|
Books > Computing & IT > Applications of computing > Databases
The book gathers selected papers presented at the KES International
Symposium on Smart Transportation Systems (KES-STS 2019). Modern
transportation systems have undergone a rapid transformation in
recent years. This has produced a range of vehicle technology
innovations such as connected vehicles, self-driving cars, electric
vehicles, Hyperloop, and even flying cars, and with them,
fundamental changes in transport systems around the world. The book
discusses current challenges, innovations and breakthroughs in
Smart Transportation Systems, as well as transport infrastructure
modeling, safety analysis, freeway operations, intersection
analysis, and other related cutting-edge topics.
This book provides theoretical and practical approach in the area
of multimedia and IOT applications and performance analysis.
Further, multimedia communication, deep learning models to
multimedia data and the new (IOT) approaches are also covered. It
addresses the complete functional framework in the area of
multimedia data, IOT and smart computing techniques. The book
proposes a comprehensive overview of the state-of-the-art research
work on multimedia analysis in IOT applications. It bridges the gap
between multimedia concepts and solutions by providing the current
IOT frameworks, their applications in multimedia analysis, the
strengths and limitations of the existing methods, and the future
directions in multimedia IOT analytics.
This book provides insights into important new developments in the
area of statistical quality control and critically discusses
methods used in on-line and off-line statistical quality control.
The book is divided into three parts: Part I covers statistical
process control, Part II deals with design of experiments, while
Part III focuses on fields such as reliability theory and data
quality. The 12th International Workshop on Intelligent Statistical
Quality Control (Hamburg, Germany, August 16 - 19, 2016) was
jointly organized by Professors Sven Knoth and Wolfgang Schmid. The
contributions presented in this volume were carefully selected and
reviewed by the conference's scientific program committee. Taken
together, they bridge the gap between theory and practice, making
the book of interest to both practitioners and researchers in the
field of quality control.
This contributed book focuses on major aspects of statistical
quality control, shares insights into important new developments in
the field, and adapts established statistical quality control
methods for use in e.g. big data, network analysis and medical
applications. The content is divided into two parts, the first of
which mainly addresses statistical process control, also known as
statistical process monitoring. In turn, the second part explores
selected topics in statistical quality control, including
measurement uncertainty analysis and data quality. The
peer-reviewed contributions gathered here were originally presented
at the 13th International Workshop on Intelligent Statistical
Quality Control, ISQC 2019, held in Hong Kong on August 12-14,
2019. Taken together, they bridge the gap between theory and
practice, making the book of interest to both practitioners and
researchers in the field of statistical quality control.
The digital traces that people leave behind as they conduct their
daily lives provide a powerful resource for businesses to better
understand the dynamics of an otherwise chaotic society. Digital
technologies have become omnipresent in our lives and we still do
not fully know how to make the best use of the data these
technologies could harness. Businesses leveraging big data
appropriately could definitely gain a sustainable competitive
advantage. With a balanced mix of texts and cases, this book
discusses a variety of digital technologies and how they transform
people and organizations. It offers a debate on the societal
consequences of the yet unfolding technological revolution and
proposes alternatives for harnessing disruptive technologies for
the greater benefit of all. This book will have wide appeal to
academics in technology management, strategy, marketing, and human
resource management.
This book is a timely collection of chapters that present the state
of the art within the analysis and application of big data. Working
within the broader context of big data, this text focuses on the
hot topics of social network modelling and analysis such as online
dating recommendations, hiring practices, and subscription-type
prediction in mobile phone services. Manuscripts are expanded
versions of the best papers presented at the IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining
(ASONAM'2016), which was held in August 2016. The papers were among
the best featured at the meeting and were then improved and
extended substantially. Social Network Based Big Data Analysis and
Applications will appeal to students and researchers in the field.
This book discusses various aspects of blockchains in economic
systems and investment strategies in crypto markets. It first
addresses the topic from a conceptual and theoretical point of
view, and then analyzes it from an assessment and investment angle.
Further, it examines the opportunities and limitations of the
taxation of crypto currency, as well as the political implications,
such as regulation of speculation with crypto currencies. The book
is intended for academicians and students in the fields of
economics and finance.
This book presents a general framework analysis of sovereignty in
blockchain based on the concept of blockchain technology, and
specifically discusses the three theoretical foundations of
sovereignty in blockchain: data sovereignty theory, social trust
theory, and smart contract theory. It also explores the evolution
of laws concerning data and digital rights, how to build trust
mechanisms for digital rights transactions, as well as contract
signing and the implementation of digital rights transactions.
