![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science. Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field.
This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.
Interval computing combined with fuzzy logic has become an emerging tool in studying artificial intelligence and knowledge processing (AIKP) applications since it models uncertainties frequently raised in the field. This book provides introductions for both interval and fuzzy computing in a very accessible style. Application algorithms covered in this book include quantitative and qualitative data mining with interval valued datasets, decision making systems with interval valued parameters, interval valued Nash games and interval weighted graphs. Successful applications in studying finance and economics, etc are also included. This book can serve as a handbook or a text for readers interested in applying interval and soft computing for AIKP.
This book integrates two areas of computer science, namely data mining and evolutionary algorithms. Both these areas have become increasingly popular in the last few years, and their integration is currently an area of active research.In general, data mining consists of extracting knowledge from data. In this book we particularly emphasize the importance of discovering comprehensible, interesting knowledge, which is potentially useful for the reader for intelligent decision making.In a nutshell, the motivation for applying evolutionary algorithms to data mining is that evolutionary algorithms are robust search methods which perform a global search in the space of candidate solutions. In contrast, most rule induction methods perform a local, greedy search in the space of candidate rules. Intuitively, the global search of evolutionary algorithms can discover interesting rules and patterns that would be missed by the greedy search.
The complexity and sensitivity of modern industrial processes and systems increasingly require adaptable advanced control protocols. These controllers have to be able to deal with circumstances demanding "judgement" rather than simple "yes/no," "on/off" responses, circumstances where an imprecise linguistic description is often more relevant than a cut-and-dried numerical one. The ability of fuzzy systems to handle numeric and linguistic information within a single framework renders them efficacious in this form of expert control system. Divided into two parts, Fuzzy Logic, Identification and Predictive Control first shows you how to construct static and dynamic fuzzy models using the numerical data from a variety of real-world industrial systems and simulations. The second part demonstrates the exploitation of such models to design control systems employing techniques like data mining. Fuzzy Logic, Identification and Predictive Control is a comprehensive introduction to the use of fuzzy methods in many different control paradigms encompassing robust, model-based, PID-like and predictive control. This combination of fuzzy control theory and industrial serviceability will make a telling contribution to your research whether in the academic or industrial sphere and also serves as a fine roundup of the fuzzy control area for the graduate student. Advances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrialcontrol.
'Data Mining with Ontologies' examines methodologies and research for the development of ontological foundations for data mining.
Loop tiling, as one of the most important compiler optimizations, is beneficial for both parallel machines and uniprocessors with a memory hierarchy. This book explores the use of loop tiling for reducing communication cost and improving parallelism for distributed memory machines. The author provides mathematical foundations, investigates loop permutability in the framework of nonsingular loop transformations, discusses the necessary machineries required, and presents state-of-the-art results for finding communication- and time-minimal tiling choices. Throughout the book, theorems and algorithms are illustrated with numerous examples and diagrams. The techniques presented in Loop Tiling for Parallelism can be adapted to work for a cluster of workstations, and are also directly applicable to shared-memory machines once the machines are modeled as BSP (Bulk Synchronous Parallel) machines. Features and key topics: Detailed review of the mathematical foundations, including convex polyhedra and cones; Self-contained treatment of nonsingular loop transformations, code generation, and full loop permutability; Tiling loop nests by rectangles and parallelepipeds, including their mathematical definition, dependence analysis, legality test, and code generation; A complete suite of techniques for generating SPMD code for a tiled loop nest; Up-to-date results on tile size and shape selection for reducing communication and improving parallelism; End-of-chapter references for further reading. Researchers and practitioners involved in optimizing compilers and students in advanced computer architecture studies will find this a lucid and well-presented reference work with numerous citations to original sources.
Database Solutions: A step-by-step guide to building databases 2/eAre you responsible for designing and creating the databases that keep your business running? Or are you studying for a module in database design? If so, Database Solutions is for you This fully revised and updated edition will make the database design and build process smoother, quicker and more reliable.Recipe for database success Take one RDMS - any of the major commercial products will do: Oracle, Informix, SQL Server, Access, Paradox Add one thorough reading of Database Solutions if you are an inexperienced database designer, or one recap of the methodology if you are an old hand Use the design and implementation frameworks to plan your timetable, use a common data model that fits your requirements and adapt as necessaryFeatures Includes hints and tips for success with comprehensive guidance on avoiding pitfalls and traps Shows how to create data models using the UML design notation Includes two full-length coded example databases written on Microsoft Access 2002 and Oracle 9i, plus 15 sample data models to adapt to your needs, chosen from seven common business areasNew for this edition New chapters on SQL (St
This book is for database designers and database administrators
using Visio, which is the database component of Microsoft's Visual
Studio .NET for Enterprise Architects suite, also included in MSDN
subscriptions. This is the only guide to this product that tells
DBAs how to get their job done. Although primarily focused on tool
features, the book also provides an introduction to data modeling,
and includes practical advice on managing database projects. The
principal author was the program manager of VEA's database modeling
solutions.
Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.
