Network hardware Books
Springer Us Digital Phase Modulation Applications of Communications Theory
Book Synopsis1. Introduction.- 2. Signal Analysis and an Overview of Modulation Methods.- 3. Error Performance.- 4. Spectral Performance.- 5. Energy-Bandwidth Comparisons and Shannon Theory for Phase Modulation.- 6. Transmitters.- 7. Receivers.- 8. Simplified Receivers.- 9. Synchronization.- 10. Partially Coherent Receivers.- 11. Phase Modulation and Convolutional Codes.- Appendix A. Minimum Distance Calculation Algorithms.- A.1. Limited Sequential Tree Search.- A.2. The Viterbi Algorithm in a Superstate Trellis.- B.1. A Markov Distance Chain.- Appendix C. Simulation Techniques.- C.1. Statistical Analysis of Error Events.- C.2. The Signal Space Method of Simulation.- Appendix D. Tables of Optimum Codes.- D.1. Optimal Codes for Binary and Quaternary CPFSK.- D.2. Optimal Codes for 8-, 16- and 32-Level CPFSK.Table of Contents1. Introduction.- 2. Signal Analysis and an Overview of Modulation Methods.- 3. Error Performance.- 4. Spectral Performance.- 5. Energy-Bandwidth Comparisons and Shannon Theory for Phase Modulation.- 6. Transmitters.- 7. Receivers.- 8. Simplified Receivers.- 9. Synchronization.- 10. Partially Coherent Receivers.- 11. Phase Modulation and Convolutional Codes.- Appendix A. Minimum Distance Calculation Algorithms.- A.1. Limited Sequential Tree Search.- A.2. The Viterbi Algorithm in a Superstate Trellis.- B.1. A Markov Distance Chain.- Appendix C. Simulation Techniques.- C.1. Statistical Analysis of Error Events.- C.2. The Signal Space Method of Simulation.- Appendix D. Tables of Optimum Codes.- D.1. Optimal Codes for Binary and Quaternary CPFSK.- D.2. Optimal Codes for 8-, 16- and 32-Level CPFSK.
£313.49
Springer Science+Business Media Satellite Communication Systems Design
Book Synopsis1. Signals.- 2. Causes of Signal Impairment.- 3. Baseband Signal Processing.- 4. Services.- 5. Quality of Service.- 6. System Outline.- 7. Orbits and Controlled Trajectories.- 8. Radio-Frequency Design Issues.- 9. Analog Transmission.- 10. Digital Transmission.- 11. Bidirectional Circuit Design.- 12. Channel-Access Schemes.- 13. Networking.- 14. System Economics.- 15. Future Developments.- Appendix 1. Radio Regulations Provisions.- I. Introduction.- II. Frequency Allocations.- III. Interference Coordination.- A. Modes of Interference between Space and Terrestrial Services.- B. Modes of Interference between Stations of Different Space Systems in Frequency Bands with Separated Earth-to-Space and Space-to-Earth Allocations.- C. Modes of Interference between ESs of Different Space Systems in Frequency Bands for Bidirectional Use.- IV. Radiation Limitations.- References.- Appendix 2. Frequency Sharing among Fixed-Satellite Service Networks.- I. Interference Evaluation to Determine if CoordiTable of ContentsSignals; E. Saggese, S. Tirró. Causes of Signal Impairment; S. Tirró. Source Signal Processing; E. Saggese. Services; A. Puccio. Quality of Service; A. Puccio, et al. System Outline; A. Bonetto, et al. Orbits and Controlled Trajectories; V. Violi, G. Vulpetti. Radiofrequency Design Issues; A. Bonetto, E. Saggese. Analog Transmission; S. Tirró. Digital Transmission; F. Ananasso, et al. Bidirectional Circuits Design; S. Tirró. Channel Access Schemes; A. Vernucci. Networking; S. Tirró. System Economics; S. Tirró. Future Developments; G. Chiassarini, et al. Index.
£134.99
Pearson Education Practical Cryptology and Web Security
Book SynopsisSecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.Table of Contents1. Basic security skills on the World Wide Web1.1 An introduction to network security1.1.1 Secure and insecure networks1.1.2 Digital cryptography on the web 1.2 The web browser-server dialog 1.2.1 The structure and configurations of the web1.2.2 Web browser and server dialog1.2.3 My first page with security1.2.4 Using HTML and migrating to XHTML1.3 Webpage skills for message manipulation and Security 1.3.1 Number Systems Used On The Web1.3.2 The Ascii Character Set1.3.3 Using Unicode On The Web1.3.4 Numerical Representations Of Messages1.3.5 Implementation Of The Caesar Code1.4 Bitwise Operators And Base64 Encoding/Decoding 1.4.1 An Introduction To Bitwise Operators 1.4.2 Bitwise Operations and Encryptions on The Web1.4.3 Base64 Encoding And Decoding1.5 The Xor And Pkzip/Winzip Encryption Schemes 1.5.1 Xor Encryption/Decryption1.5.2 Implementation Of The Xor Scheme On The Web 1.5.3 Encryption/Decryption Of Pkzip And Winzip1.5.4 Implementation Of The Pkzip/Winzip Encryption Scheme 2. Cryptology, Website Protection And Attacks2.1 An Overview Of Cryptology What Is Cryptology? Examples On Classic Ciphers And Attacks Basic User Authentication And Website Protections 2.2.1 The Beginning Of Cipher-Based Authentication 2.2.2 Basic HTTP Authentication With Apache
£42.74
Springer Handbook of PeertoPeer Networking
Book SynopsisPeer-to-peer networking is a disruptive technology for large scale distributed app- cations that has recently gained wide interest due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications.Trade ReviewFrom the reviews:“This handbook serves as a foundation work on P2P networks covering a broad spectrum of topics … . Within each subject area, many notable researchers contribute their seminal work to make up the contents. Hence this volume is invaluable not only to those primarily doing research in P2P network technologies, but also to those interested in network-related issues and their impact on society. Summing Up: Recommended. Graduate students and above.” (J. Y. Cheung, Choice, Vol. 48 (1), September, 2010)Table of ContentsPart 1: Introduction to Peer-to-Peer Networking: Peer-to-Peer Networking and Applications: Synopsis and Research Directions John Buford, Heather Yu.- The social impact of P2P systems Andrea Glorioso, Ugo Pagallo, Giancarlo Ruffo.- From Client- Server to P2P Networking Lu Liu, Nick Antonopoulos.- Examining the Use of Peer-to-Peer Networks from an Activity Perspective Jorn De Boever, Dirk De Groof.- Part 2: Unstructured P2P Overlay Architectures: Unstructured Peer-to-Peer Network Architectures Xing Jin, S.-H. Gary Chan.- Exchanging Peers to Establish P2P Networks Mursalin Akon, Mohammad Towhidul Islam, Xuemin Shen, Ajit Singh.- Peer-to-Peer Topology Formation Using Random Walk Kin-Wah Kwong, Danny H.K. Tsang.- Semantic Social Overlay Networks Alexander Lser, Steffen Staab, Christoph Tempich.- Part 3: Structured P2P Overlay Architectures: Overview of Structured Overlay Algorithms Krishna Dhara, Yang Guo, Mario Kolberg, Xiaotao Wu.- Distributed Hash Tables: Design and Applications C.-F. Michael Chan, S.-H. Gary Chan, - The Gamut of Bootstrapping Mechanisms for Structured Overlay Networks Anwitaman Datta.- Network Aware DHT-based P2P Systems Marguerite Fayçal, Ahmed Serhrouchni.- On Adding Structure to Unstructured Overlay Networks João Leitão, Nuno A.Carvalho, José Orlando Pereira, Rui Oliveira, Luis Rodrigues.- Mathematical Modeling of Routing in DHTs Peter Kersch, Robert Szabo.- Part 4: Search and Query Processing: Keyword Search in Unstructured P2P Networks Dingyi Han, Yong Yu.- Distributed Search and Pattern Matching Reaz Ahmad, Raouf Boutaba.- Distributed Semantic Overlay Networks Christos Doulkeridis, Akrivi Vlachou, Kjetil Nørvåg, Michalis Vazirgiannis.- Self-adaptation and Self-organization for Search in Social-like Peer-to-Peer Networks LuLiu, Jie Xu, Duncan Russell, Zongyang Luo.- Data Sharing in P2P Systems Rabab Hayek, Guillaume Raschia, Patrick Valduriez, Noureddine Mouaddib.- Managing Linguistic Data Summaries in Advanced P2P Applications R.Hayek, G. Raschia, P. Valduriez, N. Mouaddib.- Case Study: Scoop for Partial Read from P2P Database Farnoush Banaei-Kashani, Cyrus Shahabi.- Part 5: Incentive Mechanisms: Incentive Mechanisms for Cooperation in Peer-to-Peer Networks Daniel A. G. Manzato, Nelson L. S. da Fonseca.- Bandwidth Trading as Incentive Kolja Eger, Ulrich Killat.- Part 6: Trust, Anonymity, and Privacy: Reputation-based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy Loubna Mekouar, Youssef Iraqi, Raouf Boutaba.- P2P Reputation Management Through Social Networking Zoran Despotovic .- State of the Art in Trust and Reputation Models in P2P Networks Felix Gómez Mármol, Gregorio Martinez Pérez.- Anonymity in P2P Systems Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse.- Private Peer-to-Peer Network Michael Rogers, Saleem Bhatti.- Part 7: Broadcast and Multicast Services: Gossip-based Broadcast João Leitão, José Pereira, Luís Rodrigues.- Employing Multicast in P2P Overlay Networks Mario Kolberg.- Multicast Services Over Structured P2P Networks P. Manzanares-Lopez, J. Malgosa-Sanahuja, J.P. Muñoz-Gea, J. Sanchez-Aarnoutse.- Multicast Routing in Structured Overlays and Hybrid Networks Matthias Wählisch, Thomas C. Schmidt.- Multicast and Bulk Lookup in Structured Overlay Networks Ali Ghodsi.-Part 8: Multimedia Content Delivery: Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks J. De Boever, D. De Grooff.- Live video and IP-TV Maria Luisa Merani, Daniela Saladino.- Providing VoD streaming using P2P networks J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse.- Part 9: Mobile P2P: Peer-to-Peer Overlay in Mobile Ad-hoc Networks Marcel C. Castro, Andreas J. Kassler, Carla-Fabiana Chiasserini, Claudio Casetti, Ibrahim Korpeoglu.- Opportunistic Information Retrieval in Sparsely Connected Ad Hoc Networks Mooi-Choo Chuah, Jian-bin Han.- The MOBI-DIK Approach to
£314.99
Springer-Verlag New York Inc. Methods and Procedures for the Verification and
Book SynopsisNeural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. This volume introduces some of the methods and techniques used for the verification and validation of neural networks and adaptive systems.Table of ContentsBackground of the Verification and Validation of Neural Networks.- Augmentation of Current Verification and Validation Practices.- Risk and Hazard Analysis for Neural Network Systems.- Validation of Neural Networks Via Taxonomic Evaluation.- Stability Properties of Neural Networks.- Neural Network Verification.- Neural Network Visualization Techniques.- Rule Extraction as a Formal Method.- Automated Test Generation for Testing Neural Network Systems.- Run-Time Assessment of Neural Network Control Systems.