Here's a thorough introduction to the latest developments in
database systems design presented from an applications point of
view. Featuring contributions from well-known experts in the field,
this book pays special attention to issues raised by new trends in
database design, and how these developments affect the programmer
and database administrator.
 |
Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation
- IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2020, Tiruchirappalli, India, December 18-19, 2020, Proceedings, Part II
(Hardcover, 1st ed. 2020)
Sujeet K. Sharma, Yogesh K. Dwivedi, Bhimaraya Metri, Nripendra P. Rana
|
R4,730
Discovery Miles 47 300
|
Ships in 12 - 17 working days
|
|
This two-volume set of IFIP AICT 617 and 618 constitutes the
refereed proceedings of the IFIP WG 8.6 International Working
Conference "Re-imagining Diffusion and Adoption of Information
Technology and Systems: A Continuing Conversation" on Transfer and
Diffusion of IT, TDIT 2020, held in Tiruchirappalli, India, in
December 2020.The 86 revised full papers and 36 short papers
presented were carefully reviewed and selected from 224
submissions. The papers focus on the re-imagination of diffusion
and adoption of emerging technologies. They are organized in the
following parts: Part I: artificial intelligence and autonomous
systems; big data and analytics; blockchain; diffusion and adoption
technology; emerging technologies in e-Governance; emerging
technologies in consumer decision making and choice; fin-tech
applications; healthcare information technology; and Internet of
Things Part II: diffusion of information technology and disaster
management; adoption of mobile and platform-based applications;
smart cities and digital government; social media; and diffusion of
information technology and systems
This book provides an overview of the most recent developments in
Internet of Things (IoT) security and data protection. It presents
the results of several international research projects addressing
this topic from complementary angles. It starts by analyzing the
main privacy and security threats on IoT, as well as the evolution
of data protection norms, such as the European General Data
Protection Regulation (GDPR), and their impact on IoT. Through a
comprehensive and systematic approach, the contributors present new
perspectives on IoT & Cloud Computing security requirements.
They discuss the most recent approach to support trusted IoT,
including new models of privacy risk assessment, labeling and
certification, and contractual tools (such as Privacy PACT).
Practical implementations, such as in the European Large Scale
Pilots on IoT for Smart Cities (Synchronicity), are presented,
explaining how they address security, privacy and data protection.
Finally, innovative models to secure IoT systems are presented for
the network and end-nodes security, including network threats
analysis.
This book presents high-quality, original contributions (both
theoretical and experimental) on Information Security, Machine
Learning, Data Mining and Internet of Things (IoT). It gathers
papers presented at ICETIT 2019, the 1st International Conference
on Emerging Trends in Information Technology, which was held in
Delhi, India, in June 2019. This conference series represents a
targeted response to the growing need for research that reports on
and assesses the practical implications of IoT and network
technologies, AI and machine learning, data analytics and cloud
computing, security and privacy, and next generation computing
technologies.
This book is an important outcome of the Fifth World Internet
Conference. It provides a comprehensive account of the new trends
and highlights of global Internet development over the past year,
covering network infrastructure, information technology, digital
economy, world internet media, cyber security, and international
cyberspace governance. This year, the book improves the Global
Internet Development Index System and adds more countries into the
assessed list, in order to reflect more comprehensively,
objectively and accurately the general situation of the world
Internet development and thus to provide reference for all
countries in promoting Internet development and governance.
Intelligent methods are used in distributed environments in
countless ways, with examples such as propagation, communication,
collaboration, and cooperation. With the abundant purposes for
intelligence in distributed systems, it is pertinent for
researchers, technicians, and students in various areas of computer
science to discover the most current and definitive advances in the
field.""Intelligence Integration in Distributed Knowledge
Management"" provides recent technologies and practices in
intelligence for distributed systems, while covering major aspects
of the agent based systems. This book is a must for those striving
to enhance their understanding of distributed knowledge management
and extend their ideas of cooperation using for numerous real-world
problems.
Rising concerns about the security of our data have made quantum
cryptography a very active research field in recent years. Quantum
cryptographic protocols promise everlasting security by exploiting
distinctive quantum properties of nature. The most extensively
implemented protocol is quantum key distribution (QKD), which
enables secure communication between two users. The aim of this
book is to introduce the reader to state-of-the-art QKD and
illustrate its recent multi-user generalization: quantum conference
key agreement. With its pedagogical approach that doesn't disdain
going into details, the book enables the reader to join in
cutting-edge research on quantum cryptography.
Collecting the latest research results from the leading researchers
in the field of fuzzy object-oriented databases, Advances in Fuzzy
Object-Oriented Databases: Modeling and Applications provide a
single source for current research and practical applications in
fuzzy object-oriented databases. This book includes major aspects
of fuzzy object-oriented database modeling - conceptual, logical
and physical, as well as details of implementations and
applications. Readers will benefit from a complete understanding of
the notions, techniques, and methods related to the research and
developments of fuzzy object-oriented databases. This book can act
as a starting point and a reference for their research and
developments and stimulate the interest in the field of fuzzy
object-oriented databases and further promote the research in the
field.
The increasing trend of multimedia data use is likely to accelerate
creating an urgent need of providing a clear means of capturing,
storing, indexing, retrieving, analyzing, and summarizing data
through image data. ""Artificial Intelligence for Maximizing
Content Based Image Retrieval"" discusses major aspects of
content-based image retrieval (CBIR) using current technologies and
applications within the artificial intelligence (AI) field.
