![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This edited collection discusses the emerging topics in statistical modeling for biomedical research. Leading experts in the frontiers of biostatistics and biomedical research discuss the statistical procedures, useful methods, and their novel applications in biostatistics research. Interdisciplinary in scope, the volume as a whole reflects the latest advances in statistical modeling in biomedical research, identifies impactful new directions, and seeks to drive the field forward. It also fosters the interaction of scholars in the arena, offering great opportunities to stimulate further collaborations. This book will appeal to industry data scientists and statisticians, researchers, and graduate students in biostatistics and biomedical science. It covers topics in: Next generation sequence data analysis Deep learning, precision medicine, and their applications Large scale data analysis and its applications Biomedical research and modeling Survival analysis with complex data structure and its applications.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.
This book provides an overview of the theory and application of linear and nonlinear mixed-effects models in the analysis of grouped data, such as longitudinal data, repeated measures, and multilevel data. Over 170 figures are included in the book.
Given its effective techniques and theories from various sources and fields, data science is playing a vital role in transportation research and the consequences of the inevitable switch to electronic vehicles. This fundamental insight provides a step towards the solution of this important challenge. Data Science and Simulation in Transportation Research highlights entirely new and detailed spatial-temporal micro-simulation methodologies for human mobility and the emerging dynamics of our society. Bringing together novel ideas grounded in big data from various data mining and transportation science sources, this book is an essential tool for professionals, students, and researchers in the fields of transportation research and data mining.
This book focuses on new and emerging data mining solutions that offer a greater level of transparency than existing solutions. Transparent data mining solutions with desirable properties (e.g. effective, fully automatic, scalable) are covered in the book. Experimental findings of transparent solutions are tailored to different domain experts, and experimental metrics for evaluating algorithmic transparency are presented. The book also discusses societal effects of black box vs. transparent approaches to data mining, as well as real-world use cases for these approaches.As algorithms increasingly support different aspects of modern life, a greater level of transparency is sorely needed, not least because discrimination and biases have to be avoided. With contributions from domain experts, this book provides an overview of an emerging area of data mining that has profound societal consequences, and provides the technical background to for readers to contribute to the field or to put existing approaches to practical use.
Learn how applying risk management to each stage of the software engineering model can help the entire development process run on time and on budget. This practical guide identifies the potential threats associated with software development, explains how to establish an effective risk management program, and details the six critical steps involved in applying the process. It also explores the pros and cons of software and organizational maturity, discusses various software metrics approaches you can use to measure software quality, and highlights procedures for implementing a successful metrics program.
This book discusses the challenges facing current research in knowledge discovery and data mining posed by the huge volumes of complex data now gathered in various real-world applications (e.g., business process monitoring, cybersecurity, medicine, language processing, and remote sensing). The book consists of 14 chapters covering the latest research by the authors and the research centers they represent. It illustrates techniques and algorithms that have recently been developed to preserve the richness of the data and allow us to efficiently and effectively identify the complex information it contains. Presenting the latest developments in complex pattern mining, this book is a valuable reference resource for data science researchers and professionals in academia and industry.
The present text aims at helping the reader to maximize the reuse of information. Topics covered include tools and services for creating simple, rich, and reusable knowledge representations to explore strategies for integrating this knowledge into legacy systems. The reuse and integration are essential concepts that must be enforced to avoid duplicating the effort and reinventing the wheel each time in the same field. This problem is investigated from different perspectives. in organizations, high volumes of data from different sources form a big threat for filtering out the information for effective decision making. the reader will be informed of the most recent advances in information reuse and integration.
Manufacturing and operations management paradigms are evolving toward more open and resilient spaces where innovation is driven not only by ever-changing customer needs but also by agile and fast-reacting networked structures. Flexibility, adaptability and responsiveness are properties that the next generation of systems must have in order to successfully support such new emerging trends. Customers are being attracted to be involved in Co-innovation Networks, as - proved responsiveness and agility is expected from industry ecosystems. Renewed production systems needs to be modeled, engineered and deployed in order to achieve cost-effective solutions. BASYS conferences have been developed and organized as a forum in which to share visions and research findings for innovative sustainable and knowledge-based products-services and manufacturing models. Thus, the focus of BASYS is to discuss how human actors, emergent technologies and even organizations are integrated in order to redefine the way in which the val- creation process must be conceived and realized. BASYS 2010, which was held in Valencia, Spain, proposed new approaches in automation where synergies between people, systems and organizations need to be fully exploited in order to create high added-value products and services. This book contains the selection of the papers which were accepted for presentation at the BASYS 2010 conference, covering consolidated and emerging topics of the conference scope.
