![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
One of the infinite rewards to continuously advancing technology is an increased ease and precision in organizational techniques. Online data collection and online instruments are vital ways to electronically measure and assess organizational areas relevant to management, leadership, and human research development.Online Instruments, Data Collection, and Electronic Measurements: Organizational Advancements aims to assist researchers in both understanding and utilizing online data collection by providing methodological knowledge related to online research, and by presenting information about the empirical quality, the availability, and the location of specific online instruments. This book provides a strong focus on organizational leadership instruments while combining them with practical and ethical issues associated with online data collection. Such a combination makes this a unique contribution to the field.
As technology continues to become more sophisticated, mimicking natural processes and phenomena becomes more of a reality. Continued research in the field of natural computing enables an understanding of the world around us, in addition to opportunities for manmade computing to mirror the natural processes and systems that have existed for centuries. Nature-Inspired Algorithms for Big Data Frameworks is a collection of innovative research on the methods and applications of extracting meaningful information from data using algorithms that are capable of handling the constraints of processing time, memory usage, and the dynamic and unstructured nature of data. Highlighting a range of topics including genetic algorithms, data classification, and wireless sensor networks, this book is ideally designed for computer engineers, software developers, IT professionals, academicians, researchers, and upper-level students seeking current research on the application of nature and biologically inspired algorithms for handling challenges posed by big data in diverse environments.
The Semantic Web combines the descriptive languages RDF (Resource Description Framework) and OWL (Web Ontology Language), with the data-centric, customizable XML (eXtensible Mark-up Language) to provide descriptions of the content of Web documents. These machine-interpretable descriptions allow more intelligent software systems to be written, automating the analysis and exploitation of web-based information. Software agents will be able to create "automatically" new services from already published services, with potentially huge implications for models of e-Business. "Semantic Web Technologies" provides a comprehensive overview of key semantic knowledge technologies and research. The authors explain (semi-)automatic ontology generation and metadata extraction in depth, along with ontology management and mediation. Further chapters examine how Semantic Web technology is being applied in knowledge management ("Semantic Information Access") and in the next generation of Web services. "Semantic Web Technologies: " Provides a comprehensive exposition of the state-of-the art in Semantic Web research and key technologies. Explains the use of ontologies and metadata to achieve machine-interpretability. Describes methods for ontology learning and metadata generation. Discusses ontology management and evolution, covering ontology change detection and propagation, ontology dependency and mediation. Illustrates the theoretical concepts with three case studies on industrial applications in digital libraries, the legal sector and the telecommunication industry. Graduate and advanced undergraduate students, academic and industrial researchers in the field will all find "Semantic WebTechnologies" an essential guide to the technologies of the Semantic Web.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted from this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are in finance (banking, brokerage, and insurance), marketing (customer relationships, retailing, logistics, and travel), as well as in manufacturing, health care, fraud detection, homeland security, and law enforcement.
Our ability to generate and collect data has been increasing rapidly. Not only are all of our business, scientific, and government transactions now computerized, but the widespread use of digital cameras, publication tools, and bar codes also generate data. On the collection side, scanned text and image platforms, satellite remote sensing systems, and the World Wide Web have flooded us with a tremendous amount of data. This explosive growth has generated an even more urgent need for new techniques and automated tools that can help us transform this data into useful information and knowledge. Like the first edition, voted the most popular data mining book by KD Nuggets readers, this book explores concepts and techniques for the discovery of patterns hidden in large data sets, focusing on issues relating to their feasibility, usefulness, effectiveness, and scalability. However, since the publication of the first edition, great progress has been made in the development of new data mining methods, systems, and applications. This new edition substantially enhances the first edition, and new chapters have been added to address recent developments on mining complex types of data- including stream data, sequence data, graph structured data, social network data, and multi-relational data.
To develop and sustain competitive advantage in the marketplace, organizations depend critically on competence and resources, knowledge and information exchanged both within and across partner organizations, and on process integration and management. ""Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation"" presents research related to the application of semantic Web technologies, including semantic service-oriented architecture, semantic content management, and semantic knowledge sharing in e-business processes. ""Semantic Web Technologies and E-Business: Toward the Integrated Virtual Organization and Business Process Automation"" compiles research from experts around the globe, bringing business, managerial, technological, and implementation issues surrounding the application of semantic Web technologies in e-business to the forefront.
Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.
The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.
Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.
DESCRIPTION Users expect search to be simple: They enter a few terms and expect perfectly-organized, relevant results instantly. But behind this simple user experience, complex machinery is at work. Whether using Elasticsearch, Solr, or another search technology, the solution is never one size fits all. Returning the right search results requires conveying domain knowledge and business rules in the search engine's data structures, text analytics, and results ranking capabilities. Relevant Search demystifies relevance work. Using Elasticsearch, it tells how to return engaging search results to users, helping readers understand and leverage the internals of Lucene-based search engines. The book walks through several real-world problems using a cohesive philosophy that combines text analysis, query building, and score shaping to express business ranking rules to the search engine. It outlines how to guide the engineering process by monitoring search user behavior and shifting the enterprise to a search-first culture focused on humans, not computers. It also shows how the search engine provides a deeply pluggable platform for integrating search ranking with machine learning, ontologies, personalization, domain-specific expertise, and other enriching sources. KEY FEATURES Highly relevant, concrete, hands-on guide Digs deep into search engine technology Contains essential tools, tips, and strategies for building engaging search engines AUDIENCE For readers who can code moderately complex tasks. ABOUT THE TECHNOLOGY Lucene is the underlying technology that backs both Elasticsearch and Solr. Dominant search engines are based upon Lucene and since Lucene itself is based upon the strong foundation of Information Retrieval research, the book will be applicable to almost any search technology available now or in the foreseeable future.
This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.
Electronic participation is an emerging and growing research area that makes use of internet solutions to enhance citizens' participation in government processes in order to provide a fair and efficient society. This book examines recommender-system technologies and voting advice applications as tools to enable electronic citizen participation during election campaigns. Further, making use of fuzzy classification, it provides an evaluation framework for eParticipation. A dynamic voting advice application developed for the 2017 Ecuador national election serves as a real-world case study to introduce readers to the practical implementation and evaluation issues. The book concludes with a comprehensive analysis of the 2017 election project based on altmetrics, Google Analytics and statistics from the case study.
This book provides a survey on research, development, and trends in innovative computing in communications engineering and computer science. It features selected and expanded papers from the EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018), with contributions by top global researchers and practitioners in the field. The content is of relevance to computer science graduates, researchers and academicians in computer science and engineering. The authors discuss new technologies in computer science and engineering that have reduced the dimension of data coverage worldwide, reducing the gaps and coverage of domains globally. They discuss how these advances have also contributed to strength in prediction, analysis, and decision in the areas such as Technology, Management, Social Computing, Green Computing, and Telecom. Contributions show how nurturing the research in technology and computing is essential to finding the right pattern in the ocean of data. Focuses on research areas of innovative computing and its application in engineering and technology; Includes contributions from researchers in computing and engineering from around the world; Features selected and expanded papers from EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018).
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
The book is logically divided into 5 main categories with each
category representing a major skill set required by most security
professionals:
As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
Data mining is still a relatively young field, expanding at the rate of technology while advancing tools and techniques for gaining knowledge, finding patterns, and managing databases. Exploring Advances in Interdisciplinary Data Mining and Analytics: New Trends is an updated look at the state of technology in the field of data mining and analytics. As processor speeds, database size, network capabilities, artificial intelligence, and most fields of hardware and software continue to improve at a staggering rate of increased capability and pace, it is vital for practitioners to stay abreast of the current issues and research in the field. This volume is perfect for IT specialists, data analysts, practitioners and academics alike, offering the latest technological, analytical, ethical, and commercial perspectives on topics in data mining.
Addresses different scenarios when finding complex relationships in spatiotemporal data by modeling them as graphs, giving readers a comprehensive synopsis on two successful partition-based algorithms designed by the authors. |
You may like...
Numerical Linear Algebra with Julia
Eric Darve, Mary Wootters
Paperback
R2,215
Discovery Miles 22 150
Introduction to Nonsmooth Optimization…
Adil Bagirov, Napsu Karmitsa, …
Hardcover
R4,146
Discovery Miles 41 460
Philosophy for Girls - An Invitation to…
Melissa Shew, Kimberly Garchar
Hardcover
R2,445
Discovery Miles 24 450
|