Providing state-of-the-art research from leading international
experts, this book offers a theoretical perspective and practical
solutions for academicians, researchers, and industry
practitioners.
This book explores the concepts and techniques of IoT, AI, and
blockchain. Also discussed is the possibility of applying
blockchain for providing security in various domains. The specific
highlight of this book is focused on the application of integrated
technologies in enhancing data models, better insights and
discovery, intelligent predictions, smarter finance, smart retail,
global verification, transparent governance, and innovative audit
systems. The book allows both practitioners and researchers to
share their opinions and recent research in the convergence of
these technologies among academicians and industry people. The
contributors present their technical evaluation and compare it with
existing technologies. Theoretical explanation and experimental
case studies related to real-time scenarios are also included. This
book pertains to IT professionals, researchers and academicians
working on fourth revolution technologies.
This contributed volume discusses diverse topics to demystify the
rapidly emerging and evolving blockchain technology, the emergence
of integrated platforms and hosted third-party tools, and the
development of decentralized applications for various business
domains. It presents various applications that are helpful for
research scholars and scientists who are working toward identifying
and pinpointing the potential of as well as the hindrances to this
technology.
 |
Agents and Multi-agent Systems: Technologies and Applications 2019
- 13th KES International Conference, KES-AMSTA-2019 St. Julians, Malta, June 2019 Proceedings
(Hardcover, 1st ed. 2020)
Gordan Jezic, Yun-Heh Jessica Chen-Burger, Mario Kusek, Roman Sperka, Robert J. Howlett, …
|
R5,932
Discovery Miles 59 320
|
Ships in 10 - 15 working days
|
|
This book highlights new trends and challenges in research on
agents and the new digital and knowledge economy. It includes
papers on business- process management, agent-based modeling and
simulation, and anthropic-oriented computing, which were originally
presented at the 13th International KES Conference on Agents and
Multi-Agent Systems - Technologies and Applications (KES-AMSTA
2019) held June 17-19, 2019 at St George's Bay, St. Julians, Malta.
Today's economy is driven by technologies and knowledge. Digital
technologies can free, shift and multiply choices, and often
intrude on the territory of other industries by providing new ways
of conducting business operations and creating value for customers
and companies. As such, the book covers topics such as software
agents, multi-agent systems, agent modeling, mobile and cloud
computing, big data analysis, business intelligence, artificial
intelligence, social systems, computer embedded systems and nature
inspired manufacturing, all of which contribute to the modern
digital economy. The research presented is of value to researchers
and industrial practitioners working in the fields of artificial
intelligence, collective computational intelligence, innovative
business models, the new digital and knowledge economy and, in
particular, agent and multi-agent systems, technologies, tools and
applications.
This book discusses the design and implementation of, as well as
experimentation on, an open cross-layer framework and associated
methodology to provide voluntary interoperability among
heterogeneous Internet of Things (IoT) platforms. It allows readers
to effectively and efficiently develop smart IoT applications for
various heterogeneous IoT platforms, spanning single and/or
multiple application domains. To do so, it provides an
interoperable framework architecture for the seamless integration
of different IoT architectures present in different application
domains. In this regard, interoperability is pursued at various
levels: device, network, middleware, services and data.
This book provides insights into smart ways of computer log data
analysis, with the goal of spotting adversarial actions. It is
organized into 3 major parts with a total of 8 chapters that
include a detailed view on existing solutions, as well as novel
techniques that go far beyond state of the art. The first part of
this book motivates the entire topic and highlights major
challenges, trends and design criteria for log data analysis
approaches, and further surveys and compares the state of the art.
The second part of this book introduces concepts that apply
character-based, rather than token-based, approaches and thus work
on a more fine-grained level. Furthermore, these solutions were
designed for "online use", not only forensic analysis, but also
process new log lines as they arrive in an efficient single pass
manner. An advanced method for time series analysis aims at
detecting changes in the overall behavior profile of an observed
system and spotting trends and periodicities through log analysis.
The third part of this book introduces the design of the AMiner,
which is an advanced open source component for log data anomaly
mining. The AMiner comes with several detectors to spot new events,
new parameters, new correlations, new values and unknown value
combinations and can run as stand-alone solution or as sensor with
connection to a SIEM solution. More advanced detectors help to
determines the characteristics of variable parts of log lines,
specifically the properties of numerical and categorical fields.
Detailed examples throughout this book allow the reader to better
understand and apply the introduced techniques with open source
software. Step-by-step instructions help to get familiar with the
concepts and to better comprehend their inner mechanisms. A log
test data set is available as free download and enables the reader
to get the system up and running in no time. This book is designed
for researchers working in the field of cyber security, and
specifically system monitoring, anomaly detection and intrusion
detection. The content of this book will be particularly useful for
advanced-level students studying computer science, computer
technology, and information systems. Forward-thinking
practitioners, who would benefit from becoming familiar with the
advanced anomaly detection methods, will also be interested in this
book.
|
|