0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (62)
  • R250 - R500 (382)
  • R500+ (14,666)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

First-stage LISA Data Processing and Gravitational Wave Data Analysis - Ultraprecise Inter-satellite Laser Ranging, Clock... First-stage LISA Data Processing and Gravitational Wave Data Analysis - Ultraprecise Inter-satellite Laser Ranging, Clock Synchronization and Novel Gravitational Wave Data Analysis Algorithms (Hardcover, 1st ed. 2016)
Yan Wang
R3,359 Discovery Miles 33 590 Ships in 10 - 15 working days

This thesis covers a diverse set of topics related to space-based gravitational wave detectors such as the Laser Interferometer Space Antenna (LISA). The core of the thesis is devoted to the preprocessing of the interferometric link data for a LISA constellation, specifically developing optimal Kalman filters to reduce arm length noise due to clock noise. The approach is to apply Kalman filters of increasing complexity to make optimal estimates of relevant quantities such as constellation arm length, relative clock drift, and Doppler frequencies based on the available measurement data. Depending on the complexity of the filter and the simulated data, these Kalman filter estimates can provide up to a few orders of magnitude improvement over simpler estimators. While the basic concept of the LISA measurement (Time Delay Interferometry) was worked out some time ago, this work brings a level of rigor to the processing of the constellation-level data products. The thesis concludes with some topics related to the eLISA such as a new class of phenomenological waveforms for extreme mass-ratio inspiral sources (EMRIs, one of the main source for eLISA), an octahedral space-based GW detector that does not require drag-free test masses, and some efficient template-search algorithms for the case of relatively high SNR signals.

Integration of Information Flow for Greening Supply Chain Management (Hardcover, 1st ed. 2020): Adam Kolinski, Davor Dujak,... Integration of Information Flow for Greening Supply Chain Management (Hardcover, 1st ed. 2020)
Adam Kolinski, Davor Dujak, Paulina Golinska- Dawson
R3,169 Discovery Miles 31 690 Ships in 18 - 22 working days

This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more "green" supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains

Conceptual Modeling Perspectives (Hardcover, 1st ed. 2017): Jordi Cabot, Cristina Gomez, Oscar Pastor, Maria Ribera Sancho,... Conceptual Modeling Perspectives (Hardcover, 1st ed. 2017)
Jordi Cabot, Cristina Gomez, Oscar Pastor, Maria Ribera Sancho, Ernest Teniente
R3,645 R3,384 Discovery Miles 33 840 Save R261 (7%) Ships in 10 - 15 working days

Conceptual modeling has always been one of the main issues in information systems engineering as it aims to describe the general knowledge of the system at an abstract level that facilitates user understanding and software development. This collection of selected papers provides a comprehensive and extremely readable overview of what conceptual modeling is and perspectives on making it more and more relevant in our society. It covers topics like modeling the human genome, blockchain technology, model-driven software development, data integration, and wiki-like repositories and demonstrates the general applicability of conceptual modeling to various problems in diverse domains. Overall, this book is a source of inspiration for everybody in academia working on the vision of creating a strong, fruitful and creative community of conceptual modelers. With this book the editors and authors want to honor Prof. Antoni Olive for his enormous and ongoing contributions to the conceptual modeling discipline. It was presented to him on the occasion of his keynote at ER 2017 in Valencia, a conference that he has contributed to and supported for over 20 years. Thank you very much to Antoni for so many years of cooperation and friendship.

Last Mile Internet Access for Emerging Economies (Hardcover, 1st ed. 2019): Wynand Lambrechts, Saurabh Sinha Last Mile Internet Access for Emerging Economies (Hardcover, 1st ed. 2019)
Wynand Lambrechts, Saurabh Sinha
R3,117 Discovery Miles 31 170 Ships in 18 - 22 working days

This book presents an investigative approach to globalization-driving technologies that efficiently deliver ubiquitous, last-mile, broadband internet access to emerging markets and rural areas. Research has shown that ubiquitous internet access boosts socio-economic growth through innovations in science and technology, and has a positive effect on the lives of individuals. Last-mile internet access in developing countries is not only intended to provide areas with stable, efficient, and cost-effective broadband capabilities, but also to encourage the use of connectivity for human capacity development. The book offers an overview of the principles of various technologies, such as light fidelity and millimeter-wave backhaul, as last-mile internet solutions and describes these potential solutions from a signal propagation perspective. It also provides readers with the notional context needed to understand their operation, benefits, and limitations, and enables them to investigate feasible and tailored solutions to ensure sustainable infrastructures that are expandable and maintainable.

