![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This book presents cutting edge research on the new ethical challenges posed by biomedical Big Data technologies and practices. 'Biomedical Big Data' refers to the analysis of aggregated, very large datasets to improve medical knowledge and clinical care. The book describes the ethical problems posed by aggregation of biomedical datasets and re-use/re-purposing of data, in areas such as privacy, consent, professionalism, power relationships, and ethical governance of Big Data platforms. Approaches and methods are discussed that can be used to address these problems to achieve the appropriate balance between the social goods of biomedical Big Data research and the safety and privacy of individuals. Seventeen original contributions analyse the ethical, social and related policy implications of the analysis and curation of biomedical Big Data, written by leading experts in the areas of biomedical research, medical and technology ethics, privacy, governance and data protection. The book advances our understanding of the ethical conundrums posed by biomedical Big Data, and shows how practitioners and policy-makers can address these issues going forward.
This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.
This book aims to reflect how journalism has changed in recent years through different perspectives concerning the impact of technology, the reconfiguration of the media ecosystem, the transformation of business models, production and profession, as well as the influence of digital storytelling, mobile devices and participation within the context of glocal information. Journalism innovation implies modifications in techniques, technologies, processes, languages, formats and devices intended to enhance the production and consumption of the journalistic information. This book becomes an interesting resource for researchers and professionals working in news media to identify the best practices and discover new types of information flows in a rapidly changing news media landscape.
Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.
Traditionally, scientific fields have defined boundaries, and scientists work on research problems within those boundaries. However, from time to time those boundaries get shifted or blurred to evolve new fields. For instance, the original goal of computer vision was to understand a single image of a scene, by identifying objects, their structure, and spatial arrangements. This has been referred to as image understanding. Recently, computer vision has gradually been making the transition away from understanding single images to analyzing image sequences, or video Video understanding deals with understanding of video understanding. sequences, e.g., recognition of gestures, activities, facial expressions, etc. The main shift in the classic paradigm has been from the recognition of static objects in the scene to motion-based recognition of actions and events. Video understanding has overlapping research problems with other fields, therefore blurring the fixed boundaries. Computer graphics, image processing, and video databases have obvi ous overlap with computer vision. The main goal of computer graphics is to generate and animate realistic looking images, and videos. Re searchers in computer graphics are increasingly employing techniques from computer vision to generate the synthetic imagery. A good exam pIe of this is image-based rendering and modeling techniques, in which geometry, appearance, and lighting is derived from real images using computer vision techniques. Here the shift is from synthesis to analy sis followed by synthesis. Image processing has always overlapped with computer vision because they both inherently work directly with images."
The process of developing predictive models includes many stages. Most resources focus on the modeling algorithms but neglect other critical aspects of the modeling process. This book describes techniques for finding the best representations of predictors for modeling and for nding the best subset of predictors for improving model performance. A variety of example data sets are used to illustrate the techniques along with R programs for reproducing the results.
Information Organization and Databases: Foundations of Data Organization provides recent developments of information organization technologies that have become crucial not only for data mining applications and information visualization, but also for treatment of semistructured data, spatio-temporal data and multimedia data that are not necessarily stored in conventional DBMSs. Information Organization and Databases: Foundations of Data Organization presents: semistructured data addressing XML, query languages and integrity constraints, focusing on advanced technologies for organizing web data for effective retrieval; multimedia database organization emphasizing video data organization and data structures for similarity retrieval; technologies for data mining and data warehousing; index organization and efficient query processing issues; spatial data access and indexing; organizing and retrieval of WWW and hypermedia. Information Organization and Databases: Foundations of Data Organization is a resource for database practitioners, database researchers, designers and administrators of multimedia information systems, and graduate-level students in the area of information retrieval and/or databases wishing to keep abreast of advances in the information organization technologies.
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able to access the information they desire without having to search through a mountain of unrelated data, so algorithms and methods for effectively seeking out pertinent information are of critical importance. Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding evaluates some of the existing approaches to information retrieval and summarization of digital documents, as well as current research and future developments. This book serves as a sounding board for students, educators, researchers, and practitioners of information technology, advancing the ongoing discussion of communication in the digital age.
Data engineering has grown rapidly in the past decade, leaving many software engineers, data scientists, and analysts looking for a comprehensive view of this practice. With this practical book, you will learn how to plan and build systems to serve the needs of your organization and customers by evaluating the best technologies available in the framework of the data engineering lifecycle. Authors Joe Reis and Matt Housley walk you through the data engineering lifecycle and show you how to stitch together a variety of cloud technologies to serve the needs of downstream data consumers. You will understand how to apply the concepts of data generation, ingestion, orchestration, transformation, storage, governance, and deployment that are critical in any data environment regardless of the underlying technology. This book will help you: Assess data engineering problems using an end-to-end data framework of best practices Cut through marketing hype when choosing data technologies, architecture, and processes Use the data engineering lifecycle to design and build a robust architecture Incorporate data governance and security across the data engineering lifecycle
This volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled 'Optimization and Data Analysis in Biomedical Informatics' was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks presented at the workshop, and additional invited chapters were chosen from world's leading experts. In this publication, the authors share their expertise in the form of state-of-the-art research and review chapters, bringing together researchers from different disciplines and emphasizing the value of mathematical methods in the areas of clinical sciences. This work is targeted to applied mathematicians, computer scientists, industrial engineers, and clinical scientists who are interested in exploring emerging and fascinating interdisciplinary topics of research. It is designed to further stimulate and enhance fruitful collaborations between scientists from different disciplines.
