Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
14,232
result(s) for
"COMPUTERS / Internet / General."
Sort by:
Building the Internet of Things with IPv6 and MIPv6
by
Minoli, Daniel
in
Communication, Networking and Broadcast Technologies
,
Computers
,
COMPUTERS / Internet / General. bisacsh
2013
\"If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.\"
—Kevin Ashton, originator of the term, Internet of Things
An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with IPv6 and MIPv6
What is the Internet of Things? How can it help my organization? What is the cost of deploying such a system? What are the security implications? Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M Communications answers these questions and many more.
This essential book explains the concept and potential that the IoT presents, from mobile applications that allow home appliances to be programmed remotely, to solutions in manufacturing and energy conservation. It features a tutorial for implementing the IoT using IPv6 and Mobile IPv6 and offers complete chapter coverage that explains:
* What is the Internet of Things?
* Internet of Things definitions and frameworks
* Internet of Things application examples
* Fundamental IoT mechanisms and key technologies
* Evolving IoT standards
* Layer 1/2 connectivity: wireless technologies for the IoT
* Layer 3 connectivity: IPv6 technologies for the IoT
* IPv6 over low power WPAN (6lowpan)
Easily accessible, applicable, and not overly technical, Building the Internet of Things with IPv6 and MIPv6 is an important resource for Internet and ISP providers, telecommunications companies, wireless providers, logistics professionals, and engineers in equipment development, as well as graduate students in computer science and computer engineering courses.
From City Space to Cyberspace
2021,2025
The narrative of the birth of internet culture often focuses on the achievements of American entrepreneurs in Silicon Valley, but there is an alternative history of internet pioneers in Europe who developed their own model of network culture in the early 1990s. Drawing from their experiences in the leftist and anarchist movements of the '80s, they built DIY networks that give us a glimpse into what internet culture could have been if it were in the hands of squatters, hackers, punks, artists, and activists. In the Dutch scene, the early internet was intimately tied to the aesthetics and politics of squatting. Untethered from profit motives, these artists and activists aimed to create a decentralized tool that would democratize culture and promote open and free exchange of information.
Internet of Things Security: Fundamentals, Techniques and Applications
2020,2018
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them. Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include: • Machine-to-Machine Communications • IoT Architecture • Identity of Things • Block Chain • Parametric Cryptosystem • Software and Cloud Components
Media Networks
by
Zeadally, Sherali
,
Moustafa, Hassnaa
in
Closed-circuit television
,
Computer network architectures
,
COMPUTERS / Internet / General bisacsh
2016,2012
With a focus on video and audio-visual services, this book considers different media network architectures along with related protocols and standards. It presents different digital TV technologies along with their deployment architectures, discussing promising media content delivery architectures, including Future Internet, Content Delivery Networks, and Content Centric Networks. The author addresses related technical challenges and standardization efforts. Chapters cover the management of media information and immersive technologies that account for advanced services personalization, immersive technologies architectures and applications, e-health, and e-learning.
Folklore and the Internet
by
Blank, Trevor J
in
Computer network resources
,
COMPUTERS / Internet / General
,
Digital communications
2009,2013
A pioneering examination of the folkloric qualities of the World Wide Web, e-mail, and related digital media. These stuidies show that folk culture, sustained by a new and evolving vernacular, has been a key, since the Internet's beginnings, to language, practice, and interaction online. Users of many sorts continue to develop the Internet as a significant medium for generating, transmitting, documenting, and preserving folklore.In a set of new, insightful essays, contributors Trevor J. Blank, Simon J. Bronner, Robert Dobler, Russell Frank, Gregory Hansen, Robert Glenn Howard, Lynne S. McNeill, Elizabeth Tucker, and William Westerman showcase ways the Internet both shapes and is shaped by folklore
Full Stack iOS Development with Swift and Vapor
by
Dutt, Hem
in
COMPUTERS / General
,
COMPUTERS / Information Technology
,
COMPUTERS / Internet / General
2023
A step-by-step journey into full-stack iOS development with Swift and Vapor
Key Features
? Learn how to leverage Vapor to build robust backend systems for your iOS applications.
