|
|
Books > Computing & IT > Applications of computing > Databases
"What information do these data reveal?" "Is the information
correct?" "How can I make the best use of the information?" The
widespread use of computers and our reliance on the data generated
by them have made these questions increasingly common and
important. Computerized data may be in either digital or analog
form and may be relevant to a wide range of applications that
include medical monitoring and diagnosis, scientific research,
engineering, quality control, seismology, meteorology, political
and economic analysis and business and personal financial
applications. The sources of the data may be databases that have
been developed for specific purposes or may be of more general
interest and include those that are accessible on the Internet. In
addition, the data may represent either single or multiple
parameters. Examining data in its initial form is often very
laborious and also makes it possible to "miss the forest for the
trees" by failing to notice patterns in the data that are not
readily apparent. To address these problems, this monograph
describes several accurate and efficient methods for displaying,
reviewing and analyzing digital and analog data. The methods may be
used either singly or in various combinations to maximize the value
of the data to those for whom it is relevant. None of the methods
requires special devices and each can be used on common platforms
such as personal computers, tablets and smart phones. Also, each of
the methods can be easily employed utilizing widely available
off-the-shelf software. Using the methods does not require special
expertise in computer science or technology, graphical design or
statistical analysis. The usefulness and accuracy of all the
described methods of data display, review and interpretation have
been confirmed in multiple carefully performed studies using
independent, objective endpoints. These studies and their results
are described in the monograph. Because of their ease of use,
accuracy and efficiency, the methods for displaying, reviewing and
analyzing data described in this monograph can be highly useful to
all who must work with computerized information and make decisions
based upon it.
This book introduces the concept of Event Mining for building
explanatory models from analyses of correlated data. Such a model
may be used as the basis for predictions and corrective actions.
The idea is to create, via an iterative process, a model that
explains causal relationships in the form of structural and
temporal patterns in the data. The first phase is the data-driven
process of hypothesis formation, requiring the analysis of large
amounts of data to find strong candidate hypotheses. The second
phase is hypothesis testing, wherein a domain expert's knowledge
and judgment is used to test and modify the candidate hypotheses.
The book is intended as a primer on Event Mining for
data-enthusiasts and information professionals interested in
employing these event-based data analysis techniques in diverse
applications. The reader is introduced to frameworks for temporal
knowledge representation and reasoning, as well as temporal data
mining and pattern discovery. Also discussed are the design
principles of event mining systems. The approach is reified by the
presentation of an event mining system called EventMiner, a
computational framework for building explanatory models. The book
contains case studies of using EventMiner in asthma risk management
and an architecture for the objective self. The text can be used by
researchers interested in harnessing the value of heterogeneous big
data for designing explanatory event-based models in diverse
application areas such as healthcare, biological data analytics,
predictive maintenance of systems, computer networks, and business
intelligence.
Handbook of Research on Blockchain Technology presents the latest
information on the adaptation and implementation of Blockchain
technologies in real world business, scientific, healthcare and
biomedical applications. The book's editors present the rapid
advancements in existing business models by applying Blockchain
techniques. Novel architectural solutions in the deployment of
Blockchain comprise the core aspects of this book. Several use
cases with IoT, biomedical engineering, and smart cities are also
incorporated. As Blockchain is a relatively new technology that
exploits decentralized networks and is used in many sectors for
reliable, cost-effective and rapid business transactions, this book
is a welcomed addition on existing knowledge. Financial services,
retail, insurance, logistics, supply chain, public sectors and
biomedical industries are now investing in Blockchain research and
technologies for their business growth. Blockchain prevents double
spending in financial transactions without the need of a trusted
authority or central server. It is a decentralized ledger platform
that facilitates verifiable transactions between parties in a
secure and smart way.
In the computer science industry, high levels of performance remain
the focal point in software engineering. This quest has made
current systems exceedingly complex, as practitioners strive to
discover novel approaches to increase the capabilities of modern
computer structures. A prevalent area of research in recent years
is scalable transaction processing and its usage in large databases
and cloud computing. Despite its popularity, there remains a need
for significant research in the understanding of scalability and
its performance within distributed databases. Handling Priority
Inversion in Time-Constrained Distributed Databases provides
emerging research exploring the theoretical and practical aspects
of database transaction processing frameworks and improving their
performance using modern technologies and algorithms. Featuring
coverage on a broad range of topics such as consistency mechanisms,
real-time systems, and replica management, this book is ideally
designed for IT professionals, computing specialists, developers,
researchers, data engineers, executives, academics, and students
seeking research on current trends and developments in distributed
computing and databases.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
BIG DATA ANALYTICS FOR INTERNET OF THINGS Discover the latest
developments in IoT Big Data with a new resource from established
and emerging leaders in the field Big Data Analytics for Internet
of Things delivers a comprehensive overview of all aspects of big
data analytics in Internet of Things (IoT) systems. The book
includes discussions of the enabling technologies of IoT data
analytics, types of IoT data analytics, challenges in IoT data
analytics, demand for IoT data analytics, computing platforms,
analytical tools, privacy, and security. The distinguished editors
have included resources that address key techniques in the analysis
of IoT data. The book demonstrates how to select the appropriate
techniques to unearth valuable insights from IoT data and offers
novel designs for IoT systems. With an abiding focus on practical
strategies with concrete applications for data analysts and IoT
professionals, Big Data Analytics for Internet of Things also
offers readers: A thorough introduction to the Internet of Things,
including IoT architectures, enabling technologies, and
applications An exploration of the intersection between the
Internet of Things and Big Data, including IoT as a source of Big
Data, the unique characteristics of IoT data, etc. A discussion of
the IoT data analytics, including the data analytical requirements
of IoT data and the types of IoT analytics, including predictive,
descriptive, and prescriptive analytics A treatment of machine
learning techniques for IoT data analytics Perfect for
professionals, industry practitioners, and researchers engaged in
big data analytics related to IoT systems, Big Data Analytics for
Internet of Things will also earn a place in the libraries of IoT
designers and manufacturers interested in facilitating the
efficient implementation of data analytics strategies.
