Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet
Offers access to projects of some of the top professionals working in Real-Time Content Production today like engineering teams from "The Mandalorian" & League of Legends as well as video content designers for The Foo Fighters and Back to the Future, The Musical Includes reviews of real-time content production workflow for virtual production Features discussion from the software developers about the origins of their platforms
This book presents a design methodology that is practically applicable to the architectural design of a broad range of systems. It is based on fundamental design concepts to conceive and specify the required functional properties of a system, while abstracting from the specific implementation functions and technologies that can be chosen to build the system. Abstraction and precision are indispensable when it comes to understanding complex systems and precisely creating and representing them at a high functional level. Once understood, these concepts appear natural, self-evident and extremely powerful, since they can directly, precisely and concisely reflect what is considered essential for the functional behavior of a system. The first two chapters present the global views on how to design systems and how to interpret terms and meta-concepts. This informal introduction provides the general context for the remainder of the book. On a more formal level, Chapters 3 through 6 present the main basic design concepts, illustrating them with examples. Language notations are introduced along with the basic design concepts. Lastly, Chapters 7 to 12 discuss the more intricate basic design concepts of interactive systems by focusing on their common functional goal. These chapters are recommended to readers who have a particular interest in the design of protocols and interfaces for various systems. The didactic approach makes it suitable for graduate students who want to develop insights into and skills in developing complex systems, as well as practitioners in industry and large organizations who are responsible for the design and development of large and complex systems. It includes numerous tangible examples from various fields, and several appealing exercises with their solutions.
The book provides a comprehensive exposition of all major topics in digital signal processing (DSP). With numerous illustrative examples for easy understanding of the topics, it also includes MATLAB-based examples with codes in order to encourage the readers to become more confident of the fundamentals and to gain insights into DSP. Further, it presents real-world signal processing design problems using MATLAB and programmable DSP processors. In addition to problems that require analytical solutions, it discusses problems that require solutions using MATLAB at the end of each chapter. Divided into 13 chapters, it addresses many emerging topics, which are not typically found in advanced texts on DSP. It includes a chapter on adaptive digital filters used in the signal processing problems for faster acceptable results in the presence of changing environments and changing system requirements. Moreover, it offers an overview of wavelets, enabling readers to easily understand the basics and applications of this powerful mathematical tool for signal and image processing. The final chapter explores DSP processors, which is an area of growing interest for researchers. A valuable resource for undergraduate and graduate students, it can also be used for self-study by researchers, practicing engineers and scientists in electronics, communications, and computer engineering as well as for teaching one- to two-semester courses.
Learn how to program JavaScript while creating interactive audio applications with JavaScript for Sound Artists: Learn to Code With the Web Audio API! William Turner and Steve Leonard showcase the basics of JavaScript language programing so that readers can learn how to build browser based audio applications, such as music synthesizers and drum machines. The companion website offers further opportunity for growth. Web Audio API instruction includes oscillators, audio file loading and playback, basic audio manipulation, panning and time. This book encompasses all of the basic features of JavaScript with aspects of the Web Audio API to heighten the capability of any browser. Key Features Uses the readers existing knowledge of audio technology to facilitate learning how to program using JavaScript. The teaching will be done through a series of annotated examples and explanations. Downloadable code examples and links to additional reference material included on the books companion website. This book makes learning programming more approachable to nonprofessional programmers The context of teaching JavaScript for the creative audio community in this manner does not exist anywhere else in the market and uses example-based teaching
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient's prevention plans or to allow medical professionals to access the patient's current status. This book will be of value to all with an interest in this expanding field.
This volume is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. It includes the refereed conference papers from the 6th International Conference on COINs, June 8-11, 2016, in Rome, Italy. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs16 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This book provides a general and comprehensible overview of imbalanced learning. It contains a formal description of a problem, and focuses on its main features, and the most relevant proposed solutions. Additionally, it considers the different scenarios in Data Science for which the imbalanced classification can create a real challenge. This book stresses the gap with standard classification tasks by reviewing the case studies and ad-hoc performance metrics that are applied in this area. It also covers the different approaches that have been traditionally applied to address the binary skewed class distribution. Specifically, it reviews cost-sensitive learning, data-level preprocessing methods and algorithm-level solutions, taking also into account those ensemble-learning solutions that embed any of the former alternatives. Furthermore, it focuses on the extension of the problem for multi-class problems, where the former classical methods are no longer to be applied in a straightforward way. This book also focuses on the data intrinsic characteristics that are the main causes which, added to the uneven class distribution, truly hinders the performance of classification algorithms in this scenario. Then, some notes on data reduction are provided in order to understand the advantages related to the use of this type of approaches. Finally this book introduces some novel areas of study that are gathering a deeper attention on the imbalanced data issue. Specifically, it considers the classification of data streams, non-classical classification problems, and the scalability related to Big Data. Examples of software libraries and modules to address imbalanced classification are provided. This book is highly suitable for technical professionals, senior undergraduate and graduate students in the areas of data science, computer science and engineering. It will also be useful for scientists and researchers to gain insight on the current developments in this area of study, as well as future research directions.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.
