![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This is the first textbook on attribute exploration, its theory, its algorithms forapplications, and some of its many possible generalizations. Attribute explorationis useful for acquiring structured knowledge through an interactive process, byasking queries to an expert. Generalizations that handle incomplete, faulty, orimprecise data are discussed, but the focus lies on knowledge extraction from areliable information source.The method is based on Formal Concept Analysis, a mathematical theory ofconcepts and concept hierarchies, and uses its expressive diagrams. The presentationis self-contained. It provides an introduction to Formal Concept Analysiswith emphasis on its ability to derive algebraic structures from qualitative data,which can be represented in meaningful and precise graphics.
This thesis presents an experimental study of quantum memory based on cold atomic ensembles and discusses photonic entanglement. It mainly focuses on experimental research on storing orbital angular momentum, and introduces readers to methods for storing a single photon carried by an image or an entanglement of spatial modes. The thesis also discusses the storage of photonic entanglement using the Raman scheme as a step toward implementing high-bandwidth quantum memory. The storage of photonic entanglement is central to achieving long-distance quantum communication based on quantum repeaters and scalable linear optical quantum computation. Addressing this key issue, the findings presented in the thesis are very promising with regard to future high-speed and high-capacity quantum communications.
Only ten years ago driving was about horsepower, style and comfort -- people said they loved their cars. Today, we can see the transformation in the automotive industry including ridesharing and carsharing with the new concepts of mobility and motion changing every day. Will consumers lose the e-motion they previously had for their vehicles? Maybe the new e-motion will be a different type of connection, one that understands, learns, and reasons as you move through your life; this is the concept of a cognitive vehicle and lifestyle that is discussed within. This book provides the trends and technologies in the automotive industry as it moves from a connected vehicle to a cognitive vehicle and how automotive manufactures facing the market shift from an organizational-centered to an individual-centered economy.
For undergraduate database management courses. Get Students Straight to the Point of Database Processing Database Processing: Fundamentals, Design, and Implementation reflects a new teaching and professional workplace environment and method that gets students straight to the point with its thorough and modern presentation of database processing fundamentals.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
Seeking to define a new approach to data management at the enterprise level, this work takes the reader beyond information management to information control, where the methods of data capture and manipulation supersede data quantity. Using the metadata approach ensures long-term, universal control of all data characteristics and improves the effectiveness of IT as a corporate function by minimizing the potential for errors, and improving communication and understanding between IT and other disciplines. By describing how to establish metadata management within an organization, this volume provides examples of data structure architectures, and reviews issues associated with metadata management in relation to the Internet and data warehousing. It offers to help the reader to control the factors that make data useable throughout an organization and manage data so that it becomes a valuable corporate asset. The book examines real-world business departments that can benefit from this approach and ways in which sets of metadata can be both autonomous and overlapping.
This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2020, held in Salt Lake City, UT, USA, in October 2020.*The 16 full papers included in this volume were carefully reviewed and selected from the 38 papers (out of 74 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
This book reports on a novel concept of mechanism transitions for the design of highly scalable and adaptive publish/subscribe systems. First, it introduces relevant mechanisms for location-based filtering and locality-aware dissemination of events based on a thorough review of the state-of-the-art. This is followed by a detailed description of the design of a transition-enabled publish/subscribe system that enables seamless switching between mechanisms during runtime. Lastly, the proposed concepts are evaluated within the challenging context of location-based mobile applications. The book assesses in depth the performance and cost of transition execution, highlighting the impact of the proposed state transfer mechanism and the potential of coexisting transition-enabled mechanisms.
This book presents some of the emerging techniques and technologies used to handle Web data management. Authors present novel software architectures and emerging technologies and then validate using experimental data and real world applications. The contents of this book are focused on four popular thematic categories of intelligent Web data management: cloud computing, social networking, monitoring and literature management. The Volume will be a valuable reference to researchers, students and practitioners in the field of Web data management, cloud computing, social networks using advanced intelligence tools.
