![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
This thesis covers a diverse set of topics related to space-based gravitational wave detectors such as the Laser Interferometer Space Antenna (LISA). The core of the thesis is devoted to the preprocessing of the interferometric link data for a LISA constellation, specifically developing optimal Kalman filters to reduce arm length noise due to clock noise. The approach is to apply Kalman filters of increasing complexity to make optimal estimates of relevant quantities such as constellation arm length, relative clock drift, and Doppler frequencies based on the available measurement data. Depending on the complexity of the filter and the simulated data, these Kalman filter estimates can provide up to a few orders of magnitude improvement over simpler estimators. While the basic concept of the LISA measurement (Time Delay Interferometry) was worked out some time ago, this work brings a level of rigor to the processing of the constellation-level data products. The thesis concludes with some topics related to the eLISA such as a new class of phenomenological waveforms for extreme mass-ratio inspiral sources (EMRIs, one of the main source for eLISA), an octahedral space-based GW detector that does not require drag-free test masses, and some efficient template-search algorithms for the case of relatively high SNR signals.
This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more "green" supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains
Conceptual modeling has always been one of the main issues in information systems engineering as it aims to describe the general knowledge of the system at an abstract level that facilitates user understanding and software development. This collection of selected papers provides a comprehensive and extremely readable overview of what conceptual modeling is and perspectives on making it more and more relevant in our society. It covers topics like modeling the human genome, blockchain technology, model-driven software development, data integration, and wiki-like repositories and demonstrates the general applicability of conceptual modeling to various problems in diverse domains. Overall, this book is a source of inspiration for everybody in academia working on the vision of creating a strong, fruitful and creative community of conceptual modelers. With this book the editors and authors want to honor Prof. Antoni Olive for his enormous and ongoing contributions to the conceptual modeling discipline. It was presented to him on the occasion of his keynote at ER 2017 in Valencia, a conference that he has contributed to and supported for over 20 years. Thank you very much to Antoni for so many years of cooperation and friendship.
This book presents an investigative approach to globalization-driving technologies that efficiently deliver ubiquitous, last-mile, broadband internet access to emerging markets and rural areas. Research has shown that ubiquitous internet access boosts socio-economic growth through innovations in science and technology, and has a positive effect on the lives of individuals. Last-mile internet access in developing countries is not only intended to provide areas with stable, efficient, and cost-effective broadband capabilities, but also to encourage the use of connectivity for human capacity development. The book offers an overview of the principles of various technologies, such as light fidelity and millimeter-wave backhaul, as last-mile internet solutions and describes these potential solutions from a signal propagation perspective. It also provides readers with the notional context needed to understand their operation, benefits, and limitations, and enables them to investigate feasible and tailored solutions to ensure sustainable infrastructures that are expandable and maintainable.
In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.
Data science has been playing a vital role in almost all major fields. Many researchers are interested in the development of IT applications, which are user-driven with a focus on issues. This can be addressed using data science. User-driven research and data science have gained much attention from many private, public, and government organizations and research institutions. The Handbook of Research on Designing User Interfaces With a Data Science Approach promotes the inclusion of more diversified users for user-centered designs of applications across domains and analyzes user data with a data science approach for effective and user-friendly user interface designs. It introduces the foundations of advanced topics of human-computer interaction, particularly with user-centered designs and techniques. Covering topics such as artificial neural networks, natural dialog systems, and machine learning, this book is an essential resource for faculty, research scholars, industry professionals, students of higher education, mathematicians, data scientists, interaction designers, visual designers, software engineers, user experience researchers, accessibility engineers, cognitive system engineers, academicians, and libraries.
Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.
This book presents a unique approach to stream data mining. Unlike the vast majority of previous approaches, which are largely based on heuristics, it highlights methods and algorithms that are mathematically justified. First, it describes how to adapt static decision trees to accommodate data streams; in this regard, new splitting criteria are developed to guarantee that they are asymptotically equivalent to the classical batch tree. Moreover, new decision trees are designed, leading to the original concept of hybrid trees. In turn, nonparametric techniques based on Parzen kernels and orthogonal series are employed to address concept drift in the problem of non-stationary regressions and classification in a time-varying environment. Lastly, an extremely challenging problem that involves designing ensembles and automatically choosing their sizes is described and solved. Given its scope, the book is intended for a professional audience of researchers and practitioners who deal with stream data, e.g. in telecommunication, banking, and sensor networks.
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.
The technologies in data mining have been applied to bioinformatics research in the past few years with success, but more research in this field is necessary. While tremendous progress has been made over the years, many of the fundamental challenges in bioinformatics are still open. Data mining plays a essential role in understanding the emerging problems in genomics, proteomics, and systems biology. ""Advanced Data Mining Technologies in Bioinformatics"" covers important research topics of data mining on bioinformatics. Readers of this book will gain an understanding of the basics and problems of bioinformatics, as well as the applications of data mining technologies in tackling the problems and the essential research topics in the field. ""Advanced Data Mining Technologies in Bioinformatics"" is extremely useful for data mining researchers, molecular biologists, graduate students, and others interested in this topic.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
As information technology continues to advance in massive increments, the bank of information available from personal, financial, and business electronic transactions and all other electronic documentation and data storage is growing at an exponential rate. With this wealth of information comes the opportunity and necessity to utilize this information to maintain competitive advantage and process information effectively in real-world situations. Data Mining and Knowledge Discovery Technologies presents researchers and practitioners in fields such as knowledge management, information science, Web engineering, and medical informatics, with comprehensive, innovative research on data mining methods, structures, tools, and methods, the knowledge discovery process, and data marts, among many other cutting-edge topics.