£85.88
Springer-Verlag New York Inc. Information Theory and Network Coding Information
Book SynopsisThis book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy.Trade ReviewFrom the reviews: "This book could serve as a reference in the general area of information theory and would be of interest to electrical engineers, computer engineers, or computer scientists with an interest in information theory. Each chapter has an appropriate problem set at the end and a brief paragraph that provides insight into the historical significance of the material covered therein. … Summing Up: Recommended. Upper-division undergraduate through professional collections." (J. Beidler, Choice, Vol. 46 (9), May, 2009) "The book consisting of 21 chapters is divided into two parts. Part I, Components of Information Theory … . Part II Fundamentals of Network Coding … . A comprehensive instructor’s manual is available. This is a well planned comprehensive book on the subject. The writing style of the author is quite reader friendly. … it is a welcome addition to the subject and will be very useful to students as well as to the researchers in the field." (Arjun K. Gupta, Zentralblatt MATH, Vol. 1154, 2009)Table of ContentsThe Science of Information.- The Science of Information.- Fundamentals of Network Coding.- Information Measures.- Information Measures.- Zero-Error Data Compression.- Weak Typicality.- Strong Typicality.- Discrete Memoryless Channels.- Rate-Distortion Theory.- The Blahut–Arimoto Algorithms.- Differential Entropy.- Continuous-Valued Channels.- Markov Structures.- Information Inequalities.- Shannon-Type Inequalities.- Beyond Shannon-Type Inequalities.- Entropy and Groups.- Fundamentals of Network Coding.- The Max-Flow Bound.- Single-Source Linear Network Coding: Acyclic Networks.- Single-Source Linear Network Coding: Cyclic Networks.- Multi-source Network Coding.
£71.99
Springer New York Linux Universe Installation and Configuration
Book Synopsis1.1 Historical perspectives on Linux.- 1.2 Versions.- 1.3 Features.- 1.4 UNIX development and standards.- 1.5 The Free Software Foundation.- Features.- New Features in Linux 2.0.- Hardware.- 4.1 Required hardware.- 4.2 Supported hardware.- Basic Installation.- 5.1 Overview.- 5.2 Booting for installation.- 5.3 Partitioning.- The Installation Program.- 6.1 Language.- 6.2 Partitioning.- 6.3 Swap partition.- 6.4 File system partition.- 6.5 X11 configuration.- 6.6 Products.- 6.7 Network adapter selection.- 6.8 Installation.- 6.9 Reboot.- 6.10 Launching a shell.- 6.11 Aborting installation.- The Boot System.- 7.1 Boot options.- 7.2 The Linux Universe boot manager.- 7.3 Boot variants.- Fundamentals of Linux.- 8.1 First things first.- 8.2 Accessing and removing the Linux Universe CD.- 8.3 Accessing other file systems.- 8.4 Linux identifiers.- 8.5 Users and groups.- 8.6 Files under Linux.- 8.7 Essential commands.- 8.8 Redirection of input and output.- 8.9 Piping commands.- 8.10 Accessing floppy disk drives.- 8.11 Virtual consoles.- 8.12 Automatic path extension.- 8.13 Compressed files.- 8.14 Printing.- 8.15 Background commands.- 8.16 Help and documentation.- 8.17 Fundamentals of X11.- Administration.- 9.1 What is administration?.- 9.2 xadmin.- 9.3 Software management.- 9.4 Configuration of the file systems.- 9.5 Setting the keyboard type.- 9.6 Processes.- 9.7 Shutting down the Linux system.- 9.8 Kernel modules.- 9.9 Utilities.- 9.10 The appointment calendar cron.- 9.11 User management.- 9.12 User groups.- 9.13 Adding and removing shells with xadmin.- 9.14 Message of the day.- 9.15 Boot message.- 9.16 Formatting floppy disks.- 9.17 Copying floppy disks.- 9.18 Setting date and time.- 9.19 Backups.- 9.20 Environment variables.- 9.21 Printer configuration.- 9.22 Setting the modem port.- 9.23 Network.- 9.24 Kernel compilation.- 9.25 X11 configuration.- 9.26 Configuration of X applications.- 9.27 The source code CD.- Reference.Table of Contents1.1 Historical perspectives on Linux.- 1.2 Versions.- 1.3 Features.- 1.4 UNIX development and standards.- 1.5 The Free Software Foundation.- Features.- New Features in Linux 2.0.- Hardware.- 4.1 Required hardware.- 4.2 Supported hardware.- Basic Installation.- 5.1 Overview.- 5.2 Booting for installation.- 5.3 Partitioning.- The Installation Program.- 6.1 Language.- 6.2 Partitioning.- 6.3 Swap partition.- 6.4 File system partition.- 6.5 X11 configuration.- 6.6 Products.- 6.7 Network adapter selection.- 6.8 Installation.- 6.9 Reboot.- 6.10 Launching a shell.- 6.11 Aborting installation.- The Boot System.- 7.1 Boot options.- 7.2 The Linux Universe boot manager.- 7.3 Boot variants.- Fundamentals of Linux.- 8.1 First things first.- 8.2 Accessing and removing the Linux Universe CD.- 8.3 Accessing other file systems.- 8.4 Linux identifiers.- 8.5 Users and groups.- 8.6 Files under Linux.- 8.7 Essential commands.- 8.8 Redirection of input and output.- 8.9 Piping commands.- 8.10 Accessing floppy disk drives.- 8.11 Virtual consoles.- 8.12 Automatic path extension.- 8.13 Compressed files.- 8.14 Printing.- 8.15 Background commands.- 8.16 Help and documentation.- 8.17 Fundamentals of X11.- Administration.- 9.1 What is administration?.- 9.2 xadmin.- 9.3 Software management.- 9.4 Configuration of the file systems.- 9.5 Setting the keyboard type.- 9.6 Processes.- 9.7 Shutting down the Linux system.- 9.8 Kernel modules.- 9.9 Utilities.- 9.10 The appointment calendar cron.- 9.11 User management.- 9.12 User groups.- 9.13 Adding and removing shells with xadmin.- 9.14 Message of the day.- 9.15 Boot message.- 9.16 Formatting floppy disks.- 9.17 Copying floppy disks.- 9.18 Setting date and time.- 9.19 Backups.- 9.20 Environment variables.- 9.21 Printer configuration.- 9.22 Setting the modem port.- 9.23 Network.- 9.24 Kernel compilation.- 9.25 X11 configuration.- 9.26 Configuration of X applications.- 9.27 The source code CD.- Reference.
£35.99
John Wiley & Sons Inc Wireless Sensor Networks
Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491
£79.16
Pearson Education CompTIA PenTest PT0001 Cert Guide
Book Synopsis Omar Santos is a principal engineer in the Cisco Product Security Incident Response Team (PSIRT) within Cisco's Security Research and Operations. He mentors and leads engineers and incident managers during the investigation and resolution of security vulnerabilities in all Cisco products, including cloud services. Omar has been working with information technology and cybersecurity since the mid-1990s. He has designed, implemented, and supported numerous secure networks for Fortune 100 and 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the Worldwide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. Omar is an active member of the security community, where he leads several industrywide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies,
£31.99
Cambridge University Press Scalability Density and Decision Making in
Book SynopsisThis cohesive treatment of cognitive radio and networking technology integrates information and decision theory to provide insight into relationships throughout all layers of networks and across all wireless applications. It encompasses conventional considerations of spectrum and waveform selection and covers topology determination, routing policies, content positioning and future hybrid architectures that fully integrate wireless and wired services. Emerging flexibility in spectrum regulation and the imminent adoption of spectrum-sharing policies make this topic of immediate relevance both to the research community and to the commercial wireless community. Features specific examples of decision-making structures and criteria required to extend network density and scaling to unprecedented levels Integrates sensing, control plane and content operations into a single cohesive structure Provides simpler and more powerful models of network operation Presents a unique approach to decisTrade Review'This is an extremely important text that comes at a critical time in the evolution of our understanding of both the characteristics of the spectrum need and the means by which this increasingly urgent need can be satisfied. [Marshall] has been one of the long term leaders in the development of the framework for dynamic spectrum access networks and cognitive radio technology, giving him a historic as well as current perspective on the challenges. The insights in this book should be of enormous value to students, active researchers, wireless systems developers, and regulatory and policy leaders.' Dennis A. Roberson, Illinois Institute of Technology'… highly original and brilliantly insightful. Preston Marshall has examined cognitive technologies under three essential key headings - scalability, density and decision-making. In doing this he unlocks the power of cognitive technologies and builds a realisable and compelling vision for communication networks of the future. Every section … is full of new ideas and insights that could only be written by someone who has been a leader in this field and has a handle on the bigger picture as well as a deep understanding of the technical details. This book is so far removed from the myriad of books that simple relate information to the reader. It is packed full of ideas, opinions and most crucially supporting evidence … a breath of fresh air … essential reading for someone who has any interest in how the challenges for communication systems of the future will be met.' Linda Doyle, University of Dublin'… a refreshing take … I strongly recommend this book to both scholars and experts in the field, and I am convinced that it will be frequently used as reference material for all interested in the future potential of cognitive wireless networks.' Shaunak Joshi, IEEE Communications MagazineTable of ContentsPreface; Part I. Overview: 1. Introduction; 2. Theoretical foundations; 3. Future wireless operation, environments and dynamic spectrum access; 4. Fundamental challenges in cognitive radio and wireless systems; Part II. Generalized Environmental Characterization: 5. The spectrum and channel environment; 6. Propagation modeling, characterization and control; 7. The connectivity environment; 8. The information and content environment; Part III. System Performance of Cognitive Wireless Systems: 9. Network scaling; 10. Network physical density limitations; 11. Network sensing and exchange information effectiveness; 12. Content access information effectiveness; 13. Minimizing nonlinear circuit effects; Part IV. Integrated Analysis and Decision-Making: 14. Awareness structure for cognitive wireless systems; 15. Instantiating and updating beliefs across wireless networks; 16. Decision-making structure for cognitive wireless systems; Part V. Summary: 17. Further research needs in cognitive wireless networks; Appendix A. Terms and acronyms; Appendix B. Symbols; Appendix C. Mathematica and MATLAB routines.
