![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases
With the improvements of artificial intelligence, processor speeds and database sizes, the rapidly expanding field of data mining continues to provide advancing methods for managing databases and gaining knowledge.Developments in Data Extraction, Management, and Analysis is an essential collection of research on the area of data mining and analytics. Presenting the most recent perspectives on data mining subjects and current issues, this book is useful for practitioners and academics alike.
"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media
and get an overview of the leading vendors in a crowded space of BI
applications. By the end of this book, you will be well prepared
for your organization s next social data analytics project.
Corporations and governmental agencies of all sizes are embracing a new generation of enterprise-scale business intelligence (BI) and data warehousing (DW), and very often appoint a single senior-level individual to serve as the Enterprise BI/DW Program Manager. This book is the essential guide to the incremental and iterative build-out of a successful enterprise-scale BI/DW program comprised of multiple underlying projects, and what the Enterprise Program Manager must successfully accomplish to orchestrate the many moving parts in the quest for true enterprise-scale business intelligence and data warehousing. Author Alan Simon has served as an enterprise business intelligence and data warehousing program management advisor to many of his clients, and spent an entire year with a single client as the adjunct consulting director for a $10 million enterprise data warehousing (EDW) initiative. He brings a wealth of knowledge about best practices, risk management, organizational culture alignment, and other Critical Success Factors (CSFs) to the discipline of enterprise-scale business intelligence and data warehousing.
The book reports on advanced theories and methods in two related engineering fields: electrical and electronic engineering, and communications engineering and computing. It highlights areas of global and growing importance, such as renewable energy, power systems, mobile communications, security and the Internet of Things (IoT). The contributions cover a number of current research issues, including smart grids, photovoltaic systems, wireless power transfer, signal processing, 4G and 5G technologies, IoT applications, mobile cloud computing and many more. Based on the proceedings of the first International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM 2016), held in Voila Bagatelle, Mauritius from November 25 to 27, 2016, the book provides graduate students, researchers and professionals with a snapshot of the state-of-the-art and a source of new ideas for future research and collaborations.
The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applications. This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects. Topics appropriate for this Book include, but are not necessarily limited to: - Methods for SO development - IoT Networking - Middleware for SOs - Data Management for SOs - Service-oriented SOs - Agent-oriented SOs - Applications of SOs in Smart Environments: Smart Cities, Smart Health, Smart Buildings, etc. Advanced IoT Projects.
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.
This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.
This book presents an investigative approach to globalization-driving technologies that efficiently deliver ubiquitous, last-mile, broadband internet access to emerging markets and rural areas. Research has shown that ubiquitous internet access boosts socio-economic growth through innovations in science and technology, and has a positive effect on the lives of individuals. Last-mile internet access in developing countries is not only intended to provide areas with stable, efficient, and cost-effective broadband capabilities, but also to encourage the use of connectivity for human capacity development. The book offers an overview of the principles of various technologies, such as light fidelity and millimeter-wave backhaul, as last-mile internet solutions and describes these potential solutions from a signal propagation perspective. It also provides readers with the notional context needed to understand their operation, benefits, and limitations, and enables them to investigate feasible and tailored solutions to ensure sustainable infrastructures that are expandable and maintainable.
The field of enterprise systems integration is constantly evolving, as every new technology that is introduced appears to make all previous ones obsolete. Despite this continuous evolution, there is a set of underlying concepts and technologies that have been gaining an increasing importance in this field. Examples are asynchronous messaging through message queues, data and application adapters based on XML and Web services, the principles associated with the service-oriented architecture (SOA), service composition, orchestrations, and advanced mechanisms such as correlations and long-running transactions. Today, these concepts have reached a significant level of maturity and they represent the foundation over which most integration platforms have been built. This book addresses integration with a view towards supporting business processes. From messaging systems to data and application adapters, and then to services, orchestrations, and choreographies, the focus is placed on the connection between systems and business processes, and particularly on how it is possible to develop an integrated application infrastructure in order to implement the desired business processes. For this purpose, the text follows a layered, bottom-up approach, with application-oriented integration at the lowest level, followed by service-oriented integration and finally completed by process-oriented integration at the topmost level. The presentation of concepts is accompanied by a set of instructive examples using state-of-the-art technologies such as Java Message Service (JMS), Microsoft Message Queuing (MSMQ), Web Services, Microsoft BizTalk Server, and the Business Process Execution Language (BPEL). The book is intended as a textbook for advance undergraduate or beginning graduate students in computer science, especially for those in an information systems curriculum. IT professionals with a background in programming, databases and XML will also benefit from the step-by-step description of the various integration levels and the related implementation examples.