This book presents an exhaustive and timely review of key research work on fuzzy XML data management, and provides readers with a comprehensive resource on the state-of-the art tools and theories in this fast growing area. Topics covered in the book include: representation of fuzzy XML, query of fuzzy XML, fuzzy database models, extraction of fuzzy XML from fuzzy database models, reengineering of fuzzy XML into fuzzy database models, and reasoning of fuzzy XML. The book is intended as a reference guide for researchers, practitioners and graduate students working and/or studying in the field of Web Intelligence, as well as for data and knowledge engineering professionals seeking new approaches to replace traditional methods, which may be unnecessarily complex or even unproductive.
With the onset of massive cosmological data collection through media such as the Sloan Digital Sky Survey (SDSS), galaxy classification has been accomplished for the most part with the help of citizen science communities like Galaxy Zoo. Seeking the wisdom of the crowd for such Big Data processing has proved extremely beneficial. However, an analysis of one of the Galaxy Zoo morphological classification data sets has shown that a significant majority of all classified galaxies are labelled as Uncertain . This book reports on how to use data mining, more specifically clustering, to identify galaxies that the public has shown some degree of uncertainty for as to whether they belong to one morphology type or another. The book shows the importance of transitions between different data mining techniques in an insightful workflow. It demonstrates that Clustering enables to identify discriminating features in the analysed data sets, adopting a novel feature selection algorithms called Incremental Feature Selection (IFS). The book shows the use of state-of-the-art classification techniques, Random Forests and Support Vector Machines to validate the acquired results. It is concluded that a vast majority of these galaxies are, in fact, of spiral morphology with a small subset potentially consisting of stars, elliptical galaxies or galaxies of other morphological variants."
Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.
"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and
identifies and discusses the temporal functionality still missing
from SQL.
"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media
and get an overview of the leading vendors in a crowded space of BI
applications. By the end of this book, you will be well prepared
for your organization s next social data analytics project.
Data Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by various multi-dimensional applications. Data Mining Applications for Empowering Knowledge Societies presents an overview on the main issues of data mining, including its classification, regression, clustering, and ethical issues. This comprehensive book also provides readers with knowledge enhancing processes as well as a wide spectrum of data mining applications.
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.
This book highlights the state of the art and recent advances in Big Data clustering methods and their innovative applications in contemporary AI-driven systems. The book chapters discuss Deep Learning for Clustering, Blockchain data clustering, Cybersecurity applications such as insider threat detection, scalable distributed clustering methods for massive volumes of data; clustering Big Data Streams such as streams generated by the confluence of Internet of Things, digital and mobile health, human-robot interaction, and social networks; Spark-based Big Data clustering using Particle Swarm Optimization; and Tensor-based clustering for Web graphs, sensor streams, and social networks. The chapters in the book include a balanced coverage of big data clustering theory, methods, tools, frameworks, applications, representation, visualization, and clustering validation.
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
This book presents breakthroughs in the design of Wireless Energy Harvesting (WEH) networks. It bridges the gap between WEH through radio waves communications and power transfer, which have largely been designed separately. The authors present an overview of the RF-EHNs including system architecture and RF energy harvesting techniques and existing applications. They also cover the idea of WEH in novel discoveries of information, the theoretical bounds in WEH, wireless sensor networks, usage of modern channel coding together with WEH, energy efficient resource allocation mechanisms, distributed self-organized energy efficient designs, delay-energy trade-off, specific protocols for energy efficient communication designs, D2D communication and energy efficiency, cooperative wireless networks, and cognitive networks.
This book highlights some of the most fascinating current uses, thought-provoking changes, and biggest challenges that Big Data means for our society. The explosive growth of data and advances in Big Data analytics have created a new frontier for innovation, competition, productivity, and well-being in almost every sector of our society, as well as a source of immense economic and societal value. From the derivation of customer feedback-based insights to fraud detection and preserving privacy; better medical treatments; agriculture and food management; and establishing low-voltage networks - many innovations for the greater good can stem from Big Data. Given the insights it provides, this book will be of interest to both researchers in the field of Big Data, and practitioners from various fields who intend to apply Big Data technologies to improve their strategic and operational decision-making processes.
The growing complexity and volume of modern databases make it increasingly important for researchers and practitioners involved with association rule mining to make sense of the information they contain. ""Rare Association Rule Mining and Knowledge Discovery: Technologies for Infrequent and Critical Event Detection"" provides readers with an in-depth compendium of current issues, trends, and technologies in association rule mining. Covering a comprehensive range of topics, this book discusses underlying frameworks, mining techniques, interest metrics, and real-world application domains within the field. |
You may like...
Progress in Fuzzy Sets and Systems
W. Janko, M. R. Roubens, …
Hardcover
R2,757
Discovery Miles 27 570
On Logical, Algebraic, and Probabilistic…
Susanne Saminger-Platz, Radko Mesiar
Hardcover
Towards Efficient Fuzzy Information…
Chongfu Huang, Yong Shi
Hardcover
R2,862
Discovery Miles 28 620
Microbial Surfaces - Structure…
Terri A. Camesano, Charlene Mello
Hardcover
R1,794
Discovery Miles 17 940
Aggregation Operators - New Trends and…
Tomasa Calvo, Gaspar Mayor, …
Hardcover
R4,210
Discovery Miles 42 100
Wearable Physical, Chemical and…
Eden Morales-Narvaez, Can Dincer
Paperback
R3,981
Discovery Miles 39 810
|