|
|
Books > Computing & IT > Applications of computing
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
In today's digital world, the huge amount of data being generated
is unstructured, messy, and chaotic in nature. Dealing with such
data, and attempting to unfold the meaningful information, can be a
challenging task. Feature engineering is a process to transform
such data into a suitable form that better assists with
interpretation and visualization. Through this method, the
transformed data is more transparent to the machine learning
models, which in turn causes better prediction and analysis of
results. Data science is crucial for the data scientist to assess
the trade-offs of their decisions regarding the effectiveness of
the machine learning model implemented. Investigating the demand in
this area today and in the future is a necessity. The Handbook of
Research on Automated Feature Engineering and Advanced Applications
in Data Science provides an in-depth analysis on both the
theoretical and the latest empirical research findings on how
features can be extracted and transformed from raw data. The
chapters will introduce feature engineering and the recent
concepts, methods, and applications with the use of various data
types, as well as examine the latest machine learning applications
on the data. While highlighting topics such as detection, tracking,
selection techniques, and prediction models using data science,
this book is ideally intended for research scholars, big data
scientists, project developers, data analysts, and computer
scientists along with practitioners, researchers, academicians, and
students interested in feature engineering and its impact on data.
Advances in Computers, the latest volume in the series published
since 1960, presents detailed coverage of innovations in computer
hardware, software, theory, design, and applications. In addition,
it provides contributors with a medium in which they can explore
their subjects in greater depth and breadth than journal articles
usually allow. As a result, many articles have become standard
references that continue to be of significant, lasting value in
this rapidly expanding field.
Diversity in user queries makes it challenging for search engines
to effectively return a set of relevant results. Both user
intentions to search the web and types of queries are vastly
varied; consequently, horizontal and vertical search engines are
developed to answer user queries more efficiently. However, these
search engines present a variety of problems in web searching.
Result Page Generation for Web Searching: Emerging Research and
Opportunities is an essential reference publication that focuses on
taking advantages from text and web mining in order to address the
issues of recommendation and visualization in web searching.
Highlighting a wide range of topics such as navigational searching,
resource identification, and ambiguous queries, this book is
ideally designed for computer engineers, web designers,
programmers, academicians, researchers, and students.
A fascinating work on the history and development of cryptography,
from the Egyptians to WWII. Many of the earliest books,
particularly those dating back to the 1900s and before, are now
extremely scarce and increasingly expensive. Hesperides Press are
republishing these classic works in affordable, high quality,
modern editions, using the original text and artwork Contents
Include The Beginings of Cryptography From the Middle Ages Onwards
Signals, Signs, And Secret Languages Commercial Codes Military
Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering
Bibliography
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
In recent decades, the industrial revolution has increased economic
growth despite its immersion in global environmental issues such as
climate change. Researchers emphasize the adoption of circular
economy practices in global supply chains and businesses for better
socio-environmental sustainability without compromising economic
growth. Integrating blockchain technology into business practices
could promote the circular economy as well as global environmental
sustainability. Integrating Blockchain Technology Into the Circular
Economy discusses the technological advancements in circular
economy practices, which provide better results for both economic
growth and environmental sustainability. It provides relevant
theoretical frameworks and the latest empirical research findings
in the applications of blockchain technology. Covering topics such
as big data analytics, financial market infrastructure, and
sustainable performance, this book is an essential resource for
managers, operations managers, executives, manufacturers,
environmentalists, researchers, industry practitioners, students
and educators of higher education, and academicians.
This book is a celebration of Leslie Lamport's work on concurrency,
interwoven in four-and-a-half decades of an evolving industry: from
the introduction of the first personal computer to an era when
parallel and distributed multiprocessors are abundant. His works
lay formal foundations for concurrent computations executed by
interconnected computers. Some of the algorithms have become
standard engineering practice for fault tolerant distributed
computing - distributed systems that continue to function correctly
despite failures of individual components. He also developed a
substantial body of work on the formal specification and
verification of concurrent systems, and has contributed to the
development of automated tools applying these methods. Part I
consists of technical chapters of the book and a biography. The
technical chapters of this book present a retrospective on
Lamport's original ideas from experts in the field. Through this
lens, it portrays their long-lasting impact. The chapters cover
timeless notions Lamport introduced: the Bakery algorithm, atomic
shared registers and sequential consistency; causality and logical
time; Byzantine Agreement; state machine replication and Paxos;
temporal logic of actions (TLA). The professional biography tells
of Lamport's career, providing the context in which his work arose
and broke new grounds, and discusses LaTeX - perhaps Lamport's most
influential contribution outside the field of concurrency. This
chapter gives a voice to the people behind the achievements,
notably Lamport himself, and additionally the colleagues around
him, who inspired, collaborated, and helped him drive worldwide
impact. Part II consists of a selection of Leslie Lamport's most
influential papers. This book touches on a lifetime of
contributions by Leslie Lamport to the field of concurrency and on
the extensive influence he had on people working in the field. It
will be of value to historians of science, and to researchers and
students who work in the area of concurrency and who are interested
to read about the work of one of the most influential researchers
in this field.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Quantum Inspired Computational Intelligence: Research and
Applications explores the latest quantum computational intelligence
approaches, initiatives, and applications in computing,
engineering, science, and business. The book explores this emerging
field of research that applies principles of quantum mechanics to
develop more efficient and robust intelligent systems. Conventional
computational intelligence-or soft computing-is conjoined with
quantum computing to achieve this objective. The models covered can
be applied to any endeavor which handles complex and meaningful
information.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
AI is going to change your world – but don’t panic.
