![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.
Knowledge management captures the right knowledge, to the right user, who in turn uses the knowledge to improve organizational or individual performance to increase effectiveness. ""Strategies for Knowledge Management Success: Exploring Organizational Efficacy"" collects and presents key research articles focused on identifying, defining, and measuring accomplishment in knowledge management. A significant collection of the latest international findings within the field, this book provides a strong reference for students, researchers, and practitioners involved with organizational knowledge management.
This book presents a state-of-the-art review of current perspectives in information systems security in view of the information society of the 21st century. It will be essential reading for information technology security specialists, computer professionals, EDP managers, EDP auditors, managers, researchers and students working on the subject.
This edited book covers ongoing research in both theory and practical applications of using deep learning for social media data. Social networking platforms are overwhelmed by different contents, and their huge amounts of data have enormous potential to influence business, politics, security, planning and other social aspects. Recently, deep learning techniques have had many successful applications in the AI field. The research presented in this book emerges from the conviction that there is still much progress to be made toward exploiting deep learning in the context of social media data analytics. It includes fifteen chapters, organized into four sections that report on original research in network structure analysis, social media text analysis, user behaviour analysis and social media security analysis. This work could serve as a good reference for researchers, as well as a compilation of innovative ideas and solutions for practitioners interested in applying deep learning techniques to social media data analytics.
In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity. Examples of important applications of RTDBS include stock trading systems, navigation systems and computer integrated manufacturing. Different transaction scheduling algorithms and concurrency control protocols have been proposed to satisfy transaction timing data temporal constraints. Other design issues important to the performance of a RTDBS are buffer management, index accesses and I/O scheduling. Real-Time Database Systems: Architecture and Techniques summarizes important research results in this area, and serves as an excellent reference for practitioners, researchers and educators of real-time systems and database systems.
Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated guide to NodeXL, the open-source social network analysis (SNA) plug-in for use with Excel. The book analyzes social media, provides a NodeXL tutorial, and presents network analysis case studies, all of which are revised to reflect the latest developments. Sections cover history and concepts, mapping and modeling, the detailed operation of NodeXL, and case studies, including e-mail, Twitter, Facebook, Flickr and YouTube. In addition, there are descriptions of each system and types of analysis for identifying people, documents, groups and events. This book is perfect for use as a course text in social network analysis or as a guide for practicing NodeXL users.
This book provides conceptual understanding of machine learning algorithms though supervised, unsupervised, and advanced learning techniques. The book consists of four parts: foundation, supervised learning, unsupervised learning, and advanced learning. The first part provides the fundamental materials, background, and simple machine learning algorithms, as the preparation for studying machine learning algorithms. The second and the third parts provide understanding of the supervised learning algorithms and the unsupervised learning algorithms as the core parts. The last part provides advanced machine learning algorithms: ensemble learning, semi-supervised learning, temporal learning, and reinforced learning. Provides comprehensive coverage of both learning algorithms: supervised and unsupervised learning; Outlines the computation paradigm for solving classification, regression, and clustering; Features essential techniques for building the a new generation of machine learning.
People have a hard time communicating, and also have a hard time
finding business knowledge in the environment. With the
sophistication of search technologies like Google, business people
expect to be able to get their questions answered about the
business just like you can do an internet search. The truth is,
knowledge management is primitive today, and it is due to the fact
that we have poor business metadata management.
This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.
A statisticallanguage model, or more simply a language model, is a prob abilistic mechanism for generating text. Such adefinition is general enough to include an endless variety of schemes. However, a distinction should be made between generative models, which can in principle be used to synthesize artificial text, and discriminative techniques to classify text into predefined cat egories. The first statisticallanguage modeler was Claude Shannon. In exploring the application of his newly founded theory of information to human language, Shannon considered language as a statistical source, and measured how weH simple n-gram models predicted or, equivalently, compressed natural text. To do this, he estimated the entropy of English through experiments with human subjects, and also estimated the cross-entropy of the n-gram models on natural 1 text. The ability of language models to be quantitatively evaluated in tbis way is one of their important virtues. Of course, estimating the true entropy of language is an elusive goal, aiming at many moving targets, since language is so varied and evolves so quickly. Yet fifty years after Shannon's study, language models remain, by all measures, far from the Shannon entropy liInit in terms of their predictive power. However, tbis has not kept them from being useful for a variety of text processing tasks, and moreover can be viewed as encouragement that there is still great room for improvement in statisticallanguage modeling."
