24 resultater (0,23694 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Digital Media and Wireless Communications in Developing Nations - - Bog - Apple Academic Press Inc. - Plusbog.dk

Mobile, Wireless and Sensor Networks - Amine Dahane - Bog - Apple Academic Press Inc. - Plusbog.dk

Mobile, Wireless and Sensor Networks - Amine Dahane - Bog - Apple Academic Press Inc. - Plusbog.dk

Wireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach, the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. In Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety , the authors use an approach based on computing of the weight of each node in the network as the proposed technique to deal with this problem. They present a virtual laboratory platform (VLP) of baptized mercury, allowing students and researchers to make practical work (PW) on different aspects of mobile wireless sensor networks. The authors’ choice of WSNs is motivated mainly by the use of real experiments needed in most college courses on WSNs. These usual experiments, however, require an expensive investment and many nodes in the classroom. The platform presented here aims at showing the feasibility, the flexibility, and the reduced cost using the authors’ approach. The authors demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs. The book will be a valuable resource for students in networking studies as well as for faculty and researchers in this area.

DKK 835.00
1

Wireless Sensor Networks and the Internet of Things - - Bog - Apple Academic Press Inc. - Plusbog.dk

Sensor-Based Quality Assessment Systems for Fruits and Vegetables - - Bog - Apple Academic Press Inc. - Plusbog.dk

Understanding Biometrics with Matlab - Fathi E. Abd El Samie - Bog - Apple Academic Press Inc. - Plusbog.dk

Performance Evaluation of Micro Irrigation Management - - Bog - Apple Academic Press Inc. - Plusbog.dk

Internet of Things for Agriculture 4.0 - - Bog - Apple Academic Press Inc. - Plusbog.dk

Internet of Things for Agriculture 4.0 - - Bog - Apple Academic Press Inc. - Plusbog.dk

This new book provides an insightful look at the varied and exciting uses and applications of Wi-Fi and the Internet of Things in agriculture. With internet-enabled communications becoming more widely available, farms and agricultural establishments can take advantage of these new technologies for a wide range of farm operations, such as crop management, farm vehicle tracking, livestock monitoring, storage monitoring, and more. The collected data from these devices can be stored in the cloud system or server and accessed by the farmers via the internet or mobile phones. This book shows the many benefits to farmers from applying IoT, including better utilizing information for monitoring crops, optimizing water use, planning effective fertilization strategies, and saving time and reducing the operation expenses. Topics include using IoT for vertical farming, IoT-based smart irrigation system, landslide susceptibility assessment, automated aeroponics systems, crop survival analysis, and more. The volume also considers the challenges of IoT in agriculture, such as the requirements of applications of wireless sensor networks, the threat of attacks and the detection of vulnerabilities in wireless sensor networks, and more. Internet of Things for Agriculture 4.0: Impact and Challenges provides a better understanding of the time- and resourcing-saving benefits of wireless sensors and remote monitoring devices in agriculture. The volume will be useful for those involved in agricultural operations as well as scientists and researchers, and faculty and students in agriculture and computer and information science engineering.

DKK 835.00
1

Computer Technology and Computer Programming - - Bog - Apple Academic Press Inc. - Plusbog.dk

Bioelectronics and Medical Devices - - Bog - Apple Academic Press Inc. - Plusbog.dk

Intelligent Systems - - Bog - Apple Academic Press Inc. - Plusbog.dk

Advances in Antenna, Signal Processing, and Microelectronics Engineering - - Bog - Apple Academic Press Inc. - Plusbog.dk

Electronic Devices and Circuit Design - - Bog - Apple Academic Press Inc. - Plusbog.dk

Handbook of Artificial Intelligence in Biomedical Engineering - - Bog - Apple Academic Press Inc. - Plusbog.dk

Research Progress in Nano and Intelligent Materials - - Bog - Apple Academic Press Inc. - Plusbog.dk

Research Progress in Nano and Intelligent Materials - - Bog - Apple Academic Press Inc. - Plusbog.dk

Effective Communication During Disasters - - Bog - Apple Academic Press Inc. - Plusbog.dk

