7.460 results (0,22912 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Draw On Your Emotions book and The Emotion Cards

Interaction for Designers How To Make Things People Love

Design of Internet of Things

Design of Internet of Things

The text provides a comprehensive overview of the design aspects of the internet of things devices and covers the fundamentals of big data and data science. It explores various scenarios such as what are the middleware and frameworks available and how to build a stable standards-based and Secure internet of things device. It discusses important concepts including embedded programming techniques machine-to-machine architecture and the internet of things for smart city applications. It will serve as an ideal design book for professionals senior undergraduate and graduate students in the fields including electrical engineering electronics and communication engineering and computer engineering. The book- Covers applications and architecture needed to deliver solutions to end customers and readers. Discusses practical aspects of implementing the internet of things in diverse areas including manufacturing and software development. Highlights big data concepts and embedded programming techniques. Presents technologies including machine to machine integrated sensors and radio-frequency identification. Introduces global system for mobile communication and precise details of standards based on internet of things architecture models. The book focuses on practical design aspects such as how to finalize a processor integrated circuit which operating system to use etc. in a single volume. It will serve as an ideal text for professionals senior undergraduate and graduate students in diverse engineering domains including electrical electronics and communication computer. | Design of Internet of Things

GBP 44.99
1

Draw on Your Emotions

5G LTE Narrowband Internet of Things (NB-IoT)

Fundamentals of Internet of Things for Non-Engineers

Fundamentals of Internet of Things for Non-Engineers

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers progressed to connecting people to people and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare excitement and cheering. We’re now into the work phase and we have to figure out how to make the dream come true. The IoT will have many faces and involve many fields as it progresses. It will involve technology design security legal policy business artificial intelligence design Big Data and forensics; about any field that exists now. This is the reason for this book. There are books in each one of these fields but the focus was always an inch wide and a mile deep. There’s a need for a book that will introduce the IoT to non-engineers and allow them to dream of the possibilities and explore the work venues in this area. The book had to be a mile wide and a few inches deep. The editors met this goal by engaging experts from a number of fields and asking them to come together to create an introductory IoT book. Fundamentals of Internet of Things for Non-Engineers Provides a comprehensive view of the current fundamentals and the anticipated future trends in the realm of Internet of Things from a practitioner’s point of view Brings together a variety of voices with subject matter expertise in these diverse topical areas to provide leaders students and lay persons with a fresh worldview of the Internet of Things and the background to succeed in related technology decision-making Enhances the reader’s experience through a review of actual applications of Internet of Things end points and devices to solve business and civic problems along with notes on lessons learned Prepares readers to embrace the Internet of Things era and address complex business social operational educational and personal systems integration questions and opportunities

GBP 52.99
1

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

How Things Work The Computer Science Edition

What Every Engineer Should Know About the Internet of Things

Get to Know Me: OCD

Medical Big Data and Internet of Medical Things Advances Challenges and Applications

Medical Big Data and Internet of Medical Things Advances Challenges and Applications

Big data and the Internet of Things (IoT) play a vital role in prediction systems used in biological and medical applications particularly for resolving issues related to disease biology at different scales. Modelling and integrating medical big data with the IoT helps in building effective prediction systems for automatic recommendations of diagnosis and treatment. The ability to mine process analyse characterize classify and cluster a variety and wide volume of medical data is a challenging task. There is a great demand for the design and development of methods dealing with capturing and automatically analysing medical data from imaging systems and IoT sensors. Addressing analytical and legal issues and research on integration of big data analytics with respect to clinical practice and clinical utility architectures and clustering techniques for IoT data processing effective frameworks for removal of misclassified instances practicality of big data analytics methodological and technical issues potential of Hadoop in managing healthcare data is the need of the hour. This book integrates different aspects used in the field of healthcare such as big data IoT soft computing machine learning augmented reality organs on chip personalized drugs implantable electronics integration of bio-interfaces and wearable sensors devices practical body area network (BAN) and architectures of web systems. Key Features:Addresses various applications of Medical Big Data and Internet of Medical Things in real time environmentHighlights recent innovations designs developments and topics of interest in machine learning techniques for classification of medical dataProvides background and solutions to existing challenges in Medical Big Data and Internet of Medical ThingsProvides optimization techniques and programming models to parallelize the computationally intensive tasks in data mining of medical dataDiscusses interactions advantages limitations challenges and future perspectives of IoT based remote healthcare monitoring systems. Includes data privacy and security analysis of cryptography methods for the Web of Medical Things (WoMT)Presents case studies on the next generation medical chair electronic nose and pill cam are also presented. | Medical Big Data and Internet of Medical Things Advances Challenges and Applications

GBP 44.99
1

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security Cybersecurity Laws Internet of Things (IoT) and Mobile Devices is an introductory text addressing current technology trends and security issues. While many books on the market cover investigations forensic recovery and presentation of evidence and others explain computer and network security this book explores both explaining the essential principles governing computers wireless and mobile devices the Internet of Things cloud systems and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered investigated and adjudicated unless they are understood. The legal portion of the book is an overview of the legal system in the United States including cyberlaw standards and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances. Key Features: Provides a strong foundation of cybercrime knowledge along with the core concepts of networking computer security Internet of Things (IoTs) and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices cloud computing Software-as-a-Service (SaaS) VMware and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security concepts that are often glossed over in many textbooks and includes the study of cybercrime as critical forward-looking cybersecurity challenges. Cybercrime and Information Technology is a welcome addition to the literature particularly for those professors seeking a more hands-on forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum and is relevant to those studying Security Administration Public Administrations Police Studies Business Administration Computer Science and Information Systems. A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction. | Cybercrime and Information Technology The Computer Network Infrastructure and Computer Security Cybersecurity Laws Internet of Things (IoT

