|
Books > Computing & IT
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
As technology continues to expand and develop, the internet of
things (IoT) is playing a progressive role in the infrastructure of
electronics. The increasing amount of IoT devices, however, has led
to the emergence of significant privacy and security challenges.
Security and Privacy Issues in Sensor Networks and IoT is a
collection of innovative research on the methods and applications
of protection disputes in the internet of things and other
computing structures. While highlighting topics that include cyber
defense, digital forensics, and intrusion detection, this book is
ideally designed for security analysts, IT specialists, software
developers, computer engineers, industry professionals,
academicians, students, and researchers seeking current research on
defense concerns in cyber physical systems.
The complex world of online piracy and peer-to-peer file sharing is
skillfully condensed into an easy-to-understand guide that provides
insight into the criminal justice approach to illegal file sharing,
while offering guidance to parents and students who have concerns
about potential legal action in response to file-sharing
activities. While the actual impact of digital piracy is nearly
impossible to precisely calculate, the threat of financial damage
from illegal peer-to-peer (P2P) file sharing to the world's
highest-grossing entertainment firms (and even entire industries!)
has garnered attention from government, industry, and academic
leaders and criminal justice professionals. Oftentimes, those
providing access to computers and file sharing
capabilities-parents, schools, libraries-don't know about or
understand these activities and, therefore, put themselves and
their families at risk for criminal and civil prosecution. This
work describes the technological, legal, social, and ethical facets
of illegal peer-to-peer file sharing. Geared toward parents,
teachers, librarians, students, and any other computer user engaged
in file sharing, this book will help readers to understand all
forms of traditional and digital copyright violations of protected
music, movies, and software. To date over 18,000 P2P users have
been sued by the Recording Industry Association of America (RIAA).
Most of these users have been college students and parents of
high-school students. While word of these law suits are spreading,
and many parents fear that their children may be using a family
computer to illegally download and share copyrighted works, few
supervising adults have the technical knowledge needed to determine
whether and to what extent pirating may be occurring via a computer
and Internet connection they are legally responsible for.
Additionally, while P2P networks are filled with millions of users
with billions of copyrighted files, few users understand the ways
in which they are illegally using computers and other mobile
electronic devices to download protected content. While describing
both technical and social issues, this book primarily focuses on
the social aspects of illegal file sharing, and provides technical
concepts at a general level. Fisk skillfully condenses the complex
nature of file sharing systems into an easy-to-understand guide,
provides insight into the criminal justice approach to illegal file
sharing, and offers guidance to parents and students who have
concerns about potential legal action in response to file sharing
activities.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
This book explains the concepts, history, and implementation of IT
infrastructures. Although many of books can be found on each
individual infrastructure building block, this is the first book to
describe all of them: datacenters, servers, networks, storage,
operating systems, and end user devices. The building blocks
described in this book provide functionality, but they also provide
the non-functional attributes performance, availability, and
security. These attributes are explained on a conceptual level in
separate chapters, and specific in the chapters about each
individual building block. Whether you need an introduction to
infrastructure technologies, a refresher course, or a study guide
for a computer science class, you will find that the presented
building blocks and concepts provide a solid foundation for
understanding the complexity of today's IT infrastructures. This
book can be used as part of IT architecture courses based on the IS
2010.4 curriculum.
With near-universal internet access and ever-advancing electronic
devices, the ability to facilitate interactions between various
hardware and software provides endless possibilities. Though
internet of things (IoT) technology is becoming more popular among
individual users and companies, more potential applications of this
technology are being sought every day. There is a need for studies
and reviews that discuss the methodologies, concepts, and possible
problems of a technology that requires little or no human
interaction between systems. The Handbook of Research on the
Internet of Things Applications in Robotics and Automation is a
pivotal reference source on the methods and uses of advancing IoT
technology. While highlighting topics including traffic information
systems, home security, and automatic parking, this book is ideally
designed for network analysts, telecommunication system designers,
engineers, academicians, technology specialists, practitioners,
researchers, students, and software developers seeking current
research on the trends and functions of this life-changing
technology.