£100.30
Cambridge University Press Wireless Communications and Networking for
Book SynopsisA thorough treatment of UAV wireless communications and networking research challenges and opportunities. Detailed, step-by-step development of carefully selected research problems that pertain to UAV network performance analysis and optimization, physical layer design, trajectory path planning, resource management, multiple access, cooperative communications, standardization, control, and security is provided. Featuring discussion of practical applications including drone delivery systems, public safety, IoT, virtual reality, and smart cities, this is an essential tool for researchers, students, and engineers interested in broadening their knowledge of the deployment and operation of communication systems that integrate or rely on unmanned aerial vehicles.Trade Review'This book, written by the most prominent experts in the field, provides a complete in-depth analysis of UAV wireless communications. It should become a reference material for all the students, engineers and researchers who are building our next generation wireless communication networks.' Merouane Debbah, CentraleSupélec'This is the most comprehensive book on the rapidly evolving field of wireless communications and networking for UAVs. The authors are among the researchers who have made the most profound contributions to this emerging field. Their impressive command on the subject matter results in a thorough presentation taking theory, practice, and industrial standards into account. A must-read for researchers and engineers working in this field.' Halim Yanikomeroglu, Carleton University, OttawaTable of Contents1. Wireless communications and networking with unmanned aerial vehicles: an introduction; 2. UAV applications and use cases; 3. Aerial channel modeling and waveform design; 4. Performance analysis and tradeoffs; 5. Deployment of UAVs for wireless communications; 6. Wireless-aware path planning for UAV networks; 7. Resource management for UAV networks; 8. Cooperative communications in UAV networks; 9. From LTE to 5G NR-enabled UAV networks; 10. Security of UAV networks.
£94.50
Pearson Education BTEC Nationals Information Technology Student
Book Synopsis
£33.10
Cambridge University Press An Introduction to Automatic Digital Computers
Book SynopsisOriginally published in 1960, this textbook is aimed at those without advanced mathematical training and provides a comprehensive introductory account of digital computers, what they are capable of doing and how they are made to do it. Throughout the book the emphasis is on the applications of computers to routine work rather than to advanced research.Table of ContentsList of plates; Preface to the first edition; Preface to the second edition; 1. The elements of programming; 2. Input, storage and output of numbers; 3. The organization of programmes; 4. The solution of engineering problems; References for further reading; Index.
£29.99
Palgrave Macmillan EGovernance
Book SynopsisThe e-governance revolution is said to be changing everything, but will all the modelling tools, electronic meeting management systems and online consultations really change political judgement in policy formation? Using case studies from local and federal government in the US and Europe, Perri 6 examines these claims and presents a new theory of how policymakers use and reject information and do and don''t trust each other with information in using the new tools, before analyzing the implications for democracy.Trade Review'This is a path-breaking work on the actual and potential use of electronic tools in public sector decision making. It combines fascinating case studies on leading edge applications with a thought-provoking model of institutional styles of policy making, and challenges us to imagine how the various players in the model would incorporate these electronic tools into their work. It should be required reading for anyone concerned with the future of e-governance.' - Sandford Borins, Professor of Public Management, University of Toronto 'Governments everywhere are pushing the boundaries of technology. In this important new analysis, Perri 6 carefully charts the rise of this movement in political terms and its use in shaping the judgments of policy makers. He provides strong and persuasive arguments on a central puzzle of the information age: if and how it can strengthen governance. The book is a must-read for anyone interested in the effects of modern technology on government.' - Donald F. Kettl, University of Wisconsin, Madison, USATable of ContentsAcknowledgements Introduction The Scope of E-Governance Examples and Initiatives The Forward March of E-Governance Halted? What Difference Could E-Governance Make? Fears, Aspirations and Theories Conducting Policy Judgement Through Information Technologies: Three Cases Policy Making: The Work of Governance The Organization of Policy Makers and the Use of E-Governance Tools Institutional Styles and E-Governance Tools Ways Forward Conclusion Notes References
£40.49
Springer-Verlag New York Inc. Design Research in Information Systems Theory and
Book SynopsisIt is 5 years since the publication of the seminal paper on “Design Science in Information Systems Research” by Hevner, March, Park, and Ram in MIS Quarterly and the initiation of the Information Technology and Systems department of the Communications of AIS.Table of Contentsto Design Science Research.- Design Science Research in Information Systems.- Design Science Research Frameworks.- On Design Theory.- Twelve Theses on Design Science Research in Information Systems.- A Science of Design for Software-Intensive Systems.- People and Design.- Software Design: Past and Present.- Evaluation.- The Use of Focus Groups in Design Science Research.- Design and Creativity.- A Design Language for Knowledge Management Systems (KMS).- On Integrating Action Research and Design Research.- Design Science in the Management Disciplines.- Design Science Research in Information Systems: A Critical Realist Approach.- Design of Emerging Digital Services: A Taxonomy.- Disseminating Design Science Research.- Design Science Research: Looking to the Future.
£104.49
Springer New York Information Systems Theory Explaining and Predicting Our Digital Society Vol 1 28 Integrated Series in Information Systems
Book SynopsisThe second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others.Table of ContentsThe Updated DeLone and McLean Model of Information Systems Success.- If They Build It, Will They Come? The Technology Acceptance Model.- A Bibliometric Analysis of Articles Citing the Unified Theory of Acceptance and Use of Technology.- Why do People Reject Technologies: A Review of User Resistance Theories.- Task-Technology Fit Theory: A Survey and Synopsis of the Literature.- Migrating Processes from Physical to Virtual Environments: Process Virtualization Theory.- The Theory of Deferred Action: Purposive Design as Deferred Systems for Emergent Orgaisations.- Resource-based View Theory.- On the Business Value of Information Technology: A Theory of Slack Resources.- Portfolio Theory: The Contribution of Markowitz's Theory to Information System Area.- The Theory of the Lemon Markets in IS Research.- The Technology: Organization - Environment Framework.- Contingency Theory in Information Systems Research.- IT and Porter's Competitive Forces Model and Strategies.- Information Technology and Organisational Performance: Reviewing the Business Value of IT Literature.- Applying "Business Case" Construct Using the "Diffusion of Innovations" Theory Framework: Empirical Case Study in the Higher Edcuation.- Punctuated Equilibrium Theory in IS Research.- Discrepancy Theory Models of Satisfaction in is Research.- Institutional Change and Green IS: Towards Problem-driven, Mechanism-based Explanations.- A Multi-level Social Network Perspective on ICT Adoption.- Expectation Confirmation Theory in Information System Research: A Review and Analysis.- Stakeholder Theory & Applications in Information Systems.
£187.49
APress Complex Enterprise Architecture
Book SynopsisImplement successful and cost-effective enterprise architecture projects. This book provides a new approach to developing enterprise architecture based on the idea of emergent behaviors-where instead of micromanaging system implementation, the enterprise architecture effort establishes clear goals and leaves the details to the implementation teams. System development efforts are measured based on their contribution to achieving business goals instead of implementing specific (possibly outdated) requirements. Most enterprise architecture initiatives employ one of the existing system architecture frameworks such as Zachman or The Open Group Architecture Framework, but these are not well-suited for enterprise architecture in a modern, agile organization. The new approach presented in this book is based on the author''s experience with large enterprise architecture efforts. The approach leverages research into complex adaptive systems and emergent behaviors, where a fTable of Contents
£33.99
APress Integrating Serverless Architecture
Book Synopsis Design, develop, build, and deliver an end-to-end serverless architecture by leveraging Azure services, frameworks, and tools. This book offers a holistic approach, guiding you through the design and development of a Twitter Bot application, while leveraging Azure Functions. Integrating Serverless Architecture begins with an overview of serverless computing and getting started with Azure Functions. Here, you will create a Twitter bot function which scans Twitter for the latest tweets and makes use of dependency injection. Further, you will learn about Azure Cosmos DB where you will cover its change feed mechanism and the repository pattern. You will create a Cosmos DB trigger-based tweet notifier function, which will broadcast the latest tweets to connected clients. You will explore the basics of Azure Service Bus and create a tweet scheduler function, which will prioritize different keywords for the Twitter bot function. Along the way, you will debug, deliverTable of Contents 1. New Era of Serverless Computing · Introduction to Serverless Computing · Introduction to Twitter Bot application · Scope of Work · Technologies to be Used · Logical Architecture · Physical Architecture · Software Prerequisites · Summary · References 2. Getting Started with Azure Functions · Understanding Azure Functions · Explore Tweetinvi Library and interact with Twitter · Create a Tweet Bot Function · Debug the Azure Function · Logging support in Azure Function · Deploy the Function to Azure · Exercises · Summary · References 3. Explore Azure Cosmos DB and its Change feed mechanism · Introduction to Azure Cosmos DB · Azure Cosmos DB Repository Pattern · Sample CRUD Operations · Integrate with Tweet Bot Function · Understand Change Feed mechanism · Implement Azure Cosmos DB Trigger Function · Exercises · Summary · References 4. Secure Secrets in Azure Key Vault · Introduction to Azure Key Vault · Store Secrets in Key Vault · Access Secrets in Azure Functions from Key Vault · Summary · References 5. Getting Started with Azure SignalR Service · Introduction to Azure SignalR Service · Create a SignalR Service · Integrate with Azure Cosmos DB Trigger Function · Summary · References 6. Create Tweet Bot Web Application · Getting started with .NET Core · Create a Web application with Materialize CSS · Integrate with Tweetinvi to display list of Hashtags · Save User Preference to Cosmos DB · Display latest tweets from Cosmos DB · Integrate with Azure SignalR Service and display real-time notifications · Deploy to Azure Web App Service · Exercises · Summary · References 7. Enable App Service Authentication on Azure Functions · Introduction to App Service Authentication · Enable App Service Authentication on Azure Web App · Enable App Service Authentication on Azure Functions · Integrate Authentication flow from Web app to Azure Functions · Exercises · Summary · References 8. Configuring Continuous Integration and Continuous Deployment to Azure Environment · Design a Continuous Integration and Deployment pipeline · Create VSTS and Check-in the Source Code · Create Build Definition · Create Release Definition · Testing the CI/CI Pipeline · Provisioning and configuring our Azure Function infrastructure (optional) · Extending Twitter Bot Exercises 9. Setup Continuous Integration and Continuous Deployment pipeline for Azure Functions
£49.49
APress Pro PowerShell for Amazon Web Services
Book SynopsisAmazon Web Services (AWS) is the leading public cloud platform. In this book you will learn to use Microsoft PowerShell to create, host, manage, and administer workloads using Amazon Web Services. You will learn how to create virtual machines, provision storage, configure networks, and more-all using your preferred Windows scripting language.CIOs everywhere are leading their organizations to the cloud, but there are few books available to help. This book focuses on moving Microsoft Windows workloads to the cloud using technologies familiar to enterprise Microsoft-based professionals.The completely revised and expanded Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads on Amazon Web Services. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few years ago. Tasks that traditionally took weeks of work, costing thousands of dollars, can be completed in minutes for a fraction of a penny.New chapters in this second edition cover: AWS Lambda, Amazon WorkSpaces, Amazon AppStream 2.0, AWS Directory Service, Amazon WorkDocs, and AWS System Manager.What You''ll Learn Create and manage Windows servers on Elastic Compute Cloud (EC2) Configure and secure networks with Virtual Private Cloud (VPC) Leverage autoscaling to adjust resources as load changes Deploy and manage SQL Server using the Relational Database Service (RDS) Manage virtual desktops using WorkSpaces and AppStream Leverage AWS Systems Manager to manage Windows at scale Who This Book Is ForWindows professionals who want to learn more about Amazon Web Services, with a focus on running Windows workloads and automated management at scale using PowerShell tools for AWS. The book assumes you have knowledge of Windows and PowerShell, but are new to AWS.Table of Contents
£49.49
APress Applied Machine Learning for Health and Fitness A