Medical and information communication technology professionals are
working to develop robust classification techniques, especially in
healthcare data/image analysis, to ensure quick diagnoses and
treatments to patients. Without fast and immediate access to
healthcare databases and information, medical professionals'
success rates and treatment options become limited and fall to
disastrous levels. Advanced Classification Techniques for
Healthcare Analysis provides emerging insight into classification
techniques in delivering quality, accurate, and affordable
healthcare, while also discussing the impact health data has on
medical treatments. Featuring coverage on a broad range of topics
such as early diagnosis, brain-computer interface, metaheuristic
algorithms, clustering techniques, learning schemes, and mobile
telemedicine, this book is ideal for medical professionals,
healthcare administrators, engineers, researchers, academicians,
and technology developers seeking current research on furthering
information and communication technology that improves patient
care.
Over the last two decades, researchers are looking at imbalanced
data learning as a prominent research area. Many critical
real-world application areas like finance, health, network, news,
online advertisement, social network media, and weather have
imbalanced data, which emphasizes the research necessity for
real-time implications of precise fraud/defaulter detection, rare
disease/reaction prediction, network intrusion detection, fake news
detection, fraud advertisement detection, cyber bullying
identification, disaster events prediction, and more. Machine
learning algorithms are based on the heuristic of
equally-distributed balanced data and provide the biased result
towards the majority data class, which is not acceptable
considering imbalanced data is omnipresent in real-life scenarios
and is forcing us to learn from imbalanced data for foolproof
application design. Imbalanced data is multifaceted and demands a
new perception using the novelty at sampling approach of data
preprocessing, an active learning approach, and a cost perceptive
approach to resolve data imbalance. The Handbook of Research on
Data Preprocessing, Active Learning, and Cost Perceptive Approaches
for Resolving Data Imbalance offers new aspects for imbalanced data
learning by providing the advancements of the traditional methods,
with respect to big data, through case studies and research from
experts in academia, engineering, and industry. The chapters
provide theoretical frameworks and the latest empirical research
findings that help to improve the understanding of the impact of
imbalanced data and its resolving techniques based on data
preprocessing, active learning, and cost perceptive approaches.
This book is ideal for data scientists, data analysts, engineers,
practitioners, researchers, academicians, and students looking for
more information on imbalanced data characteristics and solutions
using varied approaches.
Communication based on the internet of things (IoT) generates huge
amounts of data from sensors over time, which opens a wide range of
applications and areas for researchers. The application of
analytics, machine learning, and deep learning techniques over such
a large volume of data is a very challenging task. Therefore, it is
essential to find patterns, retrieve novel insights, and predict
future behavior using this large amount of sensory data. Artificial
intelligence (AI) has an important role in facilitating analytics
and learning in the IoT devices. Applying AI-Based IoT Systems to
Simulation-Based Information Retrieval provides relevant frameworks
and the latest empirical research findings in the area. It is ideal
for professionals who wish to improve their understanding of the
strategic role of trust at different levels of the information and
knowledge society and trust at the levels of the global economy,
networks and organizations, teams and work groups, information
systems, and individuals as actors in the networked environments.
Covering topics such as blockchain visualization, computer-aided
drug discovery, and health monitoring, this premier reference
source is an excellent resource for business leaders and
executives, IT managers, security professionals, data scientists,
students and faculty of higher education, librarians, hospital
administrators, researchers, and academicians.
Blockchain technology allows value exchange without the need for a
central authority and ensures trust powered by its decentralized
architecture. As such, the growing use of the internet of things
(IoT) and the rise of artificial intelligence (AI) are to be
benefited immensely by this technology that can offer devices and
applications data security, decentralization, accountability, and
reliable authentication. Bringing together blockchain technology,
AI, and IoT can allow these tools to complement the strengths and
weaknesses of the others and make systems more efficient.
Multidisciplinary Functions of Blockchain Technology in AI and IoT
Applications deliberates upon prospects of blockchain technology
using AI and IoT devices in various application domains. This book
contains a comprehensive collection of chapters on machine
learning, IoT, and AI in areas that include security issues of IoT,
farming, supply chain management, predictive analytics, and natural
languages processing. While highlighting these areas, the book is
ideally intended for IT industry professionals, students of
computer science and software engineering, computer scientists,
practitioners, stakeholders, researchers, and academicians
interested in updated and advanced research surrounding the
functions of blockchain technology in AI and IoT applications
across diverse fields of research.
This updated compendium provides the linear algebra background
necessary to understand and develop linear algebra applications in
data mining and machine learning.Basic knowledge and advanced new
topics (spectral theory, singular values, decomposition techniques
for matrices, tensors and multidimensional arrays) are presented
together with several applications of linear algebra (k-means
clustering, biplots, least square approximations, dimensionality
reduction techniques, tensors and multidimensional arrays).The
useful reference text includes more than 600 exercises and
supplements, many with completed solutions and MATLAB
applications.The volume benefits professionals, academics,
researchers and graduate students in the fields of pattern
recognition/image analysis, AI, machine learning and databases.
|
|