Effective Communication During Disasters - - Bog - Apple Academic Press Inc. - Plusbog.dk

This title includes a number of Open Access chapters. In today’s world, there are new opportunities for disaster communications through modern technology and social media. Social network applications such as Facebook, Twitter, and Instagram can connect friends, family, first responders, and those providing relief and assistance. However, social media and other modern communication tools have their limitations. They can be affected by disaster situations where there are power outages or interrupted cellular service. The research contained in this valuable compendium offers much-needed information for emergency responders, utility companies, relief organizations, and governments as they invest in infrastructure to support post-disaster communications. In order to make use of modern communication methods, as well as fully utilize more traditional communication networks, it is imperative that we understand how people actually communicate in the wake of a disaster situation and how various communication strategies can best be utilized. Communication during and immediately after a disaster situation is a vital component of response and recovery. Effective communication connects first responders, support systems, and family members with the communities and individuals immersed in the disaster. Reliable communication also plays a key role in a community’s resilience. With research from internationally recognized experts, this volume provides an overview of communication challenges and best-practice analyses, looks at the internet and social media and mobile phones and other technology for disaster communication, and explores the challenges to effective communication. - Presents a quality improvement project that gathered expert consensus on best practices used to improve disaster communication - Analyzes the information dissemination mechanisms of different media to establish an efficient information dissemination plan for disaster pre-warning, including short message service (SMS), microblogs, news portals, cell phones, television, and oral communication - Gauges the effectiveness of disaster risk communication - Looks at the future of social media use during emergencies and afterwards - Proposes a disaster resilient network that integrates various wireless networks into a cognitive wireless network in the event of disaster occurrences Effective Communication During Disasters: Making Use of Technology, Media, and Human Resources is an informative, multi-faceted resource on preparedness planning for effective communication before, during, and after a disaster occurs.

DKK 1042.00
1

Effective Communication During Disasters - - Bog - Apple Academic Press Inc. - Plusbog.dk

Effective Communication During Disasters - - Bog - Apple Academic Press Inc. - Plusbog.dk

This title includes a number of Open Access chapters. In today’s world, there are new opportunities for disaster communications through modern technology and social media. Social network applications such as Facebook, Twitter, and Instagram can connect friends, family, first responders, and those providing relief and assistance. However, social media and other modern communication tools have their limitations. They can be affected by disaster situations where there are power outages or interrupted cellular service. The research contained in this valuable compendium offers much-needed information for emergency responders, utility companies, relief organizations, and governments as they invest in infrastructure to support post-disaster communications. In order to make use of modern communication methods, as well as fully utilize more traditional communication networks, it is imperative that we understand how people actually communicate in the wake of a disaster situation and how various communication strategies can best be utilized. Communication during and immediately after a disaster situation is a vital component of response and recovery. Effective communication connects first responders, support systems, and family members with the communities and individuals immersed in the disaster. Reliable communication also plays a key role in a community’s resilience. With research from internationally recognized experts, this volume provides an overview of communication challenges and best-practice analyses, looks at the internet and social media and mobile phones and other technology for disaster communication, and explores the challenges to effective communication. - Presents a quality improvement project that gathered expert consensus on best practices used to improve disaster communication - Analyzes the information dissemination mechanisms of different media to establish an efficient information dissemination plan for disaster pre-warning, including short message service (SMS), microblogs, news portals, cell phones, television, and oral communication - Gauges the effectiveness of disaster risk communication - Looks at the future of social media use during emergencies and afterwards - Proposes a disaster resilient network that integrates various wireless networks into a cognitive wireless network in the event of disaster occurrences Effective Communication During Disasters: Making Use of Technology, Media, and Human Resources is an informative, multi-faceted resource on preparedness planning for effective communication before, during, and after a disaster occurs.