Book SynopsisPart I: Getting Started.- Chapter 1: Machine Learning in Sports 101.- Chapter 2: Physics of Sports.- Chapter 3: Data Scientist's Toolbox.- Chapter 4: 3D Neutral Networks.- Chapter 5: Sensors.- Part 2: Applied Machine Learning.- Chapter 6: Deep Computer Learning.- Chapter 7: 2D Body Pose Estimation.- Chapter 8: 3D Pose Estimation.- Chapter 9: Video Action Recognition.- Chapter 10: Reinforcement Learning in Sports.- Chapter 11: Machine Learning in the Cloud.- Chapter 12: Automating and Consuming Machine Learning.Table of ContentsIntroductionMachine Learning is fun with sensors and sports. Today’s data scientist is out there, on the ski slopes, or surfing the waves, and best way to apply machine learning is real life scenarios of sports. What can we do if we had the best, the ultimate model of our body and health monitoring us constantly? So, when we wanted to start a new sport, for example skiing or surfing, our personal body assistant could give us suggestions, like a personal coach. With machine learning and AI methods, imagine having a coach next to you 24/7.Part I: SensorsChapter 1: Getting StartedWhy are sensors important for health and fitness? For coaches, athletes and health professionals, they provide and objective picture of your activity. It’s often impossible to capture micro-movements and forces of a downhill racer, moving at 100 mph down a winding ski trail, but when equipped with sensors, every aspect of that movement can be captured, analyzed and studied. In this book we’ll use various IoT devices that can be used for sports data collection: inertial measurement units (IMUs), attitude and heading reference systems (AHRS), inertial navigation systems (INS/GPS), pressure sensors and others.1. Types of sensors and what they measurea. IMUs, AHRSb. INS/GPSc. Pressure sensorsd. Heart ratee. Vision and camera2. Sport science and dataa. Why is data frequency so important? A typical GPS device in your mobile phone works at 1Hz, that is one reading per second. Why isn’t this enough for most sports applications?b. Machine Learning really cares about data frequencies, as a rule of thumb we will use 100 Hz for most sensor data we collect3. How can Machine Learning help?a. Problems solved by machine learning for human movement, health and fitness applications4. Visualizing sports from sensor dataProject: First look at athlete movement analysis with a sample sensor data setChapter 2: Sensor HardwareIt turns out they don’t sell sensors with built in machine learning at convenience stores just yet! So, we made some. We go over some sport specific requirements for sensors, where and how sensors are placed on the body and equipment. In this chapter we will cover choices for sensor hardware, communication from sensors for data collection and data choices for IoT devices. 1) Sensor IoT devices: IMU, AHRS, INS/GPS, Pressure, Proximity2) Sensor communication3) Data choices for IoT devicesProject: Learning to work with a sample SensorKit datasetChapter 3: Sensor SoftwareOur sensor is operating at a relatively high frequency of 100 samples per second (100 Hz). We need a special software to connect our sensor to the app. In this chapter we include a practical project on how to connect our sensor via a protocol like Bluetooth Low Energy to a mobile device and transfer data to the cloud.1) Sensor firmware2) Algorithms for sensor data processing3) Connecting with the app and the SDKProject: Writing the code to connect from sensor to the cloudChapter 4: 3D Printing SensorsProject: 3D printing is a fantastic technology for custom applications like sports! In this chapter I included a fun project on designing the case for our sensor, using 3D design software like Fusion 360 and 3D printing our sensor.1) Designing sensor casing model for sports2) Printing the sensor3) Every sport is different!Project: Designing a case and 3D printing our sensorPart II: Sensor DataSensors generate an enormous amount of data! In this part we learn about different types of sensor data, how to parse it, store it, transfer between IoT devices and the cloud.Chapter 5: Collecting sensor dataThis is where we sports scientists have most fun: data science on the ski slopes and surfing the waves! In this chapter I included a project.1) Sports and sensor placement2) Designing sports experiments3) Software and mobile devices for sports4) Sensor data for MLProject: Collecting dribble data from a basketball sensorChapter 6: Storing and parsing dataStoring sensor data is an interesting subject: at 100 Hz we have a lot of data from sports!1) Data frequency and aggregation decisions2) What to calculate on the sensors3) Sending data to the cloudProject: Writing code to parse and store sensor dataChapter 7: Managing and streaming IoT data in the cloudAn overview of modern IoT data technologies for the cloud, this chapter is about managing and streaming IoT data in the cloud.1) Non-relational databases for sensor data 2) Streaming IoT data: (Spark, Kafka, Azure Stream Analytics)3) Data pipelines for IoTProject: Storing and streaming IoT data in the cloudPart III: Machine Learning for Health, Fitness and SportsFrom sensor data to physics of sports, movement analysis and machine learning models.Chapter 8: Physics of sportsSports scientists believe that each sport can be described mathematically with physics, let’s dive into sport science! In this chapter we’ll have a physics project to help us better understand the models.1) Physics of movement2) Sensors and physicsProject: Calculating forces for an athlete, using physicsChapter 9: Machine Learning modelsMachine Learning models for sports. This chapter defines reasoning behind various algorithms for machine learning in sports, as applied to sensor data.1) Raw sensor data2) Clean and transform the data3) Engineering features4) Supervised Learning5) Unsupervised Learning6) Reinforcement LearningProject: Creating a machine learning model from our experimentsChapter 10: Applying Machine Learning for various activitiesIn this chapter we look at some applications of sensors for sports, fitness and health. 1) Skiing and snowboarding2) Basketball3) Tennis4) Diving5) Javelin6) SurfingPart III: Visualizing Sensors Using computer vision and visualizing sports data in 3D and VR.Chapter 11: Computer visionComputer vision is an important way of tracking athletes in real time.1) Computer vision for sports overview2) 3D body rendering3) Problems with computer vision vs sensors (occlusion)4) Winning scenario: combining sensors with computer vision5) Project: using computer vision for athletic performanceProject: using computer vision for athletic performanceChapter 12: Visualizing athlete in 3D, Holograms and VRIn this chapter we’ll touch the holy grail of sports science: visualizing athlete in full 3D, as a holographic avatar.1) Methods and requirements for 3D visualization2) Using Unity to visualize data Chapter 13: Vision and SensorsThis chapter is about combining vision and sensors. Imagine, if we had to bring visual and sensor data together, then we have a tool that can provide both a near-real time visual feedback and video analysis.1) Combining sensor and video dataProject: Combining sensor and video data for analysisPart V: What the Coach needsFrom individual athletes to the team: this chapter would make the coach happy! Often, tracking an individual athlete with sensors is not enough: coaches or health professionals deal with teams they need to analyze. Chapter 14: Coach and team view on the dataWorking with coaches on US Olympic Team, WTA, WNBA, professional ski and snowboard instructors, I learned a lot about requirements that coaches have on the sensors, data, analytics and presentation of the data.1) Coaches and teams view2) Looking across the entire team3) Coach dashboard (PowerBI)Project: Creating a coach dashboard with PowerBIChapter 15: Connected sensors and sports teamsFrom individual athletes and sports, to connected experiences.1) Sensor data from the team prospective2) Connected teamConclusion: What’s nextThis book provides a toolkit, a foundation for a sports scientist or a data professional to use sensors and machine learning for insights about athlete performance and injury prevention.PROJECTS1) First look at athlete movement analysis with a sample sensor data set2) Learning to work with a sample sport dataset 3) Writing the code to connect from sensor to the cloud4) Writing code to parse and store sensor data5) Storing and streaming IoT data in the cloud6) Designing a case and 3D printing our sensor7) Collecting dribble data from a basketball sensor8) Calculating forces for an athlete, using physics9) Creating a machine learning model from our experiments 10) Using computer vision for athletic performance11) Combining sensor and video data for analysis12) Creating a coach dashboard with PowerBI for the team
£41.24
APress Visual Studio Extensibility Development
Book SynopsisLearn the extensibility model of Visual Studio to enhance the Visual Studio integrated development environment (IDE). This book will cover every aspect, starting from developing an extension to publishing it and making it available to the end user. The book begins with an introduction to the basic concepts of Visual Studio including data structures and design patterns and moves forward with the fundamentals of the VS extensibility model. Here you will learn how to work on Roslyn - the .NET compiler platform - and load extensions in VS. Next, you will go through the extensibility model and see how various extensions, such as menus, commands, and tool windows, can be plugged into VS. Moving forward, you''ll cover developing VS extensions and configuring them, along with demonstrations on customizing extension by developing option pages. Further, you will learn to create custom code snippets and use a debugger visualizer. Next, you will go through creation of pTable of ContentsChapter 1: Basics Primer Chapter Goal: The objective of this chapter is to introduce the basic concepts to the reader that would be required through-out this book, so that he gets comfortable in this learning journey. No of pages :50-60 Sub -Topics 1. What is a compiler? 2. What is an SDK (Software Development Kit)? 3. Recap of Tree Data structure 1. Tree traversal, 2. Abstract Syntax trees 4. MEF (Managed Extensibility Framework) Basics. 5. Visual Studio & its history 6. XML & JSON 7. Serialization & Deserialization. 8. Revisiting Visitor, Abstract Factory and Factory design patterns. 9. MSBuild basics 10. Async-await. Chapter 2: Getting Started Chapter Goal: With the fundamentals strongly in place, we are now good to get started with Visual Studio (VS) Extensibility model. We will do our setup in this chapter. This chapter would introduce the VS Extensibility, Roslyn to the reader. The reader would also learn to write and debug a VS extension. No of pages: 40 Sub - Topics 1. Prerequisites and installation of VS 2. Anatomy of a VSIX 3. How Visual Studio discovers and loads extensions. 4. VSPackage 5. Async Loading 6. Writing your first simple templatized Visual Studio Extension. 7. Roslyn - .NET Compiler platform fundamentals Chapter 3: Extending Visual Studio Chapter Goal: This chapter would introduce the extensibility model and how various extensions can be plugged in VS as menus, commands, tool window, code window, solution explorer etc No of pages: 40-50 Sub - Topics: 1. The Visual Studio Extensibility model 2. Tool Window extension 3. Menus & commands, 4. Code Window extension 5. Solution explorer item extension Chapter 4: Developing real world extensions - I Chapter Goal: This chapter dives into developing useful real-world VS Extensions and shows how they can be made configurable by customizing UI and options page. We would also learn how to write to output window and manipulate documents and projects in this chapter. No of pages: 40-50 Sub - Topics: 1. VS Extension to search on MSDN/Bing/Google. 2. VS Extension to generate HTTP Client proxy class for HTTP Web API using T4 templates. 3. VS Extension to generate test data. 4. Customizing extension by developing Tools option page. 5. Customizing UI of extension. Chapter 5: Developing real world extensions - II Chapter Goal: This chapter is the continuation of last chapter and continues the development of useful real-world VS extensions but this time using the .NET Compiler platform – Roslyn. No of pages: 40-50 Sub - Topics: 1. Rewrite VS Extension to generate HTTP Client proxy class for HTTP Web API using Roslyn. 2. Developing a custom code analysis Visual Studio Extension. 3. Developing a light bulb style code refactoring. 4. Developing Roslyn based extension to generate unit tests using T4 template. Chapter 6: Do more with VS SDK Chapter Goal: This chapter introduces the reader with famous Visual Studio Isolated and integrated Shell to develop applications that looks like Visual Studio and also develops handy productivity boosters like custom code snippets, debugger visualizers, modifying intellisense, debugging experience for developers No of pages: 40-50 Sub - Topics: 1. VS Isolated and Integrated Shell 2. Developing applications that look like Visual Studio. 3. Extending the debugger. 4. Create custom code snippets. 5. Create Debugger Visualizer for view data while debugging. 6. Modifying intellisense. Chapter 7: Templates, Debugging VS Extensions Chapter Goal: This chapter explains how to create project and item templates. The chapter also shows a sample code lens extension then dives into debugging the extension No of pages: 40-50 Sub - Topics: 6. Code lens sample extension. 7. Creating Project and Item template. 8. Debugging VS Extensions. Chapter 8: Deploying VS Extensions Chapter Goal: This chapter explains how to deploy VS extensions using continuous integration (CI). The chapter also explains how the extension can be made available to the world by uploading in marketplace. We also discuss how to make a private extension gallery and host your extension there. No of pages: 40-50 Sub - Topics: 9. Deploying a VS Extension using CI. 10. Creating a private extension gallery/ Atom feed 11. Hosting extension in private gallery. 12. Sharing extension with the world using marketplace. Chapter 9: Tips, Tricks, extensions and words Chapter Goal: This chapter discusses few of the coolest tips and tricks for Visual Studio and its extensibility and shares few highly useful extensions. The chapter and book conclude with closing remarks on extensibility of Visual Studio Code and integration with Visual Studio Team Services (VSTS) or Azure DevOps. No of pages: 30-40 Sub - Topics: 1. Cool Tips and tricks 2. Useful Extensions for C#, VB, JS, TS and CSS developers. 3. A word on Visual Studio Code Extensibility 4. Integration with VSTS or Azure DevOps Useful Resources – 1 page More Reading – 1 page Code Samples – Link to code samples from GitHub.
