Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 24 of 24 matches in All Departments
This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization.  Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computation tasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.
This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
This volume consists of introductory lectures on the topics in the new and rapidly developing area of toric homotopy theory, and its applications to the current research in configuration spaces and braids, as well as to more applicable mathematics such as fr-codes and robot motion planning.The book starts intertwining homotopy theoretical and combinatorial ideas within the remits of toric topology and illustrates an attempt to classify in a combinatorial way polytopes known as fullerenes, which are important objects in quantum physics, quantum chemistry and nanotechnology. Toric homotopy theory is then introduced as a further development of toric topology, which describes properties of Davis-Januszkiewicz spaces, moment-angle complexes and their generalizations to polyhedral products. The book also displays the current research on configuration spaces, braids, the theory of limits over the category of presentations and the theory of fr-codes. As an application to robotics, the book surveys topological problems relevant to the motion planning problem of robotics and includes new results and constructions, which enrich the emerging area of topological robotics.The book is at research entry level addressing the core components in homotopy theory and their important applications in the sciences and thus suitable for advanced undergraduate and graduate students.
Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing. Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability. The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions. Distributed System Design outlines the main motivations for building a distributed system, including: inherently distributed applications performance/cost resource sharing flexibility and extendibility availability and fault tolerance scalability Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems. Chapters discuss: the scope of distributed computing systems general distributed programming languages and a CSP-like distributed control description language (DCDL) expressing parallelism, interprocess communication and synchronization, and fault-tolerant design two approaches describing a distributed system: the time-space view and the interleaving view mutual exclusion and related issues, including election, bidding, and self-stabilization prevention and detection of deadlock reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance virtual channels and virtual networks load distribution problems synchronization of access to shared data while supporting a high degree of concurrency
This book is an indispensable guide for anyone seeking to familarize themselves with research in braid groups, configuration spaces and their applications. Starting at the beginning, and assuming only basic topology and group theory, the volume's noted expositors take the reader through the fundamental theory and on to current research and applications in fields as varied as astrophysics, cryptography and robotics. As leading researchers themselves, the authors write enthusiastically about their topics, and include many striking illustrations. The chapters have their origins in tutorials given at a Summer School on Braids, at the National University of Singapore's Institute for Mathematical Sciences in June 2007, to an audience of more than thirty international graduate students.
Future requirements for computing speed, system reliability, and
cost-effectiveness entail the development of alternative computers
to replace the traditional von Neumann organization. As computing
networks come into being, one of the latest dreams is now possible
- distributed computing.
The widespread availability of mobile devices along with recent
advancements in networking capabilities make opportunistic mobile
social networks (MSNs) one of the most promising technologies for
next-generation mobile applications. Opportunistic Mobile Social
Networks supplies a new perspective of these networks that can help
you enhance spontaneous interaction and communication among users
that opportunistically encounter each other, without additional
infrastructure support.
Taking an in-depth look at multicast protocols, the book
explains how to provide pervasive data access to mobile users
without the support of cellular or Internet infrastructures.
Considering privacy and security issues, it surveys a collection of
cutting-edge approaches for minimizing privacy leakage during
opportunistic user profile exchange.
The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.
The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.
This brief summarizes the most commonly used sulfur dioxide surrogates and also shows the diverse reactivities to highlight the advances made in the development of synthetic methods through the insertion of sulfur dioxide. Depending on the nature of the transformation, these reactions are classified into four types: (i) pericyclic reactions; (ii) nucleophilic addition with organometallic reagents; (iii) transition metal catalysis; and (iv) free radical reactions. Highlighting recent advances in the insertion of sulfur dioxide, providing detailed descriptions of the experimental procedures for these valuable reactions, and discussing the remaining challenges in this field, the brief offers an appealing and highly useful guide for a wide readership in organic chemistry and medicinal chemistry from both academia and industry.
This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network, network security, future Internet architecture, Internet application, network management, network protocols and models, wireless and sensor networks.
Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multi processor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority sched uling, partition-based/global scheduling, and application-specific power consumption, etc.
The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010. There were 169 submissions, 96 to the networking track and 73 to the distributed computing track. After review the committee selected 23 papers for the networking and 21 for the distributed computing track. The topics addressed are network protocol and applications, fault-tolerance and security, sensor networks, distributed algorithms and optimization, peer-to-peer networks and network tracing, parallel and distributed systems, wireless networks, applications and distributed systems, optical, cellular and mobile ad hoc networks, and theory of distributed systems.
MSN 2005, the First International Conference on Mobile Ad-hoc and Sensor Networks, was held during 13-15 December 2005, in Wuhan, China. The conference provided a forum for researchers and practitioners to exchange research results and share development experiences. MSN 2005 attracted 512 submissions (including the submissions to the Modeling and Security in Next Generation Mobile Information Systems (MSNG) workshop), among which 100 papers were accepted for the conf- ence and 12 papers were accepted for the workshop. We would like to thank the International Program Committee for their valuable time and effort in reviewing the papers. Special thanks go to the conference PC Vi- chairs, Ivan Stojmenovic, Jang-Ping Sheu and Jianzhong Li for their help in ass- bling the International PC and coordinating the review process. We would also like to thank the Workshop Chair, Dongchun Lee, for organizing the workshop. We would like to express our gratitude to the invited speakers, Laxmi Bhuya, Lionel Ni and Taieb Znati, for their insightful speeches. Finally, we would like to thank the Local Organization Chair, Chuanhe Huang, for making all the local - rangements for the conference. December 2005 Xiaohua Jia Jie Wu Yanxiang He Organization Steering Co-chairs Lionel Ni, Hong Kong University of Science and Technology, HKSAR Jinnan Liu, Wuhan University, PRC General Co-chairs Taieb Znati, University of Pittsburgh, USA Yanxiang He, Wuhan University, PRC Program Co-chairs Jie Wu, Florida Atlantic University, USA Xiaohua Jia, City University of Hong Kong, HKSAR Program Vice Chairs
The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.
This book is one of the first technical overviews of autonomous vehicles written for a general computing and engineering audience. The authors share their practical experiences designing autonomous vehicle systems. These systems are complex, consisting of three major subsystems: (1) algorithms for localization, perception, and planning and control; (2) client systems, such as the robotics operating system and hardware platform; and (3) the cloud platform, which includes data storage, simulation, high-definition (HD) mapping, and deep learning model training. The algorithm subsystem extracts meaningful information from sensor raw data to understand its environment and make decisions as to its future actions. The client subsystem integrates these algorithms to meet real-time and reliability requirements. The cloud platform provides offline computing and storage capabilities for autonomous vehicles. Using the cloud platform, new algorithms can be tested so as to update the HD map-in addition to training better recognition, tracking, and decision models. Since the first edition of this book was released, many universities have adopted it in their autonomous driving classes, and the authors received many helpful comments and feedback from readers. Based on this, the second edition was improved by extending and rewriting multiple chapters and adding two commercial test case studies. In addition, a new section entitled "Teaching and Learning from this Book" was added to help instructors better utilize this book in their classes. The second edition captures the latest advances in autonomous driving and that it also presents usable real-world case studies to help readers better understand how to utilize their lessons in commercial autonomous driving projects. This book should be useful to students, researchers, and practitioners alike. Whether you are an undergraduate or a graduate student interested in autonomous driving, you will find herein a comprehensive overview of the whole autonomous vehicle technology stack. If you are an autonomous driving practitioner, the many practical techniques introduced in this book will be of interest to you. Researchers will also find extensive references for an effective, deeper exploration of the various technologies.
The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.
|
You may like...
|