Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 29 matches in All Departments
Modern devices, from phones and cars to houses and the appliances within them, are being designed with formidable computational power and expanded functionality. To be truly effective, these smart devices must effectively process data from their environment and experiences and make decisions based on that information. Recent Advances in Ambient Intelligence and Context-Aware Computing investigates the functionality of ubiquitous computational systems and how they may adapt to their environment to improve the quality of interaction for the end-user. This reference book will be of value to under- and post-graduate students, professionals, and researchers networking, computer science, communications, and other information technology disciplines.
Ambient Intelligence (AmI) is an emerging paradigm for knowledge discovery, which originally emerged as a design language for invisible computing and smart environments. Since its introduction in the late 1990's, AmI has matured and evolved, having inspired fields including computer science, interaction design, mobile computing, and cognitive science. Ubiquitous Developments in Ambient Computing and Intelligence: Human-Centered Applications provides a comprehensive collection of knowledge in cutting-edge research in fields as diverse as distributed computing, human computer interaction, ubiquitous computing, embedded systems, and other interdisciplinary areas which all contribute to AmI. Predicting the technologies that will shape our ever changing world is difficult however, in this book it is discussed that Ambient Intelligent technology will develop considerably in the future.
Ambient intelligence began as a vision for the future of technology and has now become a reality. The widespread use of modern technology has quickly expanded into the use of our everyday lives. On a daily basis, we are instantly connected to people, places, ideas, and information which have led to the acceleration of knowledge. As the continuing development of new technologies becomes available, those technologies will play an integral role in the future. Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments is a collection of research on the subject matter of human computer interaction, ubiquitous computing, embedded systems, and other areas of study which contribute to ambient intelligence. This comprehensive reference aims to broaden the overall knowledge on ambient intelligence as it relates to the aspects of modern life.
While ambient intelligence has long been relegated to the realm of science fiction, creating smart technology that is increasingly responsive to individuals and environments is, in many ways, becoming reality, as the body of research and opportunity for practical application in this field continues to grow. Innovative Applications of Ambient Intelligence: Advances in Smart Systems provides perspectives on the convergence of ubiquitous computing, intelligent systems research, and context awareness with the aim of encouraging the further development of ambient intelligence frameworks and research. Focusing on interaction and communication in smart environments, as well as the successful development and design of ambient interfaces and platforms, this book aims to further the continuously growing dialogue on the promise of ambient computing.
Reinforces basic principles of digital forensic science with examples of current trends and future prospects Broadens the readers understanding of digital forensic investigations and information security techniques using crime science Shares many tips and insights into unexplored areas of digital forensics and information security from scholars, practitioners and policy makers. Provides a level of language that suits all audiences across the globe Supplies opportunities to practice techniques which demonstrate how crime science can be used to enrich digital forensics and information security
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
A straightforward overview with minimum technical descriptions of
the underlying networking principles, standards, applications and
uses of the Internet. Understanding the Internet explains the
underlying networking concepts, the protocols and standards which
comprise the Internet, Internet trends and applications, the mobile
Internet, security and the hidden Web. The Internet and World Wide
Web are dramatically changing the world we live in and this book
provides a holistic view of the Internet so that practitioners and
users can more fully understand the concepts involved.
Reinforces basic principles of digital forensic science with examples of current trends and future prospects Broadens the readers understanding of digital forensic investigations and information security techniques using crime science Shares many tips and insights into unexplored areas of digital forensics and information security from scholars, practitioners and policy makers. Provides a level of language that suits all audiences across the globe Supplies opportunities to practice techniques which demonstrate how crime science can be used to enrich digital forensics and information security
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
Marriage, Performance, and Politics at the Jacobean Court constitutes the first full-length study of Jacobean nuptial performance, a hitherto unexplored branch of early modern theater consisting of masques and entertainments performed for high-profile weddings. Scripted by such writers as Ben Jonson, Thomas Campion, George Chapman, and Francis Beaumont, these entertainments were mounted for some of the most significant political events of James's English reign. Here Kevin Curran analyzes all six of the elite weddings celebrated at the Jacobean court, reading the masques and entertainments that headlined these events alongside contemporaneously produced panegyrics, festival books, sermons, parliamentary speeches, and other sources. The study shows how, collectively, wedding entertainments turned the idea of union into a politically versatile category of national representation and offered new ways of imagining a specifically Jacobean form of national identity by doing so.
