|
Books > Computing & IT > Applications of computing > Databases
Technological advancements have led to many beneficial developments
in the electronic world, especially in relation to online commerce.
Unfortunately, these advancements have also created a prime hunting
ground for hackers to obtain financially sensitive information and
deterring these breaches in security has been difficult.
Cryptographic Solutions for Secure Online Banking and Commerce
discusses the challenges of providing security for online
applications and transactions. Highlighting research on digital
signatures, public key infrastructure, encryption algorithms, and
digital certificates, as well as other e-commerce protocols, this
book is an essential reference source for financial planners,
academicians, researchers, advanced-level students, government
officials, managers, and technology developers.
This book presents a comprehensive collection of case studies on
augmented reality and virtual realty (AR/VR) applications in
various industries. Augmented reality and virtual reality are
changing the business landscape, providing opportunities for
businesses to offer unique services and experiences to their
customers. The case studies provided in this volume explore
business uses of the technology across multiple industries such as
healthcare, tourism, hospitality, events, fashion, entertainment,
retail, education and video gaming. The book includes solutions of
different maturities as well as those from startups to large
enterprises thereby providing a thorough view of how augmented
reality and virtual reality can be used in business.
This book describes important methodologies, tools and techniques
from the fields of artificial intelligence, basically those which
are based on relevant conceptual and formal development. The
coverage is wide, ranging from machine learning to the use of data
on the Semantic Web, with many new topics. The contributions are
concerned with machine learning, big data, data processing in
medicine, similarity processing in ontologies, semantic image
analysis, as well as many applications including the use of machine
leaning techniques for cloud security, artificial intelligence
techniques for detecting COVID-19, the Internet of things, etc. The
book is meant to be a very important and useful source of
information for researchers and doctoral students in data analysis,
Semantic Web, big data, machine learning, computer engineering and
related disciplines, as well as for postgraduate students who want
to integrate the doctoral cycle.
Multimedia and its rich semantics are profligate in today s digital
environment. Databases and content management systems serve as
essential tools to ensure that the endless supply of multimedia
content are indexed and remain accessible to end users. Methods and
Innovations for Multimedia Database Content Management highlights
original research on new theories, algorithms, technologies, system
design, and implementation in multimedia data engineering and
management with an emphasis on automatic indexing, tagging,
high-order ranking, and rule mining. This book is an ideal resource
for university researchers, scientists, industry professionals,
software engineers and graduate students.
This book exemplifies how smart buildings have a crucial role to
play for the future of energy. The book investigates what already
exists in regards to technologies, approaches and solutions both
with a scientific and technological point of view. The authors
cover solutions for mirroring and tracing human activities, optimal
strategies to configure home settings, and generating explanations
and persuasive dashboards to get occupants better committed in
their home energy managements. Solutions are adapted from the
fields of Internet of Things, physical modeling, optimization,
machine learning and applied artificial intelligence. Practical
applications are given throughout.
This book addresses one of the most overlooked practical,
methodological, and moral questions in the journey to secure and
handle the massive amount of data being generated from smart
devices interactions: the integration of Blockchain with 5G-enabled
IoT. After an overview, this book discusses open issues and
challenges, which may hinder the growth of Blockchain technology.
Then, this book presents a variety of perspectives on the most
pressing questions in the field, such as: how IoT can connect
billions of objects together; how the access control mechanisms in
5G-enabled industrial environment works; how to address the
real-time and quality-of-service requirements for industrial
applications; and how to ensure scalability and computing
efficiency. Also, it includes a detailed discussions on the
complexity of adoption of Blockchain for 5G-Enabled IoT and
presents comparative case studies with respect to various
performance evaluation metrics such as scalability, data
management, standardization, interoperability and regulations,
accessibility, human-factors engineering and interfaces,
reliability, heterogeneity, and QoS requirements. This book acts as
a professional guide for the practitioners in information security
and related topics.
