This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet’15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
This groundbreaking Brief brings a rights-based perspective to social work as opposed to the charity- and needs-based formats traditional to the field. Core principles for effective practice are discussed in the context of global human rights advocacy, from addressing individuals' immediate issues to challenging the structures that allow continued injustices to marginalized populations. Focusin…
These shared perspectives are not well addressed elsewhere in current discussions. Awareness of these dynamics, and the fluidity of the future, is important, as humankind moves forward into the uncertain future. Due to the sociotechnical complexity of the Internet, policymakers, businesspeople, and academics worldwide have struggled to keep abreast of developments. This volume's approach is int…
This book constitutes revised selected papers from the refereed proceedings of the First Human Centered Computing Conference, HCC 2014, that consolidated and further develops the successful ICPCA/SWS conferences on Pervasive Computing and the Networked World. The 54 full papers and 30 short papers presented in this volume were carefully reviewed and selected from 152 submissions. These proceedi…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
Government policies, marketing campaigns of banks, insurance companies, and other financial institutions, and consumers' protective actions all depend on assumptions about consumer financial behavior. Unfortunately, many consumers have no or little knowledge of budgeting, financial products, and financial planning. It is therefore important that organizations and market authorities know why con…
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International…
This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluati…
This book provides readers with a state-of-the-art description of techniques to be used for ultra-low-power (ULP) and ultra-low-cost (ULC), short-range wireless receivers. Readers will learn what is required to deploy these receivers in short-range wireless sensor networks, which are proliferating widely to serve the internet of things (IoT) for “smart cities.” The authors address key chall…
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015. The 36 full papers presented together with 11 short papers were carefully reviewed and selected from 62 submissions. The papers are grouped in topical sections on adding intelligence for environment adapt…