![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
This book provides basic knowledge of advanced microcontrollers associated with large systems and devices. The book determines the feasibility of the advanced controllers from an Industry 4.0 perspective, which is associated with Integrated Internet of Things (IIoT) when developing larger smart cities. Also, it describes potential applications, key areas of Industry 4.0, and controlling applications with microcontrollers. Chapters include IoT with integrated control applications in smart city paradigm; agriculture, public safety, women and child care & welfare; healthcare, water management, government and administration; environmental impact, energy with management of information systems; and safety, education, transportation systems with advanced controllers.
The widespread availability of technologies has increased exponentially in recent years. This ubiquity has created more connectivity and seamless integration among technology devices. Emerging Trends and Applications of the Internet of Things is an essential reference publication featuring the latest scholarly research on the surge of connectivity between computing devices in modern society, as well as the benefits and challenges of this. Featuring extensive coverage on a broad range of topics such as cloud computing, spatial cognition, and ultrasonic sensing, this book is ideally designed for researchers, professionals, and academicians seeking current research on upcoming advances in the Internet of Things (IoT).
This book presents the characteristics and benefits industrial organizations can reap from the Industrial Internet of Things (IIoT). These characteristics and benefits include enhanced competitiveness, increased proactive decision-making, improved creativity and innovation, augmented job creation, heightened agility to respond to continuously changing challenges, and intensified data-driven decision making. In a straightforward fashion, the book also helps readers understand complex concepts that are core to IIoT enterprises, such as Big Data, analytic architecture platforms, machine learning (ML) and data science algorithms, and the power of visualization to enrich the domains experts' decision making. The book also guides the reader on how to think about ways to define new business paradigms that the IIoT facilitates, as well how to increase the probability of success in managing analytic projects that are the core engine of decision-making in the IIoT enterprise. The book starts by defining an IIoT enterprise and the framework used to efficiently operate. A description of the concepts of industrial analytics, which is a major engine for decision making in the IIoT enterprise, is provided. It then discusses how data and machine learning (ML) play an important role in increasing the competitiveness of industrial enterprises that operate using the IIoT technology and business concepts. Real world examples of data driven IIoT enterprises and various business models are presented and a discussion on how the use of ML and data science help address complex decision-making problems and generate new job opportunities. The book presents in an easy-to-understand manner how ML algorithms work and operate on data generated in the IIoT enterprise. Useful for any industry professional interested in advanced industrial software applications, including business managers and professionals interested in how data analytics can help industries and to develop innovative business solutions, as well as data and computer scientists who wish to bridge the analytics and computer science fields with the industrial world, and project managers interested in managing advanced analytic projects.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
This book combines semi-physical simulation technology with an Internet of Things (IOT) application system based on novel mathematical methods such as the Fisher matrix, artificial neural networks, thermodynamic analysis, support vector machines, and image processing algorithms. The dynamic testing and semi-physical verification of the theory and application were conducted for typical IOT systems such as RFID systems, Internet of Vehicles systems, and two-dimensional barcode recognition systems. The findings presented are of great scientific significance and have wide application potential for solving bottlenecks in the development of RFID technology and IOT engineering. The book is a valuable resource for postgraduate students in fields such as computer science and technology, control science and engineering, and information science. Moreover, it is a useful reference resource for researchers in IOT and RFID-related industries, logistics practitioners, and system integrators.
This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.
Digital Economy: Impacts, Influences and Challenges provides information about the socioeconomic aspects of the Digital Economy. This set of 18 essays covers the effects of Digital Economy on business transactions, technology and culture, as well as on education. It also covers various aspects of global production, trade, and investment and the effects of Internet. The chapters review best practices from concept to development, through implementation and evaluation. This book is one of the few books that looks at the digital economy from a socio economic angle, offering perspectives from scholars and practitioners of digital economics around the world.
This new edition provides step-by-step instruction on modern 3D graphics shader programming in OpenGL with C , along with its theoretical foundations. It is appropriate both for computer science graphics courses and for professionals interested in mastering 3D graphics skills. Ithas been designed in a 4-color, "teach-yourself" format with numerousexamples that the reader can run just as presented. Every shader stage is explored,from the basics of modeling, textures, lighting, shadows, etc., throughadvanced techniques such as tessellation, normal mapping, noise maps, as wellas new chapters on simulating water, stereoscopy, and ray tracing. FEATURES: Covers modern OpenGL 4.0 shaderprogramming in C , with instructions for both PC/Windows and Macintosh Illustrates every technique with runningcode examples. Everything needed to install the libraries, and complete sourcecode for each example Includes step-by-step instruction for usingeach GLSL programmable pipeline stage (vertex, tessellation, geometry, andfragment) Explores practical examples formodeling, lighting, and shadows (including soft shadows), terrain, water, and 3Dmaterials such as wood and marble Adds new chapters on simulating water, stereoscopy, and ray tracing with compute shaders Explains how to optimize code for tools such as Nvidia's Nsight debugger Includes companion files with code,object models, figures, and more.
