![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing
The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are arguably the most notable. Structured Search paradigm connects them via a fundamental concept of key-objects evolving out of keywords as the units of search. The key-object data model and KeySQL revamp the data independence principle making it applicable for Big Data and complement NoSQL with full-blown structured querying functionality. The ultimate goal is extracting Big Information from the Big Data. As a Big Data Consultant, Mikhail Gilula combines academic background with 20 years of industry experience in the database and data warehousing technologies working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and PayPal, among others. He has authored three books, including The Set Model for Database and Information Systems and holds four US Patents in Structured Search and Data Integration.
Blockchain technology presents numerous advantages that include increased transparency, reduced transaction costs, faster transaction settlement, automation of information, increased traceability, improved customer experience, improved digital identity, better cyber security, and user-controlled networks. These potential applications are widespread and diverse including funds transfer, smart contracts, e-voting, efficient supply chain, and more in nearly every sector of society including finance, healthcare, law, trade, real estate, and other important areas. However, there are challenges and limitations that exist such as high energy consumption, limited scalability, complexity, security, network size, lack of regulations, and other critical issues. Nevertheless, blockchain is an attractive technology and has much to offer to the modern-day industry. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector investigates blockchain technology's adoption and effectiveness in multiple industries and for the internet of things (IoT)-based applications, presents use cases from industrial and financial sectors as well as from other transaction-based services, and fills a gap in this respect by extending the existing body of knowledge in the suggested field. While highlighting topics such as cybersecurity, use cases, and models for blockchain implementation, this book is ideal for business managers, financial accountants, practitioners, researchers, academicians, and students interested in blockchain technology's role and implementation in IoT and the financial sector.
An intellectual property discussion is central to qualitative research projects, and ethical guidelines are essential to the safe accomplishment of research projects. Undertaking research studies without adhering to ethics may be dangerous to researchers and research subjects. Therefore, it is important to understand and develop practical techniques for handling ethics with a specific focus on qualitative projects so that researchers conducting this type of research may continue to use ethical practices at every step of the project. Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities discusses in detail the methods related to the social constructionist paradigm that is popular with qualitative research projects. These methods help researchers undertake ideal qualitative projects that are free from quantitative research techniques/concepts all while acquiring practical skills in handling ethics and ethical issues in qualitative projects. The chapters each contain case studies, learning outcomes, question and answer sections, and discuss critical research philosophies in detail along with topics such as ethics, research design, data gathering and sampling methods, research outputs, data analysis, and report writing. Featuring a wide range of topics such as epistemology, probability sampling, and big data, this book is ideal for researchers, practitioners, computer scientists, academicians, analysts, coders, and students looking to become competent qualitative research specialists.
The first NFT book that tells of the beginning of Crypto Art with 50 of the best artists in the movement. In the last year, crypto art has overwhelmed the world of digital art and beyond, involving collectors, museums, and auction houses, creating a fully-fledged digital revolution. It is guided by visionary artists who have promoted this unprecedented movement, with new rules, overwhelming dynamics, and innovative ways of using art. Crypto Art Begins, published by Rizzoli Italia and New York, is based on an idea and project by The NFT Magazine, the first monthly magazine to be read and collected on the blockchain Ethereum. The volume tells of this exciting movement through the history and works of 50 crypto artists including Hackatao, Refik Anadol, Kevin Abosch, Osinachi, Federico Clapis, Giant Swan, and DADA.Art who contributed to its creation and form a part of it with their NFTs (non-fungible tokens) representing the present and future of this new world.
Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.
Analyzing data sets has continued to be an invaluable application for numerous industries. By combining different algorithms, technologies, and systems used to extract information from data and solve complex problems, various sectors have reached new heights and have changed our world for the better. The Handbook of Research on Engineering, Business, and Healthcare Applications of Data Science and Analytics is a collection of innovative research on the methods and applications of data analytics. While highlighting topics including artificial intelligence, data security, and information systems, this book is ideally designed for researchers, data analysts, data scientists, healthcare administrators, executives, managers, engineers, IT consultants, academicians, and students interested in the potential of data application technologies.
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
Fog computing is quickly increasing its applications and uses to the next level. As it continues to grow, different types of virtualization technologies can thrust this branch of computing further into mainstream use. The Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science is a key reference volume on the latest research on the role of next-generation systems and devices that are capable of self-learning and how those devices will impact society. Featuring wide-ranging coverage across a variety of relevant views and themes such as cognitive analytics, data mining algorithms, and the internet of things, this publication is ideally designed for programmers, IT professionals, students, researchers, and engineers looking for innovative research on software-defined cloud infrastructures and domain-specific analytics.
