![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.
This book exemplifies how smart buildings have a crucial role to play for the future of energy. The book investigates what already exists in regards to technologies, approaches and solutions both with a scientific and technological point of view. The authors cover solutions for mirroring and tracing human activities, optimal strategies to configure home settings, and generating explanations and persuasive dashboards to get occupants better committed in their home energy managements. Solutions are adapted from the fields of Internet of Things, physical modeling, optimization, machine learning and applied artificial intelligence. Practical applications are given throughout.
Statistical Mining and Data Visualization in Atmospheric Sciences brings together in one place important contributions and up-to-date research results in this fast moving area. Statistical Mining and Data Visualization in Atmospheric Sciences serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical systems, and the Internet of things which is expected to have a tremendous impact on our daily lives. It contains a total of thirteen peer-reviewed and edited chapters. This book covers topics such as context-aware cyber-physical systems, sustainable cloud computing, fog computing, and cloud monitoring; both the theoretical and practical aspects belonging to these topics are discussed. All the chapters also discuss open research challenges in the areas mentioned above. Finally, the handbook presents three use cases regarding healthcare, smart buildings and disaster management to assist the audience in understanding how to develop next-generation IoT- and cloud-enabled cyber-physical systems. This timely handbook is edited for students, researchers, as well as professionals who are interested in the rapidly growing fields of cloud computing, cyber-physical systems, and the Internet of things.
Knowledge Base Systems are an integration of conventional database systems with Artificial Intelligence techniques. They provide inference capabilities to the database system by encapsulating the knowledge of the application domain within the database. Knowledge is the most valuable of all corporate resources that must be captured, stored, re-used and continuously improved, in much the same way as database systems were important in the previous decade. Flexible, extensible, and yet efficient Knowledge Base Systems are needed to capture the increasing demand for knowledge-based applications which will become a significant market in the next decade. Knowledge can be expressed in many static and dynamic forms; the most prominent being domain objects, their relationships, and their rules of evolution and transformation. It is important to express and seamlessly use all types of knowledge in a single Knowledge Base System. Parallel, Object-Oriented, and Active Knowledge Base Systems presents in detail features that a Knowledge Base System should have in order to fulfill the above requirements. Parallel, Object-Oriented, and Active Knowledge Base Systems covers in detail the following topics: Integration of deductive, production, and active rules in sequential database systems. Integration and inter-operation of multiple rule types into the same Knowledge Base System. Parallel rule matching and execution, for deductive, production, and active rules, in parallel Export, Knowledge Base, and Database Systems. In-depth description of a Parallel, Object-Oriented, and Active Knowledge Base System that integrates all rule paradigms into a single database system without hindering performance. Parallel, Object-Oriented, and Active Knowledge Base Systems is intended as a graduate-level text for a course on Knowledge Base Systems and as a reference for researchers and practitioners in the areas of database systems, knowledge base systems and Artificial Intelligence.
This book explains network science and its applications in data analytics for critical infrastructures, engineered systems, and knowledge acquisition. Each chapter describes step-by-step processes of how network science enables and automates data analytics through examples. The book not only dissects modeling techniques and analytical results but also explores the intrinsic development of these models and analyses. This unique approach bridges the gap between theory and practice and channels' managerial and problem-solving skills. Engineers, researchers, and managers would benefit from the extensive theoretical background and practical examples discussed in this book. Advanced undergraduate students and graduate students in mathematics, statistics, engineering, business, public health, and social science may use this book as a one-semester textbook or a reference book. Readers who are more interested in applications may skip Chapter 1 and peruse through the rest of the book with ease.
