![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This book provides a general and comprehensible overview of imbalanced learning. It contains a formal description of a problem, and focuses on its main features, and the most relevant proposed solutions. Additionally, it considers the different scenarios in Data Science for which the imbalanced classification can create a real challenge. This book stresses the gap with standard classification tasks by reviewing the case studies and ad-hoc performance metrics that are applied in this area. It also covers the different approaches that have been traditionally applied to address the binary skewed class distribution. Specifically, it reviews cost-sensitive learning, data-level preprocessing methods and algorithm-level solutions, taking also into account those ensemble-learning solutions that embed any of the former alternatives. Furthermore, it focuses on the extension of the problem for multi-class problems, where the former classical methods are no longer to be applied in a straightforward way. This book also focuses on the data intrinsic characteristics that are the main causes which, added to the uneven class distribution, truly hinders the performance of classification algorithms in this scenario. Then, some notes on data reduction are provided in order to understand the advantages related to the use of this type of approaches. Finally this book introduces some novel areas of study that are gathering a deeper attention on the imbalanced data issue. Specifically, it considers the classification of data streams, non-classical classification problems, and the scalability related to Big Data. Examples of software libraries and modules to address imbalanced classification are provided. This book is highly suitable for technical professionals, senior undergraduate and graduate students in the areas of data science, computer science and engineering. It will also be useful for scientists and researchers to gain insight on the current developments in this area of study, as well as future research directions.
This book analyses the role of Enterprise Resource Planning (ERP) and Business Intelligence (BI) systems in improving information quality through an empirical analysis carried out in Italy. The study begins with a detailed examination of ERP features that highlights the advantages and disadvantages of ERP adoption. Critical success factors for ERP implementation and post-implementation are then discussed, along with the capabilities of ERP in driving the alignment between management accounting and financial accounting information.The study goes on to illustrate the features of BI systems and to summarize companies' needs for BI. Critical success factors for BI implementation are then presented, along with the BI maturity model and lifecycle. The focus of the research entails a detailed empirical analysis in the Italian setting designed to investigate the role played by ERP and BI systems in reducing information overload/underload and improving information quality by influencing the features of information flow. The practical and theoretical implications of the study are discussed and future avenues of research are suggested. This book will be of value for all those who have an interest in the capacities of ERP and BI systems to enhance business information quality.
This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy.
This book provides an examination of e-Government frameworks and maturity stages in governments around the world, including an overview of the legal frameworks that have supported them. Divided into three sections, the first part of this book analyses the theoretical context of current policies, codes of best practice and their implementation. The second section presents case studies which bring key issues to the fore including open government, privacy protection, social media, democracy, systems failures, innovations in inter-organizational e-government projects, and open data systems. The authors demonstrate the importance of the successful implementation of e-Government for improving managerial efficiency, public service delivery and citizen engagement, with special attention given to developing countries. The book concludes by drawing out the lessons learned from the latest research and recommending solutions for improving the implementation of e-Government in the future, thereby helping to achieve more transparent, participative and democratic societies. This book will provide an invaluable resource for researchers, policy-makers, public managers, international organizations and technical experts.
This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students in the fields of information technology, computer science, or computer engineering where this topic is a substantial emerging area of study.
The advancement of technology is a standard of modern daily life, whether it be the release of a new cellphone, computer, or a self-driving car. Due to this constant advancement, the networks on which these technologies operate must advance as well. Innovations in Software-Defined Networking and Network Functions Virtualization is a critical scholarly publication that observes the advances made in network infrastructure through achieving cost efficacy while maintaining maximum flexibility for the formation and operation of these networks. Featuring coverage on a broad selection of topics, such as software-defined storage, openflow controller, and storage virtualization, this publication is geared toward professionals, computer engineers, academicians, students, and researchers seeking current and relevant research on the advancements made to network infrastructures.
This book is an outcome of the 33rd International Conference EnviroInfo 2019, held at the University of Kassel, Germany. It presents a selection of papers that describe innovative scientific approaches and ongoing research in environmental informatics and the emerging field of computational sustainability. The respective articles cover a broad range of scientific aspects including advances in core technologies such as earth observation, environmental modelling, big data and machine learning, as well as applications of ICT solutions intended to support societal transformation processes toward the more sustainable management of resource use, transportation and the energy supply. Given its scope, the book is essential reading for scientists, experts and students in these fields of research.
Cooperative communications, an emerging research area spurring tremendous excitement within academia and industry, has experienced an increase in demands for wireless multimedia and interactive services in recent years. ""Cooperative Communications for Improved Wireless Network Transmission: Framework for Virtual Antenna Array Applications"" provides practitioners, researchers, and academicians with fundamental principles of cooperative communication, presenting the latest advances in this rapidly evolving field. Containing research from leading international experts, this Premier Reference Source offers readers diverse findings and exposes underlying issues in the analysis, design, and optimization of wireless systems.
