![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This book discusses the design and implementation of, as well as experimentation on, an open cross-layer framework and associated methodology to provide voluntary interoperability among heterogeneous Internet of Things (IoT) platforms. It allows readers to effectively and efficiently develop smart IoT applications for various heterogeneous IoT platforms, spanning single and/or multiple application domains. To do so, it provides an interoperable framework architecture for the seamless integration of different IoT architectures present in different application domains. In this regard, interoperability is pursued at various levels: device, network, middleware, services and data.
Collecting the latest research results from the leading researchers in the field of fuzzy object-oriented databases, Advances in Fuzzy Object-Oriented Databases: Modeling and Applications provide a single source for current research and practical applications in fuzzy object-oriented databases. This book includes major aspects of fuzzy object-oriented database modeling - conceptual, logical and physical, as well as details of implementations and applications. Readers will benefit from a complete understanding of the notions, techniques, and methods related to the research and developments of fuzzy object-oriented databases. This book can act as a starting point and a reference for their research and developments and stimulate the interest in the field of fuzzy object-oriented databases and further promote the research in the field.
Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn't disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This book features a collection of high-quality research papers presented at the International Conference on Tourism, Technology & Systems (ICOTTS 2020), held at the University of Cartagena, in Cartagena de Indias, Colombia, from 29th to 31st October 2020. The book is divided into two volumes, and it covers the areas of technology in tourism and the tourist experience, generations and technology in tourism, digital marketing applied to tourism and travel, mobile technologies applied to sustainable tourism, information technologies in tourism, digital transformation of tourism business, e-tourism and tourism 2.0, big data and management for travel and tourism, geotagging and tourist mobility, smart destinations, robotics in tourism, and information systems and technologies.
A Deep Dive into NoSQL Databases: The Use Cases and Applications, Volume 109, the latest release in the Advances in Computers series first published in 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth. This update includes sections on NoSQL and NewSQL databases for big data analytics and distributed computing, NewSQL databases and scalable in-memory analytics, NoSQL web crawler application, NoSQL Security, a Comparative Study of different In-Memory (No/New)SQL Databases, NoSQL Hands On-4 NoSQLs, the Hadoop Ecosystem, and more.
This book highlights new trends and challenges in research on agents and the new digital and knowledge economy. It includes papers on business- process management, agent-based modeling and simulation, and anthropic-oriented computing, which were originally presented at the 13th International KES Conference on Agents and Multi-Agent Systems - Technologies and Applications (KES-AMSTA 2019) held June 17-19, 2019 at St George's Bay, St. Julians, Malta. Today's economy is driven by technologies and knowledge. Digital technologies can free, shift and multiply choices, and often intrude on the territory of other industries by providing new ways of conducting business operations and creating value for customers and companies. As such, the book covers topics such as software agents, multi-agent systems, agent modeling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computer embedded systems and nature inspired manufacturing, all of which contribute to the modern digital economy. The research presented is of value to researchers and industrial practitioners working in the fields of artificial intelligence, collective computational intelligence, innovative business models, the new digital and knowledge economy and, in particular, agent and multi-agent systems, technologies, tools and applications.
This book is related to the educational networking (EN) domain, an incipient but disrupting trend engaged in extending and improving formal and informal academic practices by means of the support given by online social networks (OSNs) and Web 2.0 technologies. With the aim of contributing to spread the knowledge and development of the arena, this volume introduces ten recent works, whose content meets the quality criteria of formal scientific labor that is worthy to be published according to following five categories: * Reviews: gather three overviews that focus on K-12 EN practice, mixed methods approaches using social network analysis for learning and education, and a broad landscape of the recent accomplished labor. * Conceptual: presents a work where a theoretical framework is proposed to overcome barriers that constrain the use of OSNs for educational purposes by means of a Platform Adoption Model. * Projects: inform a couple of initiatives, where one fosters groups and networks for teachers involved in distance education, and the other encourages students the author academic videos to improve motivation and engagement. * Approaches: offer three experiences related to: Wiki and Blog usage for assessment affairs, application of a method that encourages OSNs users to actively post and repost valuable information for the learning community, and the recreation of learning spaces in context-aware to boost EN. * Study: applies an own method to ranking Mexican universities based on maximal clique, giving as a result a series of complex visual networks that characterize the tides among diverse features that describe academic institutions practice. In resume, this volume offers a fresh reference of an emergent field that contributes to spreading and enhancing the provision of education in classrooms and online settings through social constructivism and collaboration policy. Thus, it is expected the published content encourages researchers, practitioners, professors, and postgraduate students to consider their future contribution to extent the scope and impact of EN in formal and informal teaching and learning endeavors.