Data has increased due to the growing use of web applications and communication devices. It is necessary to develop new techniques of managing data in order to ensure adequate usage. Modern Technologies for Big Data Classification and Clustering is an essential reference source for the latest scholarly research on handling large data sets with conventional data mining and provide information about the new technologies developed for the management of large data. Featuring coverage on a broad range of topics such as text and web data analytics, risk analysis, and opinion mining, this publication is ideally designed for professionals, researchers, and students seeking current research on various concepts of big data analytics. Topics Covered: The many academic areas covered in this publication include, but are not limited to: Data visualization Distributed Computing Systems Opinion Mining Privacy and security Risk analysis Social Network Analysis Text Data Analytics Web Data Analytics
This contributed volume discusses essential topics and the fundamentals for Big Data Emergency Management and primarily focusses on the application of Big Data for Emergency Management. It walks the reader through the state of the art, in different facets of the big disaster data field. This includes many elements that are important for these technologies to have real-world impact. This book brings together different computational techniques from: machine learning, communication network analysis, natural language processing, knowledge graphs, data mining, and information visualization, aiming at methods that are typically used for processing big emergency data. This book also provides authoritative insights and highlights valuable lessons by distinguished authors, who are leaders in this field. Emergencies are severe, large-scale, non-routine events that disrupt the normal functioning of a community or a society, causing widespread and overwhelming losses and impacts. Emergency Management is the process of planning and taking actions to minimize the social and physical impact of emergencies and reduces the community's vulnerability to the consequences of emergencies. Information exchange before, during and after the disaster periods can greatly reduce the losses caused by the emergency. This allows people to make better use of the available resources, such as relief materials and medical supplies. It also provides a channel through which reports on casualties and losses in each affected area, can be delivered expeditiously. Big Data-Driven Emergency Management refers to applying advanced data collection and analysis technologies to achieve more effective and responsive decision-making during emergencies. Researchers, engineers and computer scientists working in Big Data Emergency Management, who need to deal with large and complex sets of data will want to purchase this book. Advanced-level students interested in data-driven emergency/crisis/disaster management will also want to purchase this book as a study guide.
This book provides an in-depth analysis of the current evolutionary clustering techniques. It discusses the most highly regarded methods for data clustering. The book provides literature reviews about single objective and multi-objective evolutionary clustering algorithms. In addition, the book provides a comprehensive review of the fitness functions and evaluation measures that are used in most of evolutionary clustering algorithms. Furthermore, it provides a conceptual analysis including definition, validation and quality measures, applications, and implementations for data clustering using classical and modern nature-inspired techniques. It features a range of proven and recent nature-inspired algorithms used to data clustering, including particle swarm optimization, ant colony optimization, grey wolf optimizer, salp swarm algorithm, multi-verse optimizer, Harris hawks optimization, beta-hill climbing optimization. The book also covers applications of evolutionary data clustering in diverse fields such as image segmentation, medical applications, and pavement infrastructure asset management.
Data Quality provides an exposA(c) of research and practice in the data quality field for technically oriented readers. It is based on the research conducted at the MIT Total Data Quality Management (TDQM) program and work from other leading research institutions. This book is intended primarily for researchers, practitioners, educators and graduate students in the fields of Computer Science, Information Technology, and other interdisciplinary areas. It forms a theoretical foundation that is both rigorous and relevant for dealing with advanced issues related to data quality. Written with the goal to provide an overview of the cumulated research results from the MIT TDQM research perspective as it relates to database research, this book is an excellent introduction to Ph.D. who wish to further pursue their research in the data quality area. It is also an excellent theoretical introduction to IT professionals who wish to gain insight into theoretical results in the technically-oriented data quality area, and apply some of the key concepts to their practice.
This book constitutes the refereed proceedings of the 20th International TRIZ Future Conference on Automated Invention for Smart Industries, TFC 2020, held in Cluj-Napoca, Romania, in October 2020 and sponsored by IFIP WG 5.4. The conference was held virtually.The 34 full papers presented were carefully reviewed and selected from 91 submissions. They are organized in the following thematic sections: computing TRIZ; education and pedagogy; sustainable development; tools and techniques of TRIZ for enhancing design; TRIZ and system engineering; TRIZ and complexity; and cross-fertilization of TRIZ for innovation management.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.
This book is a truly comprehensive, timely, and very much needed treatise on the conceptualization of analysis, and design of contactless & multimodal sensor-based human activities, behavior understanding & intervention. From an interaction design perspective, the book provides views and methods that allow for more safe, trustworthy, efficient, and more natural interaction with technology that will be embedded in our daily living environments. The chapters in this book cover sufficient grounds and depth in related challenges and advances in sensing, signal processing, computer vision, and mathematical modeling. It covers multi-domain applications, including surveillance and elderly care that will be an asset to entry-level and practicing engineers and scientists.(See inside for the reviews from top experts)
This book includes high-quality research papers presented at 20th International Conference on Informatics in Economy (IE 2021), which is held in Bucharest, Romania during May 2021. The book covers research results in business informatics and related computer science topics, such as IoT, mobile-embedded and multimedia solutions, e-society, enterprise and business solutions, databases and big data, artificial intelligence, data-mining and machine learning, quantitative economics.
This is the second edition of the comprehensive treatment of statistical inference using permutation techniques. It makes available to practitioners a variety of useful and powerful data analytic tools that rely on very few distributional assumptions. Although many of these procedures have appeared in journal articles, they are not readily available to practitioners. This new and updated edition places increased emphasis on the use of alternative permutation statistical tests based on metric Euclidean distance functions that have excellent robustness characteristics. These alternative permutation techniques provide many powerful multivariate tests including multivariate multiple regression analyses.