Software Evolution with UML and XML provides a forum where expert insights are presented on the subject of linking three current phenomena: software evolution, UML and XML. Software evolution and reengineering are a real problem in the software industry; various attempts have been made in these areas and there is still room for improvement. Tackling evolution with the help of UML and XML can be very beneficial to the software community, especially as the cost of software evolution makes up a considerable proportion, sometimes even 70-80 per cent, of the total budget of a software system. Software Evolution with UML and XML not only investigates the potential powerful applications of two popularly used languages, UML and XML, in the field of software evolution, but also discovers what will happen when these three are linked to work together.
This innovative monograph focuses on a contemporary form of computer-based literature called 'literary hypertext', a digital, interactive, communicative form of new media writing. Canonizing Hypertext combines theoretical and hermeneutic investigations with empirical research into the motivational and pedagogic possibilities of this form of literature. It focuses on key questions for literary scholars and teachers: How can literature be taught in such a way as to make it relevant for an increasingly hypermedia-oriented readership? How can the rapidly evolving new media be integrated into curricula that still seek to transmit traditional literary competence? How can the notion of literary competence be broadened to take into account these current trends? This study, which argues for hypertexts integration in the literary canon, offers a critical overview of developments in hypertext theory, an exemplary hypertext canon and an evaluation of possible classroom applications.
Web-based training, known as e-learning, has experienced a great evolution and growth in recent years, as the capacity for education is no longer limited by physical and time constraints. The emergence of such a prized learning tool mandates a comprehensive evaluation of the effectiveness and implications of e-learning. This book explores the technical, pedagogical, methodological, tutorial, legal, and emotional aspects of e-learning, considering and analyzing its different application contexts, and providing researchers and practitioners with an innovative view of e-learning as a lifelong learning tool for scholars in both academic and professional spheres.
The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applications. This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects. Topics appropriate for this Book include, but are not necessarily limited to: - Methods for SO development - IoT Networking - Middleware for SOs - Data Management for SOs - Service-oriented SOs - Agent-oriented SOs - Applications of SOs in Smart Environments: Smart Cities, Smart Health, Smart Buildings, etc. Advanced IoT Projects.
The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments. From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn.
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
This volume gives a comprehensive coverage of Internet technologies. It provides both a contemporary and extensive review of developments in the field and also gives details of research. Areas covered include: developments in the network protocols on which the Internet is based; the evolving capability of the Internet to carry audio and video traffic; and the development in security and payment technologies which are opening up a wide range of commercial electronic applications. As the importance of the Internet continues to increase, this book should be of interest to businesses. Several case studies of on-line services are included. The text should prove useful not only to researchers in the communications and computing sectors working directly in the development of the technology, but also to people working in banking and finance. Business users of the Internet should also find the book to be useful in the development of such applications as Internet trading and corporate intranets.
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
This book provides a comprehensive introduction to all major topics in digital signal processing (DSP). The book is designed to serve as a textbook for courses offered to undergraduate students enrolled in electrical, electronics, and communication engineering disciplines. The text is augmented with many illustrative examples for easy understanding of the topics covered. Every chapter contains several numerical problems with answers followed by question-and-answer type assignments. The detailed coverage and pedagogical tools make this an ideal textbook for students and researchers enrolled in electrical engineering and related programs.
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
Kein Zweifel: A ber soziale Medien erreichen Sie Ihre Kunden am besten, am authentischsten, am persAnlichsten. Was kann Ihnen Besseres passieren, als wenn jemand Ihr Produkt beispielsweise auf Facebook mit einer persAnlichen Empfehlung versieht? Allerdings ist die KomplexitAt von Social-Media-Marketing hoch und die Gefahr extrem groA , jede Menge Zeit und Geld in den sozialen Medien zu verpulvern. Dieses Buch senkt die HA1/4rde fA1/4r den Einsteiger ins Social-Media-Marketing und gibt Ihnen einen einfachen Leitfaden an die Hand, um erfolgreicher im Social Web zu werben. Finden Sie Ihren Wunschkunden, definieren Sie Ihre Ziele und Ihre Marketingstrategie passend zu Ihren Ressourcen und optimieren Sie Ihren Arbeitseinsatz. Werden Sie Ihr eigener Influencer! |
![]() ![]() You may like...
Research Anthology on Applying Social…
Information R Management Association
Hardcover
R10,270
Discovery Miles 102 700
An Introduction to XML and Web…
Anders Moller, Michael Schwartzbach
Paperback
R2,648
Discovery Miles 26 480
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|