Teachers of political science, social studies, and economics, as well as school library media specialists, will find this resource invaluable for incorporating the Internet into their classroom lessons. Over 150 primary source Web sites are referenced and paired with questions and activities designed to encourage critical thinking skills. Completing the activities for the lessons in this book will allow students to evaluate the source of information, the content presented, and it usefulness in the context of their assignments. Along with each Web site, a summary of the site's contents identifies important primary source documents such as constitutions, treaties, speeches, court cases, statistics, and other official documents. The questions and activites invite the students to log on to the Web site, read the information presented, interact with the data, and analyze it critically to answer such questions as: Who created this document? Is the source reliable? How is the information useful and how does it relate to present-day circumstances? If I were in this situation, would I have responded the same way as the person in charge? Strengthening these critical thinking skills will help prepare students for both college and career in the 21st century.
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.
This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.
This work makes major contributions to the thriving area of social, communication, and distributed networks by introducing novel methodologies and tools toward the study of the evolutionary behaviors of these networks, as well as their computational complexity and rates of convergence. By departing from the classical approaches and results in the literature, this work shows that it is possible to handle more complex and realistic nonlinear models where either the traditional approaches fail or lead to weak results. The author also develops several easily implementable algorithms, delivering excellent performance guarantees while running faster than those that exist in the literature. The study undertaken and the approaches adopted enable the analysis of the evolution of several different types of social and distributed networks, with the potential to apply to and resolve several other outstanding issues in such networks.
This book discusses blockchain technology and its potential applications in digital government and the public sector. With its robust infrastructure and append-only record system, blockchain technology is being increasingly employed in the public sector, specifically where trustworthiness and security are of importance. Written by leading scholars and practitioners, this edited volume presents challenges, benefits, regulations, frameworks, taxonomies, and applications of blockchain technology in the public domain. Specifically, the book analyzes the implementation of blockchain technologies in the public sector and the potential reforms it would bring. It discusses emerging technologies and their role in the implementation of blockchain technologies in the public sector. The book details the role of blockchain in the creation of public value in the delivery of public sector services. The book analyzes effects, impacts, and outcomes from the implementation of blockchain technologies in the public sector in select case studies. Providing up-to-date information on important developments regarding blockchain in government around the world, this volume will appeal to academics, researchers, policy-makers, public managers, international organizations, and technical experts looking to understand how blockchain can enhance public service delivery.
The stability analysis of stochastic models for telecommunication systems is an intensively studied topic. The analysis is, as a rule, a difficult problem requiring a refined mathematical technique, especially when one endeavors beyond the framework of Markovian models. The primary purpose of this book is to present, in a unified way, research into the stability analysis of a wide variety of regenerative queueing systems. It describes the theoretical foundations of this method, and then shows how it works with particular models, both classic ones as well as more recent models that have received attention. The focus lies on an in-depth and insightful mathematical explanation of the regenerative stability analysis method. The unique volume can serve as a textbook for students working in these and related scientific areas. The material is also of interest to engineers working in telecommunications field, who may be faced with the problem of stability of queueing systems.
This book provides an overview of the problems involved in engineering scalable, elastic, and cost-efficient cloud computing services and describes the CloudScale method - a description of rescuing tools and the required steps to exploit these tools. It allows readers to analyze the scalability problem in detail and identify scalability anti-patterns and bottlenecks within an application. With the CloudScale method, software architects can analyze both existing and planned IT services. The method allows readers to answer questions like: * With an increasing number of users, can my service still deliver acceptable quality of service? * What if each user uses the service more intensively? Can my service still handle it with acceptable quality of service? * What if the number of users suddenly increases? Will my service still be able to handle it? * Will my service be cost-efficient? First the book addresses the importance of scalability, elasticity, and cost-efficiency as vital quality-related attributes of modern cloud computing applications. Following a brief overview of CloudScale, cloud computing applications are then introduced in detail and the aspects that need to be captured in models of such applications are discussed. In CloudScale, these aspects are captured in instances of the ScaleDL modeling language. Subsequently, the book describes the forward engineering part of CloudScale, which is applicable when developing a new service. It also outlines the reverse and reengineering parts of CloudScale, which come into play when an existing (legacy) service is modified. Lastly, the book directly focuses on the needs of both business-oriented and technical managers by providing guidance on all steps of implementing CloudScale as well as making decisions during that implementation. The demonstrators and reference projects described serve as a valuable starting point for learning from experience. This book is meant for all stakeholders interested in delivering scalable, elastic, and cost-efficient cloud computing applications: managers, product owners, software architects and developers alike. With this book, they can both see the overall picture as well as dive into issues of particular interest.
This book provides scientific research into Cognitive Internet of Things for Smart Society, with papers presented at the 2nd EAI International Conference on Robotic Sensor Networks. The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, with the explosive number of networks models and increasing computational power of computers significantly extending the number of potential applications for robotic technologies while also bringing new challenges to the network's community. The 2nd EAI International Conference on Robotic Sensor Networks was held 25-26 August 2018 at the Kitakyushu International Conference Center (MICE), Kitakyushu, Japan.