£58.49
APress Practical Guide to Salesforce Experience Cloud
Book SynopsisWhether you are brand new to the world of digital experiences on the Salesforce platform or you are looking to take your Experience Cloud (previously Community Cloud) knowledge to the next level, this detailed guide will help you build and manage a Salesforce site by leveraging the declarative power of the platform with clicks, not code. Each Salesforce site/community is a part of a widespread ecosystem, with thousands of sites and millions of users active today on Experience Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways. Author Philip Weinmeister, Salesforce MVP and the only recipient of the Community Cloud MVP Trailblazer award from Salesforce, leads you through the ins and outs of Salesforce Experience Cloud and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform. This completely revised editioTable of ContentsChapter 1: Why Digital Experiences on the Salesforce Platform? (REVISED) Chapter 2: Planning and Preparing for Success with Experience Cloud (REVISED) Chapter 3: Experience Cloud Licenses and Member Groups: Employees, Partners, and Customers (REVISED) Chapter 4: Experience Cloud Template Types: Tabs, Visualforce, and Lightning (REVISED) Chapter 5: Experience Builder (REVISED) Chapter 6: Experience Pages and Components (REVISED) Chapter 7: Experience Setup, Administration, and Workspaces (REVISED) Chapter 8: Access, Sharing, and Visibility in Experiences (REVISED) Chapter 9: Topics in Experiences (REVISED) Chapter 10: Knowledge (Articles) in Experiences (REVISED) Chapter 11: Process Automation in Experiences (REVISED) Chapter 12: Experience Audience Targeting and Personalization (REVISED) Chapter 13: Lightning Bolt for Experience Cloud (REVISED) Chapter 14: Salesforce CMS (Content) in Experiences (NEW) Chapter 15: B2B and B2C Commerce within Experience Cloud (NEW) Chapter 16: The Community/Experience Cloud Consultant Certification Exam (NEW) Chapter 17: The Best of the Rest: Additional Experience Cloud Topics
£28.49
APress Third Generation Internet Revealed
Book SynopsisThis book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space.IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation. Further, there are now enough public addresses allocated to accommodate all anticipated uses for the foreseeable future.Most networking products and software, especially open-source software, are already fully IPv6 compliant. Today, no business shTable of Contents1. Introduction 2. History of Computer Networks up to IPv4 3. Review of IPv4 4. The Depletion of the IPv4 Address Space 5. IPv6 Deployment Progress 6. IPv6 Core Protocols 7. IPSec and IKEv2 8. Transition Mechanisms 9. IPv6 on Mobile Devices 10. DNS 11. The Future of Messaging with No NAT 12. IPv6 Related Organizations 13. IPv6 Projects
£40.49
APress Visual Data Insights Using SAS ODS Graphics
Book SynopsisSAS ODS graphics users will learn in this book how to visually understand and communicate the significance of data to deliver images for quick and easy insight, with precise numbers. Many charts or plots require the viewer to run the eye from a bar end or plot point to some point on an axis, and then to interpolate between tick marks to estimate the value. Some design choices can lead to wrong conclusions or mistaken impressions. Graphic software relies on defaults to deliver something if you make a minimal effort, but that something is not likely to be exactly what you want. Visual Data Insights Using SAS ODS Graphics provides examples using experience-based design principles. It presents examples of bar charts, pie charts, and trend lines or time series plots, the graph types commonly used in business, other organizations, and the media for visual insight into data. Newer graphs are also included: dot plots, needle plots, waterfall charts, butterfly chaTable of ContentsIntroduction About this book Part I: Design Principles Chapter 1: Principles of Communication-Effective Graphic Design A. Joseph Pulitzer on Communication (principles for Press are universally applicable) B. Accelerate/Facilitate Visual Data Insights with Simplicity C. The Effects of Needless Complexity D. Simplicity E. Elegance F. Sparse Image Focuses Attention G. Sparse Graph more easily, more quickly interpreted H. Whenever possible, make graph title a headline I. Text readability—often wrongly assumed by graph creators J. Is what the creator sees what the viewer sees? K. How assure text readability L. We read horizontally M. Axis Labels N. Image Plus Precise Numbers—Both Are Necessary O. Annotation or On-Image Table P. Sparse Line Annotation Q. Y Axis for Time Series Plots R. Ranking and Subsetting Information S. Scrolling on Web Graphs T. Maximizing Information Delivery in Titles and Subtitles U. 3D Chapter 2: Principles of Communication-Effective Use of Color A. When and Why Color: Communication, Not Decoration B. Benefits of Boring Black and White C. Contrast with Background D. Always Bad Backgrounds 1) Image Backgrounds (continuous tone color) 2) Color Gradient Backgrounds 3) Textured Backgrounds E. Visual Dominance F. Other Choices for Text Emphasis G. Monitor Color vs HardCopy Color H. Consistency I. Purpose/Significance Assumed Even If Unintended J. Color-Coding K. Thickness of Lines and Text L. Size of Plot Markers and Legend Color Blocks M. Maximum Number of Distinguishable Shades of One Hue N. Other Tips O. Color Control with ODS Graphics Attribute Maps P. Multi-Line Plot That Obviates Need for a Legend Part II: Widely Applicable Examples You Can Use Chapter 3: Technical Introduction A. Outer Structure of ODS Graphics Code in Examples B. Inner Structure of ODS Graphics Code in Examples C. Text Parts of ODS Graphics Images D. Borders E. From Defaults through Customization for a Simple Example F. What Follows Chapter 4: Charts for Data in Categories A. Getting Your Charts In Order B. Pie Charts 1) The Perils of Pie Charts a) 3D Pie Charts are ALWAYS misleading b) Labels Can Collide If All Outside c) Labels Can Be Hard To Read If Inside If Insufficient Color Fill Contrast d) Slices Too Small To Be Seen Are Not Necessarily a Problem e) Reason to Avoid the OTHER Collective Pie Slice 2) Pie Chart Alternatives a) Default Colors vs Better Background for Inside-Of-Slice Labels b) All Inside Labels c) All Outside Labels for Name/Category, Value, Percent d) Label Collisions Problem e) Collision Problem Solved f) Maximally Informative CallOut Labels g) Default Legend h) Maximally Informative Legend i) The Ineffable Incontrovertible Insightful Power of Simplicity: The Pac-Man Pie Chart—the Extremes of Other C. Donut Charts D. Horizontal Bar Charts 1) Default Chart 2) Easy Bar Annotation 3) Adding Percent of Total Measurement 4) Key Design Principles a) Ranking; Show Them What’s Important b) Subsetting: Let Part Stand for the Whole 5) The Maximally Informative Horizontal Bar Chart 6) Interlinked Subsets Images Only 7) A Tall Horizontal Bar Chart: The Complement of a Subset 8) “Nested” Bar Charts (Web Charts) 9) Clustered Bar Chart 10 Dot Chart 11 When to use alphabetical order for bar labels 12 ButterFly Chart E. Vertical Bar Charts 1) Basic 2) Alternative to the Always Unsatisfactory Stacked Bar Chart 3) Bar Over Bar (Overlay) Chart 4) Needle Plot 5) WaterFall Charts F. Panels of Bar Charts G. Other Charts Data with a Single Categorical Key 1) Series Chart with Block Chart 2) Needle Plot with Block Chart H. Single Categorical Key But Two Measurement Variables: Vertical Bar Chart with Overlaid Line Chart I. Charts for Two Categorical Keys 1) Bubble Chart 2) Heat Map a) Default b) Improved c) Alternative with Simpler Code Chapter 5: Plots for Time-Dependent Data A. Best Use of Vertical Axis Space B. CurveLabels vs Legend C. Single-Line Plots 1) Simple 2) Band Plot 3) With Band As OverLay “Companion” to Highlight Part of Plotted Area D. All the ways to present a v e r y l o n g plot E. Multiple Line Plots Concurrently Displayed 1) Overlaid 2) Overlaid and Using Line Color Control 3) Overlaid and Using Data Labels and, to Eliminate Need for Legend, Curve Labels 4) Overlaid and Using XAxis Table, No Legend or CurveLabels Needed 5) In a Panel F. The Ineffable Incontrovertible Insightful Power of Simplicity: Annotated SparseLines 1) Single 2) Stacked or Paneled G. Spark Tables - SparkLines Used in a Table H. Other Ways To Present Time Series Data 1) Needle Plot 2) Step Plot 3) High-Low Open-Close Plot for Virtual Multi-Line Plot I. Vertical Bar Charts to Show Date/Time Dependence J. Animation To Show Time Evolution K. Other Alternatives to Providing Numbers 1) Limiting Labels to Y Values by Using Needle Plot to Get to X axis precisely 2) Use DropLines to Both Axes 3) Using TEXT Statements 4) Using ODS Graphics Annotation [LIGHT HERE, a usage example is provided for the US By-State Population Map] L. When all on-image annotation methods are infeasible, or declined 1) Web Graph Linked to Excel Table and Back 2) Graph and Table Composite in Excel WorkSheet 3) Graph and Table Composite in PowerPoint Slide 4) Graph and Table Composite in Word Document 5) Graph and Table Composite in PDF File Chapter 6: Looking for Relationships between Two Variables A. Scatter Charts 1) SGSCATTER with PLOT Statement vs SGPLOT with SCATTER Statement 2) Annotation with DataLabels 3) Highly Informative DataLabels 4) DropLines Instead of