Recent advancements in technology have influenced major change within many industries. Because of such advancements, businesses and organizations are adapting to a more technology based work environment in order achieve a higher rate of production, output, and accuracy. Methodological Advancements in Intelligent Information Technologies: Evolutionary Trends brings together research from international authors detailing developments in intelligent information technologies and their impact on organizational environments. This esteemed reference publication covers topics on agent-based approaches to process management, semantic Web services, data mining techniques, engineering software technologies, and scalable and adaptive Web search engines, in order to provide current research for practitioners, educators, and students interested in the implementation of innovative technologies in a variety of work environments.
This book covers the state of the art in learning algorithms with an inclusion of semi-supervised methods to provide a broad scope of clustering and classification solutions for big data applications. Case studies and best practices are included along with theoretical models of learning for a comprehensive reference to the field. The book is organized into eight chapters that cover the following topics: discretization, feature extraction and selection, classification, clustering, topic modeling, graph analysis and applications. Practitioners and graduate students can use the volume as an important reference for their current and future research and faculty will find the volume useful for assignments in presenting current approaches to unsupervised and semi-supervised learning in graduate-level seminar courses. The book is based on selected, expanded papers from the Fourth International Conference on Soft Computing in Data Science (2018). Includes new advances in clustering and classification using semi-supervised and unsupervised learning; Address new challenges arising in feature extraction and selection using semi-supervised and unsupervised learning; Features applications from healthcare, engineering, and text/social media mining that exploit techniques from semi-supervised and unsupervised learning.
This book provides a critical comprehensive summary of the coevolution of telecom markets, rules and public institutions over the last 25 years, focusing on the challenges that regulators and policy makers have been facing. Even if the perspective of the book is European (as the EU regulatory framework is examined), most of the economic and institutional issues addressed are common to all telecom markets in advanced economies. The book addresses some traditional fundamental topics in the telecom regulation literature, as well as some hot-button topics in the current policy debate, e.g., ultrafast broadband and 5G networks, the relationship between investments and competition, the sector digitalisation and the role of OTTs. All these are relevant to students, researchers, and policy makers interested to get a sound understanding of the sector, its many dimensions and coevolutionary patterns.
This book includes papers on intelligent expert systems and sustainability applications in the areas of data science, image processing, wireless communication, risk assessment, healthcare, intelligent social network mining, and energy. The recent growth of sustainability leads to a progressively new era of computing, where its design and deployment leverages significant impact on the intelligent systems research. Moreover, the sustainability technologies can be effectively used in the progressive deployment of various network-enabled technologies like intelligent sensors, smart cities, wearable technologies, robotics, web applications and other such Internet technologies. The thrust of this book is to publish the state-of-the-art research articles that deals with the design, development, implementation and testing of the intelligent expert systems and also to provide an overview of the sustainable management of these systems.
Whether searching, shopping, or socializing, Web users leave behind a great deal of data revealing their information needs, mindset, and approaches used, creating vast opportunities for Web service providers as well as a host of security and privacy concerns for consumers. The Handbook of Research on Web Log Analysis reflects on the multifaceted themes of Web use and presents various approaches to log analysis. This expansive collection reviews the history of Web log analysis and examines new trends including the issues of privacy, social interaction and community building. Over XX research contributions from XX international experts comprehensively cover the latest user-behavior analytic and log analysis methodologies, and consider new research directions and novel applications. An essential holding for library reference collections, this Handbook of Research will benefit academics, researchers, and students in a variety of fields, as well as technology professionals interested in the opportunities and challenges presented by the massive collection of Web usage data.