DKK 835.00
1

The 21st Century Meeting and Event Technologies - Dessislava (roi Communication Boshnakova - Bog - Apple Academic Press Inc. - Plusbog.dk

The 21st Century Meeting and Event Technologies - Dessislava (roi Communication Boshnakova - Bog - Apple Academic Press Inc. - Plusbog.dk

Here is the first book to specifically and comprehensively address the rapid changes and advances in technology in the planning, management, and marketing of meetings and events. The multigenerational trio of authors, including Joe Goldblatt and two of his former students, Seungwon "Shawn" Lee and Dessislava Boshnakova, cover the most important aspects of using technology for today’s meetings and events, such as - How to harness the power of social media - How to use crowdsourcing effectively - How to choose appropriate room layout design software - How to manage and use guest-generated content - How to measure and evaluate your success - How to choose meeting registration software - How to promote your meeting with blogs, websites, podcasts, and more - How to hold virtual meetings and events - How to use search engine optimization to advantage The area of meeting and event technology is a fast-growing component of the meetings, incentives, conventions and exhibition (MICE) industry. With a foreword by Corbin Ball, an internationally renowned speaker, consultant and writer in the meetings and events technology field, The 21st Century Meeting and Event Technologies will be an essential resource for hospitality students and business professionals. Faculty may request an examination copy from info@appleacademicpress.com. Please provide your name and title, course title, course start date, current text, number of students, and your institution address.

DKK 986.00
1

The 21st Century Meeting and Event Technologies - Joe Goldblatt - Bog - Apple Academic Press Inc. - Plusbog.dk

The 21st Century Meeting and Event Technologies - Joe Goldblatt - Bog - Apple Academic Press Inc. - Plusbog.dk

Here is the first book to specifically and comprehensively address the rapid changes and advances in technology in the planning, management, and marketing of meetings and events. The multigenerational trio of authors, including Joe Goldblatt and two of his former students, Seungwon "Shawn" Lee and Dessislava Boshnakova, cover the most important aspects of using technology for today’s meetings and events, such as - How to harness the power of social media - How to use crowdsourcing effectively - How to choose appropriate room layout design software - How to manage and use guest-generated content - How to measure and evaluate your success - How to choose meeting registration software - How to promote your meeting with blogs, websites, podcasts, and more - How to hold virtual meetings and events - How to use search engine optimization to advantage The area of meeting and event technology is a fast-growing component of the meetings, incentives, conventions and exhibition (MICE) industry. With a foreword by Corbin Ball, an internationally renowned speaker, consultant and writer in the meetings and events technology field, The 21st Century Meeting and Event Technologies will be an essential resource for hospitality students and business professionals. Faculty may request an examination copy from info@appleacademicpress.com. Please provide your name and title, course title, course start date, current text, number of students, and your institution address.

DKK 835.00
1

Technological Interventions in Dairy Science - - Bog - Apple Academic Press Inc. - Plusbog.dk

Technological Interventions in Dairy Science - - Bog - Apple Academic Press Inc. - Plusbog.dk

This volume covers a selection of important novel technological interventions in dairy science, from the physical properties of milk and other milk products to nonthermal processing of milk. It also discusses safety methods in dairy science, which includes cleaning-in-place and techniques to determine adulteration in milk. Milk is a perishable commodity, and being rich in nutrients, it acts as the perfect substrate for the growth of microflora (sometimes dangerous for consumption). To reduce this, different thermal and nonthermal techniques are used. Thermal treatments are common techniques used for extending the shelf life of milk, such as, for example, pasteurization, sterilization, and UHT, but loss of nutrients is a concern associated with these treatments. Nonthermal treatments like high-pressure processing, pulse electric field, ultra-sonication, and irradiation are also explored in the processing of milk to minimize the loss of nutrients as compared to thermal treatment. Post-process contamination is also a major factor that can affect the shelf life of milk, and safe packaging plays an important role when the milk and milk products are stored at refrigeration or ambient temperature. Many advances in these dairy technologies are presented in this informative volume. Technological Interventions in Dairy Science: Innovative Approaches in Processing, Preservation, and Analysis of Milk Products will prove valuable for industrial professionals, scientists, regulatory personnel, consultants, academics, students and field-related personnel. The book also attempts to bridge the gap between research and industrial application of recent techniques.