DataLabels 5) Annotation with the TEXT Statement 6) PROC SGSCATTER Panel of One Y Variable vs Two X Variables 7) PROC SGSCATTER Panel of Two Y Variables vs One X Variable 8) PROC SGSCATTER Panel of Three Y Variables vs One X Variable 9, 10, 11) Use PROC SGPANEL and SCATTER statement to create above examples—possibly retain just this solution 12} Overlay of Two Scatter Plots for Different Values of a Categorical Variable (e.g., Gender) to See Correlations and Differences in the y-x Relationship 13) SGPANEL of two Gender-Specific SCATTER plots for data in Item 12 13) Horizontal or Vertical Panel of the Above Overlay with the Two Individual Scatter Plots as Companion Images for Clarity 15) Annotated Scattter Plot using SGPLOT and SCATTER Statement 16) Add x values to annotation and suppress the superfluous axis 17) Replace y,x annotation with names of people whose data is plotted 18) Maximal annotation with Name, y, x 19) SGPANEL other examples TBD, maybe none B. Fit and Confidence Plots 1) Introduction 2) ELLIPSE 3) Linear Regression Plot 4) Cubic Regression Plot 5) LOESS Fit 6) SPLINE 7) Penalized B-Spline Plot C. VLINE Plus VBAR on the Same Chart Chapter 7: Distribution of a Single Variable A. Histogram 1) Basic 2) With Density Plot 3) With Fringe Plot B. Density Plot with Fringe Plot C. Box Plots Chapter 8: Maps for Data with Geographic Keys A. Examples for various types of unit area 1) By Country 2) By State 3) By County 4) By Point Location, such as City B. Rationales for Range Setting for the Measurement Reported C. Automating implementation of the rationale D. Annotating the map for maximal information communication E. The “For Color” Map Problem Solved—Color Coding for Maps F. What to do for a unit area that is too tiny to be readily visible Part III: Other Features Chapter 9: Ways to Enhance Your Graph A. Attribute Maps B. Reference Lines C. Inserting Text with INSET and TEXT Statements Chapter 10: Other Ways To Deliver Data Visualization A. Graph and Table Composite in Excel WorkSheet B. Graph and Table Composite in & Other Examples in PowerPoint Slides C. Graph and Table Composite in Word Document D. Graph and Table Composite in PDF File E. So you want to build an InfoGraphic 1) Creating the elements as individual images 2) Assembling a composite from those images 3) Creating an image file from the slide Chapter 11: Miscellaneous Tips A. Positioning of Titles in ODS Graphics Images B. Title and Footnote Text Handling in Web Graphs C. Pseudo-3D Effects That Introduce No Distortion or Needless Complexity Part IV: Appendixes Appendix A: Additional Resources 1. SAS-Institute-provided Documentation 2. Other Resources at support.sas.com 3. Online Conference Proceedings (not available from SAS Institute) 4. Online Newsletters 5. Blogs 6. Others TBD Appendix B: Possible Lengthy Code for Some Examples
£41.24
APress Serverless Beyond the Buzzword
Book SynopsisKnow how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps Table of ContentsAbout the author Acknowledgements Prologue Who is this book for? Technical levels used in this book What will you learn? Amazon Web Services (AWS) Second edition Chapter 1: Serverless basics What is Serverless architecture? Microservices Serverless example History of Serverless Types of projects Key challenges Key benefits Common objections Public case studies Chapter 2: Strategy Introduction Traditional organization structure vs Serverless Cloud Centre of Excellence (CCoE) Cloud controls as compliance guardrails Supporting tools Serverless adoption: current state Serverless adoption: desired state Serverless adoption: gap analysis Application suitability for Serverless Event Storming Public case studies Chapter 3: Finances Total Cost of Ownership (TCO) The value of paying for utilization The cost to develop Serverless The cost of migrating applications The cost of maintenance and operations Estimating the cloud operational costs Collecting the input data for an estimate Calculating the estimate Cost management Cost optimization Chapter 4: Security Shared responsibility Serverless security Principle of Least Privilege IAM Policy tips Security for cloud users Security for microservices User input validation Storing credentials Encryption Protecting Data Securing Databases Privacy and GDPR Security monitoring with ElectricEye Chapter 5: People Serverless roles Serverless roles: Solution Architect Serverless Roles: Cloud Security Engineer Serverless Roles: Deployment Automation Engineer Serverless roles: Full Stack Developer Serverless roles: Database Engineer Serverless training Serverless team structure Working with Serverless vendors Vetting Serverless capabilities Chapter 6: DevOps & Tooling What is DevOps? Infrastructure as Code AWS CloudFormation AWS CloudFormation planning Terraform AWS Serverless Application Model (SAM) AWS Amplify AWS Cloud Development Kit (CDK) CDK technical considerations Serverless Framework Code Repositories GIT Submodules Developer Tooling Code quality assurance Chapter 7: Data Data is a valuable asset Database selection Event Sourcing Data tenancy Relational Database Service (RDS) Redshift Serverless DynamoDB NoSQL Serverless NoSQL databases Managed NoSQL databases NoSQL databases comparison In-memory databases AppSync Simple Storage Solution (S3) Elastic File System (EFS) Chapter 8: Logging & Testing Logging Reactive Logging Proactive Logging Logging format and content Log types in the cloud Cloud logging services CloudWatch Exporting logs to S3 CloudWatch Subscriptions Managed services for proactive logging Error Monitoring Performance Optimisation Cost Tracking Security Monitoring Logging Best Practices Testing Testing Challenges in Serverless Types of Tests Asynchronous Testing Risk Assessment for Testing Test Pyramid vs Test Honeycomb Contract Testing for Serverless Deployment Pipeline AWS Testing Services Chapter 9: Architecture Challenges & mitigations AWS: Microservices AWS: Application Programming Interface (API) Design patterns Microservice example architectures Stateless architecture Decoupling microservices AWS: Decoupling Event-driven architecture Asynchronous design pattern Containers AWS: Edge AWS: Internet of Things (IoT) AWS: Managed Machine Learning (ML) AWS: Ledger Technology AWS: Call Centre Well-Architected Framework Serverless tips Chapter 10: Case studies Introduction Proactive logging Serverless data lake Video analysis Serverless Minecraft Dynamic live streaming SEO-friendly website and CMS Virtual host True Serverless containers Epilogue References
£41.24
APress Creating Business Applications with Microsoft 365
Book SynopsisLearn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You''ll work with an eTable of ContentsChapter 1. Programming in the Power Platform In this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language. Chapter 2. Updating a SharePoint List Using Power Apps Chapter 3. Creating an Approval Process with Power Automate Chapter 4. Creating a Survey Response Dashboard with Microsoft Power BI Chapter 5. Creating a Survey Solution with Microsoft Forms, Flow, SharePoint, and Power BI Chapter 6. Power BI Challenges with JSON, XML, and Yes/No Data Chapter 7. Power BI Case Study: Monitoring BMC Remedy Help Tickets Chapter 8. Building a Help Ticketing System in PowerApps and SharePoint – New Ticket Form Chapter 9. Continuing the Help Ticketing System – Technician Form Chapter 10. Using Power BI for the Help Ticketing System Chapter 11. Overcoming Power Apps Delegation Issues with SharePoint Data Sources In this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record. Chapter 12. Creating a Class Sign-Up Solution in SharePoint and Power Apps Chapter 13. Visualizing Learning Management Data from SQL Server using Power BI This chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more. Chapter 14. Dynamic Information in Power Apps and Sending an Adaptive Card to Teams using Power Automate In this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel. Chapter 15. Dynamically Setting Object Properties in Power Apps Based on a SharePoint List In this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps. Chapter 16. Uploading Files from PowerApps to SharePoint and Emailing Links using Power Automate In this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient. Chapter 17. Working with SharePoint Lookup Columns in Power BI In this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type. Chapter 18. Joining SharePoint/Excel Tables in Power BI This chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query. Chapter 19. Copying Microsoft Forms Answers to SharePoint using Power Automate and then Showing the Most Current Submission in Power BI In this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering. Chapter 20. Copying Microsoft Forms Attachments to a SharePoint List Item using Power Automate In this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item. Chapter 21. Creating an Employee Recognition App in Power Apps, Power Automate, Power BI, Teams, and SharePoint In this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data. Chapter 22. Creating a Reservations Booking Solution in Power Apps and SharePoint In this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf). Chapter 23. Creating a Scoring Application in Power Apps and SharePoint In this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.
