![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.
This volume presents the second part of the proceedings of the Mediterranean Conference on Information & Communication Technologies (MedICT 2015), which was held at Saidia, Morocco during 7-9 May, 2015. MedICT provides an excellent international forum to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development. The conference has also a special focus on enabling technologies for societal challenges, and seeks to address multidisciplinary challenges in Information & Communication Technologies such as health, demographic change, wellbeing, security and sustainability issues. The proceedings publish high quality papers which are closely related to the various theories, as well as emerging and practical applications of particular interest to the ICT community. This second volume provides a compact yet broad view of recent developments in Data, Systems, Services and Education, and covers recent research areas in the field including Control Systems, Software Engineering, Data Mining and Big Data, ICT for Education and Support Activities, Networking, Cloud Computing and Security, ICT Based Services and Applications, Mobile Agent Systems, Software Engineering, Data Mining and Big Data, Online Experimentation & Artificial Intelligence in Education, Networking, Cloud Computing and Security, ICT Based Education and Services ICT Challenges and Applications, Advances in ICT Modeling and Design ICT Developments.
Electrical Engineering/Circuits and Systems Principles of Data Conversion System Design This advanced text and reference deals with the design and implementation of integrated circuits for analog-to-digital and digital-to-analog conversion. It begins with basic concepts and systematically leads the reader to advanced topics, describing design issues and techniques at both circuit and system levels. Key topics covered include:
This book will appeal to engineering students in the field of circuits and systems, as well as design engineers who want to gain a system-level perspective of data conversion units and their trade-offs. Behzad Razavi is a technical staff member at AT&T Bell Laboratories in Holmdel, New Jersey. He has had several IEEE papers published, including: "A 12-bit 10-MHz BiCMOS Comparator," "Design Techniques for High-Speed, High-Resolution Comparators," and "Low-Voltage Techniques for High-Speed Digital Bipolar Circuits." Dr. Razavi earned his Ph.D. and M.Sc. in Electrical Engineering from Stanford University and his B.Sc. in Electrical Engineering from Tehran University of Technology. Also of Interest from IEEE Press
This uniquely accessible book helps readers use CABology to solve real-world business problems and drive real competitive advantage. It provides reliable, concise information on the real benefits, usage and operationalization aspects of utilizing the "Trio Wave" of cloud, analytic and big data. Anyone who thinks that the game changing technology is slow paced needs to think again. This book opens readers' eyes to the fact that the dynamics of global technology and business are changing. Moreover, it argues that businesses must transform themselves in alignment with the Trio Wave if they want to survive and excel in the future. CABology focuses on the art and science of optimizing the business goals to deliver true value and benefits to the customer through cloud, analytic and big data. It offers business of all sizes a structured and comprehensive way of discovering the real benefits, usage and operationalization aspects of utilizing the Trio Wave.
This book presents selected papers on Business Management and Technology, focusing on recent research in Business, Optimization, Technology, and Global Issues. Organized in four broad tracks, papers examine Management Challenges in Today's Industry, especially concerning changes in customer demands; Optimization Challenges in Today's Business, looking at efficiency and effectiveness in providing goods and services at affordable prices; Innovation in Hospitality and Tourism; and Technological Challenges in the Era of Globalization. The book covers both production systems and service systems, including the growing area of Information Technology, and also looks at the quality of work life in various sectors of business. It presents a balanced blend of theoretical and practical papers.
This book provides an overview of the problems involved in engineering scalable, elastic, and cost-efficient cloud computing services and describes the CloudScale method - a description of rescuing tools and the required steps to exploit these tools. It allows readers to analyze the scalability problem in detail and identify scalability anti-patterns and bottlenecks within an application. With the CloudScale method, software architects can analyze both existing and planned IT services. The method allows readers to answer questions like: * With an increasing number of users, can my service still deliver acceptable quality of service? * What if each user uses the service more intensively? Can my service still handle it with acceptable quality of service? * What if the number of users suddenly increases? Will my service still be able to handle it? * Will my service be cost-efficient? First the book addresses the importance of scalability, elasticity, and cost-efficiency as vital quality-related attributes of modern cloud computing applications. Following a brief overview of CloudScale, cloud computing applications are then introduced in detail and the aspects that need to be captured in models of such applications are discussed. In CloudScale, these aspects are captured in instances of the ScaleDL modeling language. Subsequently, the book describes the forward engineering part of CloudScale, which is applicable when developing a new service. It also outlines the reverse and reengineering parts of CloudScale, which come into play when an existing (legacy) service is modified. Lastly, the book directly focuses on the needs of both business-oriented and technical managers by providing guidance on all steps of implementing CloudScale as well as making decisions during that implementation. The demonstrators and reference projects described serve as a valuable starting point for learning from experience. This book is meant for all stakeholders interested in delivering scalable, elastic, and cost-efficient cloud computing applications: managers, product owners, software architects and developers alike. With this book, they can both see the overall picture as well as dive into issues of particular interest.