Edge Computing - From Hype to Reality (Hardcover, 1st ed. 2019): Fadi Al-Turjman Edge Computing - From Hype to Reality (Hardcover, 1st ed. 2019)
Fadi Al-Turjman
R3,335 Discovery Miles 33 350 Ships in 18 - 22 working days

In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.

Handbook of Research on Designing User Interfaces With a Data Science Approach (Hardcover): Abhijit Narayanrao Banubakode,... Handbook of Research on Designing User Interfaces With a Data Science Approach (Hardcover)
Abhijit Narayanrao Banubakode, Haris Abd Wahab, Mohd Rashid Mohd Saad, Hasan Reza, Mokbul Morshed Ahmad
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

Data science has been playing a vital role in almost all major fields. Many researchers are interested in the development of IT applications, which are user-driven with a focus on issues. This can be addressed using data science. User-driven research and data science have gained much attention from many private, public, and government organizations and research institutions. The Handbook of Research on Designing User Interfaces With a Data Science Approach promotes the inclusion of more diversified users for user-centered designs of applications across domains and analyzes user data with a data science approach for effective and user-friendly user interface designs. It introduces the foundations of advanced topics of human-computer interaction, particularly with user-centered designs and techniques. Covering topics such as artificial neural networks, natural dialog systems, and machine learning, this book is an essential resource for faculty, research scholars, industry professionals, students of higher education, mathematicians, data scientists, interaction designers, visual designers, software engineers, user experience researchers, accessibility engineers, cognitive system engineers, academicians, and libraries.

Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.): Seppo... Transaction Processing - Management of the Logical Database and its Underlying Physical Structure (Hardcover, 2014 ed.)
Seppo Sippu, Eljas Soisalon-Soininen
R2,550 Discovery Miles 25 500 Ships in 10 - 15 working days

Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.

Stream Data Mining: Algorithms and Their Probabilistic Properties (Hardcover, 1st ed. 2020): Leszek Rutkowski, Maciej Jaworski,... Stream Data Mining: Algorithms and Their Probabilistic Properties (Hardcover, 1st ed. 2020)
Leszek Rutkowski, Maciej Jaworski, Piotr Duda
R4,645 Discovery Miles 46 450 Ships in 10 - 15 working days

This book presents a unique approach to stream data mining. Unlike the vast majority of previous approaches, which are largely based on heuristics, it highlights methods and algorithms that are mathematically justified. First, it describes how to adapt static decision trees to accommodate data streams; in this regard, new splitting criteria are developed to guarantee that they are asymptotically equivalent to the classical batch tree. Moreover, new decision trees are designed, leading to the original concept of hybrid trees. In turn, nonparametric techniques based on Parzen kernels and orthogonal series are employed to address concept drift in the problem of non-stationary regressions and classification in a time-varying environment. Lastly, an extremely challenging problem that involves designing ensembles and automatically choosing their sizes is described and solved. Given its scope, the book is intended for a professional audience of researchers and practitioners who deal with stream data, e.g. in telecommunication, banking, and sensor networks.