The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020. The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product
This book establishes constructivist, interpretivist, and linguistic approaches based on conventions about the nature of qualitative and text data, the author's influence on text interpretation, and the validity checks used to justify text interpretations. Vast quantities of text and qualitative data in organizations often go unexplored. Text analytics outlined in this book allow readers to understand the process of converting unstructured text data into meaningful data for analysis in order to measure employee opinions, feedback, and reviews through sentiment analysis to support fact-based decision making. The methods involve using NVivo and RapidMiner software to perform lexical analysis, categorization, clustering, pattern recognition, tagging, annotation, memo creation, information extraction, association analysis, and visualization. The methodological approach in the book uses innovation theory as a sensitizing concept to lay the foundation for the analysis of research data, suggesting approaches for empirical exploration of organizational learning, knowledge management, and innovation practices amongst geographically dispersed individuals and team members. Based on data obtained from a private educational organization that has offices dispersed across Asia through focus group discussions and interviews on these topics, the author highlights the need for integrating organizational learning, knowledge management, and innovation to improve organizational performance, exploring perspectives on collective relationships and networks, organizational characteristics and structures, and tacit and overt values which influence such innovation initiatives. In the process, the author puts forward a new theory which is built on three themes: relationship and networks, knowledge sharing mechanisms, and the role of social cognitive schema that facilitate emergent learning, knowledge management, and innovation.
This book covers a fast-growing topic in great depth and focuses on the technologies and applications of probabilistic data management. It aims to provide a single account of current studies in probabilistic data management. The objective of the book is to provide the state of the art information to researchers, practitioners, and graduate students of information technology of intelligent information processing, and at the same time serving the information technology professional faced with non-traditional applications that make the application of conventional approaches difficult or impossible.
This book explores the ways in which artists use technology to create different perceptions of time in art in order to reflect on contemporary relationships to technology. By considering the links between technology, movement and contemporary art, the book explores changing relationship between temporality in art, art history, media art theory, modernity, contemporary art, and digital art. This book challenges the dominant view that kinetic art is an antiquated artistic experiment and considers the changing perception of kinetic art by focusing on exhibitions and institutions that have recently challenged the notion of kinetic art as a marginalised and forgotten artistic experiment with mechanical media. This is achieved by deconstructing Frank Popper's argument that kinetic art is a precursor to subsequent explorations in the intersections between art, science and technology. Rather than pandering to the prevailing art historical assumption that kinetic sculpture is merely a precursor to art in a digital culture, the book proposes that perhaps kineticism succeeded too well, where movement has become a ubiquitous element of the aesthetic of contemporary art. If, as Boris Groys has recently suggested, installation has become the dominant mode of art in the contemporary age, then movement in real time with the viewer is used to aestheticise and explore the facets of our peculiar time.
A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of which are distributed and stored across a network of participating computer systems. With the advent of cryptocurrencies and NFTs, which are entirely predicated on blockchain technology, and the integration of blockchain architecture into online and high-security networked spaces more broadly, there has never been a greater need for software, network, and financial professionals to be familiar with this technology. Blockchain for Real World Applications provides a practical discussion of this subject and the key characteristics of blockchain architecture. It describes how blockchain technology gains its essential irreversibility and persistency and discusses how this technology can be applied to the information and security needs of different kinds of businesses. It offers a comprehensive overview of the ever-growing blockchain ecosystem and its burgeoning role in a connected world. Blockchain for Real World Applications readers will also find: Treatment of real-world applications such as ID management, encryption, network security, and more Discussion of the UID (Unique Identifier) and its benefits and drawbacks Detailed analysis of privacy issues such as unauthorized access and their possible blockchain-based solutions Blockchain for Real World Applications is a must for professionals in high-security industries, as well as for researchers in blockchain technologies and related areas.
This book provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and reports four novel DCNs, including a switch-centric DCN, a modular DCN, a wireless DCN, and a hybrid DCN. Furthermore another important factor in DCN targets at managing and optimizing the network activity at the level of transfers to aggregate correlated data flows and thus directly to lower down the network traffic resulting from such data transfers. In particular, the book reports the in-network aggregation of incast transfer, shuffle transfer, uncertain incast transfer, and the cooperative scheduling of uncertain multicast transfer. |
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Applied Big Data Analytics and Its Role…
Peng Zhao, Xin Wang, …
Hardcover
R6,648
Discovery Miles 66 480
|