£37.49
APress Connecting the Internet of Things
Book SynopsisNavigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also be able to understand the essentials of connectivity including, hardware, software, and business models.?IoT is essential for increasing productivity of many industries and quality of life (making the world smart and autonomous). Both wired and wireless connectivity technologies are essential ingredients in an IoT product. Writtenby Intel engineers and architects, Connecting the Internet of ThingsunTable of ContentsChapter 1: Introduction to IoT ConnectivityChapter Goal: This chapter provides an overview of key IoT use cases and key connectivity elements of IoT solutions. The reader will get an understanding of the breadth of the IoT landscape.• Purpose of this book• Background and Terminology• Key IoT use caseso Smart citieso Asset trackingo Smart factorieso Industrialo Transportationo Digital surveillance systemso Retailo Medical o Indoor location• End-to-end IoT building blockso Things/devices/sensorso Edge/Gateway/Fogo Cloud• IoT Stakeholders/Value Chaino Chip Vendorso Module Vendorso System Integratorso ODMso ISVso End CustomersChapter 2: Considerations in choosing a connectivity technologyChapter Goals: This chapter highlights the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies and also discusses the tradeoffs between different wireless technologies and network topologies. Also, this chapter provides the motivation for using wireless technologies in IoT products as well as challenges.• Compute and connect are integral functions that are fully integrated in single SoC-for lower cost and low power solutions• Benefits of wireless• Seamless wireless connectivity for mobility applications• Remote Commissioning, ease of deployment, OTA update, device identification• Challenges of Wireless Connectivity• Fragmentation of the IoT Ecosystemo Discussion of IoT Framework Open Connectivity Foundation etc.o Interoperability (open standards)• Coexistence and interference• Wireless security is vital• Certification (Industry, regulatory, operator)o Certified labs• Antenna design challenges• Considerations in choosing a connectivity technologyo Energy/power/cost tradeoffso Selection of network architectures and topologieso Wireless standards and alignment to use cases-how to choose the right wireless protocol for the jobo Selection criteria-range, data rate, power, security, latency, capacity, etc.• Wireless Standard BodiesSubchapter Goal: Overview of Connectivity standards including 15.4, ZigBee, Thread, 6LoWPAN, wi-fi, BT, LTE, 5G etc. and which is appropriate for each use case; include cost considerationso WiFi Allianceo BT SIGo ZigBee Allianceo Thread Groupo Dot doto Z-Waveo 3GPP (ITU-T)Chapter Goals: The following chapters (3 to 10) provide a deep dive on each connectivity technology and considerations on selecting it for the IoT use casesChapter 3: Wi-Fi • Wi-Fi mesh• WiFi 802.11a/b/g/n/ac• WiFi 6Chapter 4: Bluetooth• BLE• BT mesh• BT direction finding• BT beaconsChapter 5: 802.15.4 (unlicensed)• ZigBee• ThreadChapter 6: LPWAN• Lora• SigFoxChapter 7: Cellular Technologies • NB IoT• 3G• 4G LTE• CBRS (Private LTE) / OnGoChapter 8: 5G• eMBB• mMTC• urLLC• 5G TSNChapter 9: Ethernet• TSN• Industrial Ethernet TechnologiesChapter 10: GNSSChapter 11: IoT Connectivity Frameworks and StacksChapter Goal: This chapter goes into detail on how to assemble all of the components of a working solution and discusses how to scale your solution to a product• Software stacks, drivers, operating systems, RTOS• Gateway architecture including protocolso IoT protocols CoAP MQTT OPCUA• RF: antenna, PA, etc.• Coexistence• Environmental considerations, reliability, long life etc.• Security and privacy• Managing the network• Certification• Putting it together• How to integrate and validate (chip vs pre-certified module)• Scaling from project to product • Putting it together: Sample Projects• Go through the earlier examples and discuss the complete productsChapter 12: The Future of IoT ConnectivityChapter Goal: This chapter discusses emerging connectivity technologies for addressing new use cases as well as advancing and optimizing the performance of existing technologies• Things/sensors (low power, battery powered, low compute, need wireless connectivity, small memory footprint, small RTOS footprint)• Software defined radio• What is coming next?• Future technologies: Wi-Fi 7, etc.• Next steps for the reader• Where to get more informationReferencesIndex
£41.24
APress Introducing Cisco Unified Computing System
Book SynopsisThe Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy. So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it. You''ll stTable of ContentsChapter 1: Setting up UCSPE ( Cisco UCS Platform Emulator)Chapter Goal: To set up UCSPE No of pages 20 Sub -Topics 1. Downloading UCSPE 2. Importing UCSPE into VMWare 3. Starting UCSPE 4. Real-world UCS setup Chapter 2: The hardware chapter Chapter Goal: An explanation of the different hardware that makes up a UCS (Cisco Unified Computing System) No of pages: 20 Sub - Topics 1. The Fabric Interconnect 2. Chassis and IOMs 3. FEX 4. Blade servers 5. Rackmount servers Chapter 3: Northbound Networking and SAN Chapter Goal: To understand the UCS in relation to the rest of the network No of pages: 10 Sub - Topics 1. Physical connectivity and port-channels 2. VLANs Chapter 4: Policies Chapter Goal: To create the policies we need for chapter 4 No of pages : 20 Sub - Topics: 1. Policies 2. Storage Policies 3. Dynamic vNIC connection policies 3. vNIC/vHBA Placementpolicies 4. vMedia policies 5. Server boot policies 6. Maintenance Policies 7. Server Pool policies 8. Operation policies Chapter 5: Service Profiles and Templates Chapter Goal: To use the policies we have to create service profiles and assign them to our servers No of pages: 30 Sub - Topics: 1. Creating an Organization 2. Creating a Service Profile Template 3. Creating a Service Profile from a template 4. Assigning templates Chapter 6: UCS Security Chapter Goal: to Secure our UCS environment No of pages: 20 Sub - Topics 1. AAA 2. Hardening the web interface 3. Hardening SSH Chapter 7: Troubleshooting Chapter Goal: to Secure our UCS environment No of pages: 20 Sub - Topics 1. Error messages 2. SNMP 3. Call-home
£37.49
APress Salesforce Field Service
Book SynopsisSalesforce Field Service (formerly Field Service Lightning) connects customers, workforce, and products on a single platform to deliver exceptional on-site services. This book guides Field Service enthusiasts in creating, managing, and automating support with use cases and real-time examples. You will learn Salesforce Field Service which will help you better manage your customers, internal users, and field technicians. As you advance, you'll learn the whole end-to-end life cycle of creating work orders, associating service appointments to work orders, scheduling and dispatching service appointments to field technicians, and completing the work orders. By the end of this book, you'll be able to implement, test and deploy Salesforce Field Service for both Desktop and Mobile apps. What you'll learn Basics of Field Service Field Service objects and data model Field Service schedulingand optimization Configuring Salesforce Field Service Managing Salesforce Field ServiceTable of ContentsChapter 1: Intro to Salesforce Field Service · Basics of Field Service and Field Service Life Cycle · Field Service Personas, Objects and Data Model · Common Field Service Terminology · How Salesforce can help build Field Service and understanding Salesforce Licenses Chapter 2: Step by Step Field Service Implementation · Installing Field Service Managed App Exchange Package · Using Field Service Guided Setup · Using Dispatcher Console for dispatching Service Appointments Chapter 3: Extending Field Service to Mobile · Configuring Field Service Mobile App · How Field Technicians use Mobile App Chapter 4: Reporting in Field Service · Configure Reports and Dashboards to understand Field Service performance Chapter 5: Cracking Salesforce Field Service Lightning Certification · Understanding exam outline, key tips and strategies
£40.49
Springer Us Canadian Semantic Web
Book SynopsisCanadian Semantic Web: Technologies and Applications aims at contributing to the advancement of the Semantic Web by providing the most recent signi?cant - search on Semantic Web theory, techniques and applications in academia, industry and government in Canada and all over the world.Table of ContentsIncremental Query Rewriting with Resolution.- Knowledge Representation and Reasoning in Norm-Parameterized Fuzzy Description Logics.- A Generic Evaluation Model for Semantic Web Services.- A Modular Approach to Scalable Ontology Development.- Corporate Semantic Web: Towards the Deployment of Semantic Technologies in Enterprises.- Semantic Service Matchmaking in the ATM Domain Considering Infrastructure Capability Constraints.- Developing Knowledge Representation in Emergency Medical Assistance by Using Semantic Web Techniques.- Semantically Enriching the Search System of a Music Digital Library.- Application of an Intelligent System Framework and the Semantic Web for the CO2 Capture Process.- Information Pre-Processing using Domain Meta-Ontology and Rule Learning System.
£116.99
Pearson Education Connecting Networks v6 Labs Study Guide Lab
Book Synopsis
£51.04
Pearson Education (US) Connecting Networks v6 Course Booklet
Book SynopsisYour Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: * The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section. * Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. * An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.
£32.76
Cisco Press Scaling Networks V6 Companion Guide and Lab
Book Synopsis
£111.15
Pearson Education Cisco Firepower Threat Defense FTD
Book Synopsis
£62.99
Nova Science Publishers Inc Cluster Computing
Book SynopsisCluster Computing
£67.99
Nova Science Publishers Inc Quality of Parallel & Distributed Programs &
Book SynopsisThe field of parallel computing dates back to the mid-fifties, where research labs started the development of so-called supercomputers with the aim to significantly increase the performance, mainly the number of (floating point) operations a machine is able to perform per unit of time. Since then, significant advances in hardware and software technology have brought the field to a point where the long-time challenge of tera-flop computing was reached in 1998. While increases in performance are still a driving factor in parallel and distributed processing, there are many other challenges to be addressed in the field. Enabled by growth of the Internet, the majority of desktop computers nowadays can be seen as part of a huge distributed system, the World Wide Web. Advances in wireless networks extend the scope to a variety of mobile devices (including notebooks, PDAs, or mobile phones). Information is therefore distributed by nature, users require immediate access to information sources, to computing power, and to communication facilities. While performance in the sense defined above is still an important criterion in such kind of systems, other issues, including correctness, reliability, security, ease of use, ubiquitous access, intelligent services, etc. must be considered already in the development process itself. This extended notion of performance covering all those aspects is called "quality of parallel and distributed programs and systems". In order to examine and guarantee quality of parallel and distributed programs and systems special models, metrics and tools are necessary. The six papers selected for this volume tackle various aspects of these problems.
£55.99
Nova Science Publishers Inc Parallel & Distributed Scientific & Engineering
Book Synopsis
£99.74
Nova Science Publishers Inc Applied Parallel & Distributed Computing
Book SynopsisIn the not too distant future, every researcher and professional in science and engineering fields will have to understand parallel and distributed computing. With hyperthreading in Intel processors, hypertransport links in AMD processors, multi-core silicon in today''s high-end microprocessors from IBM and emerging cluster and grid computing, parallel and distributed computers have moved into the mainstream of computing. To fully exploit these advances in computer architectures, researchers and professionals must start to design parallel or distributed software, systems and algorithms for their scientific and engineering applications. Parallel and distributed scientific and engineering computing has become a key technology which will play an important part in determining, or at least shaping, future research and development activities in many academic and industrial branches. This book reports on the recent important advances in the area of parallel and distributed computing for science and engineering applications. Included in the book are selected papers from prestigious workshops such as PACT-SHPSEC, IPDPS-PDSECA and ICPP-HPSECA together with some invited papers from prominent researchers around the world. The book is divided into five main sections. These chapters not only provide novel ideas, new experimental results and handful experience in this field, but also stimulate the future research activities in the area of parallel and distributed computing for science and engineering applications.
£146.24
Pearson Education Limited BTEC Level 3 National IT Student Book 1
Book SynopsisResources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.
£33.09
Springer London Ltd Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. First Edition
Ontological Engineering refers to the set of activities that concern the ontology development process, the ontology life cycle, the methods and methodologies for building ontologies, and the tool suites and languages that support them. During the last decade, increasing attention has been focused on ontologies and Ontological Engineering. Ontologies are now widely used in Knowledge Engineering, Artificial Intelligence and Computer Science; in applications related to knowledge management, natural language processing, e-commerce, intelligent integration information, information retrieval, integration of databases, b- informatics, and education; and in new emerging fields like the Semantic Web. Primary goals of this book are to acquaint students, researchers and developers of information systems with the basic concepts and major issues of Ontological Engineering, as well as to make ontologies more understandable to those computer science engineers that integrate ontologies into their information systems. We have paid special attention to the influence that ontologies have on the Semantic Web. Pointers to the Semantic Web appear in all the chapters, but specially in the chapter on ontology languages and tools.