Marriage, Performance, and Politics at the Jacobean Court constitutes the first full-length study of Jacobean nuptial performance, a hitherto unexplored branch of early modern theater consisting of masques and entertainments performed for high-profile weddings. Scripted by such writers as Ben Jonson, Thomas Campion, George Chapman, and Francis Beaumont, these entertainments were mounted for some of the most significant political events of James's English reign. Here Kevin Curran analyzes all six of the elite weddings celebrated at the Jacobean court, reading the masques and entertainments that headlined these events alongside contemporaneously produced panegyrics, festival books, sermons, parliamentary speeches, and other sources. The study shows how, collectively, wedding entertainments turned the idea of union into a politically versatile category of national representation and offered new ways of imagining a specifically Jacobean form of national identity by doing so.
Youth dives into the lives of four teenagers in Ireland's most diverse town, Balbriggan. Angel is about to finish school and discover if Drill music and YouTube fame can deliver on their promises. Princess is battling to escape her claustrophobic surroundings and go to university and Dean is ready to come out from under his famous father's shadow, while Tanya, struggling with the spotlight of internet infamy, is still posting her dream life for all of her faithful followers. Isolated and disorientated by the white noise and seemingly insurmountable expectations of adolescence, our protagonists are desperate to find anything that helps them belong. Oblivious to one another's presence, potential and struggles, they pass each other on the street as strangers. But when their paths cross, the connections they make will change the course of their lives. Twenty-first century life - hyper-sexualized, social media saturated, anxiety-plagued - is here. Living inside its characters' heads, and negotiating their interior landscape, this book is a love song to the possibilities of youth. Using insights gained from the young people he works with, Curran's evocative writing yields the authenticity this novel demands. With instinctive affection and admiration for his characters' strengths and complexities, Youth is a journey through streets less travelled.
Unfolding as a series of materially oriented studies ranging from chairs, machines and doors to trees, animals and food, this book retells the story of Renaissance personhood as one of material relations and embodied experience, rather than of emergent notions of individuality and freedom. The book assembles an international team of leading scholars to formulate a new account of personhood in the sixteenth and seventeenth centuries, one that starts with the objects, environments and physical processes that made personhood legible.
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.
One good track could change everything. Just one good track and Rob Lynch can finally quit his suburban teaching job and get his band, the Terrors, once Dublin's next big thing, the fame and recognition they dream of. But it's not happening - they need a new sound. When Rob discovers the unique gifts of one of his students, John 'Kembo' Pereira, a troubled African teenager with a particular talent for creating beats, he sees an opportunity that might just keep his musical ambitions alive. As Rob and John's relationship develops, however, a series of disturbing events unfold that will rock both their lives to the core. And when the Terrors start to crumble, Rob finds out just how far he is willing to go, and what he is willing to lose, in order to keep his dream alive. Powerfully capturing the energy, wit and pathos of a changed Dublin society, Beatsploitation gives voice to a cynical, disillusioned generation, caught between the tired values of the old and the uncertainty of the new. An assured, arresting debut by a commanding new talent. It is an innovative and original work of debut fiction and deals with international themes such as racism, economic failure, love, loss, and regret, while highlighting a different side of modern Ireland.
Ranging widely across law, aesthetics, religion, and philosophy, this book offers the first account of the place of judgment in Shakespearean drama Shakespeare and Judgment gathers together an international group of scholars to address for the first time the place of judgment in Shakespearean drama. Contributors approach the topic from a variety of cultural and theoretical perspectives, covering plays from across Shakespeare's career and from each of the genres in which he wrote. Anchoring the volume are two critical contentions: first, that attending to Shakespeare's treatment of judgment leads to fresh insights about the imaginative relationship between law, theater, and aesthetics in early modern England; and second, that it offers new ways of putting the plays' historical and philosophical contexts into conversation. Taken together, the essays in Shakespeare and Judgment offer a genuinely new account of the historical and intellectual coordinates of Shakespeare's plays. Building on current work in legal studies, religious studies, theater history, and critical theory, the volume will be of interest to a wide range of scholars working on Shakespeare and early modern drama. Key Features Provides the first account of the place of judgment in Shakespearean drama Offers a fresh perspective on the imaginative relationship between law, religion, and aesthetics in Shakespeare's plays Models new ways of putting the plays' historical and philosophical contexts into conversation.
