![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.
Within a given enterprise, database management involves the monitoring, administration, and maintenance of the databases, which constantly change with new technologies and new forms of data. Cross-Disciplinary Models and Applications of Database Management: Advancing Approaches is an updated look at the latest tools and technology within the burgeoning field of database management. Perfect for the network administrator, technician, information technology specialist or consultant, or for academics and students, this volume presents the latest the field has to offer by way of cases and new research. As database languages, models, and systems change, it s vital for practitioners within the field to stay abreast of the latest research and methods being used around the world, and this book offers the most current advances available.
Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management focuses on the challenges of distributed systems imposed by data intensive applications and on the different state-of-the-art solutions proposed to overcome such challenges. Providing hints on how to manage low-level data handling issues when performing data intensive distributed computing, this publication is ideal for scientists, researchers, engineers, and application developers, alike. With the knowledge of the correct data management techniques for their applications, readers will be able to focus on their primary goal, assured that their data management needs are handled reliably and efficiently.
This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.
a) Provides basic concepts of Natural Language Processing for getting started from scratch. b) Introduces advanced concepts for scaling, deep learning and real-world issues seen in the industry. c) Provides applications of Natural Language Processing over a diverse set of 15 industry verticals. d) Shares practical implementation including Python code, tools and techniques for a variety of Natural Language Processing applications and industrial products for a hands-on experience. e) Gives readers a sense of all there is to build successful Natural Language Processing projects: the concepts, applications, opportunities and hands-on material.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
This book provides a survey on research, development, and trends in innovative computing in communications engineering and computer science. It features selected and expanded papers from the EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018), with contributions by top global researchers and practitioners in the field. The content is of relevance to computer science graduates, researchers and academicians in computer science and engineering. The authors discuss new technologies in computer science and engineering that have reduced the dimension of data coverage worldwide, reducing the gaps and coverage of domains globally. They discuss how these advances have also contributed to strength in prediction, analysis, and decision in the areas such as Technology, Management, Social Computing, Green Computing, and Telecom. Contributions show how nurturing the research in technology and computing is essential to finding the right pattern in the ocean of data. Focuses on research areas of innovative computing and its application in engineering and technology; Includes contributions from researchers in computing and engineering from around the world; Features selected and expanded papers from EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018).
The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is theoretically sound, is not especially easy. That's the challenge that Building and Maintaininga Data Warehouse answers. Based on a foundation of industry-accepted principles, this work provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, this workdetails those factors that must be accomplished and those that are best avoided. Organized to logically progress from more general to specific information, this valuable guide: Presents areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole Examines the concepts and principles that are at the foundation of every successful data warehouse Explains how to recognize and attend to problematic gaps in an established data warehouse Provides the big picture perspective that planners and executives require Those considering the planning and creation of a data warehouse, as well as those who've already built one will profit greatly from the insights garnered by the author during his years of creating and gathering information on state-of-the-art data warehouses that are accessible, convenient, and reliable.
Advances in Computers remains at the forefront in presenting the
new developments in the ever-changing field of information
technology. Since 1960, Advances in Computers has chronicled the
constantly shifting theories and methods of this technology that
greatly shape our lives today.
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery tackles those data sets and covers a variety of issues in relation to intelligent data analysis so that patterns from frequent or rare events in spatial or temporal spaces can be revealed. This book brings together current research, results, problems, and applications from both theoretical and practical approaches.
This book provides an insight into recent technological trends and innovations in solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications tested in a real environment. Applications include city halls, municipalities, and companies that must keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discuss are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world.
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.
As emerging trends and research threads surface in the area of e-government, academicians, practitioners, and students face the challenge of keeping up-to-date with new and innovative practices. ""Current Issues and Trends in E-Government Research"" provides a complete synopsis of the latest technologies in information policy, security, privacy, and access, as well as the best practices in e-government applications and measurement. ""Current Issues and Trends in E-Government Research"" presents the most current issues in e-government hardware and software technology, adoption and diffusion, planning and management, and philosophy.
Kovacich and Halibozek offer you the benefit of more than 55 years
of combined experience in government and corporate security.
Throughout the book, the authors use a fictional global corporation
as a model to provide continual real-world challenges and
solutions. New and experienced managers alike will find a wealth of
information and practical advice to help you develop strategic and
tactical plans and manage your daily operations.
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.
There is a large increase in the amount of information available on World Wide Web and also in number of online databases. This information abundance increases the complexity of locating relevant information. Such a complexity drives the need for improved and intelligent systems for search and information retrieval. Intelligent Agents are currently used to improve the search and retrieval information on World Wide Web. The use of existing search and retrieval engines with the addition of intelligent agents allows a more comprehensive search with a performance that can be measured. Intelligent Agents for Mining and Information Retrieval discusses the foundation as well as the pratical side of intelligent agents and their theory and applications for web data mining and information retrieval. The book can used for researchers at the undergraduate and post-graduate levels as well as a reference of the state-of-art for cutting edge researchers.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
Data Quality: The Accuracy Dimension is about assessing the quality
of corporate data and improving its accuracy using the data
profiling method. Corporate data is increasingly important as
companies continue to find new ways to use it. Likewise, improving
the accuracy of data in information systems is fast becoming a
major goal as companies realize how much it affects their bottom
line. Data profiling is a new technology that supports and enhances
the accuracy of databases throughout major IT shops. Jack Olson
explains data profiling and shows how it fits into the larger
picture of data quality.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
The book gathers selected papers presented at the KES International Symposium on Smart Transportation Systems (KES-STS 2019). Modern transportation systems have undergone a rapid transformation in recent years. This has produced a range of vehicle technology innovations such as connected vehicles, self-driving cars, electric vehicles, Hyperloop, and even flying cars, and with them, fundamental changes in transport systems around the world. The book discusses current challenges, innovations and breakthroughs in Smart Transportation Systems, as well as transport infrastructure modeling, safety analysis, freeway operations, intersection analysis, and other related cutting-edge topics.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy. |
You may like...
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Role of 6g Wireless Networks in AI and…
Malaya Dutta Borah, Steven A. Wright, …
Hardcover
R6,206
Discovery Miles 62 060
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Blockchain Life - Making Sense of the…
Kary Oberbrunner, Lee Richter
Hardcover
R506
Discovery Miles 5 060
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
|