0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (53)
  • R250 - R500 (380)
  • R500+ (14,857)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Periodic Pattern Mining - Theory, Algorithms, and Applications (Hardcover, 1st ed. 2021): R. Uday Kiran, Philippe... Periodic Pattern Mining - Theory, Algorithms, and Applications (Hardcover, 1st ed. 2021)
R. Uday Kiran, Philippe Fournier-Viger, Jose M. Luna, Jerry Chun-Wei Lin, Anirban Mondal
R4,242 Discovery Miles 42 420 Ships in 12 - 19 working days

This book provides an introduction to the field of periodic pattern mining, reviews state-of-the-art techniques, discusses recent advances, and reviews open-source software. Periodic pattern mining is a popular and emerging research area in the field of data mining. It involves discovering all regularly occurring patterns in temporal databases. One of the major applications of periodic pattern mining is the analysis of customer transaction databases to discover sets of items that have been regularly purchased by customers. Discovering such patterns has several implications for understanding the behavior of customers. Since the first work on periodic pattern mining, numerous studies have been published and great advances have been made in this field. The book consists of three main parts: introduction, algorithms, and applications. The first chapter is an introduction to pattern mining and periodic pattern mining. The concepts of periodicity, periodic support, search space exploration techniques, and pruning strategies are discussed. The main types of algorithms are also presented such as periodic-frequent pattern growth, partial periodic pattern-growth, and periodic high-utility itemset mining algorithm. Challenges and research opportunities are reviewed. The chapters that follow present state-of-the-art techniques for discovering periodic patterns in (1) transactional databases, (2) temporal databases, (3) quantitative temporal databases, and (4) big data. Then, the theory on concise representations of periodic patterns is presented, as well as hiding sensitive information using privacy-preserving data mining techniques. The book concludes with several applications of periodic pattern mining, including applications in air pollution data analytics, accident data analytics, and traffic congestion analytics.

Information Systems Strategic Planning for Public Service Delivery in the Digital Era (Hardcover): Emanuel Camilleri Information Systems Strategic Planning for Public Service Delivery in the Digital Era (Hardcover)
Emanuel Camilleri
R6,103 Discovery Miles 61 030 Ships in 10 - 15 working days

Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.

Intelligent Mobile Service Computing (Hardcover, 1st ed. 2021): Honghao Gao, Yuyu Yin Intelligent Mobile Service Computing (Hardcover, 1st ed. 2021)
Honghao Gao, Yuyu Yin
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book discusses recent research and applications in intelligent service computing in mobile environments. The authors first explain how advances in artificial intelligence and big data have allowed for an array of intelligent services with complex and diverse applications. They then show how this brings new opportunities and challenges for service computing. The book, made up of contributions from academic and industry, aims to present advances in intelligent services, new algorithms and techniques in the field, foundational theory and systems, as well as practical real-life applications. Some of the topics discussed include cognition, modeling, description and verification for intelligent services; discovery, recommendation and selection for intelligent services; formal verification, testing and inspection for intelligent services; and composition and cooperation methods for intelligent services.

Guide to Web Development with Java - Understanding Website Creation (Hardcover, 2nd ed. 2021): Tim Downey Guide to Web Development with Java - Understanding Website Creation (Hardcover, 2nd ed. 2021)
Tim Downey
R2,214 Discovery Miles 22 140 Ships in 12 - 19 working days

This comprehensive Guide to Web Development with Java introduces the readers to the three-tiered, Model-View-Controller architecture by using Spring JPA, JSPs, and Spring MVC controllers. These three technologies use Java, so that a student with a background in programming will be able to master them with ease, with the end result of being able to create web applications that use MVC, validate user input,and save data to a database. Topics and features: * Presents web development topics in an accessible, easy-to-follow style, focusing on core information first, and allowing the reader to gain basic understanding before moving forwards * Contains many helpful pedagogical tools for students and lecturers, such as questions and exercises at the end of each chapter, detailed illustrations, chapter summaries, and a glossary * Uses existing powerful technologies that are freely available on the web to speed up web development, such as Spring Boot, Spring MVC, Spring JPA, Hibernate, JSP, JSTL, and Java 1.8 * Discusses HTML, HTML forms, and Cascading Style Sheets * Starts with the simplest technology for web development (JSP) and gradually introduces the reader to more complex topics * Introduces core technologies from the outset, such as the Model-View-Controller architecture * Includes examples for accessing common web services * Provides supplementary examples and tutorials

