![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Method engineering is a very young field. Generally, method engineering can be considered from engineering of an entire methodology for information systems development to engineering of modeling techniques according to project requirements. Computer aided method engineering is about generation and use of information systems design techniques according to user needs. Some times such environments are called generic tools or MetaCASE. Computer-Aided Method Engineering: Designing Case Repositories for the 21st Century presents a contribution on a methodology and architecture of a CASE repository, forwarding a theory that will bring about the component based development into CASE tool design and development covering a repository construction principle for the 21st century.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in marketing (customer loyalty, identifying profitable customers, instore promotions, e-commerce populations); in business (teaching data mining, efficiency of the Chinese automobile industry, moderate asset allocation funds); and techniques (veterinary predictive models, data integrity in the cloud, irregular pattern detection in a mobility network and road safety modeling.)
"Information Management: Gaining a Competitive Advantage with Data" is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. "Information Management" will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a
quick and useful resource. Either way, this book will enable you to
master all of the possibilities for data or the broadest view
across the enterprise.
Whether you are brand new to data mining or working on your tenth predictive analytics project, "Commercial Data Mining" will be there for you as an accessible reference outlining the entire process and related themes. In this book, you'll learn that your organization does not need a huge volume of data or a Fortune 500 budget to generate business using existing information assets. Expert author David Nettleton guides you through the process from beginning to end and covers everything from business objectives to data sources, and selection to analysis and predictive modeling. "Commercial Data Mining" includes case studies and practical
examples from Nettleton's more than 20 years of commercial
experience. Real-world cases covering customer loyalty,
cross-selling, and audience prediction in industries including
insurance, banking, and media illustrate the concepts and
techniques explained throughout the book.
Online survey research suites offer a vast array of capabilities, supporting the presentation of virtually every type of digital data - text, imagery, audio, video, and multimedia forms. With some researcher sophistication, these online survey research suites can enable a wide range of quantitative, qualitative, and mixed methods research. Online Survey Design and Data Analytics: Emerging Research and Opportunities is a critical scholarly resource that explores the utilization of online platforms for setting up surveys to achieve a specific result, eliciting data in in-depth ways and applying creative analytics methods to online survey data. Highlighting topics such as coding, education-based analysis, and online Delphi studies, this publication is ideal for researchers, professionals, academicians, data analysts, IT consultants, and students.
"Implementing Analytics" demystifies the concept, technology and
application of analytics and breaks its implementation down to
repeatable and manageable steps, making it possible for widespread
adoption across all functions of an organization. "Implementing
Analytics "simplifies and helps democratize a very specialized
discipline to foster business efficiency and innovation without
investing in multi-million dollar technology and manpower. A
technology agnostic methodology that breaks down complex tasks like
model design and tuning and emphasizes business decisions rather
than the technology behind analytics. Simplifies the understanding of analytics from a technical and functional perspective and shows a wide array of problems that can be tackled using existing technology Provides a detailed step by step approach to identify opportunities, extract requirements, design variables and build and test models. It further explains the business decision strategies to use analytics models and provides an overview for governance and tuning Helps formalize analytics projects from staffing, technology and implementation perspectives Emphasizes machine learning and data mining over statistics and shows how the role of a Data Scientist can be broken down and still deliver the value by building a robust development process
This book is the best way to make the leap from SQL-92 to SQL:
1999, but it is much more than just a simple bridge between the
two. The latest from celebrated SQL experts Jim Melton and Alan
Simon, "SQL: 1999" is a comprehensive, eminently practical account
of SQL's latest incarnation and a potent distillation of the
details required to put it to work. Written to accommodate both
novice and experienced SQL users, "SQL: 1999" focuses on the
language's capabilities, from the basic to the advanced, and the
way that real applications take advantage of them. Throughout, the
authors illustrate features and techniques with clear and often
entertaining references to their own custom database, which can be
downloaded from the companion Web site.
Blockchain technology presents numerous advantages that include increased transparency, reduced transaction costs, faster transaction settlement, automation of information, increased traceability, improved customer experience, improved digital identity, better cyber security, and user-controlled networks. These potential applications are widespread and diverse including funds transfer, smart contracts, e-voting, efficient supply chain, and more in nearly every sector of society including finance, healthcare, law, trade, real estate, and other important areas. However, there are challenges and limitations that exist such as high energy consumption, limited scalability, complexity, security, network size, lack of regulations, and other critical issues. Nevertheless, blockchain is an attractive technology and has much to offer to the modern-day industry. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector investigates blockchain technology's adoption and effectiveness in multiple industries and for the internet of things (IoT)-based applications, presents use cases from industrial and financial sectors as well as from other transaction-based services, and fills a gap in this respect by extending the existing body of knowledge in the suggested field. While highlighting topics such as cybersecurity, use cases, and models for blockchain implementation, this book is ideal for business managers, financial accountants, practitioners, researchers, academicians, and students interested in blockchain technology's role and implementation in IoT and the financial sector.
