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
This book focuses on how to apply network coding at different layers in wireless networks - including MAC, routing, and TCP - with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, redundant information ration) in order to be suitable for the varying wireless environments. The author explores how to deploy network coding in MAC to improve network performance and examine joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the author considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.
"Blue Pelican Java" is a somewhat unusual high school computer science textbook. Most computer science texts will begin with a section on the history of computers followed with a flurry of definitions that are just "so many words" to the average student. The approach here is to first give the student some experience upon which to hang the definitions that come later. The usual practice of introducing classes and objects is deferred until the student has a firm grasp of the fundamentals (loops, decision structures, etc). Thus, the beginning student is not overwhelmed by the simultaneous introduction of OOPs and the fundamentals. The book includes plenty of exercises (many in "contest" form), programming projects, and a huge appendix.
The world of healthcare is constantly evolving, ever increasing in complexity, costs, and stakeholders, and presenting huge challenges to policy making, decision making and system design. In Design for Care, we'll show how service and information designers can work with practice professionals and patients/advocates to make a positive difference in healthcare.
The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet. As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed. Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.
Care about content? Better copy isn't enough. As devices and channels multiply--and as users expect to relate, share, and shift information quickly--we need content that can go more places, more easily. Content Everywhere will help you stop creating fixed, single-purpose content and start making it more future-ready, flexible, reusable, manageable, and meaningful wherever it needs to go.
Social networks have emerged as a major trend in computing and social paradigms in the past few years. The social network model helps to inform the study of community behavior, allowing qualitative and quantitative assessments of how people communicate and the rules that govern communication. Social Networking and Community Behavior Modeling: Qualitative and Quantitative Measures provides a clear and consolidated view of current social network models. This work explores new methods for modeling, characterizing, and constructing social networks. Chapters contained in this book study critical security issues confronting social networking, the emergence of new mobile social networking devices and applications, network robustness, and how social networks impact the business aspects of organizations.
This book offers a thorough examination of potential game theory and its applications in radio resource management for wireless communications systems and networking. The book addresses two major research goals: how to identify a given game as a potential game, and how to design the utility functions and the potential functions with certain special properties in order to formulate a potential game. After proposing a unifying mathematical framework for the identification of potential games, the text surveys existing applications of this technique within wireless communications and networking problems found in OFDMA 3G/4G/WiFi networks, as well as next-generation systems such as cognitive radios and dynamic spectrum access networks. Professionals interested in understanding the theoretical aspect of this specialized field will find Potential Game Theory a valuable resource, as will advanced-level engineering students. It paves the way for extensive and rigorous research exploration on a topic whose capacity for practical applications is vast but not yet fully exploited.
Many designers enjoy the interfaces seen in science fiction films and television shows. Freed from the rigorous constraints of designing for real users, sci-fi production designers develop blue-sky interfaces that are inspiring, humorous, and even instructive. By carefully studying these "outsider" user interfaces, designers can derive lessons that make their real-world designs more cutting edge and successful.
'We need more warriors like Carrie' TARANA BURKE, founder of the MeToo movement 'In the age of doxxing, revenge porn, and misogynist trolls, this book is required reading' ESQUIRE Nobody's Victim is an unflinching look at a hidden world most people don't know exists-one of stalking, blackmail, and sexual violence, online and off-and the incredible story of how one lawyer, determined to fight back, turned her own hell into a revolution. Nobody's Victim invites readers to join Carrie Goldberg on the front lines of the war against sexual violence and privacy violations as her law firm sues the hell out of tech companies, schools, and sexual predators. Her battleground is the courtroom; her crusade is to transform clients from victims into warriors. In gripping detail, Carrie shares the diabolical ways her clients are attacked and how she, through her unique combination of relentless advocacy, badass risk-taking, and unique client-empowerment, pursues justice for them all. There is the ex-boyfriend who made fake bomb threats in a client's name, causing a national panic; the girl who was sexually assaulted on school grounds and then suspended when she reported the attack; and the guy who used a dating app to send more than 1,200 men to his ex's home and office for sex. Carrie also shares her own shattering story about why she began her work and became the lawyer she needed. Riveting and essential, Nobody's Victim is a bold and timely analysis of victim protection in the era of the Internet. This book is an urgent warning of a coming crisis, a predictor of imminent danger, and a weapon to take back control and protect ourselves-both online and off. 'A rallying cry for privacy justice . . . chilling . . . take-no-prisoners and warmly gregarious' New York Times *Perfect for fans of She Said by Jodi Kantor and Megan Twohey, The Whisper Network by Chandler Baker and The Good Fight*
"There is much of value in Jenkins' work. He manages to discuss CP
calmly, while at the same time making clear his personal revulsion,
an achievement in itself in an area characterized by so much
hysteria." "Magnificently readable social science on a widely misunderstood
subject." "A useful introduction to the methods that the kiddie-porn
community uses to hide its activities...a smart history of the
child-porn industry" "This is a troubling book that exposes how child pornography has
found a safe haven on the Internet. Philip Jenkins's innovative
research methods let him explore and map the secret electronic
networks that link individuals whose deviance seems not just
outrageous, but incomprehensible. Jenkins shows how culture and
social structure emerge in a virtual--and decidedly not
virtuous--world. This book raises profound questions about the
nature of deviance in an electronic future." "A disturbing, thought-provoking study" "A detailed yet engaging account . . . . Engrossing" Perhaps nothing evokes more universal disgust as child pornography. The world of its makers and users is so abhorrent that it is rarely discussed much less studied. Child pornographers have taken advantage of this and are successfully using the new electronic media to exchange their wares without detection or significant sanction. What are the implications of this threat for free speech and a free exchange of ideas on the internet? And how can we stop this illegal activity, which is so repugnant that eventhe most laissez-faire cyberlibertarians want it stamped out, if we know nothing about it? Philip Jenkins takes a leap onto the lower tiers of electronic media in this first book on the business of child pornography online. He tells the story of how the advent of the internet caused this deviant subculture to become highly organized and go global. We learn how the trade which operates on clandestine websites from Budapest or Singapore to the U.S. is easy to glimpse yet difficult to eradicate. Jenkins details how the most sophisticated transactions are done through a proxy, a "false flag" address, rendering the host computer, and participants, virtually unidentifiable. And these sites exist for only a few minutes or hours allowing on-line child pornographers to stay one step ahead of the law. This is truly a globalized criminal network which knows no names or boundaries, and thus challenges both international and U.S. law. Beyond Tolerance delves into the myths and realities of child pornography and the complex process to stamp out criminal activity over the web, including the timely debates over trade regulation, users' privacy, and individual rights. This sobering look and a criminal community contains lessons about human behavior and the law that none interested in media and the new technology can afford to ignore. |
You may like...
Recent Advances in CFD for Wind and…
Esteban Ferrer, Adeline Montlaur
Hardcover
R2,653
Discovery Miles 26 530
Ejectors for Efficient Refrigeration…
Giuseppe Grazzini, Adriano Milazzo, …
Hardcover
R3,795
Discovery Miles 37 950
Vortex Rings and Jets - Recent…
Daniel T H New, Simon C M Yu
Hardcover
R2,685
Discovery Miles 26 850
High Speed Catamarans and Multihulls…
Liang Yun, Alan Bliault, …
Hardcover
R7,275
Discovery Miles 72 750
|