Handbook of Data Science with Semantic Technologies (Hardcover): Archana Patel, Narayan C Debnath Handbook of Data Science with Semantic Technologies (Hardcover)
Archana Patel, Narayan C Debnath
R8,549 Discovery Miles 85 490 Ships in 12 - 19 working days

As the world has entered the era of big data, there is a need to give a semantic perspective to the data to find unseen patterns, derive meaningful information, and make intelligent decisions. This 2-volume handbook set is a unique, comprehensive, and complete presentation of the current progress and future potential explorations in the field of data science and related topics. Handbook of Data Science with Semantic Technologies provides a roadmap for a new trend and future development of data science with semantic technologies. The first volume serves as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for both academic researchers and industry professionals. The second volume provides a roadmap for the deployment of semantic technologies in the field of data science that enables users to create intelligence through these technologies by exploring the opportunities while eradicating the current and future challenges. The set explores the optimal use of these technologies to provide the maximum benefit to the user under one comprehensive source. This set consisting of two separate volumes can be utilized independently or together as an invaluable resource for students, scholars, researchers, professionals, and practitioners in the field.

Ludic, Co-design and Tools Supporting Smart Learning Ecosystems and Smart Education - Proceedings of the 5th International... Ludic, Co-design and Tools Supporting Smart Learning Ecosystems and Smart Education - Proceedings of the 5th International Conference on Smart Learning Ecosystems and Regional Development (Hardcover, 1st ed. 2021)
Oscar Mealha, Matthias Rehm, Traian Rebedea
R4,376 Discovery Miles 43 760 Ships in 10 - 15 working days

This book presents papers from the 5th International Conference on Smart Learning Ecosystems and Regional Development, which promotes discussions on R&D work, policies, case studies, entrepreneur experiences, with a particular focus on understanding the relevance of smart learning ecosystems for regional development and social innovation, and how the effectiveness of the relation of citizens and smart ecosystems can be boosted. The book explores how technology-mediated instruments can foster citizens' engagement with learning ecosystems and territories, providing insights into innovative human-centric design and development models/techniques, education/training practices, informal social learning, innovative citizen-driven policies, and technology-mediated experiences and their impact. As such, it will inspire the social innovation sectors and ICT, as well as economic development and deployment strategies and new policies for smarter proactive citizens.

Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover): Omowunmi E. Isafiade, Antoine B. Bagula Data Mining Trends and Applications in Criminal Science and Investigations (Hardcover)
Omowunmi E. Isafiade, Antoine B. Bagula
R5,712 Discovery Miles 57 120 Ships in 10 - 15 working days

The field of data mining is receiving significant attention in today's information-rich society, where data is available from different sources and formats, in large volumes, and no longer constitutes a bottleneck for knowledge acquisition. This rich information has paved the way for novel areas of research, particularly in the crime data analysis realm. Data Mining Trends and Applications in Criminal Science and Investigations presents scientific concepts and frameworks of data mining and analytics implementation and uses across various domains, such as public safety, criminal investigations, intrusion detection, crime scene analysis, and suspect modeling. Exploring the diverse ways that data is revolutionizing the field of criminal science, this publication meets the research needs of law enforcement professionals, data analysts, investigators, researchers, and graduate-level students.

Intelligence in Big Data Technologies-Beyond the Hype - Proceedings of ICBDCC 2019 (Hardcover, 1st ed. 2021): J. Dinesh Peter,... Intelligence in Big Data Technologies-Beyond the Hype - Proceedings of ICBDCC 2019 (Hardcover, 1st ed. 2021)
J. Dinesh Peter, Steven L. Fernandes, Amir H Alavi
R5,711 Discovery Miles 57 110 Ships in 10 - 15 working days

This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. The papers discuss the recent advances in the areas of big data analytics, data analytics in cloud, smart cities and grid, etc. This volume primarily focuses on the application of knowledge which promotes ideas for solving problems of the society through cutting-edge big-data technologies. The essays featured in this proceeding provide novel ideas that contribute for the growth of world class research and development. It will be useful to researchers in the area of advanced engineering sciences.