Websites are a central part of today's business world; however, with the vast amount of information that constantly changes and the frequency of required updates, this can come at a high cost to modern businesses. Web Data Mining and the Development of Knowledge-Based Decision Support Systems is a key reference source on decision support systems in view of end user accessibility and identifies methods for extraction and analysis of useful information from web documents. Featuring extensive coverage across a range of relevant perspectives and topics, such as semantic web, machine learning, and expert systems, this book is ideally designed for web developers, internet users, online application developers, researchers, and faculty.
The concept of digital risk, which has become ubiquitous in the media, sustains a number of myths and beliefs about the digital world. This book explores the opposite view of these ideologies by focusing on digital risks as perceived by actors in their respective contexts. Perceptions and Analysis of Digital Risks identifies the different types of risks that concern actors and actually impact their daily lives, within education or various socio-professional environments. It provides an analysis of the strategies used by the latter to deal with these risks as they conduct their activities; thus making it possible to characterize the digital cultures and, more broadly, the informational cultures at work. This book offers many avenues for action in terms of educating the younger generations, training teachers and leaders, and mediating risks.
Churn prediction, recognition, and mitigation have become essential topics in various industries. As a means for forecasting and manageing risk, further research in this field can greatly assist companies in making informed decisions based on future possible scenarios. Developing Churn Models Using Data Mining Techniques and Social Network Analysis provides an in-depth analysis of attrition modeling relevant to business planning and management. Through its insightful and detailed explanation of best practices, tools, and theory surrounding churn prediction and the integration of analytics tools, this publication is especially relevant to managers, data specialists, business analysts, academicians, and upper-level students.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools
and techniques
"Managing Data in Motion" describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is
rapidly becoming one of the biggest concerns for business and IT
management. Data warehousing and conversion, real-time data
integration, and cloud and "big data" applications are just a few
of the challenges facing organizations and businesses today.
"Managing Data in Motion" tackles these and other topics in a style
easily understood by business and IT managers as well as
programmers and architects.
Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Networks, Knowledge Networks and Knowledge Resources showcases cutting-edge research on the intersections of Semantic Web, collaborative work, and social media research, exploring how the resources of so-called social networking applications, which bring people together to interact and encourage sharing of personal information and ideas, can be tapped by Semantic Web techniques, making shared Web contents readable and processable for machine and intelligent applications, as well as humans. Semantic technologies have shown their potential for integrating valuable knowledge, and they are being applied to the composition of digital learning and working platforms. Integrated semantic applications, linked data, social networks, and networked digital solutions can now be used in collaborative environments and present participants with the context-aware information that they need.
Technology has revolutionized the ways in which libraries store, share, and access information. As digital resources and tools continue to advance, so too do the opportunities for libraries to become more efficient and house more information. E-Discovery Tools and Applications in Modern Libraries presents critical research on the digitization of data and how this shift has impacted knowledge discovery, storage, and retrieval. This publication explores several emerging trends and concepts essential to electronic discovery, such as library portals, responsive websites, and federated search technology. The timely research presented within this publication is designed for use by librarians, graduate-level students, technology developers, and researchers in the field of library and information science.
Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.
The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
Multimedia and its rich semantics are profligate in today s digital environment. Databases and content management systems serve as essential tools to ensure that the endless supply of multimedia content are indexed and remain accessible to end users. Methods and Innovations for Multimedia Database Content Management highlights original research on new theories, algorithms, technologies, system design, and implementation in multimedia data engineering and management with an emphasis on automatic indexing, tagging, high-order ranking, and rule mining. This book is an ideal resource for university researchers, scientists, industry professionals, software engineers and graduate students.
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
|
You may like...
Genetic Programming Theory and Practice…
Wolfgang Banzhaf, Erik Goodman, …
Hardcover
R4,303
Discovery Miles 43 030
Applied Artificial Intelligence - A…
Swati V. Shinde, Varsha Bendre, …
Hardcover
R3,652
Discovery Miles 36 520
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Principles of Radio Navigation for…
Sauta O.I., Shatrakov A.Y., …
Hardcover
R2,653
Discovery Miles 26 530
Emotional Cognitive Neural Algorithms…
Leonid Perlovsky, Ross Deming, …
Hardcover
R4,023
Discovery Miles 40 230
Advances in Business ICT: New Ideas from…
Tomasz Pelech-Pilichowski, Maria Mach-Krol, …
Hardcover
R3,193
Discovery Miles 31 930
|