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book shows how business process management (BPM), as a management discipline at the intersection of IT and Business, can help organizations to master digital innovations and transformations. At the same time, it discusses how BPM needs to be further developed to successfully act as a driver for innovation in a digital world. In recent decades, BPM has proven extremely successful in managing both continuous and radical improvements in many sectors and business areas. While the digital age brings tremendous new opportunities, it also brings the specific challenge of correctly positioning and scoping BPM in organizations. This book shows how to leverage BPM to drive business innovation in the digital age. It brings together the views of the world's leading experts on BPM and also presents a number of practical cases. It addresses mangers as well as academics who share an interest in digital innovation and business process management. The book covers topics such as BPM and big data, BPM and the Internet of Things, and BPM and social media. While these technological and methodological aspects are key to BPM, process experts are also aware that further nontechnical organizational capabilities are required for successful innovation. The ideas presented in this book have helped us a lot while implementing process innovations in our global Logistics Service Center. Joachim Gantner, Director IT Services, Swarovski AG Managing Processes - everyone talks about it, very few really know how to make it work in today's agile and competitive world. It is good to see so many leading experts taking on the challenge in this book. Cornelius Clauser, Chief Process Officer, SAP SE This book provides worthwhile readings on new developments in advanced process analytics and process modelling including practical applications - food for thought how to succeed in the digital age. Ralf Diekmann, Head of Business Excellence, Hilti AG This book is as an important step towards process innovation systems. I very much like to congratulate the editors and authors for presenting such an impressive scope of ideas for how to address the challenging, but very rewarding marriage of BPM and innovation. Professor Michael Rosemann, Queensland University of Technology
The proliferation of digital computing devices and their use in communication has resulted in an increased demand for systems and algorithms capable of mining textual data. Thus, the development of techniques for mining unstructured, semi-structured, and fully-structured textual data has become increasingly important in both academia and industry. This second volume continues to survey the evolving field of text mining - the application of techniques of machine learning, in conjunction with natural language processing, information extraction and algebraic/mathematical approaches, to computational information retrieval. Numerous diverse issues are addressed, ranging from the development of new learning approaches to novel document clustering algorithms, collectively spanning several major topic areas in text mining. Features: a [ Acts as an important benchmark in the development of current and future approaches to mining textual information a [ Serves as an excellent companion text for courses in text and data mining, information retrieval and computational statistics a [ Experts from academia and industry share their experiences in solving large-scale retrieval and classification problems a [ Presents an overview of current methods and software for text mining a [ Highlights open research questions in document categorization and clustering, and trend detection a [ Describes new application problems in areas such as email surveillance and anomaly detection Survey of Text Mining II offers a broad selection in state-of-the art algorithms and software for text mining from both academic and industrial perspectives, to generate interest and insight into the stateof the field. This book will be an indispensable resource for researchers, practitioners, and professionals involved in information retrieval, computational statistics, and data mining. Michael W. Berry is a professor in the Department of Electrical Engineering and Computer Science at the University of Tennessee, Knoxville. Malu Castellanos is a senior researcher at Hewlett-Packard Laboratories in Palo Alto, California.
How an organization manages its information is arguably the most important skill in today's dynamic and hyper-competitive environment. In Enterprise Information Management, editor Paul Baan and a team of expert contributors present a holistic approach to EIM, with an emphasis on action-oriented decision making. The authors demonstrate that EIM must be promoted from the top down, in order to ensure that the entire organization is committed to establishing and supporting the systems and processes designed to capture, store, analyze, and disseminate information. They identify three key "pillars" of applications: (1) business intelligence (the information and knowledge management process itself); (2) enterprise content management (company-wide management of unstructured information, including document management, digital asset management, records management, and web content management); and (3) enterprise search (using electronic tools to retrieve information from databases, file systems, and legacy systems). The authors explore EIM from economic and socio-psychological perspectives, considering the "ROI" (return on information) of IT and related technological investments, and the cultural and behavioral aspects through which people and machines interact. Illustrating concepts through case examples, the authors provide a variety of tools for managers to assess and improve the effectiveness of their EIM infrastructure, considering its implications for customer and client relations, process and system improvements, product and service innovations, and financial performance.