This book provides a systematic review of many advanced techniques to support the analysis of large collections of documents, ranging from the elementary to the profound, covering all the aspects of the visualization of text documents. Particularly, we start by introducing the fundamental concept of information visualization and visual analysis, followed by a brief survey of the field of text visualization and commonly used data models for converting document into a structured form for visualization. Then we introduce the key visualization techniques including visualizing document similarity, content, sentiments, as well as text corpus exploration system in details with concrete examples in the rest of the book.
This book offers an original and broad exploration of the fundamental methods in Clustering and Combinatorial Data Analysis, presenting new formulations and ideas within this very active field. With extensive introductions, formal and mathematical developments and real case studies, this book provides readers with a deeper understanding of the mutual relationships between these methods, which are clearly expressed with respect to three facets: logical, combinatorial and statistical. Using relational mathematical representation, all types of data structures can be handled in precise and unified ways which the author highlights in three stages: Clustering a set of descriptive attributes Clustering a set of objects or a set of object categories Establishing correspondence between these two dual clusterings Tools for interpreting the reasons of a given cluster or clustering are also included. Foundations and Methods in Combinatorial and Statistical Data Analysis and Clustering will be a valuable resource for students and researchers who are interested in the areas of Data Analysis, Clustering, Data Mining and Knowledge Discovery.
This book discusses applications of blockchain in healthcare sector. The security of confidential and sensitive data is of utmost importance in healthcare industry. The introduction of blockchain methods in an effective manner will bring secure transactions in a peer-to-peer network. The book also covers gaps of the current available books/literature available for use cases of Distributed Ledger Technology (DLT) in healthcare. The information and applications discussed in the book are immensely helpful for researchers, database professionals, and practitioners. The book also discusses protocols, standards, and government regulations which are very useful for policymakers.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
The ideas introduced in this book explore the relationships among rule based systems, machine learning and big data. Rule based systems are seen as a special type of expert systems, which can be built by using expert knowledge or learning from real data. The book focuses on the development and evaluation of rule based systems in terms of accuracy, efficiency and interpretability. In particular, a unified framework for building rule based systems, which consists of the operations of rule generation, rule simplification and rule representation, is presented. Each of these operations is detailed using specific methods or techniques. In addition, this book also presents some ensemble learning frameworks for building ensemble rule based systems.
"Business Database Systems "arms you with the knowledge to analyse, design and implement effective, robust and successful databases. This book is ideal for students of Business/Management Information Systems, or Computer Science, who will be expected to take a course in database systems for their degree programme. It is also excellently suited to any practitioner who needs to learn, or refresh their knowledge of, the essentials of database management systems.
This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain. It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources. The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services. Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data.
The book provides a thorough treatment of set functions, games and capacities as well as integrals with respect to capacities and games, in a mathematical rigorous presentation and in view of application to decision making. After a short chapter introducing some required basic knowledge (linear programming, polyhedra, ordered sets) and notation, the first part of the book consists of three long chapters developing the mathematical aspects. This part is not related to a particular application field and, by its neutral mathematical style, is useful to the widest audience. It gathers many results and notions which are scattered in the literature of various domains (game theory, decision, combinatorial optimization and operations research). The second part consists of three chapters, applying the previous notions in decision making and modelling: decision under uncertainty, decision with multiple criteria, possibility theory and Dempster-Shafer theory.
Information Systems Development: Reflections, Challenges and New Directions, is the collected proceedings of the 20th International Conference on Information Systems Development held in Edinburgh, Scotland, August 24 - 26, 2011. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education. These proceedings represent ongoing reflections within the academic community on established information systems topics and emerging concepts, approaches and ideas. It is hoped that the papers herein contribute towards disseminating research and improving practice
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
The work presented in this book is a combination of theoretical advancements of big data analysis, cloud computing, and their potential applications in scientific computing. The theoretical advancements are supported with illustrative examples and its applications in handling real life problems. The applications are mostly undertaken from real life situations. The book discusses major issues pertaining to big data analysis using computational intelligence techniques and some issues of cloud computing. An elaborate bibliography is provided at the end of each chapter. The material in this book includes concepts, figures, graphs, and tables to guide researchers in the area of big data analysis and cloud computing.