As AI becomes more widespread in the workplace and in society, what
impact will it have on your job, your life and the world around you? If
AI can take on more and more of the tasks people perform at work, and
do them more efficiently, where does that leave human beings?
Taking the Anxiety out of AI explains how to live with AI, how to
benefit from it, and how to avoid being replaced by it. The book
explores the differences between human intelligence and artificial
intelligence, considers what tasks will always be performed better by
humans, and sets out possible futures in which humans and AI work
together. It provides tools to work out how AI will affect your role,
what skills you need to learn, and which mindsets will equip you to
thrive in the future. The book concludes with a guide to current AI
programs and how to use them.
Whether you have experience with AI, or simply want to learn more about
it, this book is an invaluable guide for navigating your future.
Data mapping in a data warehouse is the process of creating a link
between two distinct data models' (source and target)
tables/attributes. Data mapping is required at many stages of DW
life-cycle to help save processor overhead; every stage has its own
unique requirements and challenges. Therefore, many data warehouse
professionals want to learn data mapping in order to move from an
ETL (extract, transform, and load data between databases) developer
to a data modeler role. Data Mapping for Data Warehouse Design
provides basic and advanced knowledge about business intelligence
and data warehouse concepts including real life scenarios that
apply the standard techniques to projects across various domains.
After reading this book, readers will understand the importance of
data mapping across the data warehouse life cycle.
Intelligent Data Analysis for e-Learning: Enhancing Security and
Trustworthiness in Online Learning Systems addresses information
security within e-Learning based on trustworthiness assessment and
prediction. Over the past decade, many learning management systems
have appeared in the education market. Security in these systems is
essential for protecting against unfair and dishonest conduct-most
notably cheating-however, e-Learning services are often designed
and implemented without considering security requirements. This
book provides functional approaches of trustworthiness analysis,
modeling, assessment, and prediction for stronger security and
support in online learning, highlighting the security deficiencies
found in most online collaborative learning systems. The book
explores trustworthiness methodologies based on collective
intelligence than can overcome these deficiencies. It examines
trustworthiness analysis that utilizes the large amounts of
data-learning activities generate. In addition, as processing this
data is costly, the book offers a parallel processing paradigm that
can support learning activities in real-time. The book discusses
data visualization methods for managing e-Learning, providing the
tools needed to analyze the data collected. Using a case-based
approach, the book concludes with models and methodologies for
evaluating and validating security in e-Learning systems. Indexing:
The books of this series are submitted to EI-Compendex and SCOPUS
Data Simplification: Taming Information With Open Source Tools
addresses the simple fact that modern data is too big and complex
to analyze in its native form. Data simplification is the process
whereby large and complex data is rendered usable. Complex data
must be simplified before it can be analyzed, but the process of
data simplification is anything but simple, requiring a specialized
set of skills and tools. This book provides data scientists from
every scientific discipline with the methods and tools to simplify
their data for immediate analysis or long-term storage in a form
that can be readily repurposed or integrated with other data.
Drawing upon years of practical experience, and using numerous
examples and use cases, Jules Berman discusses the principles,
methods, and tools that must be studied and mastered to achieve
data simplification, open source tools, free utilities and snippets
of code that can be reused and repurposed to simplify data, natural
language processing and machine translation as a tool to simplify
data, and data summarization and visualization and the role they
play in making data useful for the end user.
The effective application of knowledge management principles has
proven to be beneficial for modern organizations. When utilized in
the academic community, these frameworks can enhance the value and
quality of research initiatives. Enhancing Academic Research With
Knowledge Management Principles is a pivotal reference source for
the latest research on implementing theoretical frameworks of
information management in the context of academia and universities.
Featuring extensive coverage on relevant areas such as data mining,
organizational and academic culture, this publication is an ideal
resource for researchers, academics, practitioners, professionals,
and students.
The world is witnessing the growth of a global movement facilitated
by technology and social media. Fueled by information, this
movement contains enormous potential to create more accountable,
efficient, responsive, and effective governments and businesses, as
well as spurring economic growth. Big Data Governance and
Perspectives in Knowledge Management is a collection of innovative
research on the methods and applications of applying robust
processes around data, and aligning organizations and skillsets
around those processes. Highlighting a range of topics including
data analytics, prediction analysis, and software development, this
book is ideally designed for academicians, researchers, information
science professionals, software developers, computer engineers,
graduate-level computer science students, policymakers, and
managers seeking current research on the convergence of big data
and information governance as two major trends in information
management.
|
|