Data Analytics - The Ultimate Guide to Big Data Analytics for Business, Data Mining Techniques, Data Collection, and Business... Data Analytics - The Ultimate Guide to Big Data Analytics for Business, Data Mining Techniques, Data Collection, and Business Intelligence Concepts (Hardcover)
Herbert Jones
R705 R634 Discovery Miles 6 340 Save R71 (10%) Ships in 18 - 22 working days
Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Advanced Data Mining Technologies in Bioinformatics (Hardcover): Advanced Data Mining Technologies in Bioinformatics (Hardcover)
R2,497 Discovery Miles 24 970 Ships in 18 - 22 working days

The technologies in data mining have been applied to bioinformatics research in the past few years with success, but more research in this field is necessary. While tremendous progress has been made over the years, many of the fundamental challenges in bioinformatics are still open. Data mining plays a essential role in understanding the emerging problems in genomics, proteomics, and systems biology. ""Advanced Data Mining Technologies in Bioinformatics"" covers important research topics of data mining on bioinformatics. Readers of this book will gain an understanding of the basics and problems of bioinformatics, as well as the applications of data mining technologies in tackling the problems and the essential research topics in the field. ""Advanced Data Mining Technologies in Bioinformatics"" is extremely useful for data mining researchers, molecular biologists, graduate students, and others interested in this topic.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Data Mining and Knowledge Discovery Technologies (Hardcover): David Taniar Data Mining and Knowledge Discovery Technologies (Hardcover)
David Taniar
R2,633 Discovery Miles 26 330 Ships in 18 - 22 working days

As information technology continues to advance in massive increments, the bank of information available from personal, financial, and business electronic transactions and all other electronic documentation and data storage is growing at an exponential rate. With this wealth of information comes the opportunity and necessity to utilize this information to maintain competitive advantage and process information effectively in real-world situations. Data Mining and Knowledge Discovery Technologies presents researchers and practitioners in fields such as knowledge management, information science, Web engineering, and medical informatics, with comprehensive, innovative research on data mining methods, structures, tools, and methods, the knowledge discovery process, and data marts, among many other cutting-edge topics.

Fuzzy XML Data Management (Hardcover, 2014 ed.): Li Yan, Zongmin Ma, Fu Zhang Fuzzy XML Data Management (Hardcover, 2014 ed.)
Li Yan, Zongmin Ma, Fu Zhang
R3,320 Discovery Miles 33 200 Ships in 10 - 15 working days

This book presents an exhaustive and timely review of key research work on fuzzy XML data management, and provides readers with a comprehensive resource on the state-of-the art tools and theories in this fast growing area. Topics covered in the book include: representation of fuzzy XML, query of fuzzy XML, fuzzy database models, extraction of fuzzy XML from fuzzy database models, reengineering of fuzzy XML into fuzzy database models, and reasoning of fuzzy XML. The book is intended as a reference guide for researchers, practitioners and graduate students working and/or studying in the field of Web Intelligence, as well as for data and knowledge engineering professionals seeking new approaches to replace traditional methods, which may be unnecessarily complex or even unproductive.

Astronomy and Big Data - A Data Clustering Approach to Identifying Uncertain Galaxy Morphology (Hardcover, 2014 ed.): Kieran... Astronomy and Big Data - A Data Clustering Approach to Identifying Uncertain Galaxy Morphology (Hardcover, 2014 ed.)
Kieran Jay Edwards, Mohamed Medhat Gaber
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

With the onset of massive cosmological data collection through media such as the Sloan Digital Sky Survey (SDSS), galaxy classification has been accomplished for the most part with the help of citizen science communities like Galaxy Zoo. Seeking the wisdom of the crowd for such Big Data processing has proved extremely beneficial. However, an analysis of one of the Galaxy Zoo morphological classification data sets has shown that a significant majority of all classified galaxies are labelled as Uncertain .

This book reports on how to use data mining, more specifically clustering, to identify galaxies that the public has shown some degree of uncertainty for as to whether they belong to one morphology type or another. The book shows the importance of transitions between different data mining techniques in an insightful workflow. It demonstrates that Clustering enables to identify discriminating features in the analysed data sets, adopting a novel feature selection algorithms called Incremental Feature Selection (IFS). The book shows the use of state-of-the-art classification techniques, Random Forests and Support Vector Machines to validate the acquired results. It is concluded that a vast majority of these galaxies are, in fact, of spiral morphology with a small subset potentially consisting of stars, elliptical galaxies or galaxies of other morphological variants."