Intended for researchers and practitioners alike, this book covers carefully selected yet broad topics in optimization, machine learning, and metaheuristics. Written by world-leading academic researchers who are extremely experienced in industrial applications, this self-contained book is the first of its kind that provides comprehensive background knowledge, particularly practical guidelines, and state-of-the-art techniques. New algorithms are carefully explained, further elaborated with pseudocode or flowcharts, and full working source code is made freely available. This is followed by a presentation of a variety of data-driven single- and multi-objective optimization algorithms that seamlessly integrate modern machine learning such as deep learning and transfer learning with evolutionary and swarm optimization algorithms. Applications of data-driven optimization ranging from aerodynamic design, optimization of industrial processes, to deep neural architecture search are included.
This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge. The hybrid algorithm is implemented in the statistical programming language and environment R, introducing packages which capture - through matrix algebra - elements of learners' work with more knowledgeable others and resourceful content artefacts. The book provides comprehensive package-by-package application examples, and code samples that guide the reader through the MPIA model to show how the MPIA landscape can be constructed and the learner's journey mapped and analysed. This building block application will allow the reader to progress to using and building analytics to guide students and support decision-making in learning.
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potential solutions and how they are combined to form an overall data quality program, senior management's role, methods used to make improvements, and the life-cycle of data quality. It concludes with case studies, summaries of main points, roles and responsibilities for each individual, and a helpful listing of "dos and don'ts".
This book highlights recent research advances in unsupervised learning using natural computing techniques such as artificial neural networks, evolutionary algorithms, swarm intelligence, artificial immune systems, artificial life, quantum computing, DNA computing, and others. The book also includes information on the use of natural computing techniques for unsupervised learning tasks. It features several trending topics, such as big data scalability, wireless network analysis, engineering optimization, social media, and complex network analytics. It shows how these applications have triggered a number of new natural computing techniques to improve the performance of unsupervised learning methods. With this book, the readers can easily capture new advances in this area with systematic understanding of the scope in depth. Readers can rapidly explore new methods and new applications at the junction between natural computing and unsupervised learning. Includes advances on unsupervised learning using natural computing techniques Reports on topics in emerging areas such as evolutionary multi-objective unsupervised learning Features natural computing techniques such as evolutionary multi-objective algorithms and many-objective swarm intelligence algorithms
This book provides fresh insights into the cutting edge of multimedia data mining, reflecting how the research focus has shifted towards networked social communities, mobile devices and sensors. The work describes how the history of multimedia data processing can be viewed as a sequence of disruptive innovations. Across the chapters, the discussion covers the practical frameworks, libraries, and open source software that enable the development of ground-breaking research into practical applications. Features: reviews how innovations in mobile, social, cognitive, cloud and organic based computing impacts upon the development of multimedia data mining; provides practical details on implementing the technology for solving real-world problems; includes chapters devoted to privacy issues in multimedia social environments and large-scale biometric data processing; covers content and concept based multimedia search and advanced algorithms for multimedia data representation, processing and visualization. |
![]() ![]() You may like...
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, …
Paperback
R2,779
Discovery Miles 27 790
Intro to Python for Computer Science and…
Paul Deitel
Paperback
Database Solutions - A step by step…
Thomas Connolly, Carolyn Begg
Paperback
Blockchain Life - Making Sense of the…
Kary Oberbrunner, Lee Richter
Hardcover
Role of 6g Wireless Networks in AI and…
Malaya Dutta Borah, Steven A. Wright, …
Hardcover
R7,081
Discovery Miles 70 810
|