This book presents a unique guide to heritage preservation problems and the corresponding state-of-the-art digital techniques to achieve their plausible solutions. It covers various methods, ranging from data acquisition and digital imaging to computational methods for reconstructing the original (pre-damaged) appearance of heritage artefacts.The case studies presented here are mostly drawn from India's tangible and non-tangible heritage, which is very rich and multi-dimensional. The contributing authors have been working in their respective fields for years and present their methods so lucidly that they can be easily reproduced and implemented by general practitioners of heritage curation. The preservation methods, reconstruction methods, and corresponding results are all illustrated with a wealth of colour figures and images.The book consists of sixteen chapters that are divided into five broad sections, namely (i) Digital System for Heritage Preservation, (ii) Signal and Image Processing, (iii) Audio and Video Processing, (iv) Image and Video Database, and (v) Architectural Modelling and Visualization. The first section presents various state-of-the-art tools and technologies for data acquisition including an interactive graphical user interface (GUI) annotation tool and a specialized imaging system for generating the realistic visual forms of the artefacts. Numerous useful methods and algorithms for processing vocal, visual and tactile signals related to heritage preservation are presented in the second and third sections. In turn, the fourth section provides two important image and video databases, catering to members of the computer vision community with an interest in the domain of digital heritage. Finally, examples of reconstructing ruined monuments on the basis of historic documents are presented in the fifth section. In essence, this book offers a pragmatic appraisal of the uses of digital technology in the various aspects of preservation of tangible and intangible heritages.
Uncertainty Handling and Quality Assessment in Data Mining provides an introduction to the application of these concepts in Knowledge Discovery and Data Mining. It reviews the state-of-the-art in uncertainty handling and discusses a framework for unveiling and handling uncertainty. Coverage of quality assessment begins with an introduction to cluster analysis and a comparison of the methods and approaches that may be used. The techniques and algorithms involved in other essential data mining tasks, such as classification and extraction of association rules, are also discussed together with a review of the quality criteria and techniques for evaluating the data mining results. This book presents a general framework for assessing quality and handling uncertainty which is based on tested concepts and theories. This framework forms the basis of an implementation tool, 'Uminer' which is introduced to the reader for the first time. This tool supports the key data mining tasks while enhancing the traditional processes for handling uncertainty and assessing quality. Aimed at IT professionals involved with data mining and knowledge discovery, the work is supported with case studies from epidemiology and telecommunications that illustrate how the tool works in 'real world' data mining projects. The book would also be of interest to final year undergraduates or post-graduate students looking at: databases, algorithms, artificial intelligence and information systems particularly with regard to uncertainty and quality assessment.
The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen
This book provides knowledge into the intelligence and security areas of smart-city paradigms. It focuses on connected computing devices, mechanical and digital machines, objects, and/or people that are provided with unique identifiers. The authors discuss the ability to transmit data over a wireless network without requiring human-to-human or human-to-computer interaction via secure/intelligent methods. The authors also provide a strong foundation for researchers to advance further in the assessment domain of these topics in the IoT era. The aim of this book is hence to focus on both the design and implementation aspects of the intelligence and security approaches in smart city applications that are enabled and supported by the IoT paradigms. Presents research related to cognitive computing and secured telecommunication paradigms; Discusses development of intelligent outdoor monitoring systems via wireless sensing technologies; With contributions from researchers, scientists, engineers and practitioners in telecommunication and smart cities.
This book consists of an anthology of writings. The aim is to honour Marco to celebrate the 35th year of his academic career . The book consists of a collection of selected opinions in the field of IS. Some themes are: IT and Information Systems organizational impacts, Systems development, Business process management, Business organization, e-government, social impact of IT.
For undergraduate database management students or business professionals Here's practical help for understanding, creating, and managing small databases-from two of the world's leading database authorities. Database Concepts by David Kroenke and David Auer gives undergraduate database management students and business professionals alike a firm understanding of the concepts behind the software, using Access 2013 to illustrate the concepts and techniques. Three projects run throughout the text, to show students how to apply the concepts to real-life business situations. The text provides flexibility for choosing the software instructors want to use in class; allows students to work with new, complete databases, including Wedgewood Pacific Corporation, Heather Sweeney Designs, and Wallingford Motors; and includes coverage for some of the latest information on databases available.