This book is a truly comprehensive, timely, and very much needed
treatise on the conceptualization of analysis, and design of
contactless & multimodal sensor-based human activities,
behavior understanding & intervention. From an interaction
design perspective, the book provides views and methods that allow
for more safe, trustworthy, efficient, and more natural interaction
with technology that will be embedded in our daily living
environments. The chapters in this book cover sufficient grounds
and depth in related challenges and advances in sensing, signal
processing, computer vision, and mathematical modeling. It covers
multi-domain applications, including surveillance and elderly care
that will be an asset to entry-level and practicing engineers and
scientists.(See inside for the reviews from top experts)
This book comprises the best deliberations with the theme "Smart
Innovations in Mezzanine Technologies, Data Analytics, Networks and
Communication Systems" in the "International Conference on Advances
in Computer Engineering and Communication Systems (ICACECS 2020)",
organized by the Department of Computer Science and Engineering,
VNR Vignana Jyothi Institute of Engineering and Technology. The
book provides insights on the recent trends and developments in the
field of computer science with a special focus on the mezzanine
technologies and creates an arena for collaborative innovation. The
book focuses on advanced topics in artificial intelligence, machine
learning, data mining and big data computing, cloud computing,
Internet on things, distributed computing and smart systems.
This book is a compilation of peer-reviewed papers presented at the
International Conference on Machine Intelligence and Data Science
Applications, organized by the School of Computer Science,
University of Petroleum & Energy Studies, Dehradun, on
September 4 and 5, 2020. The book starts by addressing the
algorithmic aspect of machine intelligence which includes the
framework and optimization of various states of algorithms. Variety
of papers related to wide applications in various fields like image
processing, natural language processing, computer vision, sentiment
analysis, and speech and gesture analysis have been included with
upfront details. The book concludes with interdisciplinary
applications like legal, health care, smart society, cyber physical
system and smart agriculture. The book is a good reference for
computer science engineers, lecturers/researchers in machine
intelligence discipline and engineering graduates.
This book introduces the state-of-the-art algorithms for data and
computation privacy. It mainly focuses on searchable symmetric
encryption algorithms and privacy preserving multi-party
computation algorithms. This book also introduces algorithms for
breaking privacy, and gives intuition on how to design algorithm to
counter privacy attacks. Some well-designed differential privacy
algorithms are also included in this book. Driven by lower cost,
higher reliability, better performance, and faster deployment, data
and computing services are increasingly outsourced to clouds. In
this computing paradigm, one often has to store privacy sensitive
data at parties, that cannot fully trust and perform privacy
sensitive computation with parties that again cannot fully trust.
For both scenarios, preserving data privacy and computation privacy
is extremely important. After the Facebook-Cambridge Analytical
data scandal and the implementation of the General Data Protection
Regulation by European Union, users are becoming more privacy aware
and more concerned with their privacy in this digital world. This
book targets database engineers, cloud computing engineers and
researchers working in this field. Advanced-level students studying
computer science and electrical engineering will also find this
book useful as a reference or secondary text.
This book provides an in-depth analysis of the current evolutionary
clustering techniques. It discusses the most highly regarded
methods for data clustering. The book provides literature reviews
about single objective and multi-objective evolutionary clustering
algorithms. In addition, the book provides a comprehensive review
of the fitness functions and evaluation measures that are used in
most of evolutionary clustering algorithms. Furthermore, it
provides a conceptual analysis including definition, validation and
quality measures, applications, and implementations for data
clustering using classical and modern nature-inspired techniques.
It features a range of proven and recent nature-inspired algorithms
used to data clustering, including particle swarm optimization, ant
colony optimization, grey wolf optimizer, salp swarm algorithm,
multi-verse optimizer, Harris hawks optimization, beta-hill
climbing optimization. The book also covers applications of
evolutionary data clustering in diverse fields such as image
segmentation, medical applications, and pavement infrastructure
asset management.
New Methods of Market Research and Analysis prepares readers for
the new reality posed by big data and marketing analytics. While
connecting to traditional research approaches such as surveys and
focus groups, this book shows how new technologies and new
analytical capabilities are rapidly changing the way marketers
obtain and process their information. In particular, the prevalence
of big data systems always monitoring key performance indicators,
trends toward more research using observation or observation and
communication together, new technologies such as mobile, apps,
geo-locators, and others, as well as the deep analytics allowed by
cheap data processing and storage are all covered and placed in
context. Scott Erickson goes beyond the buzzwords to provide
relevant explanations of the meaning and impact of both big data
and analytics, placing them in context with traditional marketing
research. His engaging subject matter focuses on the practical
aspects of big data concepts, precisely defining and illustrating
key concepts and providing illuminating real world examples. This
approachable style enables marketers to understand what data
scientists are doing with big data systems and analytics, giving
them a taste of the capabilities of contemporary statistical
software and its practical applications. This book can be used as a
supplement to a traditional marketing research text or on its own.