? Seamlessly integrate frontend and backend components in your full-stack iOS application.
? Learn to configure servers and successfully launch your app in a live environment.
Description
Full-stack iOS applications combine frontend and backend development to create powerful and versatile mobile experiences, providing users with rich functionality and reliable data management. If you're interested in building full stack iOS applications, this book is a perfect fit for you. To embark on your full stack iOS development journey, the book initiates by installing the Vapor Toolbox and Xcode, equipping you with essential tools for swift progress in constructing complete projects. Through a practical approach, the book will help you navigate the intricacies of routing, implementing security measures, seamlessly integrating data, managing data effectively, and generating server-side JSON responses. As you delve deeper into the book, your expertise will expand to encompass the vast ecosystem of iOS app development, including features such as UIKit with Auto-layout, SwiftUI, Core Data, and more. Furthermore, this book serves as your guiding companion, embracing the potential of comprehensive instruction and unveiling the secrets of successful full stack iOS development. It empowers you to unleash your capabilities by understanding the complexities of bridging backend and front-end technologies. With its extensive coverage, the guide empowers you to overcome obstacles such as data storage, performance optimization, and security. By providing you with the necessary expertise and resources, this book enables you to build impressive, secure, and scalable full stack iOS applications.
What you will learn
? Learn the process of setting up a Vapor project, including routing, controller creation, and middleware implementation.
? Discover how to interact with databases using the Fluent ORM, defining models, and relationships, and performing CRUD operations.
? Learn how to design user interfaces using SwiftUI, implementing navigation and user interaction in your iOS app.
? Learn to effectively communicate with web services and APIs.
? Understand the process of deploying your full stack iOS application.
Who this book is for
This book is for aspiring developers, students, and experienced iOS developers who are skilled in Swift and looking to delve into full stack development.
Table of Contents
1. Full-stack Development Overview
2. Setting Up the Environment
3. Routing, MVC and JSON in Vapor
4. Async and HTML Rendering in Vapor
5. PostgreSQL Integration in Vapor
6. Building User Interfaces for iOS
7. Data Persistence with Core Data and SQLite in iOS
8. Full Stack Implementation
9. Advanced Full-stack Concepts
10. Deploying iOS and Vapor Applications
Deep Learning on Microcontrollers
by
Atul Krishna Gupta, Dr. Siva Prasad Nandyala
in
COMPUTERS / General
,
COMPUTERS / Information Technology
,
COMPUTERS / Internet / General
2023
A step-by-step guide that will teach you how to deploy TinyML on microcontrollers
Key Features
? Deploy machine learning models on edge devices with ease.
? Leverage pre-built AI models and deploy them without writing any code.
? Create smart and efficient IoT solutions with TinyML.
Description
TinyML, or Tiny Machine Learning, is used to enable machine learning on resource-constrained devices, such as microcontrollers and embedded systems. If you want to leverage these low-cost, low-power but strangely powerful devices, then this book is for you. This book aims to increase accessibility to TinyML applications, particularly for professionals who lack the resources or expertise to develop and deploy them on microcontroller-based boards. The book starts by giving a brief introduction to Artificial Intelligence, including classical methods for solving complex problems. It also familiarizes you with the different ML model development and deployment tools, libraries, and frameworks suitable for embedded devices and microcontrollers. The book will then help you build an Air gesture digit recognition system using the Arduino Nano RP2040 board and an AI project for recognizing keywords using the Syntiant TinyML board. Lastly, the book summarizes the concepts covered and provides a brief introduction to topics such as zero-shot learning, one-shot learning, federated learning, and MLOps. By the end of the book, you will be able to develop and deploy end-to-end Tiny ML solutions with ease.
