|
|
Books > Computing & IT > Applications of computing > Databases
Databases are designed to support data storage, processing, and
retrieval activities related to data management. The use of
databases in various applications has resulted in an enormous
wealth of data, which populates many types of databases around the
world. Advanced Database Query Systems: Techniques, Applications
and Technologies focuses on technologies and methodologies of
database queries, XML and metadata queries, and applications of
database query systems, aiming at providing a single account of
technologies and practices in advanced database query systems. This
book provides the state of the art information for academics,
researchers and industry practitioners who are interested in the
study, use, design and development of advanced and emerging
database queries with ultimate aim of building competencies for
exploiting the opportunities of the data and knowledge society.
Corporations accumulate a lot of valuable data and knowledge over
time, but storing and maintaining this data can be a logistic and
financial headache for business leaders and IT specialists.
Uncovering Essential Software Artifacts through Business Process
Archaeology introduces an emerging method of software modernisation
used to effectively manage legacy systems and company operations
supported by such systems. This book presents methods, techniques,
and new trends on business process archaeology as well as some
industrial success stories. Business experts, professionals, and
researchers working in the field of information and knowledge
management will use this reference source to efficiently and
effectively implement and utilise business knowledge.
Within a given enterprise, database management involves the
monitoring, administration, and maintenance of the databases, which
constantly change with new technologies and new forms of data.
Cross-Disciplinary Models and Applications of Database Management:
Advancing Approaches is an updated look at the latest tools and
technology within the burgeoning field of database management.
Perfect for the network administrator, technician, information
technology specialist or consultant, or for academics and students,
this volume presents the latest the field has to offer by way of
cases and new research. As database languages, models, and systems
change, it s vital for practitioners within the field to stay
abreast of the latest research and methods being used around the
world, and this book offers the most current advances available.
Data Intensive Distributed Computing: Challenges and Solutions for
Large-scale Information Management focuses on the challenges of
distributed systems imposed by data intensive applications and on
the different state-of-the-art solutions proposed to overcome such
challenges. Providing hints on how to manage low-level data
handling issues when performing data intensive distributed
computing, this publication is ideal for scientists, researchers,
engineers, and application developers, alike. With the knowledge of
the correct data management techniques for their applications,
readers will be able to focus on their primary goal, assured that
their data management needs are handled reliably and efficiently.
This book explores the main elements of e-Democracy, the term
normally used to describe the implementation of democratic
government processes by electronic means. It provides insights into
the main technological and human issues regarding governance,
government, participation, inclusion, empowerment, procurement and,
last but not least, ethical and privacy issues. Its main aim is to
bridge the gap between technological solutions, their successful
implementation, and the fruitful utilization of the main set of
e-Services totally or partially delivered by governments or
non-government organizations. Today, various parameters actively
influence e-Services' success or failure: cultural aspects,
organisational issues, bureaucracy and workflows, infrastructure
and technology in general, user habits, literacy, capacity or
merely interaction design. This includes having a significant
population of citizens who are willing and able to adopt and use
online services; as well as developing the managerial and technical
capability to implement applications that meet citizens' needs.
This book helps readers understand the mutual dependencies
involved; further, a selection of success stories and failures,
duly commented on, enables readers to identify the right approach
to innovation in governmental e-Services. With its balanced
humanistic and technological approach, the book mainly targets
public authorities, decision-makers, stakeholders, solution
developers, and graduate students.
a) Provides basic concepts of Natural Language Processing for
getting started from scratch. b) Introduces advanced concepts for
scaling, deep learning and real-world issues seen in the industry.
c) Provides applications of Natural Language Processing over a
diverse set of 15 industry verticals. d) Shares practical
implementation including Python code, tools and techniques for a
variety of Natural Language Processing applications and industrial
products for a hands-on experience. e) Gives readers a sense of all
there is to build successful Natural Language Processing projects:
the concepts, applications, opportunities and hands-on material.