This book presents the main theoretical foundations behind smart services as well as specific guidelines and practically proven methods on how to design them. Furthermore, it gives an overview of the possible implementation architectures and shows how the designed smart services can be realized with specific technologies. Finally, it provides four specific use cases that show how smart services have been realized in practice and what impact they have within the businesses. The first part of the book defines the basic concepts and aims to establish a shared understanding of terms, such as smart services, service systems, smart service systems or cyber-physical systems. On this basis, it provides an analysis of existing work and includes insights on how an organization incorporating smart services could enhance and adjust their management and business processes. The second part on the design of smart services elaborates on what constitutes a successful smart service and describes experiences in the area of interdisciplinary teams, strategic partnerships, the overall service systems and the common data basis. In the third part, technical reference architectures are presented in detail, encompassing topics on the design of digital twins in cyber physical systems, the communication between entities and sensors in the age of Industry 4.0 as well as data management and integration. The fourth part then highlights a number of analytical possibilities that can be realized and that can constitute or be part of smart services, including machine learning and artificial intelligence methods. Finally, the applicability of the introduced design and development method is demonstrated by considering specific real-world use cases. These include services in the industrial and mobility sector, which were developed in direct cooperation with industry partners. The main target audience of this book is industry-focused readers, especially practitioners from industry, who are involved in supporting and managing digital business. These include professionals working in business development, product management, strategy, and development, ranging from middle management to Chief Digital Officers. It conveys all the basics needed for developing smart services and successfully placing them on the market by explaining technical aspects as well as showcasing practical use cases.
This book illustrates the current work of leading multilevel
modeling (MLM) researchers from around the world. The book's goal is to critically examine the real problems that
occur when trying to use MLMs in applied research, such as power,
experimental design, and model violations. This presentation of
cutting-edge work and statistical innovations in multilevel
modeling includes topics such as growth modeling, repeated measures
analysis, nonlinear modeling, outlier detection, and meta
analysis. This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.
This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.
This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract Protocol (or TAP, for short) notation. This notation is greatly influenced by the Abstract Protocol Notation in the textbook Elements of Network Protocol Design, written by the second author, Mohamed G. Gouda. The TAP notation has two types of sem- tics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics thatappeals to the protocol implementors group.
The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service. Foreword by The Hon. Louis J. Freeh."
This book deals with Invitations to Tender (ITTs) for the provision of Facility Management (FM) services. It presents a framework to support companies in preparing clear, comprehensive and effective ITTs, focusing on such key aspects as: organizational structures, tools and procedures for managing information, allocation of information responsibilities, procedures for services monitoring and control, quality policies, and risk management. It discusses and analyzes a range of basic terms and concepts, procedures, and international standards concerning the Tendering Process, as well as the contents of ITTs, which should represent the translation of information needs into requirements related to: the client's goals, main categories of information to deal with, expected organization of information, modalities of reporting and control, and level of knowledge to be reached. A further major focus is on potential key innovation scenarios concerning current FM practice, such as Sustainable Procurement, Building Information Modeling (BIM), Big Data and Internet of Things (IoT) technologies, highlighting both the possible benefits and the possible risks and implications that could negatively affect the quality of FM service provision if not properly treated within the ITT. The book will be of interest to real estate owners, demand organizations and facility managers, enhancing their ability to prepare, interpret and/or critically analyze ITTs.
The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government. Moving towards open governance roadmaps worldwide, electronic participation and citizen engagement stand out as a new domain, important both for decision makers and citizens; and over the last decade, there have been a variety of related pilot projects and innovative approaches. With contributions from leading researchers, Charalabidis and Koussouris provide the latest research findings such as theoretical foundations, principles, methodologies, architectures, technical frameworks, cases and lessons learnt within the domain of open, collaborative governance and online citizen engagement. The book is divided into three sections: Section one, "Public Policy Debate Foundations," lays the foundations regarding processes and methods for scoping, planning, evaluating and transforming citizen engagement. The second section, "Information and Communication Technologies for Citizen Participation," details practical approaches to designing and creating collaborative governance infrastructures and citizen participation for businesses and administrations. Lastly, the third section on "Future Research Directions of Open, Collaborative ICT-enabled Governance" provides a constructive critique of the developments in the past and presents prospects regarding future challenges and research directions. The book is mainly written for academic researchers and graduate students working in the computer, social, political and management sciences. Its audience includes researchers and practitioners in e-Governance, public administration officials, policy and decision makers at the local, national and international level engaged in the design and creation of policies and services, and ICT professionals engaged in e-Governance and policy modelling projects and solutions.
Language, Compilers and Run-time Systems for Scalable Computers contains 20 articles based on presentations given at the third workshop of the same title, and 13 extended abstracts from the poster session. Starting with new developments in classical problems of parallel compiler design, such as dependence analysis and an exploration of loop parallelism, the book goes on to address the issues of compiler strategy for specific architectures and programming environments. Several chapters investigate support for multi-threading, object orientation, irregular computation, locality enhancement, and communication optimization. Issues of the interface between language and operating system support are also discussed. Finally, the load balance issues are discussed in different contexts, including sparse matrix computation and iteratively balanced adaptive solvers for partial differential equations. Some additional topics are also discussed in the extended abstracts. Each chapter provides a bibliography of relevant papers and the book can thus be used as a reference to the most up-to-date research in parallel software engineering.
This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world. The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis. This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.
This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus on both the algorithmic and practical parts of the artificial intelligence approaches in IoT applications that are enabled and supported by wireless sensor networks and cellular networks. Targeted readers are from varying disciplines who are interested in implementing the smart planet/environments vision via intelligent wireless/wired enabling technologies. Includes the most up-to-date research and applications related to IoT artificial intelligence (AI); Provides new and innovative operational ideas regarding the IoT artificial intelligence that help advance the telecommunications industry; Presents AI challenges facing the IoT scientists and provides potential ways to solve them in critical daily life issues. |
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Blockchain and AI Technology in the…
Subhendu Kumar Pani, Sian Lun Lau, …
Hardcover
R6,170
Discovery Miles 61 700
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, …
Hardcover
R6,170
Discovery Miles 61 700
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
R1,024
Discovery Miles 10 240
|