This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more "green" supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. "Information Hiding in Speech Signals for Secure Communication" provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication
system, including applications to various network security states.
Readers will find information hiding algorithms and techniques
(embedding and extracting) that are capable of withstanding the
advanced forms of attack. The book presents concepts and
applications for all of the most widely used speech coding
standards, including G.711, G.721, G.728, G.729 and GSM, along with
corresponding hiding and extraction algorithms. Readers will also
learn how to use a speech covert communication system over an IP
network as well as a speech secure communication system applied in
PSTN.
The growing complexity and volume of modern databases make it increasingly important for researchers and practitioners involved with association rule mining to make sense of the information they contain. ""Rare Association Rule Mining and Knowledge Discovery: Technologies for Infrequent and Critical Event Detection"" provides readers with an in-depth compendium of current issues, trends, and technologies in association rule mining. Covering a comprehensive range of topics, this book discusses underlying frameworks, mining techniques, interest metrics, and real-world application domains within the field.
With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.
"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and
identifies and discusses the temporal functionality still missing
from SQL.
This book presents breakthroughs in the design of Wireless Energy Harvesting (WEH) networks. It bridges the gap between WEH through radio waves communications and power transfer, which have largely been designed separately. The authors present an overview of the RF-EHNs including system architecture and RF energy harvesting techniques and existing applications. They also cover the idea of WEH in novel discoveries of information, the theoretical bounds in WEH, wireless sensor networks, usage of modern channel coding together with WEH, energy efficient resource allocation mechanisms, distributed self-organized energy efficient designs, delay-energy trade-off, specific protocols for energy efficient communication designs, D2D communication and energy efficiency, cooperative wireless networks, and cognitive networks.
Data science has been playing a vital role in almost all major fields. Many researchers are interested in the development of IT applications, which are user-driven with a focus on issues. This can be addressed using data science. User-driven research and data science have gained much attention from many private, public, and government organizations and research institutions. The Handbook of Research on Designing User Interfaces With a Data Science Approach promotes the inclusion of more diversified users for user-centered designs of applications across domains and analyzes user data with a data science approach for effective and user-friendly user interface designs. It introduces the foundations of advanced topics of human-computer interaction, particularly with user-centered designs and techniques. Covering topics such as artificial neural networks, natural dialog systems, and machine learning, this book is an essential resource for faculty, research scholars, industry professionals, students of higher education, mathematicians, data scientists, interaction designers, visual designers, software engineers, user experience researchers, accessibility engineers, cognitive system engineers, academicians, and libraries.
This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society.
The book studies the existing and potential connections between Social Network Analysis (SNA) and Formal Concept Analysis (FCA) by showing how standard SNA techniques, usually based on graph theory, can be supplemented by FCA methods, which rely on lattice theory. The book presents contributions to the following areas: acquisition of terminological knowledge from social networks, knowledge communities, individuality computation, other types of FCA-based analysis of bipartite graphs (two-mode networks), multimodal clustering, community detection and description in one-mode and multi-mode networks, adaptation of the dual-projection approach to weighted bipartite graphs, extensions to the Kleinberg's HITS algorithm as well as attributed graph analysis.
This book provides recent results of game theory for networking applications. The contributors address the major opportunities and challenges in applying traditional game theory as well as intelligent game theory to the understanding and designing of modern network systems, with emphasis on both new analytical techniques and novel application scenarios. After an overview of game theory for networks, the book narrows in on game theory in communications, game theory in wireless networks, and game theory applications. The book features contributions from researchers and professionals around the world. Presents a variety of perspectives on game theory for networking applications; Shows how game theory can apply to the study of data traffic, new generation networks, and smartgrid; Includes recent results of applied game theory for networks, providing some technical progresses in GAMENETS.
This book highlights some of the most fascinating current uses, thought-provoking changes, and biggest challenges that Big Data means for our society. The explosive growth of data and advances in Big Data analytics have created a new frontier for innovation, competition, productivity, and well-being in almost every sector of our society, as well as a source of immense economic and societal value. From the derivation of customer feedback-based insights to fraud detection and preserving privacy; better medical treatments; agriculture and food management; and establishing low-voltage networks - many innovations for the greater good can stem from Big Data. Given the insights it provides, this book will be of interest to both researchers in the field of Big Data, and practitioners from various fields who intend to apply Big Data technologies to improve their strategic and operational decision-making processes.