It will serve as a key reference for graduate students and advanced
undergraduates in marketing research, marketing analytics, or
business intelligence courses as well as marketing professionals
looking to stay up to date with current trends and have them
explained in a context they understand.
This book covers COVID-19 related research works and focuses on
recent advances in the Internet of Things (IoT) in smart healthcare
technologies. It includes reviews and original works on COVID-19 in
terms of e-healthcare, medicine technology, life support systems,
fast detection, diagnoses, developed technologies and innovative
solutions, bioinformatics, datasets, apps for diagnosis, solutions
for monitoring and control of the spread of COVID-19, among other
topics. The book covers comprehensive studies from bioelectronics
and biomedical engineering, artificial intelligence, and big data
with a prime focus on COVID-19 pandemic.
Conventional computational methods, and even the latest soft
computing paradigms, often fall short in their ability to offer
solutions to many real-world problems due to uncertainty,
imprecision, and circumstantial data. Hybrid intelligent computing
is a paradigm that addresses these issues to a considerable extent.
The Handbook of Research on Advanced Research on Hybrid Intelligent
Techniques and Applications highlights the latest research on
various issues relating to the hybridization of artificial
intelligence, practical applications, and best methods for
implementation. Focusing on key interdisciplinary computational
intelligence research dealing with soft computing techniques,
pattern mining, data analysis, and computer vision, this book is
relevant to the research needs of academics, IT specialists, and
graduate-level students.
This contributed volume discusses essential topics and the
fundamentals for Big Data Emergency Management and primarily
focusses on the application of Big Data for Emergency Management.
It walks the reader through the state of the art, in different
facets of the big disaster data field. This includes many elements
that are important for these technologies to have real-world
impact. This book brings together different computational
techniques from: machine learning, communication network analysis,
natural language processing, knowledge graphs, data mining, and
information visualization, aiming at methods that are typically
used for processing big emergency data. This book also provides
authoritative insights and highlights valuable lessons by
distinguished authors, who are leaders in this field. Emergencies
are severe, large-scale, non-routine events that disrupt the normal
functioning of a community or a society, causing widespread and
overwhelming losses and impacts. Emergency Management is the
process of planning and taking actions to minimize the social and
physical impact of emergencies and reduces the community's
vulnerability to the consequences of emergencies. Information
exchange before, during and after the disaster periods can greatly
reduce the losses caused by the emergency. This allows people to
make better use of the available resources, such as relief
materials and medical supplies. It also provides a channel through
which reports on casualties and losses in each affected area, can
be delivered expeditiously. Big Data-Driven Emergency Management
refers to applying advanced data collection and analysis
technologies to achieve more effective and responsive
decision-making during emergencies. Researchers, engineers and
computer scientists working in Big Data Emergency Management, who
need to deal with large and complex sets of data will want to
purchase this book. Advanced-level students interested in
data-driven emergency/crisis/disaster management will also want to
purchase this book as a study guide.
Shipping is the world's oldest sharing economy and is conducted in
a self-organizing manner. Shipping is capital, energy, and
information intensive, and with the growing impact of
digitalization and climate change, there is a need to rethink the
management and operations of this critical global industry -
assisted in no small way by maritime informatics. Building upon the
recently published inaugural book Maritime Informatics by Springer,
this book will address some of the most recent practical
developments and experiences, particularly from a global
perspective. The focus of the book is to address contemporary
movements to tackle global concerns and to complement Maritime
Informatics.
