![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery tackles those data sets and covers a variety of issues in relation to intelligent data analysis so that patterns from frequent or rare events in spatial or temporal spaces can be revealed. This book brings together current research, results, problems, and applications from both theoretical and practical approaches.
This book provides an insight into recent technological trends and innovations in solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications tested in a real environment. Applications include city halls, municipalities, and companies that must keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discuss are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world.
Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
Within a given enterprise, database management involves the monitoring, administration, and maintenance of the databases, which constantly change with new technologies and new forms of data. Cross-Disciplinary Models and Applications of Database Management: Advancing Approaches is an updated look at the latest tools and technology within the burgeoning field of database management. Perfect for the network administrator, technician, information technology specialist or consultant, or for academics and students, this volume presents the latest the field has to offer by way of cases and new research. As database languages, models, and systems change, it s vital for practitioners within the field to stay abreast of the latest research and methods being used around the world, and this book offers the most current advances available.
There is a large increase in the amount of information available on World Wide Web and also in number of online databases. This information abundance increases the complexity of locating relevant information. Such a complexity drives the need for improved and intelligent systems for search and information retrieval. Intelligent Agents are currently used to improve the search and retrieval information on World Wide Web. The use of existing search and retrieval engines with the addition of intelligent agents allows a more comprehensive search with a performance that can be measured. Intelligent Agents for Mining and Information Retrieval discusses the foundation as well as the pratical side of intelligent agents and their theory and applications for web data mining and information retrieval. The book can used for researchers at the undergraduate and post-graduate levels as well as a reference of the state-of-art for cutting edge researchers.
As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
Data Quality: The Accuracy Dimension is about assessing the quality
of corporate data and improving its accuracy using the data
profiling method. Corporate data is increasingly important as
companies continue to find new ways to use it. Likewise, improving
the accuracy of data in information systems is fast becoming a
major goal as companies realize how much it affects their bottom
line. Data profiling is a new technology that supports and enhances
the accuracy of databases throughout major IT shops. Jack Olson
explains data profiling and shows how it fits into the larger
picture of data quality.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
The book gathers selected papers presented at the KES International Symposium on Smart Transportation Systems (KES-STS 2019). Modern transportation systems have undergone a rapid transformation in recent years. This has produced a range of vehicle technology innovations such as connected vehicles, self-driving cars, electric vehicles, Hyperloop, and even flying cars, and with them, fundamental changes in transport systems around the world. The book discusses current challenges, innovations and breakthroughs in Smart Transportation Systems, as well as transport infrastructure modeling, safety analysis, freeway operations, intersection analysis, and other related cutting-edge topics.
This book covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. It can be used by any individual studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated in the book. As a background of cryptography, the textbook gives an introduction into number theory, coding theory, information theory, that obviously have discrete nature. Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous, practical examples of cryptography. FEATURES Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous examples of cryptography Provides an introduction into number theory, game theory, coding theory, and information theory as background for the coverage of cryptography Covers cryptography topics such as CRT, affine ciphers, hashing functions, substitution ciphers, unbreakable ciphers, Discrete Logarithm Problem (DLP), and more
As emerging trends and research threads surface in the area of e-government, academicians, practitioners, and students face the challenge of keeping up-to-date with new and innovative practices. ""Current Issues and Trends in E-Government Research"" provides a complete synopsis of the latest technologies in information policy, security, privacy, and access, as well as the best practices in e-government applications and measurement. ""Current Issues and Trends in E-Government Research"" presents the most current issues in e-government hardware and software technology, adoption and diffusion, planning and management, and philosophy.
This book is a timely collection of chapters that present the state of the art within the analysis and application of big data. Working within the broader context of big data, this text focuses on the hot topics of social network modelling and analysis such as online dating recommendations, hiring practices, and subscription-type prediction in mobile phone services. Manuscripts are expanded versions of the best papers presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'2016), which was held in August 2016. The papers were among the best featured at the meeting and were then improved and extended substantially. Social Network Based Big Data Analysis and Applications will appeal to students and researchers in the field.
This book presents how federated learning helps to understand and learn from user activity in Internet of Things (IoT) applications while protecting user privacy. The authors first show how federated learning provides a unique way to build personalized models using data without intruding on users' privacy. The authors then provide a comprehensive survey of state-of-the-art research on federated learning, giving the reader a general overview of the field. The book also investigates how a personalized federated learning framework is needed in cloud-edge architecture as well as in wireless-edge architecture for intelligent IoT applications. To cope with the heterogeneity issues in IoT environments, the book investigates emerging personalized federated learning methods that are able to mitigate the negative effects caused by heterogeneities in different aspects. The book provides case studies of IoT based human activity recognition to demonstrate the effectiveness of personalized federated learning for intelligent IoT applications, as well as multiple controller design and system analysis tools including model predictive control, linear matrix inequalities, optimal control, etc. This unique and complete co-design framework will benefit researchers, graduate students and engineers in the fields of control theory and engineering.
After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.
Spatial Databases: Technologies, Techniques and Trends Introduces the reader to the world of spatial databases, and related subtopics. The broad range of topics covered within the chapters includes spatial data modeling, indexing of spatial and spatiotemporal objects, data mining and knowledge discovery in spatial and spatiotemporal management issues and query processing for moving objects. The reader will be able to get in touch with several important research issues the research community is dealing with today. Covering fundamental aspects up to advanced material, this book appeals to a broad computer science audience. Although perfect for specialists, each chapter is self-contained, making it easy for non-specialists to grasp the main issues involved.
The increasing trend of multimedia data use is likely to accelerate creating an urgent need of providing a clear means of capturing, storing, indexing, retrieving, analyzing, and summarizing data through image data. ""Artificial Intelligence for Maximizing Content Based Image Retrieval"" discusses major aspects of content-based image retrieval (CBIR) using current technologies and applications within the artificial intelligence (AI) field. Providing state-of-the-art research from leading international experts, this book offers a theoretical perspective and practical solutions for academicians, researchers, and industry practitioners.
This book is the best way to make the leap from SQL-92 to SQL:
1999, but it is much more than just a simple bridge between the
two. The latest from celebrated SQL experts Jim Melton and Alan
Simon, "SQL: 1999" is a comprehensive, eminently practical account
of SQL's latest incarnation and a potent distillation of the
details required to put it to work. Written to accommodate both
novice and experienced SQL users, "SQL: 1999" focuses on the
language's capabilities, from the basic to the advanced, and the
way that real applications take advantage of them. Throughout, the
authors illustrate features and techniques with clear and often
entertaining references to their own custom database, which can be
downloaded from the companion Web site. |
You may like...
Data Analytics for Social Microblogging…
Soumi Dutta, Asit Kumar Das, …
Paperback
R3,335
Discovery Miles 33 350
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Applied Big Data Analytics and Its Role…
Peng Zhao, Xin Wang, …
Hardcover
R6,648
Discovery Miles 66 480
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
|