This book constitutes the refereed proceedings of the 14th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2018, held in Athens, Greece, in June 2018. The 14 revised full papers and 2 short papers presented were carefully reviewed and selected from 38 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and are organized in the following thematic sections: organizational aspects of OSS projects, OSS projects validity, mining OSS data, OSS in public administration, OSS governance, and OSS reusability.
Containing twenty six contributions by experts from all over the world, this book presents both research and review material describing the evolution and recent developments of various pattern recognition methodologies, ranging from statistical, linguistic, fuzzy-set-theoretic, neural, evolutionary computing and rough-set-theoretic to hybrid soft computing, with significant real-life applications.Pattern Recognition and Big Data provides state-of-the-art classical and modern approaches to pattern recognition and mining, with extensive real life applications. The book describes efficient soft and robust machine learning algorithms and granular computing techniques for data mining and knowledge discovery; and the issues associated with handling Big Data. Application domains considered include bioinformatics, cognitive machines (or machine mind developments), biometrics, computer vision, the e-nose, remote sensing and social network analysis.
Information systems belong to the most complex artifacts built in today's society. Developing, maintaining, and using an information system raises a large number of difficult problems, ranging from purely technical to organizational and social. ""Information Systems Engineering"" presents the most current research on existing and emergent trends on conceptual modeling and information systems engineering, bridging the gap between research and practice by providing a much-needed reference point on the design of software systems that evolve seamlessly to adapt to rapidly changing business and organizational practices.
This PALO volume constitutes the Proceedings of the 19th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES 2015), held in Bangkok, Thailand, November 22-25, 2015. The IES series of conference is an annual event that was initiated back in 1997 in Canberra, Australia. IES aims to bring together researchers from countries of the Asian Pacific Rim, in the fields of intelligent systems and evolutionary computation, to exchange ideas, present recent results and discuss possible collaborations. Researchers beyond Asian Pacific Rim countries are also welcome and encouraged to participate. The theme for IES 2015 is "Transforming Big Data into Knowledge and Technological Breakthroughs". The host organization for IES 2015 is the School of Information Technology (SIT), King Mongkut's University of Technology Thonburi (KMUTT), and it is technically sponsored by the International Neural Network Society (INNS). IES 2015 is collocated with three other conferences; namely, The 6th International Conference on Computational Systems-Biology and Bioinformatics 2015 (CSBio 2015), The 7th International Conference on Advances in Information Technology 2015 (IAIT 2015) and The 10th International Conference on e-Business 2015 (iNCEB 2015), as a major part of series of events to celebrate the SIT 20th anniversary and the KMUTT 55th anniversary.
The series, Contemporary Perspectives on Data Mining, is composed of blind refereed scholarly research methods and applications of data mining. This series will be targeted both at the academic community, as well as the business practitioner. Data mining seeks to discover knowledge from vast amounts of data with the use of statistical and mathematical techniques. The knowledge is extracted form this data by examining the patterns of the data, whether they be associations of groups or things, predictions, sequential relationships between time order events or natural groups. Data mining applications are seen in finance (banking, brokerage, insurance), marketing (customer relationships, retailing, logistics, travel), as well as in manufacturing, health care, fraud detection, home-land security, and law enforcement.