This book documents the creation of the Bichitra Online Tagore Variorum, a publicly accessible database of Rabindranath Tagore's complete works in Bengali and English totaling some 140,000 pages of primary material. Chapters cover innovative aspects of the site, all replicable in other projects: a hyperbibliography; a search engine and hyperconcordance working across the database; and a unique collation program comparing variant texts at three levels. There are also chapters on the special problems of processing manuscripts, and on planning the website. Early chapters take readers through the history of the project, an overview of Tagore's works, and the Bengali writing system with the challenges of adapting it to electronic form. The name Bichitra, meaning "various" in Bengali, alludes both to the great variety of Tagore's works and to their various stages of composition. Beyond their literary excellence, they are notable for their sheer quantity, the number of variant forms of a great many items, and their afterlife in translation, often the poet's own. Seldom if ever has the same writer revised his material and recast it across genres on such a scale. Tagore won the Nobel Prize in 1913. By its value-added presentation of this range of material, Bichitra can be a model for future databases covering an author's complete works or other major corpus of texts. It offers vastly expanded access to Tagore's writings, and enables new kinds of research including computational text analysis. The "book of the website" shows in technical and human terms how researchers with interests in art, literature and technology can collaborate on cultural informatics projects.
In recent years, searching for source code on the web has become increasingly common among professional software developers and is emerging as an area of academic research. This volume surveys past research and presents the state of the art in the area of "code retrieval on the web." This work is concerned with the algorithms, systems, and tools to allow programmers to search for source code on the web and the empirical studies of these inventions and practices. It is a label that we apply to a set of related research from software engineering, information retrieval, human-computer interaction, management, as well as commercial products. The division of code retrieval on the web into snippet remixing and component reuse is driven both by empirical data, and analysis of existing search engines and tools. Contributors include leading researchers from human-computer interaction, software engineering, programming languages, and management. "Finding Source Code on the Web for Remix and Reuse" consists of five parts. Part I is titled "Programmers and Practices," and consists of a retrospective chapter and two empirical studies on how programmers search the web for source code. Part II is titled "From Data Structures to Infrastructures," and covers the creation of ground-breaking search engines for code retrieval required ingenuity in the adaptation of existing technology and in the creation of new algorithms and data structures. Part III focuses on "Reuse: Components and Projects," which are reused with minimal modification. Part IV is on "Remix: Snippets and Answers," which examines how source code from the web can also be used as solutions to problems and answers to questions. The book concludes with Part V, "Looking Ahead," that looks at future programming and the legalities of software reuse and remix and the implications of current intellectual property law on the future of software development. The story, "Richie Boss: Private Investigator Manager," was selected as the winner of a crowdfunded short story contest."
This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the project but also serve as an overview of the state of the art in current research on data privacy and privacy enhancing technologies.
This book presents the state-of-the-art in various aspects of analysis and mining of online social networks. Within the broader context of online social networks, it focuses on important and upcoming topics of social network analysis and mining such as the latest in sentiment trends research and a variety of techniques for community detection and analysis. The book collects chapters that are expanded versions of the best papers presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'2015), which was held in Paris, France in August 2015. All papers have been peer reviewed and checked carefully for overlap with the literature. The book will appeal to students and researchers in social network analysis/mining and machine learning.
"Data Warehousing in the Age of the Big Data "will help you and your organization make the most of unstructured data with your existing data warehouse. As Big Data continues to revolutionize how we use data, it doesn't have to create more confusion. Expert author Krish Krishnan helps you make sense of how Big Data fits into the world of data warehousing in clear and concise detail. The book is presented in three distinct parts. Part 1 discusses Big Data, its technologies and use cases from early adopters. Part 2 addresses data warehousing, its shortcomings, and new architecture options, workloads, and integration techniques for Big Data and the data warehouse. Part 3 deals with data governance, data visualization, information life-cycle management, data scientists, and implementing a Big Data-ready data warehouse. Extensive appendixes include case studies from vendor implementations and a special segment on how we can build a healthcare information factory. Ultimately, this book will help you navigate through the complex
layers of Big Data and data warehousing while providing you
information on how to effectively think about using all these
technologies and the architectures to design the next-generation
data warehouse. |
You may like...
Mathematical Methods in Data Science
Jingli Ren, Haiyan Wang
Paperback
R3,925
Discovery Miles 39 250
Advances in the Convergence of…
Tiago M. Fernandez-Carames, Paula Fraga-Lamas
Hardcover
R2,555
Discovery Miles 25 550
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, …
Hardcover
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Bitcoin And Cryptocurrency - The…
Crypto Trader & Crypto Gladiator
Hardcover
|