Multimedia technologies are becoming more sophisticated, enabling
the Internet to accommodate a rapidly growing audience with a full
range of services and efficient delivery methods. Although the
Internet now puts communication, education, commerce and
socialization at our finger tips, its rapid growth has raised some
weighty security concerns with respect to multimedia content. The
owners of this content face enormous challenges in safeguarding
their intellectual property, while still exploiting the Internet as
an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and
state-of-the-art applications of content security and data hiding
in digital multimedia. One of the pillars of content security
solutions is the imperceptible insertion of information into
multimedia data for security purposes; the idea is that this
inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal
processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
This book provides a survey on research, development, and trends in
innovative computing in communications engineering and computer
science. It features selected and expanded papers from the EAI
International Conference on Computer Science and Engineering 2018
(COMPSE 2018), with contributions by top global researchers and
practitioners in the field. The content is of relevance to computer
science graduates, researchers and academicians in computer science
and engineering. The authors discuss new technologies in computer
science and engineering that have reduced the dimension of data
coverage worldwide, reducing the gaps and coverage of domains
globally. They discuss how these advances have also contributed to
strength in prediction, analysis, and decision in the areas such as
Technology, Management, Social Computing, Green Computing, and
Telecom. Contributions show how nurturing the research in
technology and computing is essential to finding the right pattern
in the ocean of data. Focuses on research areas of innovative
computing and its application in engineering and technology;
Includes contributions from researchers in computing and
engineering from around the world; Features selected and expanded
papers from EAI International Conference on Computer Science and
Engineering 2018 (COMPSE 2018).
The book is devoted to the analysis of big data in order to extract
from these data hidden patterns necessary for making decisions
about the rational behavior of complex systems with the different
nature that generate this data. To solve these problems, a group of
new methods and tools is used, based on the self-organization of
computational processes, the use of crisp and fuzzy cluster
analysis methods, hybrid neural-fuzzy networks, and others. The
book solves various practical problems. In particular, for the
tasks of 3D image recognition and automatic speech recognition
large-scale neural networks with applications for Deep Learning
systems were used. Application of hybrid neuro-fuzzy networks for
analyzing stock markets was presented. The analysis of big
historical, economic and physical data revealed the hidden
Fibonacci pattern about the course of systemic world conflicts and
their connection with the Kondratieff big economic cycles and the
Schwabe-Wolf solar activity cycles. The book is useful for system
analysts and practitioners working with complex systems in various
spheres of human activity.
As it is with building a house, most of the work necessary to build
a data warehouse is neither visible nor obvious when looking at the
completed product. While it may be easy to plan for a data
warehouse that incorporates all the right concepts, taking the
steps needed to create a warehouse that is as functional and
user-friendly as it is theoretically sound, is not especially easy.
That's the challenge that Building and Maintaininga Data Warehouse
answers. Based on a foundation of industry-accepted principles,
this work provides an easy-to-follow approach that is cohesive and
holistic. By offering the perspective of a successful data
warehouse, as well as that of a failed one, this workdetails those
factors that must be accomplished and those that are best avoided.
Organized to logically progress from more general to specific
information, this valuable guide: Presents areas of a data
warehouse individually and in sequence, showing how each piece
becomes a working part of the whole Examines the concepts and
principles that are at the foundation of every successful data
warehouse Explains how to recognize and attend to problematic gaps
in an established data warehouse Provides the big picture
perspective that planners and executives require Those considering
the planning and creation of a data warehouse, as well as those
who've already built one will profit greatly from the insights
garnered by the author during his years of creating and gathering
information on state-of-the-art data warehouses that are
accessible, convenient, and reliable.
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
Advances in Computers remains at the forefront in presenting the
new developments in the ever-changing field of information
technology. Since 1960, Advances in Computers has chronicled the
constantly shifting theories and methods of this technology that
greatly shape our lives today.
"Information Repositories" focuses on the use of large data
repositories to store and retrieve information.
This series is an invaluable addition to any university course in
computer technology, as well as finding itself at home on the
bookshelf of industrial practitioners.
* Includes in-depth surveys and tutorials on advances in Computer
Technology. * Features the work of well-known authors and
researchers in the field.
* Provides a broad overview of important developments.
* Contains extensive bibliographies.
Pattern Recognition has a long history of applications to data
analysis in business, military and social economic activities.
While the aim of pattern recognition is to discover the pattern of
a data set, the size of the data set is closely related to the
methodology one adopts for analysis. Intelligent Data Analysis:
Developing New Methodologies Through Pattern Discovery and Recovery
tackles those data sets and covers a variety of issues in relation
to intelligent data analysis so that patterns from frequent or rare
events in spatial or temporal spaces can be revealed. This book
brings together current research, results, problems, and
applications from both theoretical and practical approaches.