This volume presents the first part of the proceedings of the Mediterranean Conference on Information & Communication Technologies (MedICT 2015), which was held at Saidia, Morocco during 7-9 May, 2015. MedICT provides an excellent international forum to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development. The conference has also a special focus on enabling technologies for societal challenges, and seeks to address multidisciplinary challenges in Information & Communication Technologies such as health, demographic change, wellbeing, security and sustainability issues. The proceedings publish high quality papers which are closely related to the various theories, as well as emerging and practical applications of particular interest to the ICT community. This first volume provides a compact yet broad view of recent developments in devices, technologies and processing, and covers recent research areas in the field including Microwave Devices and Printed Antennas, Advances in Optical and RF Devices and Applications, Signal Processing and Information Theory, Wireless and Optical Technologies and Techniques, Computer Vision, Optimization and Modeling in Wireless Communication Systems, Modeling, Identification and Biomedical Signal Processing, Photovoltaic Cell & Systems, RF Devices and Antennas for Wireless Applications, RFID, Ad Hoc and Networks Issues.
This book provides a deep analysis and wide coverage of the very strong trend in computer vision and visual indexing and retrieval, covering such topics as incorporation of models of Human Visual attention into analysis and retrieval tasks. It makes the bridge between psycho-visual modelling of Human Visual System and the classical and most recent models in visual content indexing and retrieval. The large spectrum of visual tasks, such as recognition of textures in static images, of actions in video content, image retrieval, different methods of visualization of images and multimedia content based on visual saliency are presented by the authors. Furthermore, the interest in visual content is modelled with the means of the latest classification models such as Deep Neural Networks is also covered in this book. This book is an exceptional resource as a secondary text for researchers and advanced level students, who are involved in the very wide research in computer vision, visual information indexing and retrieval. Professionals working in this field will also be interested in this book as a reference.
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.
This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.
While high quality library and information services continue to thrive and strengthen economic and social development, much of the knowledge that exists on user's needs and behaviours is fundamentally based on the results of users in English-speaking, western developed countries. Information Access and Library User Needs in Developing Countries highlights the struggles that developing countries face in terms of information gaps and information-seeking user behaviour. The publication highlights ways in which users in developing countries can benefit from properly implementing LIS services. Researchers, academics, and practitioners interested in the design and delivery of information services will benefit from this collection of research.
Sequential data from Web server logs, online transaction logs, and performance measurements is collected each day. This sequential data is a valuable source of information, as it allows individuals to search for a particular value or event and also facilitates analysis of the frequency of certain events or sets of related events. Finding patterns in sequences is of utmost importance in many areas of science, engineering, and business scenarios. Pattern Discovery Using Sequence Data Mining: Applications and Studies provides a comprehensive view of sequence mining techniques and presents current research and case studies in pattern discovery in sequential data by researchers and practitioners. This research identifies industry applications introduced by various sequence mining approaches.
The amount of data shared and stored on the web and other document repositories is steadily on the rise. Unfortunately, this growth increases inefficiencies and difficulties when trying to find the most relevant and up-to-date information due to unstructured data. Advanced Metaheuristic Methods in Big Data Retrieval and Analytics examines metaheuristic techniques as an important alternative model for solving complex problems that are not treatable by deterministic methods. Recent studies suggest that IR and biomimicry can be used together for several application problems in big data and internet of things, especially when conventional methods would be too expensive or difficult to implement. Featuring coverage on a broad range of topics such as ontology, plagiarism detection, and machine learning, this book is ideally designed for engineers, graduate students, IT professionals, and academicians seeking an overview of new trends in information retrieval in big data.
Video Data Management and Information Retrieval combines the two important areas of research within computer technology and presents them in comprehensive, easy to understand manner. Video Data Management and Information Retrieval is ideal for graduates and under-graduates, as well as researchers working in either video data management or information retrieval. It takes an in depth look at many relevant topics within both video data management and information retrieval. In addition to dissecting those issues, the book also provides a ""big picture"" view of each topic. This shows the relevance of each issue and how those areas affect every one today.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This book describes efforts to improve subject-independent automated classification techniques using a better feature extraction method and a more efficient model of classification. It evaluates three popular saliency criteria for feature selection, showing that they share common limitations, including time-consuming and subjective manual de-facto standard practice, and that existing automated efforts have been predominantly used for subject dependent setting. It then proposes a novel approach for anomaly detection, demonstrating its effectiveness and accuracy for automated classification of biomedical data, and arguing its applicability to a wider range of unsupervised machine learning applications in subject-independent settings.