Tired of writing all your user IDs and passwords on sticky notes and pieces of scrap paper? This convenient address book stores them all in one place. This is not your typical address book There are also special sections for online banking info and one for storing e-mail addresses.
Developments in bio-inspired computation have impacted multiple fields and created opportunities for new applications. In recent years, these techniques have been increasingly integrated into robotic systems. Membrane Computing for Distributed Control of Robotic Swarms: Emerging Research and Opportunities is an innovative reference source for the latest perspectives on biologically-inspired computation techniques for robot design and control. Highlighting a range of pivotal topics such as software engineering, simulation tools, and robotic security, this book is ideally designed for researchers, academics, students, and practitioners interested in the role of membrane computing in mobile robots.
As various areas of discipline continue to progress into the digital age, diverse modes of technology are being experimented with and ultimately implemented into common practices. Mobile products and interactive devices, specifically, are being tested within educational environments as well as corporate business in support of online learning and e-commerce initiatives. There is a boundless stock of factors that play a role in successfully implementing web technologies and user-driven learning strategies, which require substantial research for executives and administrators in these fields. Handbook of Research on User Experience in Web 2.0 Technologies and Its Impact on Universities and Businesses is an essential reference source that presents research on the strategic role of user experience in e-learning and e-commerce at the level of the global economy, networks and organizations, teams and work groups, and information systems. The book assesses the impact of e-learning and e-commerce technologies on different organizations, including higher education institutions, multinational corporations, health providers, and business companies. Featuring research on topics such as ubiquitous interfaces, computer graphics, and image processing, this book is ideally designed for program developers and designers, researchers, practitioners, IT professionals, executives, academicians, and students.
The theory of computation is used to address challenges arising in many computer science areas such as artificial intelligence, language processors, compiler writing, information and coding systems, programming language design, computer architecture and more. To grasp topics concerning this theory readers need to familiarize themselves with its computational and language models, based on concepts of discrete mathematics including sets, relations, functions, graphs and logic. This handbook introduces with rigor the important concepts of this kind and uses them to cover the most important mathematical models for languages and computation, such as various classical as well as modern automata and grammars. It explains their use in such crucially significant topics of computation theory as computability, decidability, and computational complexity. The authors pay special attention to the implementation of all these mathematical concepts and models and explains clearly how to encode them in computational practice. All computer programs are written in C#.
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
This book paves the road for researchers from various areas of engineering working in the realm of smart cities to discuss the intersections in these areas when it comes to infrastructure and its flexibility. The authors lay out models, algorithms and frameworks related to the 'smartness' in the future smart cities. In particular, manufacturing firms, electric generation, transmission and distribution utilities, hardware and software computer companies, automation and control manufacturing firms, and other industries will be able to use this book to enhance their energy operations, improve their comfort and privacy, as well as to increase the benefit from the electrical system. The book pertains to researchers, professionals, and R&D in an array of industries.
A comprehensive introduction to network flows that brings together the classic and the contemporary aspects of the field, and provides an integrative view of theory, algorithms, and applications.
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.
Learning-Based Local Visual Representation and Indexing, reviews the state-of-the-art in visual content representation and indexing, introduces cutting-edge techniques in learning based visual representation, and discusses emerging topics in visual local representation, and introduces the most recent advances in content-based visual search techniques.
This book offers an introduction into quantum machine learning research, covering approaches that range from "near-term" to fault-tolerant quantum machine learning algorithms, and from theoretical to practical techniques that help us understand how quantum computers can learn from data. Among the topics discussed are parameterized quantum circuits, hybrid optimization, data encoding, quantum feature maps and kernel methods, quantum learning theory, as well as quantum neural networks. The book aims at an audience of computer scientists and physicists at the graduate level onwards. The second edition extends the material beyond supervised learning and puts a special focus on the developments in near-term quantum machine learning seen over the past few years.
Swarm Intelligence has recently emerged as a next-generation methodology belonging to the class of evolutionary computing. As a result, scientists have been able to explain and understand real-life processes and practices that previously remained unexplored. The Handbook of Research on Swarm Intelligence in Engineering presents the latest research being conducted on diverse topics in intelligence technologies such as Swarm Intelligence, Machine Intelligence, Optical Engineering, and Signal Processing with the goal of advancing knowledge and applications in this rapidly evolving field. The enriched interdisciplinary contents of this book will be a subject of interest to the widest forum of faculties, existing research communities, and new research aspirants from a multitude of disciplines and trades. |
![]() ![]() You may like...
Exploring Microsoft Office Excel 2010…
Robert Grauer, Mary Anne Poatsy, …
Paperback
R2,745
Discovery Miles 27 450
The Shelly Cashman Series (R) Microsoft…
Steven Freund, Joy Starks
Paperback
|