|
|
Books > Computing & IT
The growing presence of social media and computer use has caused
significant changes to community engagement. With the ubiquity of
these technologies, there is increasing engagement in social and
political policies and changes. Online Communities as Agents of
Change and Social Movements is a pivotal reference source for the
latest research on relevant theoretical and practical frameworks
regarding online communities and social media as agents of social
and political change. Featuring extensive coverage on relevant
areas such as computer use, online engagement, and collective
action, this publication is an ideal resource for researchers,
academics, practitioners, and students in the fields of social
psychology, social network analysis, media studies, information
systems, and political science.
Change Detection and Image Time Series Analysis 2 presents
supervised machine-learning-based methods for temporal evolution
analysis by using image time series associated with Earth
observation data. Chapter 1 addresses the fusion of multisensor,
multiresolution and multitemporal data. It proposes two supervised
solutions that are based on a Markov random field: the first relies
on a quad-tree and the second is specifically designed to deal with
multimission, multifrequency and multiresolution time series.
Chapter 2 provides an overview of pixel based methods for time
series classification, from the earliest shallow learning methods
to the most recent deep-learning-based approaches. Chapter 3
focuses on very high spatial resolution data time series and on the
use of semantic information for modeling spatio-temporal evolution
patterns. Chapter 4 centers on the challenges of dense time series
analysis, including pre processing aspects and a taxonomy of
existing methodologies. Finally, since the evaluation of a learning
system can be subject to multiple considerations, Chapters 5 and 6
offer extensive evaluations of the methodologies and learning
frameworks used to produce change maps, in the context of
multiclass and/or multilabel change classification issues.
 |
Makupedia
(Hardcover)
Peter K Matthews - Akukalia
|
R1,776
Discovery Miles 17 760
|
Ships in 10 - 15 working days
|
|
|
As the world has entered the era of big data, there is a need to
give a semantic perspective to the data to find unseen patterns,
derive meaningful information, and make intelligent decisions. This
2-volume handbook set is a unique, comprehensive, and complete
presentation of the current progress and future potential
explorations in the field of data science and related topics.
Handbook of Data Science with Semantic Technologies provides a
roadmap for a new trend and future development of data science with
semantic technologies. The first volume serves as an important
guide towards applications of data science with semantic
technologies for the upcoming generation and thus becomes a unique
resource for both academic researchers and industry professionals.
The second volume provides a roadmap for the deployment of semantic
technologies in the field of data science that enables users to
create intelligence through these technologies by exploring the
opportunities while eradicating the current and future challenges.
The set explores the optimal use of these technologies to provide
the maximum benefit to the user under one comprehensive source.
This set consisting of two separate volumes can be utilized
independently or together as an invaluable resource for students,
scholars, researchers, professionals, and practitioners in the
field.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
Relational databases have been predominant for many years and are
used throughout various industries. The current system faces
challenges related to size and variety of data thus the NoSQL
databases emerged. By joining these two database models, there is
room for crucial developments in the field of computer science.
Bridging Relational and NoSQL Databases is an innovative source of
academic content on the convergence process between databases and
describes key features of the next database generation. Featuring
coverage on a wide variety of topics and perspectives such as BASE
approach, CAP theorem, and hybrid and native solutions, this
publication is ideally designed for professionals and researchers
interested in the features and collaboration of relational and
NoSQL databases.
IT Security Governance Innovations: Theory and Research provides
extraordinary research which highlights the main contributions and
characteristics of existing approaches, standards, best practices,
and new trends in IT Security Governance. With theoretical and
practical perspectives, the book aims to address IT Security
Governance implementation in corporate organizations. This
collection of works serves as a reference for CEOs and CIOs,
security managers, systems specialists, computer science students,
and much more.
ICT Sustainability is about how to assess, and reduce, the carbon
footprint and materials used with computers and telecommunications.
These are the notes for an award winning on-line graduate course on
strategies for reducing the environmental impact of computers and
how to use the Internet to make business more energy efficient.
These notes have been used for courses by the Australian Computer
Society, Australian National University and Athabasca University
(Canada). The book includes an extensive bibliography. Free open
access course-ware is available on-line to accompany this text.
A groundbreaking treatise by one of the great mathematicians of our
age, who outlines a style of thinking by which great ideas are
conceived. What inspires and spurs on a great idea? Can we train
ourselves to think in a way that will enable world-changing
understandings and insights to emerge? Richard Hamming said we can.
He first inspired a generation of engineers, scientists, and
researchers in 1986 with "You and Your Research," an electrifying
sermon on why some scientists do great work, why most don't, why he
did, and why you can-and should-too. The Art of Doing Science and
Engineering is the full expression of what "You and Your Research"
outlined. It's a book about thinking; more specifically, a style of
thinking by which great ideas are conceived. The book is filled
with stories of great people performing mighty deeds-but they are
not meant simply to be admired. Instead, they are to be aspired to,
learned from, and surpassed. Hamming consistently returns to
Shannon's information theory, Einstein's theory of relativity,
Grace Hopper's work on high-level programming, Kaiser's work on
digital fillers, and his own work on error-correcting codes. He
also recounts a number of his spectacular failures as clear
examples of what to avoid. Originally published in 1996 and adapted
from a course that Hamming taught at the US Naval Postgraduate
School, this edition includes an all-new foreword by designer,
engineer, and founder of Dynamicland Bret Victor, plus more than 70
redrawn graphs and charts. The Art of Doing Science and Engineering
is a reminder that a capacity for learning and creativity are
accessible to everyone. Hamming was as much a teacher as a
scientist, and having spent a lifetime forming and confirming a
theory of great people and great ideas, he prepares the next
generation for even greater distinction.
There is a tremendous need for computer scientists, data
scientists, and software developers to learn how to develop
Socratic problem-solving applications. While the amount of data and
information processing has been accelerating, our ability to learn
and problem-solve with that data has fallen behind. Meanwhile,
problems have become too complex to solve in the workplace without
a concerted effort to follow a problem-solving process. This
problem-solving process must be able to deal with big and disparate
data. Furthermore, it must solve problems that do not have a "rule"
to apply in solving them. Moreover, it must deal with ambiguity and
help humans use informed judgment to build on previous steps and
create new understanding. Computer-based Socratic problem-solving
systems answer this need for a problem-solving process using big
and disparate data. Furthermore, computer scientists, data
scientists, and software developers need the knowledge to develop
these systems. Socrates Digital (TM) for Learning and Problem
Solving presents the rationale for developing a Socratic
problem-solving application. It describes how a computer-based
Socratic problem-solving system called Socrates DigitalTM can keep
problem-solvers on track, document the outcome of a problem-solving
session, and share those results with problem-solvers and larger
audiences. In addition, Socrates DigitalTM assists problem-solvers
to combine evidence about their quality of reasoning for individual
problem-solving steps and their overall confidence in the solution.
Socrates DigitalTM also captures, manages, and distributes this
knowledge across organizations to improve problem-solving. This
book also presents how to build a Socrates DigitalTM system by
detailing the four phases of design and development: Understand,
Explore, Materialize, and Realize. The details include flow charts
and pseudo-code for readers to implement Socrates DigitalTM in a
general-purpose programming language. The completion of the design
and development process results in a Socrates DigitalTM system that
leverages artificial intelligence services from providers that
include Apple, Microsoft, Google, IBM, and Amazon. In addition, an
appendix provides a demonstration of a no-code implementation of
Socrates DigitalTM in Microsoft Power Virtual Agent.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
|
|