Mixed Mode Oscillations (MMOs) - Fundamentals and Applications (Hardcover, 1st ed. 2021): Zdzislaw Trzaska Mixed Mode Oscillations (MMOs) - Fundamentals and Applications (Hardcover, 1st ed. 2021)
Zdzislaw Trzaska
R4,915 Discovery Miles 49 150 Ships in 12 - 19 working days

This book aims to present a survey of a large class of nonlinear dynamical systems exhibiting mixed-mode oscillations (MMOs). It is a sort of a guide to systems related to MMOs that features material from original research papers, including the author's own studies. The material is presented in seven chapters divided into sections. Usually, the first sections are of an introductory nature, explain phenomena, and exhibit numerical results. More advanced investigations are presented in the subsequent sections. Coverage includes * Dynamic behavior of nonlinear systems, * Fundamentals of processes exhibiting MMOs,* Mechanism and function of an structure of MMOs patterns, * Analysis of MMOs in electric circuits and systems, * MMOs in chemistry, biology, and medicine, * MMOs in mechanics and transport vehicles, * MMOs in fractional order systems. This is the first extensive description of these topics and the interpretation of analytical results and those obtained from computer simulations with the MATLAB environment. The book provides the readers with better understanding of the nature of MMOs, richness of their behaviors, and interesting applications.

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R1,007 Discovery Miles 10 070 Ships in 12 - 19 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,345 Discovery Miles 13 450 Ships in 12 - 19 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,930 Discovery Miles 79 300 Ships in 10 - 15 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,214 Discovery Miles 12 140 Ships in 12 - 19 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,125 Discovery Miles 11 250 Ships in 10 - 15 working days
Digital Watermarking and Steganography (Hardcover, 2nd edition): Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich,... Digital Watermarking and Steganography (Hardcover, 2nd edition)
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
R2,238 Discovery Miles 22 380 Ships in 12 - 19 working days

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications

Advances in Data and Information Sciences - Proceedings of ICDIS 2019 (Hardcover, 1st ed. 2020): Mohan L. Kolhe, Shailesh... Advances in Data and Information Sciences - Proceedings of ICDIS 2019 (Hardcover, 1st ed. 2020)
Mohan L. Kolhe, Shailesh Tiwari, Munesh C. Trivedi, Krishn K. Mishra
R5,730 Discovery Miles 57 300 Ships in 10 - 15 working days

This book gathers a collection of high-quality peer-reviewed research papers presented at the 2nd International Conference on Data and Information Sciences (ICDIS 2019), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on March 29-30, 2019. In chapters written by leading researchers, developers, and practitioner from academia and industry, it covers virtually all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.

Knowledge Discovery in Databases (Hardcover): May Sanders Knowledge Discovery in Databases (Hardcover)
May Sanders
R3,568 R3,225 Discovery Miles 32 250 Save R343 (10%) Ships in 10 - 15 working days
Co-Clustering (Hardcover): G Govaert Co-Clustering (Hardcover)
G Govaert
R4,083 Discovery Miles 40 830 Ships in 10 - 15 working days

Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R2,006 Discovery Miles 20 060 Ships in 10 - 15 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Machine Learning for Intelligent Decision Science (Hardcover, 1st ed. 2020): Jitendra Kumar Rout, Minakhi Rout, Himansu Das Machine Learning for Intelligent Decision Science (Hardcover, 1st ed. 2020)
Jitendra Kumar Rout, Minakhi Rout, Himansu Das
R4,604 Discovery Miles 46 040 Ships in 10 - 15 working days

The book discusses machine learning-based decision-making models, and presents intelligent, hybrid and adaptive methods and tools for solving complex learning and decision-making problems under conditions of uncertainty. Featuring contributions from data scientists, practitioners and educators, the book covers a range of topics relating to intelligent systems for decision science, and examines recent innovations, trends, and practical challenges in the field. The book is a valuable resource for academics, students, researchers and professionals wanting to gain insights into decision-making.

Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,993 Discovery Miles 49 930 Ships in 10 - 15 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Agile Project Management - The Complete Guide for Beginners to Scrum, Agile Project Management, and Software Development (Lean... Agile Project Management - The Complete Guide for Beginners to Scrum, Agile Project Management, and Software Development (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R800 R700 Discovery Miles 7 000 Save R100 (13%) Ships in 10 - 15 working days
Mobile Communication Networks: 5G and a Vision of 6G (Hardcover, 1st ed. 2021): Mladen Bozanic, Saurabh Sinha Mobile Communication Networks: 5G and a Vision of 6G (Hardcover, 1st ed. 2021)
Mladen Bozanic, Saurabh Sinha
R5,134 Discovery Miles 51 340 Ships in 10 - 15 working days

This book contributes to the body of scholarly knowledge by exploring the main ideas of wireless networks of past, present, and future, trends in the field of networking, the capabilities of 5G and technologies that are potential enablers of 6G, potential 6G applications and requirements, as well as unique challenges and opportunities that 6G research is going to offer over the next decade. It covers research topics such as communication via millimeter-waves, terahertz waves and visible light to enable faster speeds, as well as research into achieving other basic requirements of 6G networks. These include low end-to-end latency, high energy efficiency, coverage that is ubiquitous and always-on, integration of terrestrial wireless with non-terrestrial networks, network management that is made more effective by connected intelligence with machine learning capabilities, as well as support for the evolution of old service classes and support for new ones.

Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover): Joan Lu Design, Performance, and Analysis of Innovative Information Retrieval (Hardcover)
Joan Lu
R5,427 Discovery Miles 54 270 Ships in 10 - 15 working days

Daily procedures such as scientific experiments and business processes have the potential to create a huge amount of data every day, hour, or even second, and this may lead to a major problem for the future of efficient data search and retrieval as well as secure data storage for the world's scientists, engineers, doctors, librarians, and business managers.Design, Performance, and Analysis of Innovative Information Retrieval examines a number of emerging technologies that significantly contribute to modern Information Retrieval (IR), as well as fundamental IR theories and concepts that have been adopted into new tools or systems. This reference is essential to researchers, educators, professionals, and students interested in the future of IR.

Lattice-Based Public-Key Cryptography in Hardware (Hardcover, 1st ed. 2020): Sujoy Sinha Roy, Ingrid Verbauwhede Lattice-Based Public-Key Cryptography in Hardware (Hardcover, 1st ed. 2020)
Sujoy Sinha Roy, Ingrid Verbauwhede
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Self-Helpless - A Cynic's Search for…
Rebecca Davis Paperback  (4)
R290 R263 Discovery Miles 2 630
Intuitive Analog Circuit Design
Marc Thompson Paperback R1,667 Discovery Miles 16 670
Matching, Regression Discontinuity…
Myoung-Jae Lee Hardcover R3,982 Discovery Miles 39 820
Time and Petri Nets
Louchka Popova-Zeugmann Hardcover R2,515 R1,982 Discovery Miles 19 820
Essentials of Time Series for Financial…
Massimo Guidolin, Manuela Pedio Paperback R2,244 Discovery Miles 22 440
Applied Optimization and Swarm…
Eneko Osaba, Xin-She Yang Hardcover R5,102 Discovery Miles 51 020
Transcend JetRam DDR4-2666 SO-DIMM 16GB…
R1,877 R1,644 Discovery Miles 16 440
A Mathematical Journey to Quantum…
Salvatore Capozziello, Wladimir-Georges Boskoff Hardcover R2,531 Discovery Miles 25 310
Crucial Pro Overclocking | 16GB 6000Mhz…
R1,727 Discovery Miles 17 270
Almost Periodic Stochastic Processes
Paul H. Bezandry, Toka Diagana Hardcover R2,889 Discovery Miles 28 890

 

Partners