DKK 819.00
1

Novel Dairy Processing Technologies - - Bog - Apple Academic Press Inc. - Plusbog.dk

Novel Dairy Processing Technologies - - Bog - Apple Academic Press Inc. - Plusbog.dk

Milk is nature’s perfect food (lacking only iron, copper, and vitamin C) and is highly recommended by nutritionists for building healthy bodies. New technologies have emerged in the processing of milk. This new volume focuses on the processing of milk by novel techniques, emphasizing the conservation of energy and effective methods. This book is divided four parts that cover: - applications of novel processing technologies in the dairy industry - novel drying techniques in the dairy industry - management systems and hurdles in the dairy industry - energy conservation and opportunities in the dairy industry This book presents new information on the technology of ohmic heating for milk pasteurization. It goes on to provide an overview of the commercial thermal, non-thermal technologies, and hybrid technologies for milk pasteurization. There are non-thermal technologies such as pulse light, irradiation, ultra violet treatment, etc., that can be used in combination with other technologies for the processing of milk and milk products. This hybrid technology can provide multiple benefits, such extended shelf life, reduced energy costs, reduced heat treatment, and better organoleptic and sensory properties. The book also describes the different aspects of food safety management used in dairy processing. The book also looks at recent advances in microwave-assisted thermal processing of milk and the effects of microwaves on microbiological, physicochemical, and organoleptic properties of processed milk and milk products. Technological advances in value addition and standardization of the products have been reported, but well-established processes for mechanized production are recommended in the book for a uniform quality nutritious product produced under hygienic conditions. This new volume will be of interest to faculty, researchers, postgraduate students, researchers, as well as engineers in the dairy industry.

DKK 835.00
1

Satellite Marketing - Kevin Popovic - Bog - Apple Academic Press Inc. - Plusbog.dk

Satellite Marketing - Kevin Popovic - Bog - Apple Academic Press Inc. - Plusbog.dk

Satellite marketing uses multiple social media sites as a series of marketing sub-stations or "satellites." Each satellite is a stand-alone marketing effort, which means that if and when your prospects are engaged, they are being introduced to your brand, your product and services, and your community of users. Prospects presented with a call to action through satellite marketing are more likely to act because they are actively engaged with your message. Identifying opportunities for social media within integrated marketing communications, Satellite Marketing outlines a proven process to help you create an actionable strategic plan based on measurable goals. It provides business owners, CEOs, CMOs, and sales people with a comprehensive strategy for leveraging new media and integrating it with conventional marketing tactics. Traditional marketing is still important, and the context of social media will make traditional tactics more effective. Dispelling many of the myths surrounding social media, this book will help you: - - Develop an effective social media strategy to boost sales and brand awareness - Identify and target relevant markets - Create, deploy, and maintain effective satellites - Measure the success of your satellite marketing campaigns - The book explains why successful marketing has evolved from product-centric to customer-centric. It presents valuable lessons learned from established communications channels that apply to social media. It also details a step-by-step process to help you identify measurable goals, better understand your audience, create a strategy, select the appropriate social media, build engagement, develop a communications plan, and monitor performance. This book is written by Kevin Popović, the Founder of Ideahaus ® . Mr. Popovic is a speaker, educator, and was recently named a Top 20 Digital Marketing Strategist for 201 5 by the Online Marketing Institute.

DKK 373.00
1

Multilevel Modeling of Secure Systems in QoP-ML - Bogdan Ksiezopolski - Bog - Apple Academic Press Inc. - Plusbog.dk

Multilevel Modeling of Secure Systems in QoP-ML - Bogdan Ksiezopolski - Bog - Apple Academic Press Inc. - Plusbog.dk

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. - - Introduces quality of protection evaluation of IT Systems - Covers the financial, economic, and CO 2 emission analysis phase - Supplies a multilevel analysis of Cloud-based data centers - Details the structures for advanced communication modeling and energy analysis - Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures - Includes case studies that illustrate the QoP analysis process using the QoP-ML - Examines the robust security metrics of cryptographic primitives - Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework - The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system''s security.

DKK 884.00
1

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

Conducting Network Penetration and Espionage in a Global Environment - Bruce Middleton - Bog - Apple Academic Press Inc. - Plusbog.dk

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks—using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you’ve learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today’s networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

DKK 1022.00
1