Computational Intelligence for Medical Internet of Things (MIoT) Applications: Machine Intelligence Applications for IoT in Healthcare explores machine intelligence techniques necessary for effective MIoT research and practice, taking a practical approach for practitioners and students entering the field. This book investigates advanced concepts and applications in the MIoT field, guiding readers through emerging developments and future trends. A wide range of international authors guide readers through advanced concepts, including deep learning, neural network, and big data analytic approaches for the classification, indexing, retrieval, analysis, and inferencing of healthcare data.
Ranging widely across law, aesthetics, religion, and philosophy, this book offers the first account of the place of judgment in Shakespearean drama'Shakespeare and Judgment' gathers together an international group of scholars to address for the first time the place of judgment in Shakespearean drama. Contributors approach the topic from a variety of cultural and theoretical perspectives, covering plays from across Shakespeare's career and from each of the genres in which he wrote. Anchoring the volume are two critical contentions: first, that attending to Shakespeare's treatment of judgment leads to fresh insights about the imaginative relationship between law, theater, and aesthetics in early modern England; and second, that it offers new ways of putting the plays' historical and philosophical contexts into conversation. Taken together, the essays in 'Shakespeare and Judgment' offer a genuinely new account of the historical and intellectual coordinates of Shakespeare's plays. Building on current work in legal studies, religious studies, theater history, and critical theory, the volume will be of interest to a wide range of scholars working on Shakespeare and early modern drama. Key FeaturesProvides the first account of the place of judgment in Shakespearean dramaOffers a fresh perspective on the imaginative relationship between law, religion, and aesthetics in Shakespeare's playsModels new ways of putting the plays' historical and philosophical contexts into conversation
Explores the history and theory of personhood in the Renaissance period Offers the first sustained study of the history and theory of personhood in the Renaissance period Provides a study of personhood from a materialist perspective Models new way of entering posthumanist critique - animal studies, ecocriticism, and food studies - into conversation with legal theory, cultural history, and literary studies Unfolding as a series of materially oriented studies ranging from chairs, machines and doors to trees, animals and food, this book retells the story of Renaissance personhood as one of material relations and embodied experience, rather than of emergent notions of individuality and freedom. The book assembles an international team of leading scholars to formulate a new account of personhood in the sixteenth and seventeenth centuries, one that starts with the objects, environments and physical processes that made personhood legible.
This book details the design and implementation of Short Messaging Service (SMS) and MMS applications. The main aim of this book is to provide SMS/MMS developers with the tools necessary to develop applications which can send SMS/MMS messages to groups of mobile devices. 1.The first section of this book presents a Java SMS application which allows the storage of contacts and groups of contacts. Thus the user of the application can customise his/her own list of contact 'Individuals' and 'Groups' of contacts (Such as: 'Family', 'Friends', 'Work Colleagues' etc). Upon selection of Individual(s) and/or Group(s) a single message such as "how r u all" can be sent to all their respective Mobile Stations (MS) by clicking on the 'Add' and then 'Send' button. The simplicity and ease of use of this application allows a diverse range of users from an individual home user to corporate wide user base. All code is presented and a working version is freely available for download. 2.The middle section of this book presents a similar group bulk SMS application which is web enabled. The application is written using Active Server Pages and is purely web based. Again, it allows the sending of messages to individuals and groups. For the purpose of sending SMS in each scenario, the Simplewire Active X Software Development Kit is used. All code is presented and a working version is freely available for download. 3.In order for "rich media" MMS messages to be sent and received, they must first be transcoded into the MMS format. Essentially what happens is that the content is tailored before it arrives at the mobile. This tailoring process is called transcoding. Transcoding systems can adapt video, images, audio and text to the individual constraints of different devices. They summarise, translate and convert the content into the MMS format. This section of the book presents a transcoding framework, which enables various rich media files stored on PC to be sent to MMS capable handsets. Transcoding is the area that this project will focus on. A java application is developed that allows a user to select multimedia content stored on the computer and send it to a mobile. The application performs the transcoding of the message content into MMS format and deploys the message to the mobile.
This book aims to introduce the area of wireless (Wi-Fi, 802.11) security with particular emphasis on WEP. Weaknesses are highlighted through the art of war-driving where unprotected access points are discovered. War driving used ethically can be a powerful tool in the hands of security professionals to test the security of the networks they are charged with protecting. |
You may like...
The Lion King 3 - Hakuna Matata
Nathan Lane, Ernie Sabella, …
Blu-ray disc
(1)
R39 Discovery Miles 390
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, …
Blu-ray disc
R313
Discovery Miles 3 130
|