Enterprise Business Intelligence and Data Warehousing - Program Management Essentials (Paperback): Alan Simon Enterprise Business Intelligence and Data Warehousing - Program Management Essentials (Paperback)
Alan Simon
R684 Discovery Miles 6 840 Ships in 10 - 15 working days

Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.

Time and Relational Theory - Temporal Databases in the Relational Model and SQL (Paperback, 2nd edition): C.J. Date, Hugh... Time and Relational Theory - Temporal Databases in the Relational Model and SQL (Paperback, 2nd edition)
C.J. Date, Hugh Darwen, Nikos Lorentzos
R1,244 Discovery Miles 12 440 Ships in 10 - 15 working days

"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products

Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time.

This book covers the SQL:2011 temporal extensions in depth and identifies and discusses the temporal functionality still missing from SQL.
Understand how the relational model provides an ideal basis for taming the complexities of temporal databases Learn how to analyze and evaluate commercial temporal products with this timely and important information Be able to use sound principles in designing and using temporal databases Understand the temporal support recently added to SQL with coverage of the new SQL features in this unique, accurate, and authoritative reference Appreciate the benefits of a truly relational approach to the problem with this clear, user friendly presentation

Social Data Analytics - Collaboration for the Enterprise (Paperback): Krish Krishnan, Shawn P Rogers Social Data Analytics - Collaboration for the Enterprise (Paperback)
Krish Krishnan, Shawn P Rogers
R793 Discovery Miles 7 930 Ships in 10 - 15 working days

"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease.

You'll learn everything you need to know to monitor social media and get an overview of the leading vendors in a crowded space of BI applications. By the end of this book, you will be well prepared for your organization s next social data analytics project.
Provides foundational understanding of new and emerging technologies-social data, collaboration, big data, advanced analyticsIncludes case studies and practical examples of success and failuresWill prepare you to lead projects and advance initiatives that will benefit you and your organization"

Data Mining Applications for Empowering Knowledge Societies (Hardcover): Hakikur Rahman Data Mining Applications for Empowering Knowledge Societies (Hardcover)
Hakikur Rahman
R4,584 Discovery Miles 45 840 Ships in 18 - 22 working days

Data Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by various multi-dimensional applications. Data Mining Applications for Empowering Knowledge Societies presents an overview on the main issues of data mining, including its classification, regression, clustering, and ethical issues. This comprehensive book also provides readers with knowledge enhancing processes as well as a wide spectrum of data mining applications.

Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover): Philip Alexander Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover)
Philip Alexander
R2,048 Discovery Miles 20 480 Ships in 18 - 22 working days

Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.

Clustering Methods for Big Data Analytics - Techniques, Toolboxes and Applications (Hardcover, 1st ed. 2019): Olfa Nasraoui,... Clustering Methods for Big Data Analytics - Techniques, Toolboxes and Applications (Hardcover, 1st ed. 2019)
Olfa Nasraoui, Chiheb-Eddine Ben N'Cir
R3,985 Discovery Miles 39 850 Ships in 10 - 15 working days

This book highlights the state of the art and recent advances in Big Data clustering methods and their innovative applications in contemporary AI-driven systems. The book chapters discuss Deep Learning for Clustering, Blockchain data clustering, Cybersecurity applications such as insider threat detection, scalable distributed clustering methods for massive volumes of data; clustering Big Data Streams such as streams generated by the confluence of Internet of Things, digital and mobile health, human-robot interaction, and social networks; Spark-based Big Data clustering using Particle Swarm Optimization; and Tensor-based clustering for Web graphs, sensor streams, and social networks. The chapters in the book include a balanced coverage of big data clustering theory, methods, tools, frameworks, applications, representation, visualization, and clustering validation.

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018): Muhammad... Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks (Hardcover, 1st ed. 2018)
Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.