£97.49
Springer Nature Switzerland AG Testbeds and Research Infrastructures for the Development of Networks and Communities: 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th EAI International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communications, TridentCom 2018, held in November 2018 in Shanghai, China. The 10 full papers were selected from 29 submissions and are grouped into three sessions: wireless and testbed application; uncertainty analytics and formal verification; knowledge graph.Table of ContentsBig Data Science and Applications.- Big Data and Cloud Computing.- Big Data Outsourcing.- Security and privacy in Big Data.- Big Data Testbeds and Applications in Industries.- Cyber Physical Systems and Applications: Smart Homes, Smart Health, Smart Grids and Green Cities.- Connected Vehicles, Internet of Things, and Industrial Control Systems.- Security and privacy in IoT & CPS.- Next Generation Service Oriented Architectures & Web 2.0 Services.- Emerging Technology in networking and Communications.- Emerging Wired, Wireless and Optical Communication technology.- Virtualized Network and Data Center Network.- Software-Defined Network Testbeds.- Crowd Sourcing, Crowd Sensing and IoT.- Testbeds for Big data, CPS or Emerging Networking technology.- Testbed Development, Operations and Management.- Testbed Experiences in Big data, CPS or Emerging Networking Technology.- Experimental Facilities for Big data Testbeds.- Methodologies and Tools of Testbeds Performance Evaluation.
£34.19
Springer Nature Switzerland AG Quality, Reliability, Security and Robustness in Heterogeneous Systems: 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2018, held in Ho Chi Minh City, Vietnam, in December 2018. The 13 revised full papers were carefully reviewed and selected from 28 submissions. The papers are organized thematically in tracks, starting with security and privacy, telecommunication systems and networks, networks and applications.Table of ContentsImproving Privacy for GeoIP DNS Traffic.- Deep Reinforcement Learning based QoS-aware Routing in Knowledge-defined networking.- 3 Throughput optimization for multirate multicasting through association control in IEEE 802.11 WLAN.- An NS-3 MPTCP Implementation.- A Novel Security Framework for Industrial IoT based on ISA 100.11a.- Social-aware Caching and Resource Sharing Optimization for Video Delivering in 5G Networks.- Energy Efficiency in QoS Constrained 60 GHz Millimeter-Wave Ultra-dense Networks.- Priority-based Device Discovery in Public Safety D2D Networks with Full Duplexing.- Modified Direct Method for Point-to-Point Blocking.- Probability in Multi-service Switching Networks with Resource Allocation Control.- Inconsistencies among Spectral Robustness Metrics.- QoS criteria for energy-aware switching networks.- Modelling Overflow Systems with Queuing in Primary.- Exploring YouTube’s CDN Heterogeneity.
£34.19
Springer Nature Switzerland AG High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet
Book SynopsisThis open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.Table of ContentsWhy High-Performance Modelling and Simulation for Big Data Applications Matters.- Parallelization of hierarchical matrix algorithms for electromagnetic scattering problems.- Tail Distribution and Extreme Quantile Estimation using Non-Parametric Approaches.- Towards efficient and scalable data-intensive content delivery: State-of-the-art, issues and challenges.- Big Data in 5G Distributed Applications.- Big Data Processing, Analysis and Applications in Mobile Cellular Networks.- Medical Data Processing and Analysis for Remote Health and Activities Monitoring.- Towards human cell simulation.- Cloud-based High Throughput Virtual Screening in Novel Drug Discovery.- Ultra Wide Band Body Area Networks: Design and integration with Computational Clouds.- Survey on AI-based multimodal methods for emotion detection.- Forecasting Cryptocurrency Value by Sentiment Analysis: An HPC-oriented Survey of the State-of-the-Art in the Cloud Era.
£40.49
Springer Nature Switzerland AG Game Theory for Networks: 8th International EAI Conference, GameNets 2019, Paris, France, April 25–26, 2019, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 8th EAI International Conference on Game Theory for Networks, GameNets 2019, held in Paris, France, in April 2019. The 8 full and 3 short papers presented were carefully reviewed and selected from 17 submissions. They are organized in the following topical sections: Game Theory for Wireless Networks; Games for Economy and Resource Allocation; and Game Theory for Social Networks.Table of ContentsGame Theory for Wireless Networks.- Games for Economy and Resource Allocation.- Game Theory for Social Networks.
£34.19
Springer Nature Switzerland AG Industrial Control Systems Security and
Book SynopsisThis book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.Table of Contents1. Current and New Practice.- 2. Cyber-Modeling, Detection, and Forensics.- 3. Proactive Defense Mechanism Design.- 4. Human System Interface.- 5. Metrics For Resilience.
£107.99
Springer Nature Switzerland AG Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings
Book SynopsisThis book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.Table of ContentsDependable Systems.- Hardware/Software Co-designed Security Extensions for Embedded Devices.- SDES - Scalable Software Support for Dependable Embedded Systems.- Real-Time Systems.- Asynchronous Critical Sections in Real-Time Multiprocessor Systems.- Resource-Aware Parameter Tuning for Real-Time Applications.- A Hybrid NoC Enabling Fail-Operational and Hard Real-Time Communication in MPSoC.- Special Applications.- DSL-based Acceleration of Automotive Environment Perception and Mapping Algorithms for embedded CPUs, GPUs, and FPGAs.- Applying the Concept of Artificial DNA and Hormone System to a Low-Performance Automotive Environment.- A Parallel Adaptive Swarm Search Framework for Solving Black-Box Optimization Problems.- Architecture.- Leros: the Return of the Accumulator Machine.- A Generic Functional Simulation of Heterogeneous Systems.- Evaluating Dynamic Task Scheduling in a Task-based Runtime System for Heterogeneous Architectures.- Dynamic Scheduling of Pipelined Functional Units in Coarse-Grained Reconfigurable Array Elements.- Memory Hierarchy.- CyPhOS { A Component-based Cache-Aware Multi-Core Operating System.- Investigation of L2-Cache interferences in a NXP QorIQ T4240 multicore processor.- MEMPower: Data-Aware GPU Memory Power Model.- FPGA.- Effective FPGA Architecture for General CRC.- Receive-Side Notification for Enhanced RDMA in FPGA Based Networks.- An Efficient FPGA Accelerator Design for Optimized CNNs using OpenCL.- Energy Awareness.- The Return of Power Gating: Smart Leakage Energy Reductions in Modern Out-of-Order Processor Architectures.- A Heterogeneous and Reconfigurable Embedded Architecture for Energy-efficient Execution of Convolutional Neural Networks.- An energy efficient embedded processor for hard real-time Java applications.- NoC/SoC.- A Minimal Network Interface for a Simple Network-on-Chip.- Network Coding in Networks-on-Chip with Lossy Links.- Application Specific Reconfigurable SoC Interconnection Network Architectures.
£49.49
Springer Nature Switzerland AG Smart Assisted Living: Toward An Open Smart-Home Infrastructure
Book SynopsisSmart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure.This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems.This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.Table of ContentsPart I: Sensing and Activity Monitoring Multi-Resident Activity Monitoring in Smart Homes Through Non-Wearable Non-Intrusive SensorsSon N. Tran and Qing Zhang and Vanessa Smallbon and Mohan Karunanithi Where Am I? Comparing CNN and LSTM for Location Classification in Egocentric VideosGeorgios Kapidis, Ronald W. Poppe, Elsbeth A. van Dam, Remco C. Veltkamp, and Lucas P. J. J. Noldus A Privacy-Preserving Wearable Camera Setup for Dietary Event Spotting in Free-LivingGiovanni Schiboni, Fabio Wasner, and Oliver AmftSaving Energy on EMG-Monitoring Eyeglasses for Free-Living Eating Event Spotting Using Adaptive Duty-CyclingGiovanni Schiboni and Oliver Amft Indoor Localisation with WiFi Fingerprinting Based on a Convolutional Neural NetworkZumin Wang Unobtrusive Sensing to Assist with Post-Stroke RehabilitationChris Nugent Part II: Activity Recognition and Behaviour Analysis Energy-Based Decision Engine for Household Human Activity RecognitionAnastasios Vafeiadis, Thanasis Vafeiadis, Stelios Zikos, Stelios Krinidis, Konstantinos Votis, Dimitrios Giakoumis, Dimosthenis Ioannidis, Dimitrios Tzovaras, Liming Chen, and Raouf Hamzaoui Distributed Context Recognition, a Systematic ReviewUmar Ahmad and Luis Lopera Exercise Type Recognition Using Transfer LearningHossein Malekmohamadi Meta-Intelligence for Behaviour RecognitionXiaodong Liu and Qi Liu Part III: User Needs and Personalisation A Conceptual Framework for Adaptive User Interfaces for Older AdultsEduardo Machado, Deepika Singhy, Federico Cruciani, Liming Chen, Sten Hankey, Fernando Salvago, Johannes Kropf, and Andreas HolzingerStudying the Technological Barriers and Needs of People with Dementia: A Quantitative StudyNikolaos Liappas, Rebeca Isabel García-Betances, José Gabriel Teriús-Padrón, and María Fernanda Cabrera-Umpiérrez Adaptive Service Robot Behaviours Based on User Mood: Towards Better Personalized Support of MCI Patients at HomeDimitrios Giakoumis, Georgia Peleka, Manolis Vasileiadis, Ioannis Kostavelis, and Dimitrios Tzovaras Part IV: Ambient Assisted Living Solutions Towards Cognitive Assisted LivingClaudia Steinberger and Judith Michael Towards Self-Management of Chronic Diseases in Smart HomesJosé G. Teriús-Padrón, Georgios Kapidis, Sarah Fallmann, Erinc Merdivan, Sten Hanke, Rebeca I. García-Betances, and María Fernanda Cabrera-UmpiérrezA Deep Learning Approach for Privacy Preservation in Assisted LivingIsmini Psychoula, Erinc Merdivany, Deepika Singhy, Liming Chen, Feng Chen, Sten Hankey, Johannes Kropfy, Andreas Holzingerx, and Matthieu GeistTowards Socially Assistive Robots for the Elderly: An End-to-End Object Search FrameworkMohammad Reza Loghmani, Timothy Patten and Markus VinczeModelling Activities of Daily Living with Petri NetsMatias Garcia-Constantino, Alexandros Konios and Chris Nugent Calculus of Context-Aware Ambients for Assisted Living System ModellingFrancois Siewe
£71.99
Springer Nature Switzerland AG Getting Started with Enterprise Internet of
Book SynopsisThis novel textbook introduces Enterprise Internet of Things from technology, management and business perspectives, carefully examining enterprise environments through the lens of modernization with the Internet of Things (IoT). It also includes detailed case studies to offer meaningful insights for readers from various disciplines and areas. The book analyzes the ways in which the technology could contribute to the enterprise world in terms of revenue and new business models, and addresses the strategies and principles involved in developing IoT solutions with software engineering practices such as DevOps and Micro services architecture principles. By doing so, it offers readers a clear overview of the power of Internet of Things in building next generation enterprise use cases. The book enables readers to understand the latest opportunities to create new business models in enterprises using the unprecedented level of device connectivity, and the wealth of data generated and information exchange among these devices. As such, it appeals to various user groups, such as engineers trying to solve problems in their own domains using Enterprise IoT, academics interested in gaining a better understanding of applications of IoT in large-scale enterprises, and researchers wanting to contribute to the ever-growing and complex area of IoT.Table of Contents
£67.49