What you will learn
? Learn how to build a Keyword recognition system using the Syntiant TinyML board.
? Learn how to build an air gesture digit recognition system using the Arduino Nano RP2040.
? Learn how to test and deploy models on Edge Impulse and Arduino IDE.
? Get tips to enhance system-level performance.
? Explore different real-world use cases of TinyML across various industries.
Who this book is for
The book is for IoT developers, System engineers, Software engineers, Hardware engineers, and professionals who are interested in integrating AI into their work. This book is a valuable resource for Engineering undergraduates who are interested in learning about microcontrollers and IoT devices but may not know where to begin.
Table of Contents
1. Introduction to AI
2. Traditional ML Lifecycle
3. TinyML Hardware and Software Platforms
4. End-to-End TinyML Deployment Phases
5. Real World Use Cases
6. Practical Experiments with TinyML
7. Advance Implementation with TinyML Board
8. Continuous Improvement
9. Conclusion
Hands-on Programmatic In-house Digital Advertising
by
Agarwala, Raghavendra
in
COM004000 COMPUTERS / Intelligence (AI) & Semantics
,
COM018000 COMPUTERS / Data Processing
,
COMPUTERS / Internet / General
2021
Guide to Marketing Automation and Accelerated ROI on Advertising
Key Features
? Demonstrates how a DSP works, its bidding strategies, impression tracking, and configurations.
? Exemplifies how AI/ML simplifies bidding strategies.
? Illustrates how SSP, exchange, ad-server, and header-bidding (client and server-side) work in detail.
Description
This book provides you with an in-depth understanding of programmatic advertising. This knowledge can be applied to the checklist for procuring the appropriate stack, optimizing existing platforms, and/or building the system from the ground up.With comprehensive treatment of programmatic issues, this book establishes a solid foundation with ID systems, data management systems, and data thinking, among other topics. It explores the different data sources, attributes, and the real-time bidding protocol in detail (RTB steam). It makes its way even further into the larger systems of DSP and SSP. This book will help assist you in all aspects of running an ad-tech system.By the end of this book, you will gain a vast amount of knowledge about programmatic systems. You will become an independent expert that will help you to evaluate the advertising techniques for your own business.
What you will learn
? Learn about the ID mechanics of cookies and GAID/IDFA.
? Gain an intuitive and in-depth understanding of the data's role in AI/ML.
? Learn about various data-centric strategies around buy and sell of media.
? Learn about DSP, bidder, bidding strategies, RTB, paid impression, and various syncs.
? Learn about SSP, Exchange, Ad-Server, header bidding systems, and AI-led floor price optimization.
Who this book is for
The book is essential for the architects, senior developers, and ad-tech operations to learn about programmatic in-housing from a design, process, strategic thinking, and operational standpoint. It also attracts business professionals who want to learn the tricks of the trade for increasing revenues and learn the art of asking the right questions.
Table of Contents
1. ID Management, Cookies, and Sync Mechanics
2. Data and AI Strategies
3. DMP and CDP
4. Exchanges, Ad-Servers, and Header Bidding
5. Bidders and Meta DSPs
6. Data Privacy by Design
7. Buy and Sell Strategies
Linked Data Management
by
Harth, Andreas
,
Hose, Katja
,
Schenkel, Ralf
in
COMPUTERS / Database Management / Data Mining. bisacsh
,
COMPUTERS / Database Management / General. bisacsh
,
COMPUTERS / Internet / General. bisacsh
2014,2016
This book presents techniques for querying and managing Linked Data that is available on today's Web. It shows how the abundance of Linked Data can serve as fertile ground for research and commercial applications. While the book covers query processing extensively, the Linked Data abstraction furnishes more than a mechanism for collecting, integrating, and querying data from the open Web-the Linked Data technology stack also allows for controlled, sophisticated applications deployed in an enterprise environment.