Enterprises have made amazing advances by taking advantage of data
about their business to provide predictions and understanding of
their customers, markets, and products. But as the world of
business becomes more interconnected and global, enterprise data is
no long a monolith; it is just a part of a vast web of data.
Managing data on a world-wide scale is a key capability for any
business today. The Semantic Web treats data as a distributed
resource on the scale of the World Wide Web, and incorporates
features to address the challenges of massive data distribution as
part of its basic design. The aim of the first two editions was to
motivate the Semantic Web technology stack from end-to-end; to
describe not only what the Semantic Web standards are and how they
work, but also what their goals are and why they were designed as
they are. It tells a coherent story from beginning to end of how
the standards work to manage a world-wide distributed web of
knowledge in a meaningful way. The third edition builds on this
foundation to bring Semantic Web practice to enterprise. Fabien
Gandon joins Dean Allemang and Jim Hendler, bringing with him years
of experience in global linked data, to open up the story to a
modern view of global linked data. While the overall story is the
same, the examples have been brought up to date and applied in a
modern setting, where enterprise and global data come together as a
living, linked network of data. Also included with the third
edition, all of the data sets and queries are available online for
study and experimentation at data.world/swwo.
This book provides an insight into recent technological trends and
innovations in solutions and platforms to improve mobility of
visually impaired people. The authors' goal is to help to
contribute to the social and societal inclusion of the visually
impaired. The book's topics include, but are not limited to,
obstacle detection systems, indoor and outdoor navigation,
transportation sustainability systems, and hardware/devices to aid
visually impaired people. The book has a strong focus on practical
applications tested in a real environment. Applications include
city halls, municipalities, and companies that must keep up to date
with recent trends in platforms, methodologies and technologies to
promote urban mobility. Also discuss are broader realms including
education, health, electronics, tourism, and transportation.
Contributors include a variety of researchers and practitioners
around the world.
Multimedia security has become a major research topic, yielding
numerous academic papers in addition to many watermarking-related
companies. In this emerging area, there are many challenging
research issues that deserve sustained studying towards an
effective and practical system. Multimedia Security: Steganography
and Digital Watermarking Techniques for Protection of Intellectual
Property explores the myriad of issues regarding multimedia
security. This book covers various issues, including perceptual
fidelity analysis, image, audio, and 3D mesh object watermarking,
medical watermarking, error detection (authentication) and
concealment, fingerprinting, digital signature and digital right
management.
As emerging trends and research threads surface in the area of
e-government, academicians, practitioners, and students face the
challenge of keeping up-to-date with new and innovative practices.
""Current Issues and Trends in E-Government Research"" provides a
complete synopsis of the latest technologies in information policy,
security, privacy, and access, as well as the best practices in
e-government applications and measurement. ""Current Issues and
Trends in E-Government Research"" presents the most current issues
in e-government hardware and software technology, adoption and
diffusion, planning and management, and philosophy.
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application
of concepts
* Thoroughly covers the integration of physical, computer and
information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the
security solutions they need
Today, more than 80% of the data transmitted over networks and
archived on our computers, tablets, cell phones or clouds is
multimedia data - images, videos, audio, 3D data. The applications
of this data range from video games to healthcare, and include
computer-aided design, video surveillance and biometrics. It is
becoming increasingly urgent to secure this data, not only during
transmission and archiving, but also during its retrieval and use.
Indeed, in today's "all-digital" world, it is becoming ever-easier
to copy data, view it unrightfully, steal it or falsify it.
Multimedia Security 1 analyzes the issues of the authentication of
multimedia data, code and the embedding of hidden data, both from
the point of view of defense and attack. Regarding the embedding of
hidden data, it also covers invisibility, color, tracing and 3D
data, as well as the detection of hidden messages in an image by
steganalysis.
Web and Information Security consists of a collection of papers
written by leading experts in the field that describe
state-of-the-art topics pertaining to Web and information systems
security. In particular, security for the semantic Web, privacy,
security policy management and emerging topics such as secure
semantic grids and secure multimedia systems are also discussed. As
well as covering basic concepts of Web and information system
security, this book provides new insights into the semantic Web
field and its related security challenges. ""Web and Information
Security"" is valuable as a reference book for senior undergraduate
or graduate courses in information security which have special
focuses on Web security. It is also useful for technologists,
researchers, managers and developers who want to know more about
emerging security technologies.
|
|