This book throws new light on the way in which the Internet impacts on democracy. Based on Jurgen Habermas' discourse-theoretical reconstruction of democracy, it examines one of the world's largest, most diverse but also most unequal democracies, Brazil, in terms of the broad social and legal effects the internet has had. Focusing on the Brazilian constitutional evolution, the book examines how the Internet might impact on the legitimacy of a democratic order and if, and how, it might yield opportunities for democratic empowerment. The book also assesses the ways in which law, as an institution and a system, reacts to the changes and challenges brought about by the Internet: the ways in which law may retain its strength as an integrative force, avoiding a 'virtual' legitimacy crisis.
This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose specific problems for future research.
The Semantic Web has been around for some years with recent advances in mature technologies and applications. Lately, its development has been demonstrated in its contribution to businesses through the enhancement of e-commerce. Semantic Web for Business: Cases and Applications delivers real-life cases that illustrate the benefits of Semantic Web technologies as applied to e-business and e-commerce scenarios. Covering topics such as business integration, organizational knowledge management, and Semantic Web services, this book provides academic research libraries with a comprehensive reference to the commercial capabilities of Semantic Web technologies, as well as practical applications for the benefit of IT professionals, business executives, consultants, and students.
This book provides a timely and comprehensive study of dynamic resource management for network slicing in service-oriented fifth-generation (5G) and beyond core networks. This includes the perspective of developing efficient computation resource provisioning and scheduling solutions to guarantee consistent service performance in terms of end-to-end (E2E) data delivery delay. Network slicing is enabled by the software defined networking (SDN) and network function virtualization (NFV) paradigms. For a network slice with a target traffic load, the E2E service delivery is enabled by virtual network function (VNF) placement and traffic routing with static resource allocations. When data traffic enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. Data traffic has dynamics in different time granularities. For example, the traffic statistics (e.g., mean and variance) can be non-stationary and experience significant changes in a coarse time granularity, which are usually predictable. Within a long time duration with stationary traffic statistics, there are traffic dynamics in small timescales, which are usually highly bursty and unpredictable. To provide continuous QoS performance guarantee and ensure efficient and fair operation of the network slices over time, it is essential to develop dynamic resource management schemes for the embedded services in the presence of traffic dynamics during virtual network operation. Queueing theory is used in system modeling, and different techniques including optimization and machine learning are applied to solving the dynamic resource management problems. Based on a simplified M/M/1 queueing model with Poisson traffic arrivals, an optimization model for flow migration is presented to accommodate the large-timescale changes in the average traffic rates with average E2E delay guarantee, while addressing a trade-off between load balancing and flow migration overhead. To overcome the limitations of Poisson traffic model, the authors present a machine learning approach for dynamic VNF resource scaling and migration. The new solution captures the inherent traffic patterns in a real-world traffic trace with non-stationary traffic statistics in large timescale, predicts resource demands for VNF resource scaling, and triggers adaptive VNF migration decision making, to achieve load balancing, migration cost reduction, and resource overloading penalty suppression in the long run. Both supervised and unsupervised machine learning tools are investigated for dynamic resource management. To accommodate the traffic dynamics in small time granularities, the authors present a dynamic VNF scheduling scheme to coordinate the scheduling among VNFs of multiple services, which achieves network utility maximization with delay guarantee for each service. Researchers and graduate students working in the areas of electrical engineering, computing engineering and computer science will find this book useful as a reference or secondary text. Professionals in industry seeking solutions to dynamic resource management for 5G and beyond networks will also want to purchase this book.
The Internet has dramatically altered the landscape of crime and national security, creating new threats, such as identity theft, computer viruses, and cyberattacks. Moreover, because cybercrimes are often not limited to a single site or nation, crime scenes themselves have changed. Consequently, law enforcement must confront these new dangers and embrace novel methods of prevention, as well as produce new tools for digital surveillance-which can jeopardize privacy and civil liberties. Cybercrime brings together leading experts in law, criminal justice, and security studies to describe crime prevention and security protection in the electronic age. Ranging from new government requirements that facilitate spying to new methods of digital proof, the book is essential to understand how criminal law-and even crime itself-have been transformed in our networked world. Contributors: Jack M. Balkin, Susan W. Brenner, Daniel E. Geer, Jr., James Grimmelmann, Emily Hancock, Beryl A. Howell, Curtis E.A. Karnow, Eddan Katz, Orin S. Kerr, Nimrod Kozlovski, Helen Nissenbaum, Kim A. Taipale, Lee Tien, Shlomit Wagman, and Tal Zarsky. Jack M. Balkin is Knight Professor of Constitutional Law and the First Amendment at Yale Law School, and the Founder and Director of Yale's Information Society Project (ISP). He is the co-editor of The State of Play: Law, Games, and Virtual Worlds, also from NYU Press. James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky are Fellows of the ISP. Eddan Katz is the Executive Director of the Information Society Project. |
You may like...
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|