GBP 62.99
1

High Resolution Pressuremeters and Geotechnical Engineering The Measurement of Small Things

The Complete Guide to Perspective Drawing From One-Point to Six-Point

The Internet of Things Enabling Technologies Platforms and Use Cases

The Internet of Things Enabling Technologies Platforms and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT) there is an even greater need for this book which explains the technology the internetworking and applications that are making IoT an everyday reality. The book begins with a discussion of IoT ecosystems and the technology that enables them which includes:Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement PlatformsA chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection storage translation real-time processing mining and analysis all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices mobile technology wearables RFID sensors and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements promising applications and roles of cloud computing and data analytics. The book also examines smart homes smart cities and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. | The Internet of Things Enabling Technologies Platforms and Use Cases

GBP 44.99
1

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)

Security privacy and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are again crucial for the effective performance of these systems. Recent Advances in Security Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies as well as a wide range of examples and illustrations to effectively show the principles algorithms challenges and applications of security privacy and trust for IoT and CPS. Book features: Introduces new directions for research development and engineering security privacy and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles algorithms challenges and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security privacy and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers academics and practitioners from various national and international organizations and universities.

GBP 48.99
1

Swarm Intelligence From Social Bacteria to Humans

Swarm Intelligence From Social Bacteria to Humans

The notion of swarm intelligence was introduced for describing decentralized and self-organized behaviors of groups of animals. Then this idea was extrapolated to design groups of robots which interact locally to cumulate a collective reaction. Some natural examples of swarms are as follows: ant colonies bee colonies fish schooling bird flocking horse herding bacterial colonies multinucleated giant amoebae Physarum polycephalum etc. In all these examples individual agents behave locally with an emergence of their common effect. An intelligent behavior of swarm individuals is explained by the following biological reactions to attractants and repellents. Attractants are biologically active things such as food pieces or sex pheromones which attract individuals of swarm. Repellents are biologically active things such as predators which repel individuals of swarm. As a consequence attractants and repellents stimulate the directed movement of swarms towards and away from the stimulus respectively. It is worth noting that a group of people such as pedestrians follow some swarm patterns of flocking or schooling. For instance humans prefer to avoid a person considered by them as a possible predator and if a substantial part of the group in the situation of escape panic (not less than 5%) changes the direction then the rest follows the new direction too. Some swarm patterns are observed among human beings under the conditions of their addictive behavior such as the behavior of alcoholics or gamers. The methodological framework of studying swarm intelligence is represented by unconventional computing robotics and cognitive science. In this book we aim to analyze new methodologies involved in studying swarm intelligence. We are going to bring together computer scientists and cognitive scientists dealing with swarm patterns from social bacteria to human beings. This book considers different models of simulating controlling and predicting the swarm behavior of different species from social bacteria to humans. | Swarm Intelligence From Social Bacteria to Humans

GBP 58.99
1

A Practical Guide to Event Promotion

Psychopathology From Science to Clinical Practice

LTE Cellular Narrowband Internet of Things (NB-IoT) Practical Projects for the Cloud and Data Visualization

LTE Cellular Narrowband Internet of Things (NB-IoT) Practical Projects for the Cloud and Data Visualization

NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance such as: increased area coverage of up to one kilometer; a massive number of devices—up to 200 000—per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book covering many use cases and scenarios this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino™ Amazon Cloud Google Maps and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules policy security certificates and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols such as TCP HTTP SSL or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices such as ultrasonic and environmental sensors. Finally the fourth part explains how NB-IoT can be used to control actuators such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers students researchers system integrators mobile operators’ technical staff and electronics enthusiasts. To download the software which can be used with the book go to: https://github. com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph. D. in Electrical and Computer Engineering from University of British Columbia Vancouver Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria Victoria Canada in 2000. He completed his B. Sc. degree in Computers and Systems Engineering from Al-Azhar University Cairo Egypt in 1995. Between 2003 and 2011 he was in academia and industry including Texas A&M University. Between 2011 and 2013 he was with Spirent Communications NJ USA. Since 2013 he has been with Microsoft USA. He is also an affiliate associate professor at University of Washington Tacoma WA USA teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers British Columbia Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols cellular quality of service radio resource management traffic and packet scheduling network analytics and mobility. | LTE Cellular Narrowband Internet of Things (NB-IoT) Practical Projects for the Cloud and Data Visualization

GBP 44.99
1

An Engineer's Introduction to Programming with MATLAB 2019

Bringing a Medical Device to the Market A Scientist’s Perspective

Introduction to Manufacturing An Industrial Engineering and Management Perspective

Introduction to Manufacturing An Industrial Engineering and Management Perspective

This Introduction to Manufacturing focuses students on the issues that matter to practicing industrial engineers and managers. It offers a systems perspective on designing managing and improving manufacturing operations. On each topic it covers the key issues with pointers on where to dig deeper. Unlike the many textbooks on operations management supply chain management and process technology this book weaves together these threads as they interact in manufacturing. It has five parts: Getting to Know Manufacturing: Fundamental concepts of manufacturing as an economic activity from manufacturing strategy to forecasting market demand Engineering the Factory: Physical design of factories and processes the necessary infrastructure and technology for manufacturing Making Information Flow: The central nervous system that triggers and responds to events occurring in production Making Materials Flow: The logistics of manufacturing from materials handling inside the factory via warehousing to supply chain management Enhancing Performance: Managing manufacturing performance and methods to maintain and improve it both in times of normal operations and emergencies Supported with rich illustrations and teaching aids Introduction to Manufacturing is essential reading for industrial engineering and management students – of all ages and backgrounds – engaged in the vital task of making the things we all use. | Introduction to Manufacturing An Industrial Engineering and Management Perspective

GBP 59.99
1

The Routledge Companion to Planning in the Global South