De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger af Kevin Curran

Filter
Filter
Sorter efterSorter Populære
  • af Kevin Curran
    190,95 - 1.163,95 kr.

    Argues for the social and ethical importance of judgment in politics, law, art and everyday life, taking Shakespeare as a guide and travel companion.

  • af Kevin Curran
    228,95 kr.

    This book is focussed on looking into the various commercially available location tracking technologies that may prove a best fit for tracking visitors in large indoor public spaces which allow clients to ascertain footfall, repeat visits and dwell time. The systems which are potentially suitable must be capable of "Presence Identification". That is the identification of a customer upon entry in a physical retail environment and "session-metrics" which is the shopping pattern of a customer in a physical store including time of entry/exit. Two main technologies are most suitable for this - active RFID and WiFi. Active RFID systems installed at the entrance of shops are able to conclusively identify a card/tag carrying customer upon entry. The customer would not have to produce a card if the card was present on a shopping trolley. The read range of the portal would be adequate if placed near a doorway. In order to capture session metrics an active RFID system would also capture the exit of the customer through the portal. WiFi localisation systems would also track an active tag or mobile device but would not require the installation of portals at doorways.

  • af Kevin Curran
    143,95 kr.

    This book details the design and implementation of Short Messaging Service (SMS) and MMS applications. The main aim of this book is to provide SMS/MMS developers with the tools necessary to develop applications which can send SMS/MMS messages to groups of mobile devices. 1.The first section of this book presents a Java SMS application which allows the storage of contacts and groups of contacts. Thus the user of the application can customise his/her own list of contact 'Individuals' and 'Groups' of contacts (Such as: 'Family', 'Friends', 'Work Colleagues' etc). Upon selection of Individual(s) and/or Group(s) a single message such as "how r u all" can be sent to all their respective Mobile Stations (MS) by clicking on the 'Add' and then 'Send' button. The simplicity and ease of use of this application allows a diverse range of users from an individual home user to corporate wide user base. All code is presented and a working version is freely available for download. 2.The middle section of this book presents a similar group bulk SMS application which is web enabled. The application is written using Active Server Pages and is purely web based. Again, it allows the sending of messages to individuals and groups. For the purpose of sending SMS in each scenario, the Simplewire Active X Software Development Kit is used. All code is presented and a working version is freely available for download. 3.In order for "rich media" MMS messages to be sent and received, they must first be transcoded into the MMS format. Essentially what happens is that the content is tailored before it arrives at the mobile. This tailoring process is called transcoding. Transcoding systems can adapt video, images, audio and text to the individual constraints of different devices. They summarise, translate and convert the content into the MMS format. This section of the book presents a transcoding framework, which enables various rich media files stored on PC to be sent to MMS capable handsets. Transcoding is the area that this project will focus on. A java application is developed that allows a user to select multimedia content stored on the computer and send it to a mobile. The application performs the transcoding of the message content into MMS format and deploys the message to the mobile.

  • af Kevin Curran
    118,95 kr.

    This book discusses the use of image based neural networks for detecting and locating faces in colour images with complex backgrounds. This book is intended to act as an introduction to the area of face detection and as useful information about the best techniques used to develop a system that can duplicate human vision and how systems in general are implemented at present to find a face in an image. We believe that undergraduate University students seeking to work on a similar project for coursework or perhaps a final year dissertation may find this book useful. An image based neural network technique along with relevant code is presented in this book to demonstrate the implementation of a face detection algorithm. This face detection algorithm employs a normalisation routine to be used on training and test images and a bootstrapping algorithm to aid in the machine learning process.

  • af Kevin Curran
    118,95 kr.

    Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this book is to investigate the background of steganography, discuss steganographic tools in common use and methods commonly implemented. The theory is also enhanced with a series of documented steganography java classes which implement many of the algorithms discussed.

  • af Kevin Curran
    118,95 kr.

    This book aims to introduce the area of wireless (Wi-Fi, 802.11) security with particular emphasis on WEP. Weaknesses are highlighted through the art of war-driving where unprotected access points are discovered. War driving used ethically can be a powerful tool in the hands of security professionals to test the security of the networks they are charged with protecting.

  • - The Chameleon Framework
    af Kevin Curran
    118,95 kr.

    Seamless connectivity to multiple wireless networks independently of a fixed point is becoming increasingly important for mobile devices but portable multimedia devices such as PDA's with restricted memory and smart phones vary greatly and all these devices require optimal multimedia delivery. This book presents an extensible middleware which caters for resource constrained devices to full-fledged computers through dynamic micro-protocols which enable devices to adopt specific protocol stacks at runtime in an attempt to optimise the stack to the functionality that is actually required by the application.