As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social contexts for knowledge, learning, and human development. ""Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies"" explores the potential of Web 2.0 and its synergies with the Semantic Web and provides state-of-the-art theoretical foundations and technological applications. A reference edition for academicians, practitioners, policy makers, and government officers eager for knowledge on Web 2.0 and social Web, this book emphasizes practical aspects of the integration of semantic applications into social Web technologies.
With almost every business application process being linked with a web portal, the website has become an integral part of any organization. Satisfying the end user's needs is one of the key principles of designing an effective website. Because there are different users for any given website, there are different criteria that users want. Thus, evaluating a website is a multi-criteria decision-making problem in which the decision maker's opinion should be considered for ranking the website. Multi-Criteria Decision-Making Models for Website Evaluation is a critical scholarly resource that covers the strategies needed to evaluate the navigability and efficacy of websites as promotional platforms for their companies. Featuring a wide range of topics including linguistic modelling, e-services, and site quality, this book is ideal for managers, executives, website designers, graphic artists, specialists, consultants, educationalists, researchers, and students.
In the age of increasing reliance on data and the importance of sensitive information, applications and technologies have arisen to appropriately deal with assuring the security of medical informatics and healthcare administration functions. In order for technology to progress, new systems are being installed globally to address this issue. Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology examines information security management systems for the facilitation of picture archiving and communication systems (PACS). This valuable contribution to data security and quality management literature provides a comprehensive guide for all aspects of the implementation of PACS for the enhancement of modern practices in radiology.
This book presents a theory of information justice that subsumes the question of control and relates it to other issues that influence just social outcomes. Data does not exist by nature. Bureaucratic societies must provide standardized inputs for governing algorithms, a problem that can be understood as one of legibility. This requires, though, converting what we know about social objects and actions into data, narrowing the many possible representations of the objects to a definitive one using a series of translations. Information thus exists within a nexus of problems, data, models, and actions that the social actors constructing the data bring to it. This opens information to analysis from social and moral perspectives, while the scientistic view leaves us blind to the gains from such analysis-especially to the ways that embedded values and assumptions promote injustice. Toward Information Justice answers a key question for the 21st Century: how can an information-driven society be just? Many of those concerned with the ethics of data focus on control over data, and argue that if data is only controlled by the right people then just outcomes will emerge. There are serious problems with this control metaparadigm, however, especially related to the initial creation of data and prerequisites for its use. This text is suitable for academics in the fields of information ethics, political theory, philosophy of technology, and science and technology studies, as well as policy professionals who rely on data to reach increasingly problematic conclusions about courses of action.
This book provides both a broad overview of the forecasting process, covering technological and human aspects alike, and deep insights into algorithms and platform functionalities in the IBP toolbox required to maximize forecast accuracy. Rich in technical and business explanations, it addresses short-, medium- and long-term forecasting processes using functionalities available in demand planning and demand sensing. There are also several theoretical concepts underpinning the algorithms discussed; these are explained with numerical examples to help demystify the IBP forecasting toolbox. Beyond standard procedures, the book also discusses custom approaches (e.g. new segmentation criteria, new outlier detection and correction methods) and new methods (e.g. the use of Markov chains for forecasting sporadic demands), etc. It subsequently benchmarks common practices using these innovative approaches and discusses the results. As measurement is an important precondition for improvement, an entire chapter is devoted to discussing process improvement and value using the Six Sigma methodology. In closing, the book provides several useful tips and tricks that should come in handy during project implementation.