Document Computing: Technologies for Managing Electronic Document Collections discusses the important aspects of document computing and recommends technologies and techniques for document management, with an emphasis on the processes that are appropriate when computers are used to create, access, and publish documents. This book includes descriptions of the nature of documents, their components and structure, and how they can be represented; examines how documents are used and controlled; explores the issues and factors affecting design and implementation of a document management strategy; and gives a detailed case study. The analysis and recommendations are grounded in the findings of the latest research. Document Computing: Technologies for Managing Electronic Document Collections brings together concepts, research, and practice from diverse areas including document computing, information retrieval, librarianship, records management, and business process re-engineering. It will be of value to anyone working in these areas, whether as a researcher, a developer, or a user. Document Computing: Technologies for Managing Electronic Document Collections can be used for graduate classes in document computing and related fields, by developers and integrators of document management systems and document management applications, and by anyone wishing to understand the processes of document management.
This book presents a unified collection of concepts, tools, and techniques that constitute the most important technology available today for the design and implementation of information systems. The framework adopted for this integration goal is the one offered by the relational model of data, its applica tions, and implementations in multiuser and distributed environments. The topics presented in the book include conceptual modeling of application environments using the relational model, formal properties of that model, and tools such as relational languages which go with it, techniques for the logical and physical design of relational database systems and their imple mentations. The book attempts to develop an integrated methodology for addressing all these issues on the basis of the relational approach and various research and practical developments related to that approach. This book is the only one available today that presents such an inte gration. The diversity of approaches to data models, to logical and physical database design, to database application programming, and to use and imple mentation of database systems calls for a common framework for all of them. It has become difficult to study modern database technology with out such a unified approach to a diversity of results developed during the vigorous growth of the database area in recent years, let alone to teach a course on the subject."
This edited volume gathers the proceedings of the Symposium GIS Ostrava 2016, the Rise of Big Spatial Data, held at the Technical University of Ostrava, Czech Republic, March 16-18, 2016. Combining theoretical papers and applications by authors from around the globe, it summarises the latest research findings in the area of big spatial data and key problems related to its utilisation. Welcome to dawn of the big data era: though it's in sight, it isn't quite here yet. Big spatial data is characterised by three main features: volume beyond the limit of usual geo-processing, velocity higher than that available using conventional processes, and variety, combining more diverse geodata sources than usual. The popular term denotes a situation in which one or more of these key properties reaches a point at which traditional methods for geodata collection, storage, processing, control, analysis, modelling, validation and visualisation fail to provide effective solutions. >Entering the era of big spatial data calls for finding solutions that address all "small data" issues that soon create "big data" troubles. Resilience for big spatial data means solving the heterogeneity of spatial data sources (in topics, purpose, completeness, guarantee, licensing, coverage etc.), large volumes (from gigabytes to terabytes and more), undue complexity of geo-applications and systems (i.e. combination of standalone applications with web services, mobile platforms and sensor networks), neglected automation of geodata preparation (i.e. harmonisation, fusion), insufficient control of geodata collection and distribution processes (i.e. scarcity and poor quality of metadata and metadata systems), limited analytical tool capacity (i.e. domination of traditional causal-driven analysis), low visual system performance, inefficient knowledge-discovery techniques (for transformation of vast amounts of information into tiny and essential outputs) and much more. These trends are accelerating as sensors become more ubiquitous around the world.
The first textbook ever to cover multi-relational data mining and inductive logic programming, this book fully explores logical and relational learning. Ideal for graduate students and researchers, it also looks at statistical relational learning.
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first, followed by an account of the RSA cryptographic system and its variants. This book is also suitable as a secondary text for advanced-level students in computer science and mathematics.
The book provides a comprehensive investigation of the performance and problems of the TCP/IP protocol stack, when data is transmitted over GSM, GPRS and UMTS. It gives an introduction to the protocols used for Internet access today, and also the Wireless Application Protocol (WAP). The basics of GSM, GPRS and UMTS are given, which are necessary for understanding the main topic, TCP performance over GSM, GPRS and UMTS. We describe at length the problems that TCP has when operating over a mobile radio link, and what has been proposed to remedy these problems. We derive the optimum TCP packet length for maximum data throughput on wireless networks, analytically and by simulation. Results on the throughput and various other parameters of TCP over mobile networks are given. This book gives valuable advice to network operators and application programmers to maximize data throughput, and which protocols, transmission modes, and coding schemes to use and which to avoid.