Telecommunications Present Status & Future
Continuous improvements in technological applications have allowed more opportunities to develop systems with user-focused designs. This not only leads to higher success in day-to-day usage, but it increases the overall probability of technology adoption. Design Solutions for User-Centric Information Systems provides a comprehensive examination of the latest strategies and methods for creating technological systems with end users as the focal point of the design process. Highlighting innovative practices and applications across a variety of areas, such as cloud-based computing services, e-government adoption, and logistics evaluation, this book is an ideal reference source for computer engineers, practitioners, project managers, graduate students, and researchers interested in the enhancement of user-centric information system development.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.
Advanced Topics in End User Computing is a series of books, which feature the latest research findings dealing with end user computing concepts, issues, and trends. Empirical and theoretical research concerned with all aspects of end user computing including development, utilization, and management are included. Advanced Topics in End User Computing, Volume 4 is a part of this series. Advanced Topics in End User Computing, Volume 4 is divided into three segments which cover such important topics as: organizational and end user computing issues, trends, and successes, collaborative technologies and implementation issues, and e-commerce processes and practices. This scholarly book is a collection which brings a wealth of end user computing information to one accessible location.
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.
With its cost efficiency, enabling of collaboration and sharing of resources, and its ability to improve access, cloud computing is likely to play a big role in the classrooms of tomorrow. Cloud Computing for Teaching and Learning: Strategies for Design and Implementation provides the latest information about cloud development and cloud applications in teaching and learning. The book alsos include empirical research findings in these areas for professionals and researchers working in the field of e-learning who want to implement teaching and learning with cloud computing, as well as provide insights and support to executives concerned with cloud development and cloud applications in e-learning communities and environments.
Designing for Networked Communications: Strategies and Development explains how to plan, use, and understand the products and the dynamic social processes and tasks some of the most vital innovations in the knowledge society depend upon social as well as technological. Focusing on various forms of design, implementation and integration of computer mediated communication, this book bridges the academic fields of computer science and communication studies. Designing for Networked Communications: Strategies and Development uses an interdisciplinary approach, and presents results from recent and important research in a variety of forms for networked communications. A constructive and critical view of the interplay between the new electronic and the more conventional modes of communication are utilized, while studies of organizational work practices demonstrate that the use of new technologies and media is best understood and integrated into work practices. In this process of merging, both are remodelled and rearranged while being adapted to the practices and activities for which they were designed.
ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart IoT Systems (SIS) are complex systems involving not only sensors but also actuators with control loops distributed all across the IoT, Edge and Cloud infrastructure. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is decisive to ensure and increase their trustworthiness, quality and user experience. DevOps has established itself as a software development life-cycle model that encourages developers to continuously bring new features to the system under operation without sacrificing quality. This book reports on the ENACT work to empower the development and operation as well as the continuous and agile evolution of SIS, which is necessary to adapt the system to changes in its environment, such as newly appearing trustworthiness threats.
Information systems belong to the most complex artifacts built in today's society. Developing, maintaining, and using an information system raises a large number of difficult problems, ranging from purely technical to organizational and social. ""Information Systems Engineering"" presents the most current research on existing and emergent trends on conceptual modeling and information systems engineering, bridging the gap between research and practice by providing a much-needed reference point on the design of software systems that evolve seamlessly to adapt to rapidly changing business and organizational practices.
Technology in the world today impacts every aspect of society and has infiltrated every industry, affecting communication, management, security, etc. With the emergence of such technologies as IoT, big data, cloud computing, AI, and virtual reality, organizations have had to adjust the way they conduct business to account for changing consumer behaviors and increasing data protection awareness. The Handbook of Research on Social and Organizational Dynamics in the Digital Era provides relevant theoretical frameworks and the latest empirical research findings on all aspects of social issues impacted by information technology in organizations and inter-organizational structures and presents the conceptualization of specific social issues and their associated constructs. Featuring coverage on a broad range of topics such as business management, knowledge management, and consumer behavior, this publication seeks to advance the practice and understanding of technology and the impacts of technology on social behaviors and norms in the workplace and society. It is intended for business professionals, executives, IT practitioners, policymakers, students, and researchers.
The set of papers in this handbook reflect the varied theory and wide range of applications of network models. Two of the most vibrant applications areas of network models are telecommunications and transportation. Several chapters explicitly model issues arising in these problem domains. Research on network models has been closely aligned with the field of computer science both in developing data structures for efficiently implementing network algorithms and in analyzing the complexity of network problems and algorithms. The basic structure underlying all network problems is a graph. Thus, historically, there have been strong ties between network models and graph theory. A companion volume in the "Handbook" series, entitled "Network Routing", examines problems related to the movement of commodities over a network. The problems treated arise in several application areas including logistics, telecommunications, facility location, VLSI design, and economics.
This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security. |
![]() ![]() You may like...
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee
Paperback
R1,859
Discovery Miles 18 590
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,491
Discovery Miles 14 910
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,351
Discovery Miles 13 510
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia
Paperback
R2,361
Discovery Miles 23 610
Deep Reinforcement Learning for Wireless…
Dinh Thai Hoang, Nguyen Van Huynh, …
Hardcover
R3,112
Discovery Miles 31 120
|