![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.
Containing twenty six contributions by experts from all over the world, this book presents both research and review material describing the evolution and recent developments of various pattern recognition methodologies, ranging from statistical, linguistic, fuzzy-set-theoretic, neural, evolutionary computing and rough-set-theoretic to hybrid soft computing, with significant real-life applications.Pattern Recognition and Big Data provides state-of-the-art classical and modern approaches to pattern recognition and mining, with extensive real life applications. The book describes efficient soft and robust machine learning algorithms and granular computing techniques for data mining and knowledge discovery; and the issues associated with handling Big Data. Application domains considered include bioinformatics, cognitive machines (or machine mind developments), biometrics, computer vision, the e-nose, remote sensing and social network analysis.
This book illustrates all the concepts of web mining from gathering the web data sources to discovering and representing the extracted knowledge. This book is ideal for many researchers and scholars who are interested in a reference book that involves all the techniques and algorithms that are applied to a Web environment. This book illustrates, analyzes, and compares all the techniques, applications, and algorithms that are used in Web mining categories and provides a thorough overview to undergraduates, postgraduates, and scholars who wish to learn more about Web and data mining. The goal of this book is to foster transformative, multidisciplinary, and novel approaches that introduce the practical approach of analyzing various web data sources and extracting knowledge by taking into consideration the unique challenges present in the environment. This book provides a complete overview of Web mining techniques and applications; it will be crucial for postgraduate students who want to understand the Web environment better and do not know the differences between Web mining and data mining. It will also be helpful for companies and organizations to discover practical solutions to handle their internet data in a more efficient way, as well as undergraduate students in software engineering and computer science engineering departments who do not have a complete reference book that offers them a full explanation about Web mining.
This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
The proceedings publishes new research results of scholars from the First International Conference on Agriculture and Information (ICAIT2019) organized by IRNet International Academic Communication Center, held during November 22-24, 2019. The book covers works from active researchers who are working on collaboration of agriculture and various information technologies such as ICT (Information and Communication Technologies) applicable/applied to agricultural produce, manufacturing preservation and distribution of agricultural products, etc. The book focuses on theory, design, development, testing and evaluation of all information technologies applicable/applied to various parts of agriculture and its infrastructure. The topics included are information technologies applicable to smart agriculture, intelligent information systems for smart farm systems, web-based intelligent information systems on agriculture, ICT-based marketing of agricultural products, agricultural product consumption network systems, IoT for agricultural produce and products, soft computing theories, intelligent management for agriculture, data science techniques for agriculture.
This book negotiates the hyper dimensions of the Internet through stories from myriads of Web sites, with its fluent presentation and simple but chronological organization of topics highlighting numerous opportunities and providing a solid starting point not only for inexperienced entrepreneurs and managers but anyone interested in applying information technology in business through real or virtual enterprise networks to date. "A Manager's Primer on e-Networking" is an easy to follow primer on modern enterprise networking that every manager needs to read.
Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world. Advanced Database Query Systems: Techniques, Applications and Technologies focuses on technologies and methodologies of database queries, XML and metadata queries, and applications of database query systems, aiming at providing a single account of technologies and practices in advanced database query systems. This book provides the state of the art information for academics, researchers and industry practitioners who are interested in the study, use, design and development of advanced and emerging database queries with ultimate aim of building competencies for exploiting the opportunities of the data and knowledge society.
This handbook covers a wide range of topics related to the collection, processing, analysis, and use of geospatial data in their various forms. This handbook provides an overview of how spatial computing technologies for big data can be organized and implemented to solve real-world problems. Diverse subdomains ranging from indoor mapping and navigation over trajectory computing to earth observation from space, are also present in this handbook. It combines fundamental contributions focusing on spatio-textual analysis, uncertain databases, and spatial statistics with application examples such as road network detection or colocation detection using GPUs. In summary, this handbook gives an essential introduction and overview of the rich field of spatial information science and big geospatial data. It introduces three different perspectives, which together define the field of big geospatial data: a societal, governmental, and governance perspective. It discusses questions of how the acquisition, distribution and exploitation of big geospatial data must be organized both on the scale of companies and countries. A second perspective is a theory-oriented set of contributions on arbitrary spatial data with contributions introducing into the exciting field of spatial statistics or into uncertain databases. A third perspective is taking a very practical perspective to big geospatial data, ranging from chapters that describe how big geospatial data infrastructures can be implemented and how specific applications can be implemented on top of big geospatial data. This would include for example, research in historic map data, road network extraction, damage estimation from remote sensing imagery, or the analysis of spatio-textual collections and social media. This multi-disciplinary approach makes the book unique. This handbook can be used as a reference for undergraduate students, graduate students and researchers focused on big geospatial data. Professionals can use this book, as well as practitioners facing big collections of geospatial data.
As new concepts such as virtualisation, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.
Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management focuses on the challenges of distributed systems imposed by data intensive applications and on the different state-of-the-art solutions proposed to overcome such challenges. Providing hints on how to manage low-level data handling issues when performing data intensive distributed computing, this publication is ideal for scientists, researchers, engineers, and application developers, alike. With the knowledge of the correct data management techniques for their applications, readers will be able to focus on their primary goal, assured that their data management needs are handled reliably and efficiently.
This book covers advances in system, control and computing. This book gathers selected high-quality research papers presented at the International Conference on Advances in Systems, Control and Computing (AISCC 2020), held at MNIT Jaipur during February 27-28, 2020. The first part is advances in systems and it is dedicated to applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi-agent systems, machine learning, other intelligent systems and related areas. In the second part, machine learning and other intelligent algorithms for design of control/control analysis are covered. The last part covers advancements, modifications, improvements and applications of intelligent algorithms.