Wireless Information and Power Transfer: A New Paradigm for Green Communications (Hardcover, 1st ed. 2018): Dushantha Nalin K.... Wireless Information and Power Transfer: A New Paradigm for Green Communications (Hardcover, 1st ed. 2018)
Dushantha Nalin K. Jayakody, John Thompson, Symeon Chatzinotas, Salman Durrani
R4,150 Discovery Miles 41 500 Ships in 10 - 15 working days

This book presents breakthroughs in the design of Wireless Energy Harvesting (WEH) networks. It bridges the gap between WEH through radio waves communications and power transfer, which have largely been designed separately. The authors present an overview of the RF-EHNs including system architecture and RF energy harvesting techniques and existing applications. They also cover the idea of WEH in novel discoveries of information, the theoretical bounds in WEH, wireless sensor networks, usage of modern channel coding together with WEH, energy efficient resource allocation mechanisms, distributed self-organized energy efficient designs, delay-energy trade-off, specific protocols for energy efficient communication designs, D2D communication and energy efficiency, cooperative wireless networks, and cognitive networks.

Big Data for the Greater Good (Hardcover, 1st ed. 2019): Ali Emrouznejad, Vincent Charles Big Data for the Greater Good (Hardcover, 1st ed. 2019)
Ali Emrouznejad, Vincent Charles
R4,019 Discovery Miles 40 190 Ships in 18 - 22 working days

This book highlights some of the most fascinating current uses, thought-provoking changes, and biggest challenges that Big Data means for our society. The explosive growth of data and advances in Big Data analytics have created a new frontier for innovation, competition, productivity, and well-being in almost every sector of our society, as well as a source of immense economic and societal value. From the derivation of customer feedback-based insights to fraud detection and preserving privacy; better medical treatments; agriculture and food management; and establishing low-voltage networks - many innovations for the greater good can stem from Big Data. Given the insights it provides, this book will be of interest to both researchers in the field of Big Data, and practitioners from various fields who intend to apply Big Data technologies to improve their strategic and operational decision-making processes.

Rare Association Rule Mining and Knowledge Discovery - Technologies for Infrequent and Critical Event Detection (Hardcover,... Rare Association Rule Mining and Knowledge Discovery - Technologies for Infrequent and Critical Event Detection (Hardcover, New)
Yun Sing Koh, Nathan Rountree
R4,569 Discovery Miles 45 690 Ships in 18 - 22 working days

The growing complexity and volume of modern databases make it increasingly important for researchers and practitioners involved with association rule mining to make sense of the information they contain. ""Rare Association Rule Mining and Knowledge Discovery: Technologies for Infrequent and Critical Event Detection"" provides readers with an in-depth compendium of current issues, trends, and technologies in association rule mining. Covering a comprehensive range of topics, this book discusses underlying frameworks, mining techniques, interest metrics, and real-world application domains within the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Progress in Fuzzy Sets and Systems
W. Janko, M. R. Roubens, … Hardcover R2,757 Discovery Miles 27 570
On Logical, Algebraic, and Probabilistic…
Susanne Saminger-Platz, Radko Mesiar Hardcover R4,190 R3,389 Discovery Miles 33 890
Towards Efficient Fuzzy Information…
Chongfu Huang, Yong Shi Hardcover R2,862 Discovery Miles 28 620
Microbial Surfaces - Structure…
Terri A. Camesano, Charlene Mello Hardcover R1,794 Discovery Miles 17 940
Model Based Fuzzy Control - Fuzzy Gain…
Rainer Palm Hardcover R1,512 Discovery Miles 15 120
Aggregation Operators - New Trends and…
Tomasa Calvo, Gaspar Mayor, … Hardcover R4,210 Discovery Miles 42 100
Wearable Physical, Chemical and…
Eden Morales-Narvaez, Can Dincer Paperback R3,981 Discovery Miles 39 810
Evolving Rule-Based Models - A Tool for…
Plamen P. Angelov Hardcover R2,772 Discovery Miles 27 720
Comparative Statistical Inference 3e
V. Barnett Hardcover R5,712 Discovery Miles 57 120
Fuzzy Classifier Design
Ludmila I. Kuncheva Hardcover R4,186 Discovery Miles 41 860

 

Partners