This book highlights research in linking and mining data from across varied data sources. The authors focus on recent advances in this burgeoning field of multi-source data fusion, with an emphasis on exploratory and unsupervised data analysis, an area of increasing significance with the pace of growth of data vastly outpacing any chance of labeling them manually. The book looks at the underlying algorithms and technologies that facilitate the area within big data analytics, it covers their applications across domains such as smarter transportation, social media, fake news detection and enterprise search among others. This book enables readers to understand a spectrum of advances in this emerging area, and it will hopefully empower them to leverage and develop methods in multi-source data fusion and analytics with applications to a variety of scenarios. Includes advances on unsupervised, semi-supervised and supervised approaches to heterogeneous data linkage and fusion; Covers use cases of analytics over multi-view and heterogeneous data from across a variety of domains such as fake news, smarter transportation and social media, among others; Provides a high-level overview of advances in this emerging field and empowers the reader to explore novel applications and methodologies that would enrich the field.
Reengineering: An Objectoriented Model for Data, Knowledge and System Reengineering (S.M. Huang et al.). Uturn Methodology: A Database Reengineering Methodology Based on the Entity -Structure- Relationship Data Model (I.K. Jeong, D.K. Baik). The Management Perspective of Database Reengineering (C. Yau). Reengineering VSAM, IMS, and DL/1 Applications into Relational Databases (R. England). Reengineering Library Data: The Long Way from ADABAS to NIMARC (D. Aebi, R. Largo). Reverse Engineering in a Client'Server Environment Case Studies on Relational Database Design (B. Siu, J. Fong). Eliminating the Impedance Mismatch between Relational Systems and Objectoriented Programming Languages (J. Chen, Q. Huang). Generalization without Reorganization in a Simple Objectoriented DBMS (T. Beldjilali). Interoperability: Semantic Query Transformation: An Approach to Achieve Semantic Interoperability in Heterogeneous Application Domains (N. Bolloju). On Interoperability Verification and Testing of Objectoriented Databases (T.Y. Kuo, T.Y. Cheung). An Objectoriented Approach to Query Interoperability (J. Zhan, W.S. Luk). Building Parameterized Canonical Representations to Achieve Interoperability among Heterogeneous Databases (Y. Chang, L. Raschid). Flexible Transaction Management in an Interoperable Database Environment (W. Yu, F. Eliassen). A Pilot Survey of Database Reengineering for Data Interoperability (I.S.Y. Kwan). Designing Client-Server Applications for Enterprise Database Connectivity (C. Moffatt). Handling Terabyte Databases on Open Systems (T. Banham). Integration: Schema Integration Methodology including Structural Conflict Resolution and Checking Similarity (G. Suzuki, M. Yamamuro). Extensional Issues in Schema Integration (M. GarciaSolaco et al.). Towards Intelligent Integration of Heterogeneous Information Sources (S.B. Navathe, M.J. Donahoo). A Business ProcessDriven Multidatabase Integration Methodology (R.M. Muhlerger, M.E. Orlowska). A Database Integration System and an Example of Its Application (A.E. James). DEE: A Data Exchange Environment (G.N. Benadjaoud, B.T. David). Database Replica Management Strategies in Multidatabase Systems with Mobile Hosts (M. Faiz, A. Zaslavsky). Providing Multidatabase Access: An Association Approach (P. Missier et al.). Index. |
You may like...
Compressed Sensing & Sparse Filtering
Avishy Y. Carmi, Lyudmila Mihaylova, …
Hardcover
Networks in Action - Text and Computer…
Gerard Sierksma, Diptesh Ghosh
Hardcover
R1,508
Discovery Miles 15 080
Topics in Numerical Partial Differential…
Susanne C. Brenner
Hardcover
R3,281
Discovery Miles 32 810
Nature-Inspired Metaheuristic Algorithms…
Serdar Carbas, Abdurrahim Toktas, …
Hardcover
R5,207
Discovery Miles 52 070
Accelerated Optimization for Machine…
Zhouchen Lin, Huan Li, …
Hardcover
R3,997
Discovery Miles 39 970
Measures of Complexity - Festschrift for…
Vladimir Vovk, Harris Papadopoulos, …
Hardcover
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Fundamentals of Algebraic Graph…
Hartmut Ehrig, Karsten Ehrig, …
Hardcover
R3,164
Discovery Miles 31 640
Advances in Mathematical Methods and…
Vinai K. Singh, David Gao, …
Hardcover
|