User opinions about service experiences have been extensively
acknowledged to play a key role in influencing the consumption
decisions of other customers. The widespread adoption of internet
technologies has amplified enormously the volume and the potential
impact of such customer-generated content in the form of electronic
word-of-mouth (eWOM). Exploring the Power of Electronic
Word-of-Mouth in the Services Industry is an essential research
book that explores the importance of consumer perception and the
influence of word-of-mouth in the digital world. Featuring a range
of topics such as data mining, online engagement, and social media,
this book is ideal for academicians, researchers, IT developers,
marketers, managers, media specialists, and professionals.
Decision-making is a frequent problem in today's financial,
business, and industrial world. Thus, fuzzy expert systems are
increasingly being used to solve decision-making problems by
attempting to solve a part or whole of a practical problem. These
expert systems have proven that they can solve problems in various
domains where human expertise is required, including the field of
agriculture. Fuzzy Expert Systems and Applications in Agricultural
Diagnosis is a crucial source that examines the use of fuzzy expert
systems for prediction and problem solving in the agricultural
industry. Featuring research on topics such as nutrition
management, sustainable agriculture, and defuzzification, this book
is ideally designed for farmers, researchers, scientists,
academics, students, policymakers, and development practitioners
seeking the latest research in technological tools that support
crop disease diagnosis.
Interdisciplinary and multidisciplinary research is slowly yet
steadily revolutionizing traditional education. However,
multidisciplinary research can and will also improve the extent to
which a country can protect its critical and vital assets. Applying
Methods of Scientific Inquiry Into Intelligence, Security, and
Counterterrorism is an essential scholarly publication that
provides personnel directly working in the fields of intelligence,
law enforcement, and science with the opportunity to understand the
multidisciplinary nature of intelligence and science in order to
improve current intelligence activities and contribute to the
protection of the nation. Each chapter of the book discusses
various components of science that should be applied to the
intelligence arena. Featuring coverage on a range of topics
including cybersecurity, economics, and political strategy, this
book is ideal for law enforcement, intelligence and security
practitioners, students, educators, and researchers.
In today's digital world, the huge amount of data being generated
is unstructured, messy, and chaotic in nature. Dealing with such
data, and attempting to unfold the meaningful information, can be a
challenging task. Feature engineering is a process to transform
such data into a suitable form that better assists with
interpretation and visualization. Through this method, the
transformed data is more transparent to the machine learning
models, which in turn causes better prediction and analysis of
results. Data science is crucial for the data scientist to assess
the trade-offs of their decisions regarding the effectiveness of
the machine learning model implemented. Investigating the demand in
this area today and in the future is a necessity. The Handbook of
Research on Automated Feature Engineering and Advanced Applications
in Data Science provides an in-depth analysis on both the
theoretical and the latest empirical research findings on how
features can be extracted and transformed from raw data. The
chapters will introduce feature engineering and the recent
concepts, methods, and applications with the use of various data
types, as well as examine the latest machine learning applications
on the data. While highlighting topics such as detection, tracking,
selection techniques, and prediction models using data science,
this book is ideally intended for research scholars, big data
scientists, project developers, data analysts, and computer
scientists along with practitioners, researchers, academicians, and
students interested in feature engineering and its impact on data.
The growing presence of social media and computer use has caused
significant changes to community engagement. With the ubiquity of
these technologies, there is increasing engagement in social and
political policies and changes. Online Communities as Agents of
Change and Social Movements is a pivotal reference source for the
latest research on relevant theoretical and practical frameworks
regarding online communities and social media as agents of social
and political change. Featuring extensive coverage on relevant
areas such as computer use, online engagement, and collective
action, this publication is an ideal resource for researchers,
academics, practitioners, and students in the fields of social
psychology, social network analysis, media studies, information
systems, and political science.
As the internet and its applications grow more sophisticated and
widespread, so too do the strategies of modern terrorist groups.
The existence of the dark web adds to the online arsenal of groups
using digital networks and sites to promulgate ideology or recruit
supporters. It is necessary to understand how terrorist cells are
using and adapting online tools in order to counteract their
efforts. Utilization of New Technologies in Global Terror: Emerging
Research and Opportunities is an informative resource that explores
new developments in technological advancements and the progression
of terror organizations while also examining non-government
activist organizations and their new role in protecting internet
freedom and combating cyberterrorism. Featuring relevant topics
such as social media, cyber threats, and counterterrorism, this
publication will benefit government officials, political
scientists, policymakers, researchers, academicians, and graduate
students interested in political science, mass communication, and
cyberwarfare.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
|