This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
Pattern recognition in data is a well known classical problem that falls under the ambit of data analysis. As we need to handle different data, the nature of patterns, their recognition and the types of data analyses are bound to change. Since the number of data collection channels increases in the recent time and becomes more diversified, many real-world data mining tasks can easily acquire multiple databases from various sources. In these cases, data mining becomes more challenging for several essential reasons. We may encounter sensitive data originating from different sources - those cannot be amalgamated. Even if we are allowed to place different data together, we are certainly not able to analyze them when local identities of patterns are required to be retained. Thus, pattern recognition in multiple databases gives rise to a suite of new, challenging problems different from those encountered before. Association rule mining, global pattern discovery and mining patterns of select items provide different patterns discovery techniques in multiple data sources. Some interesting item-based data analyses are also covered in this book. Interesting patterns, such as exceptional patterns, icebergs and periodic patterns have been recently reported. The book presents a thorough influence analysis between items in time-stamped databases. The recent research on mining multiple related databases is covered while some previous contributions to the area are highlighted and contrasted with the most recent developments.
Continuous Media Databases brings together in one place important contributions and up-to-date research results in this fast moving area. Continuous Media Databases serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This BriefBook is a much extended glossary or a much condensed handbook, depending on the way one looks at it. In encyclopedic format, it covers subjects in statistics, computing, analysis, and related fields, resulting in a book that is both an introduction and a reference for scientists and engineers, especially experimental physicists dealing with data analysis.
This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.
This book provides an overview of how comparable corpora can be used to overcome the lack of parallel resources when building machine translation systems for under-resourced languages and domains. It presents a wealth of methods and open tools for building comparable corpora from the Web, evaluating comparability and extracting parallel data that can be used for the machine translation task. It is divided into several sections, each covering a specific task such as building, processing, and using comparable corpora, focusing particularly on under-resourced language pairs and domains. The book is intended for anyone interested in data-driven machine translation for under-resourced languages and domains, especially for developers of machine translation systems, computational linguists and language workers. It offers a valuable resource for specialists and students in natural language processing, machine translation, corpus linguistics and computer-assisted translation, and promotes the broader use of comparable corpora in natural language processing and computational linguistics.
This book highlights new trends and challenges in research on agents and the new digital and knowledge economy. It includes papers on business process management, agent-based modeling and simulation, and anthropic-oriented computing that were originally presented at the 15th International KES Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2021), being held as a Virtual Conference in June 14-16, 2021. The respective papers cover topics such as software agents, multi-agent systems, agent modeling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computer embedded systems, and nature-inspired manufacturing, all of which contribute to the modern digital economy.
This book aims to highlight the latest achievements in the use of AI and multimodal artificial intelligence in biomedicine and healthcare. Multimodal AI is a relatively new concept in AI, in which different types of data (e.g. text, image, video, audio, and numerical data) are collected, integrated, and processed through a series of intelligence processing algorithms to improve performance. The edited volume contains selected papers presented at the 2022 Health Intelligence workshop and the associated Data Hackathon/Challenge, co-located with the Thirty-Sixth Association for the Advancement of Artificial Intelligence (AAAI) conference, and presents an overview of the issues, challenges, and potentials in the field, along with new research results. This book provides information for researchers, students, industry professionals, clinicians, and public health agencies interested in the applications of AI and Multimodal AI in public health and medicine.