This handbook covers recent advances in the integration of three
areas, namely, cloud computing, cyber-physical systems, and the
Internet of things which is expected to have a tremendous impact on
our daily lives. It contains a total of thirteen peer-reviewed and
edited chapters. This book covers topics such as context-aware
cyber-physical systems, sustainable cloud computing, fog computing,
and cloud monitoring; both the theoretical and practical aspects
belonging to these topics are discussed. All the chapters also
discuss open research challenges in the areas mentioned above.
Finally, the handbook presents three use cases regarding
healthcare, smart buildings and disaster management to assist the
audience in understanding how to develop next-generation IoT- and
cloud-enabled cyber-physical systems. This timely handbook is
edited for students, researchers, as well as professionals who are
interested in the rapidly growing fields of cloud computing,
cyber-physical systems, and the Internet of things.
In the literature of information science, a number of studies have
been carried out attempting to model cognitive, affective,
behavioral, and contextual factors associated with human
information seeking and retrieval. On the other hand, only a few
studies have addressed the exploration of creative thinking in
music, focusing on understanding and describing individuals'
information seeking behavior during the creative process. Trends in
Music Information Seeking, Behavior, and Retrieval for Creativity
connects theoretical concepts in information seeking and behavior
to the music creative process. This publication presents new
research, case studies, surveys, and theories related to various
aspects of information retrieval and the information seeking
behavior of diverse scholarly and professional music communities.
Music professionals, theorists, researchers, and students will find
this publication an essential resource for their professional and
research needs.
Privacy protection within large databases can be a challenge. By
examining the current problems and challenges this domain is
facing, more efficient strategies can be established to safeguard
personal information against invasive pressures. HCI Challenges and
Privacy Preservation in Big Data Security is an informative
scholarly publication that discusses how human-computer interaction
impacts privacy and security in almost all sectors of modern life.
Featuring relevant topics such as large scale security data, threat
detection, big data encryption, and identity management, this
reference source is ideal for academicians, researchers,
advanced-level students, and engineers that are interested in
staying current on the advancements and drawbacks of human-computer
interaction within the world of big data.
This book focuses on the implementation of Artificial Intelligence
in Business, Education and Healthcare, It includes research
articles and expository papers on the applications of Artificial
Intelligence on Decision Making, Entrepreneurship, Social Media,
Healthcare, Education, Public Sector, FinTech, and RegTech. It also
discusses the role of Artificial Intelligence in the current
COVID-19 pandemic, in the health sector, education, and others. It
also discusses the impact of Artificial Intelligence on
decision-making in vital sectors of the economy.
This book is the world's first book on 6G Mobile Wireless Networks
that aims to provide a comprehensive understanding of key drivers,
use cases, research requirements, challenges and open issues that
are expected to drive 6G research. In this book, we have invited
world-renowned experts from industry and academia to share their
thoughts on different aspects of 6G research. Specifically, this
book covers the following topics: 6G Use Cases, Requirements,
Metrics and Enabling Technologies, PHY Technologies for 6G
Wireless, Reconfigurable Intelligent Surface for 6G Wireless
Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless,
Challenges in Transport Layer for Tbit/s Communications,
High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native
Approach for 6G Wireless Networks, Machine Type Communications in
6G, Edge Intelligence and Pervasive AI in 6G, Blockchain:
Foundations and Role in 6G, Role of Open-source Platforms in 6G,
and Quantum Computing and 6G Wireless. The overarching aim of this
book is to explore the evolution from current 5G networks towards
the future 6G networks from a service, air interface and network
perspective, thereby laying out a vision for 6G networks. This book
not only discusses the potential 6G use cases, requirements,
metrics and enabling technologies, but also discusses the emerging
technologies and topics such as 6G PHY technologies, reconfigurable
intelligent surface, millimeter-wave and THz communications,
visible light communications, transport layer for Tbit/s
communications, high-capacity backhaul connectivity, cloud native
approach, machine-type communications, edge intelligence and
pervasive AI, network security and blockchain, and the role of
open-source platform in 6G. This book provides a systematic
treatment of the state-of-the-art in these emerging topics and
their role in supporting a wide variety of verticals in the future.
As such, it provides a comprehensive overview of the expected
applications of 6G with a detailed discussion of their requirements
and possible enabling technologies. This book also outlines the
possible challenges and research directions to facilitate the
future research and development of 6G mobile wireless networks.
|
|