  • - A deep dive into the Building Blocks, Applications, Security, Protocols and Hidden Secrets of the Internet
    af Kevin Curran
    173,95 kr.

    The Internet is a complex beast. However it can be understood. It is simply a combination of standards based protocols intereacting with applications and devices. The common denominator of the Internet is the Internet Protocol (IP). Every device which connects to the Internet must run IP. This book is an attempt to examine in depth various aspects of the Web. There are no shortcuts to true knowledge and insight can only come from understanding principles and facts surrounding a subject area. This book does not dwell on the history of the Internet. Suffice to say that it was a combination as usual of military demands and industry/university collaboration. I doubt however that many of those involved back then could have foreseen the impact that early bandwidth limted network would have on society in the future. Interestingly however, the building blocks have not changed much since the initial days. Protocols are crucial to providing functionality and their standardisation enables widespread adoption.This book is divided into six sections.In section 1 - The Network underneath, we examine protocol stacks, standards and issues, what causes delays in the network, mesh networking & wireless sensor networks. We also look at disruption tolerant networking, streaming audio and cognitive radio.In section 2 - Internet Building Blocks - Protocols and Standards, we examine computational GRIDS, web operating systems and really simple syndication (RSS). We then look at Javascript, XML, E4X and AJA, the semantic web, voiceXML and web services.In section 3 - Internet Trends, Applications and Services, we examine web 2.0, electronic surveillance, mobile social software, the long tail, cyberterrorism, podcasts and blogging and web accessibility for users with disabilities.In section 4 - The Mobile Internet, we look at WiMAX, hybrid web applications, browsing the Web through a Phone, in vehicle computing, body area networks, mobile IP and cellullar IP and mobile adaptive applications.In section 5 - Internet Security, we examine cryptography, universal authentication, honeynets, wireless (WiFi) security, email SPAM, hacking and Internet fraud.In section 6 - The Hidden Web, we look at the invisible web, digital watermarking & steganography, vertical search engines, location positioning, web intelligence and ambient intelligence.

  • af Kevin Curran
    188,95 kr.

    Youth follows four teenagers in Ireland's most diverse town, Balbriggan. Twenty-first century life - hyper-sexualized, social media saturated, anxiety-plagued - is here. Isolated and disorientated by the white noise and seemingly insurmountable expectations of adolescence, our protagonists are desperate to find anything that helps them belong.

  • af Kevin Curran, Yassine Maleh & Ahmed A. Abd El-Latif
    1.668,95 kr.

    Computational Intelligence for Medical Internet of Things (MIoT) Applications: Machine Intelligence Applications for IoT in Healthcare explores machine intelligence techniques necessary for effective MIoT research and practice, taking a practical approach for practitioners and students entering the field. This book investigates advanced concepts and applications in the MIoT field, guiding readers through emerging developments and future trends. A wide range of international authors guide readers through advanced concepts, including deep learning, neural network, and big data analytic approaches for the classification, indexing, retrieval, analysis, and inferencing of healthcare data.

  • - Law and Distributed Selfhood
    af Kevin Curran
    1.433,95 kr.

    Offers the first sustained examination of the relationship between law and selfhood in Shakespeare's work. Taking five plays and the sonnets as case studies, Kevin Curran argues that law provided Shakespeare with the conceptual resources to imagine selfhood in social and distributed terms, as a product of interpersonal exchange or as a gathering of various material forces.

  • af Kevin Curran
    1.267,95 kr.

    Shakespeare and Judgment gathers together an international group of scholars to address for the first time the place of judgment in Shakespearean drama. Contributors approach the topic from a variety of cultural and theoretical perspectives, covering plays from across Shakespeare's career and from each of the genres in which he wrote. Anchoring the volume are two critical contentions: first, that attending to Shakespeare's treatment of judgment leads to fresh insights about the imaginative relationship between law, theater, and aesthetics in early modern England; and second, that it offers new ways of putting the plays' historical and philosophical contexts into conversation. Taken together, the essays in Shakespeare and Judgment offer a genuinely new account of the historical and intellectual coordinates of Shakespeare's plays. Building on current work in legal studies, religious studies, theater history, and critical theory, the volume will be of interest to a wide range of scholars working on Shakespeare and early modern drama

  • af Kevin Curran
    687,95 - 1.876,95 kr.

    Presents a study of Jacobean nuptial performance. This work analyzes six of the elite weddings celebrated at the Jacobean court, reading the masques and entertainments that headlined these events alongside contemporaneously produced panegyrics, festival books, sermons, parliamentary speeches, and other sources.