Covering aspects from principles and limitations of statistical significance tests to topic set size design and power analysis, this book guides readers to statistically well-designed experiments. Although classical statistical significance tests are to some extent useful in information retrieval (IR) evaluation, they can harm research unless they are used appropriately with the right sample sizes and statistical power and unless the test results are reported properly. The first half of the book is mainly targeted at undergraduate students, and the second half is suitable for graduate students and researchers who regularly conduct laboratory experiments in IR, natural language processing, recommendations, and related fields.Chapters 1-5 review parametric significance tests for comparing system means, namely, t-tests and ANOVAs, and show how easily they can be conducted using Microsoft Excel or R. These chapters also discuss a few multiple comparison procedures for researchers who are interested in comparing every system pair, including a randomised version of Tukey's Honestly Significant Difference test. The chapters then deal with known limitations of classical significance testing and provide practical guidelines for reporting research results regarding comparison of means. Chapters 6 and 7 discuss statistical power. Chapter 6 introduces topic set size design to enable test collection builders to determine an appropriate number of topics to create. Readers can easily use the author's Excel tools for topic set size design based on the paired and two-sample t-tests, one-way ANOVA, and confidence intervals. Chapter 7 describes power-analysis-based methods for determining an appropriate sample size for a new experiment based on a similar experiment done in the past, detailing how to utilize the author's R tools for power analysis and how to interpret the results. Case studies from IR for both Excel-based topic set size design and R-based power analysis are also provided.
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery tackles those data sets and covers a variety of issues in relation to intelligent data analysis so that patterns from frequent or rare events in spatial or temporal spaces can be revealed. This book brings together current research, results, problems, and applications from both theoretical and practical approaches.
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes selected papers from the International Conference on Computational Intelligence and Data Engineering (ICCIDE 2020). It covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence and speech processing.
Within a given enterprise, database management involves the monitoring, administration, and maintenance of the databases, which constantly change with new technologies and new forms of data. Cross-Disciplinary Models and Applications of Database Management: Advancing Approaches is an updated look at the latest tools and technology within the burgeoning field of database management. Perfect for the network administrator, technician, information technology specialist or consultant, or for academics and students, this volume presents the latest the field has to offer by way of cases and new research. As database languages, models, and systems change, it s vital for practitioners within the field to stay abreast of the latest research and methods being used around the world, and this book offers the most current advances available.
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
This book highlights cutting-edge applications of machine learning techniques for disaster management by monitoring, analyzing, and forecasting hydro-meteorological variables. Predictive modelling is a consolidated discipline used to forewarn the possibility of natural hazards. In this book, experts from numerical weather forecast, meteorology, hydrology, engineering, agriculture, economics, and disaster policy-making contribute towards an interdisciplinary framework to construct potent models for hazard risk mitigation. The book will help advance the state of knowledge of artificial intelligence in decision systems to aid disaster management and policy-making. This book can be a useful reference for graduate student, academics, practicing scientists and professionals of disaster management, artificial intelligence, and environmental sciences.
This textbook covers the broader field of artificial intelligence. The chapters for this textbook span within three categories: Deductive reasoning methods: These methods start with pre-defined hypotheses and reason with them in order to arrive at logically sound conclusions. The underlying methods include search and logic-based methods. These methods are discussed in Chapters 1through 5. Inductive Learning Methods: These methods start with examples and use statistical methods in order to arrive at hypotheses. Examples include regression modeling, support vector machines, neural networks, reinforcement learning, unsupervised learning, and probabilistic graphical models. These methods are discussed in Chapters~6 through 11. Integrating Reasoning and Learning: Chapters~11 and 12 discuss techniques for integrating reasoning and learning. Examples include the use of knowledge graphs and neuro-symbolic artificial intelligence. The primary audience for this textbook are professors and advanced-level students in computer science. It is also possible to use this textbook for the mathematics requirements for an undergraduate data science course. Professionals working in this related field many also find this textbook useful as a reference.
Recent research reveals that socioeconomic factors of the neighborhoods where road users live and where pedestrian-vehicle crashes occur are important in determining the severity of the crashes, with the former having a greater influence. Hence, road safety countermeasures, especially those focusing on the road users, should be targeted at these high risk neighborhoods. Big Data Analytics in Traffic and Transportation Engineering: Emerging Research and Opportunities is an essential reference source that discusses access to transportation and examines vehicle-pedestrian crashes, specifically in relation to socioeconomic factors that influence them, main predictors, factors that contribute to crash severity, and the enhancement of pedestrian safety measures. Featuring research on topics such as public transport, accessibility, and spatial distribution, this book is ideally designed for policymakers, transportation engineers, road safety designers, transport planners and managers, professionals, academicians, researchers, and public administrators.
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.
There is a large increase in the amount of information available on World Wide Web and also in number of online databases. This information abundance increases the complexity of locating relevant information. Such a complexity drives the need for improved and intelligent systems for search and information retrieval. Intelligent Agents are currently used to improve the search and retrieval information on World Wide Web. The use of existing search and retrieval engines with the addition of intelligent agents allows a more comprehensive search with a performance that can be measured. Intelligent Agents for Mining and Information Retrieval discusses the foundation as well as the pratical side of intelligent agents and their theory and applications for web data mining and information retrieval. The book can used for researchers at the undergraduate and post-graduate levels as well as a reference of the state-of-art for cutting edge researchers.
This book constitutes the refereed post-conference proceedings of the Third IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2020, held in Chennai, India, in February 2020.The 19 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers are organized in the following topical sections: computational intelligence for text analysis; computational intelligence for image and video analysis; and data science. |
![]() ![]() You may like...
|