This open access book covers the use of data science, including advanced machine learning, big data analytics, Semantic Web technologies, natural language processing, social media analysis, time series analysis, among others, for applications in economics and finance. In addition, it shows some successful applications of advanced data science solutions used to extract new knowledge from data in order to improve economic forecasting models. The book starts with an introduction on the use of data science technologies in economics and finance and is followed by thirteen chapters showing success stories of the application of specific data science methodologies, touching on particular topics related to novel big data sources and technologies for economic analysis (e.g. social media and news); big data models leveraging on supervised/unsupervised (deep) machine learning; natural language processing to build economic and financial indicators; and forecasting and nowcasting of economic variables through time series analysis. This book is relevant to all stakeholders involved in digital and data-intensive research in economics and finance, helping them to understand the main opportunities and challenges, become familiar with the latest methodological findings, and learn how to use and evaluate the performances of novel tools and frameworks. It primarily targets data scientists and business analysts exploiting data science technologies, and it will also be a useful resource to research students in disciplines and courses related to these topics. Overall, readers will learn modern and effective data science solutions to create tangible innovations for economic and financial applications.
This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines. The approach is based on the idea that advancing the frontier on data science approaches for fake news is an interdisciplinary effort, and that perspectives from domain experts are crucial to shape the next generation of methods and tools. The fake news challenge cuts across a number of data science subfields such as graph analytics, mining of spatio-temporal data, information retrieval, natural language processing, computer vision and image processing, to name a few. This book will present a number of tutorial-style surveys that summarize a range of recent work in the field. In a unique feature, this book includes perspective notes from experts in disciplines such as linguistics, anthropology, medicine and politics that will help to shape the next generation of data science research in fake news. The main target groups of this book are academic and industrial researchers working in the area of data science, and with interests in devising and applying data science technologies for fake news detection. For young researchers such as PhD students, a review of data science work on fake news is provided, equipping them with enough know-how to start engaging in research within the area. For experienced researchers, the detailed descriptions of approaches will enable them to take seasoned choices in identifying promising directions for future research.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2021), held at Hanoi in Vietnam. It includes peer-reviewed high-quality articles on intelligent system and networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include-foundations of computer science; computational intelligence language and speech processing; software engineering software development methods; wireless communications signal processing for communications; electronics track IoT and sensor systems embedded systems; etc.
This book constitutes the refereed post-conference proceedings of the Fifth IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2022, held virtually, in March 2022. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers cover topics such as computational intelligence for text analysis; computational intelligence for image and video analysis; blockchain and data science.
This book is a collection of representative and novel works in the field of data mining, knowledge discovery, clustering and classification. Discussing both theoretical and practical aspects of "Knowledge Discovery and Management" (KDM), it is intended for researchers interested in these fields, including PhD and MSc students, and researchers from public or private laboratories. The contributions included are extended and reworked versions of six of the best papers that were originally presented in French at the EGC'2016 conference held in Reims (France) in January 2016. This was the 16th edition of this successful conference, which takes place each year, and also featured workshops and other events with the aim of promoting exchanges between researchers and companies concerned with KDM and its applications in business, administration, industry and public organizations. For more details about the EGC society, please consult egc.asso.fr.
The last two decades have seen a wave of exciting new developments in the theory of algorithmic randomness and its applications to other areas of mathematics. This volume surveys much of the recent work that has not been included in published volumes until now. It contains a range of articles on algorithmic randomness and its interactions with closely related topics such as computability theory and computational complexity, as well as wider applications in areas of mathematics including analysis, probability, and ergodic theory. In addition to being an indispensable reference for researchers in algorithmic randomness, the unified view of the theory presented here makes this an excellent entry point for graduate students and other newcomers to the field.
This volume offers the reader a systematic and throughout account of branches of logic instrumental for computer science, data science and artificial intelligence. Addressed in it are propositional, predicate, modal, epistemic, dynamic, temporal logics as well as applicable in data science many-valued logics and logics of concepts (rough logics). It offers a look into second-order logics and approximate logics of parts. The book concludes with appendices on set theory, algebraic structures, computability, complexity, MV-algebras and transition systems, automata and formal grammars. By this composition of the text, the reader obtains a self-contained exposition that can serve as the textbook on logics and relevant disciplines as well as a reference text. |
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
R1,024
Discovery Miles 10 240
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, …
Hardcover
R6,170
Discovery Miles 61 700
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,276
Discovery Miles 92 760
|