This book provides detailed descriptions of big data solutions for activity detection and forecasting of very large numbers of moving entities spread across large geographical areas. It presents state-of-the-art methods for processing, managing, detecting and predicting trajectories and important events related to moving entities, together with advanced visual analytics methods, over multiple heterogeneous, voluminous, fluctuating and noisy data streams from moving entities, correlating them with data from archived data sources expressing e.g. entities' characteristics, geographical information, mobility patterns, mobility regulations and intentional data. The book is divided into six parts: Part I discusses the motivation and background of mobility forecasting supported by trajectory-oriented analytics, and includes specific problems and challenges in the aviation (air-traffic management) and the maritime domains. Part II focuses on big data quality assessment and processing, and presents novel technologies suitable for mobility analytics components. Next, Part III describes solutions toward processing and managing big spatio-temporal data, particularly enriching data streams and integrating streamed and archival data to provide coherent views of mobility, and storing of integrated mobility data in large distributed knowledge graphs for efficient query-answering. Part IV focuses on mobility analytics methods exploiting (online) processed, synopsized and enriched data streams as well as (offline) integrated, archived mobility data, and highlights future location and trajectory prediction methods, distinguishing between short-term and more challenging long-term predictions. Part V examines how methods addressing data management, data processing and mobility analytics are integrated in big data architectures with distinctive characteristics compared to other known big data paradigmatic architectures. Lastly, Part VI covers important ethical issues that research on mobility analytics should address. Providing novel approaches and methodologies related to mobility detection and forecasting needs based on big data exploration, processing, storage, and analysis, this book will appeal to computer scientists and stakeholders in various application domains.
This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.
This book reflects the latest research trends, methods and experimental results in the field of electrical and information technologies for rail transportation, which covers abundant state-of-the-art research theories and ideas. As a vital field of research that is highly relevant to current developments in a number of technological domains, the subjects it covered include intelligent computing, information processing, Communication Technology, Automatic Control, etc. The objective of the proceedings is to provide a major interdisciplinary forum for researchers, engineers, academicians as well as industrial professionals to present the most innovative research and development in the field of rail transportation electrical and information technologies. Engineers and researchers in academia, industry, and the government will also explore an insight view of the solutions that combine ideas from multiple disciplines in this field. The volumes serve as an excellent reference work for researchers and graduate students working on rail transportation, electrical and information technologies.
This book examines how digital technologies enable collaboration as a way for individuals, teams and businesses to connect, create value, and harness new opportunities. Digital technologies have brought the world closer together but also created new barriers and divides. While it is now possible to connect almost instantly and seamlessly across the globe, collaboration comes at a cost; it requires new skills and hidden 'collaboration work', and the need to renegotiate the fair distribution of value in multi-stakeholder network arrangements. Presenting state-of-the-art research, case studies, and leading voices in the field, the book provides academics and professionals with insights into the diverse powers of collaboration in the digital age, spanning collaboration among professionals, organisations, and consumers. It brings together contributions from scholars interested in the collaboration of teams, cooperatives, projects, and new cooperative systems, covering a range of sectors from the sharing economy, health care, large project businesses to public sector collaboration.
In today's society, the utilization of social media platforms has become an abundant forum for individuals to post, share, tag, and, in some cases, overshare information about their daily lives. As significant amounts of data flood these venues, it has become necessary to find ways to collect and evaluate this information. Social Media Data Extraction and Content Analysis explores various social networking platforms and the technologies being utilized to gather and analyze information being posted to these venues. Highlighting emergent research, analytical techniques, and best practices in data extraction in global electronic culture, this publication is an essential reference source for researchers, academics, and professionals.
Knowledge Discovery Practices and Emerging Applications of Data Mining: Trends and New Domains introduces the reader to recent research activities in the field of data mining. This book covers association mining, classification, mobile marketing, opinion mining, microarray data mining, internet mining and applications of data mining on biological data, telecommunication and distributed databases, among others, while promoting understanding and implementation of data mining techniques in emerging domains. |
![]() ![]() You may like...
SIMD Programming Manual for Linux and…
Paul Cockshott, Kenneth Renfrew
Hardcover
R3,191
Discovery Miles 31 910
Advanced Visual Basic 6 - Power…
Matthew Curland, Gary Clarke
Paperback
R1,349
Discovery Miles 13 490
Analysis and Evaluation of Fuzzy Systems
Akira Ishikawa, Terry L. Wilson
Hardcover
R2,625
Discovery Miles 26 250
Nonlinear Differential Problems with…
Dumitru Motreanu
Paperback
Internet of Everything and Big Data…
Salahddine Krit, Mohamed Elhoseny, …
Hardcover
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu
Paperback
|