This proceedings volume introduces recent work on the storage, retrieval and visualization of spatial Big Data, data-intensive geospatial computing and related data quality issues. Further, it addresses traditional topics such as multi-scale spatial data representations, knowledge discovery, space-time modeling, and geological applications. Spatial analysis and data mining are increasingly facing the challenges of Big Data as more and more types of crowd sourcing spatial data are used in GIScience, such as movement trajectories, cellular phone calls, and social networks. In order to effectively manage these massive data collections, new methods and algorithms are called for. The book highlights state-of-the-art advances in the handling and application of spatial data, especially spatial Big Data, offering a cutting-edge reference guide for graduate students, researchers and practitioners in the field of GIScience.
Implementation of Smart Healthcare Systems using AI, IoT, and Blockchain provides imperative research on the development of data fusion and analytics for healthcare and their implementation into current issues in a real-time environment. While highlighting IoT, bio-inspired computing, big data, and evolutionary programming, the book explores various concepts and theories of data fusion, IoT, and Big Data Analytics. It also investigates the challenges and methodologies required to integrate data from multiple heterogeneous sources, analytical platforms in healthcare sectors. This book is unique in the way that it provides useful insights into the implementation of a smart and intelligent healthcare system in a post-Covid-19 world using enabling technologies like Artificial Intelligence, Internet of Things, and blockchain in providing transparent, faster, secure and privacy preserved healthcare ecosystem for the masses.
The Turn analyzes the research of information seeking and retrieval (IS&R) and proposes a new direction of integrating research in these two areas: the fields should turn off their separate and narrow paths and construct a new avenue of research. An essential direction for this avenue is context as given in the subtitle Integration of Information Seeking and Retrieval in Context. Other essential themes in the book include: IS&R research models, frameworks and theories; search and works tasks and situations in context; interaction between humans and machines; information acquisition, relevance and information use; research design and methodology based on a structured set of explicit variables - all set into the holistic cognitive approach. The present monograph invites the reader into a construction project - there is much research to do for a contextual understanding of IS&R. The Turn represents a wide-ranging perspective of IS&R by providing a novel unique research framework, covering both individual and social aspects of information behavior, including the generation, searching, retrieval and use of information. Regarding traditional laboratory information retrieval research, the monograph proposes the extension of research toward actors, search and work tasks, IR interaction and utility of information. Regarding traditional information seeking research, it proposes the extension toward information access technology and work task contexts. The Turn is the first synthesis of research in the broad area of IS&R ranging from systems oriented laboratory IR research to social science oriented information seeking studies.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.
Text mining applications have experienced tremendous advances because of web 2.0 and social networking applications. Recent advances in hardware and software technology have lead to a number of unique scenarios where text mining algorithms are learned. Mining Text Data introduces an important niche in the text analytics field, and is an edited volume contributed by leading international researchers and practitioners focused on social networks & data mining. This book contains a wide swath in topics across social networks & data mining. Each chapter contains a comprehensive survey including the key research content on the topic, and the future directions of research in the field. There is a special focus on Text Embedded with Heterogeneous and Multimedia Data which makes the mining process much more challenging. A number of methods have been designed such as transfer learning and cross-lingual mining for such cases. Mining Text Data simplifies the content, so that advanced-level students, practitioners and researchers in computer science can benefit from this book. Academic and corporate libraries, as well as ACM, IEEE, and Management Science focused on information security, electronic commerce, databases, data mining, machine learning, and statistics are the primary buyers for this reference book. |
![]() ![]() You may like...
Evaluating Websites and Web Services
Denis Yannacopoulos, Panagiotis Manolitzas, …
Hardcover
R5,871
Discovery Miles 58 710
Qualitative Methodologies in…
Malgorzata Ciesielska, Dariusz Jemielniak
Hardcover
R3,894
Discovery Miles 38 940
Querying XML - XQuery, XPath, and…
Jim Melton, Stephen Buxton
Paperback
R1,568
Discovery Miles 15 680
A Deep Dive into NoSQL Databases: The…
Pethuru Raj, Ganesh Chandra Deka
Hardcover
R4,483
Discovery Miles 44 830
Internet of Medical Things for Smart…
Chinmay Chakraborty, Amit Banerjee, …
Hardcover
R5,124
Discovery Miles 51 240
Evolutionary Computing and Mobile…
V. Suma, Noureddine Bouhmala, …
Hardcover
R5,823
Discovery Miles 58 230
|