These proceedings are aimed at researchers, industry / market operators and students from different backgrounds (scientific, engineering and humanistic) whose work is either focused on or affined to Location Based Services (LBS). It contributes to the following areas: positioning / indoor positioning, smart environments and spatial intelligence, spatiotemporal data acquisition, processing, and analysis, data mining and knowledge discovery, personalization and context-aware adaptation, LBS visualization techniques, novel user interfaces and interaction techniques, smart phone navigation and LBS techniques, three-dimensional visualization in the LBS context, augmented reality in an LBS context, innovative LBS systems and applications, way finding /navigation ( indoor/outdoor), indoor navigation databases, user studies and evaluations, privacy issues in LBS, usability issues in LBS, legal and business aspects of LBS, LBS and Web 2.0, open source solutions and standards, ubiquitous computing, smart cities and seamless positioning.
On various examples ranging from geosciences to environmental sciences, this book explains how to generate an adequate description of uncertainty, how to justify semiheuristic algorithms for processing uncertainty, and how to make these algorithms more computationally efficient. It explains in what sense the existing approach to uncertainty as a combination of random and systematic components is only an approximation, presents a more adequate three-component model with an additional periodic error component, and explains how uncertainty propagation techniques can be extended to this model. The book provides a justification for a practically efficient heuristic technique (based on fuzzy decision-making). It explains how the computational complexity of uncertainty processing can be reduced. The book also shows how to take into account that in real life, the information about uncertainty is often only partially known, and, on several practical examples, explains how to extract the missing information about uncertainty from the available data.
Recently, a new set of software development techniques has become available, collectively termed Aspect-Oriented Software Development (AOSD). This aims to support the modularization of systemic properties (also referred to as crosscutting concerns) and their subsequent composition with the other parts of a system. Rashid focuses on the use of Aspect-Oriented Programming (AOP) techniques to modularize otherwise broadly scoped features in database systems, such as the evolution or the versioning model, to improve their customizability, extensibility and maintainability. He shows how the use of AOP can transform the way we develop, use and maintain database systems. He also discusses how database systems can support AOP by providing a means for the storage and retrieval of aspects. "Aspect-Oriented Database Systems" shows the possible synergy between AOP and database systems, and is of particular interest to researchers, graduate students and software developers in database systems and applications.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.
Information system design and development is of interest and importance to researchers and practitioners, as advances in this discipline impact a number of other related fields and help to guide future research. Theoretical and Practical Advances in Information Systems Development: Emerging Trends and Approaches contains fundamental concepts, emerging theories, and practical applications in database management, systems analysis and design, and software engineering. Contributions present critical findings in information resources management that inform and advance the field.
This book presents advances in matrix and tensor data processing in
the domain of signal, image and information processing. The
theoretical mathematical approaches are discusses in the context of
potential applications in sensor and cognitive systems engineering.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.
1. When I was asked by the editors of this book to write a foreword, I was seized by panic. Obviously, neither I am an expert in Knowledge Representation in Fuzzy Databases nor I could have been beforehand unaware that the book's contributors would be some of the most outstanding researchers in the field. However, Amparo Vila's gentle insistence gradually broke down my initial resistance, and panic then gave way to worry. Which paving stones did I have at my disposal for making an entrance to the book? After thinking about it for some time, I concluded that it would be pretentious on my part to focus on the subjects which are dealt with directly in the contributions presented, and that it would instead be better to confine myself to making some general reflections on knowledge representation given by imprecise information using fuzzy sets; reflections which have been suggested to me by some words in the following articles such as: graded notions, fuzzy objects, uncertainty, fuzzy implications, fuzzy inference, empty intersection, etc.
Designed to offer an accessible set of case studies and analyses of ethical dilemmas in data science. This book will be suitable for technical readers in data science who want to understand diverse ethical approaches to AI. |
![]() ![]() You may like...
Digital Image Processing using SCILAB
Rohit M. Thanki, Ashish M. Kothari
Hardcover
R4,102
Discovery Miles 41 020
Ergodic Theory - Finite and Infinite…
Mariusz Urbanski, Mario Roy, …
Hardcover
R4,765
Discovery Miles 47 650
Fractional-order Modeling of Nuclear…
Vishwesh Vyawahare, Paluri S. V. Nataraj
Hardcover
R2,882
Discovery Miles 28 820
Neuroscience for Designing Green Spaces…
Agnieszka Olszewska-Guizzo
Paperback
R1,055
Discovery Miles 10 550
We Are Still Human - And Work Shouldn't…
Brad Shorkend, Andy Golding
Paperback
![]()
Engineering Characteristics of Arid…
P.G. Fookes, R.H.G. Parry
Hardcover
R7,063
Discovery Miles 70 630
|