![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16-17 August 2019. Written by researchers from academia and industry, the book discusses a wide variety of industrial, engineering, and scientific applications of the emerging techniques in the field of computer science.
This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
As any application running on a computer makes use of the operating system, the potential impact of improving areas such as memory management, process scheduling, file systems, and device drivers is tremendous. The Handbook of Research on Advanced Operating Systems and Kernel Applications: Techniques and Technologies discusses non-distributed operating systems that benefit researchers, academicians, and practitioners desiring to delve into this subject area and learn more on this important field of study. This innovative publication includes an overview of topical issues, methods, and advancements in the field of one-processor operating systems.
This book highlights technical advances in knowledge management and their applications across a diverse range of domains. It explores the applications of knowledge computing methodologies in image processing, pattern recognition, health care and industrial contexts. The chapters also examine the knowledge engineering process involved in information management. Given its interdisciplinary nature, the book covers methods for identifying and acquiring valid, potentially useful knowledge sources. The ideas presented in the respective chapters illustrate how to effectively apply the perspectives of knowledge computing in specialized domains.
This book provides a general introduction to the most important geophysical exploration methods and their application to forensic sciences. It describes physical principles, campaign procedures and processing, as well as interpretation techniques, while also highlighting new acquisition and data analysis procedures. A large section of the book is devoted to applications, from measurements to the interpretation of data. Further, the book shows how to design and perform a forensic survey, and offers guidance on selecting the best method for the problem at hand, and on selecting the best type of data acquisition and processing. Written in straightforward language and chiefly intended as an introductory text for students in several scientific fields, the book also offers a useful guide for specialists who want to expand their expertise in this fascinating discipline.
This edited volume offers a clear in-depth overview of research covering a variety of issues in social search and recommendation systems. Within the broader context of social network analysis it focuses on important and up-coming topics such as real-time event data collection, frequent-sharing pattern mining, improvement of computer-mediated communication, social tagging information, search system personalization, new detection mechanisms for the identification of online user groups, and many more. The twelve contributed chapters are extended versions of conference papers as well as completely new invited chapters in the field of social search and recommendation systems. This first-of-its kind survey of current methods will be of interest to researchers from both academia and industry working in the field of social networks.
The need for collecting relevant data sources, mining useful knowledge from different forms of data sources and promptly reacting to situation change is ever increasing. Active mining is a collection of activities each solving a part of this need, but collectively achieving the mining objective through the spiral effect of these interleaving three steps. This book is a joint effort from leading and active researchers in Japan with a theme about active mining and a timely report on the forefront of data collection, user-centered mining and user interaction/reaction. It offers a contemporary overview of modern solutions with real-world applications, shares hard-learned experiences, and sheds light on future development of active mining.
This edited volume presents a collection of lessons learned with, and research conducted on, OpenStreetMap, the goal being to promote the project's integration. The respective chapters address a) state-of-the-art and cutting-edge approaches to data quality analysis in OpenStreetMap, b) investigations on understanding OpenStreetMap contributors and the nature of their contributions, c) identifying patterns of contributions and contributors, d) applications of OpenStreetMap in different domains, e) mining value-added knowledge and information from OpenStreetMap, f) limitations in the analysis OpenStreetMap data, and g) integrating OpenStreetMap with commercial and non-commercial datasets. The book offers an ideal opportunity to present and disseminate a number of cutting-edge developments and applications in the field of geography, spatial statistics, GIS, social science, and cartography.
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also presented in the book. Digital forensics is a topic of increasing importance as our society becomes "smarter" with more of the "things" around us been internet- and inter-connected (e.g., Internet of Things (IoT) and smart home devices); thus, the increasing likelihood that we will need to acquire data from these things in a forensically sound manner. This book is of interest to both digital forensic educators and digital forensic practitioners, as well as students seeking to learn about digital forensics.
This volume details several important databases and data mining tools. Data Mining Techniques for the Life Sciences, Second Edition guides readers through archives of macromolecular three-dimensional structures, databases of protein-protein interactions, thermodynamics information on protein and mutant stability, "Kbdock" protein domain structure database, PDB_REDO databank, erroneous sequences, substitution matrices, tools to align RNA sequences, interesting procedures for kinase family/subfamily classifications, new tools to predict protein crystallizability, metabolomics data, drug-target interaction predictions, and a recipe for protein-sequence-based function prediction and its implementation in the latest version of the ANNOTATOR software suite. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and cutting-edge, Data Mining Techniques for the Life Sciences, Second Edition aims to ensure successful results in the further study of this vital field.
This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.
This book combines the analytic principles of digital business and data science with business practice and big data. The interdisciplinary, contributed volume provides an interface between the main disciplines of engineering and technology and business administration. Written for managers, engineers and researchers who want to understand big data and develop new skills that are necessary in the digital business, it not only discusses the latest research, but also presents case studies demonstrating the successful application of data in the digital business.
This book is open access under a CC BY-NC 4.0 license. This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed. After a general introduction and an overview of the book in chapter 1, chapter 2 starts by condensing the industrial challenges driven by the German "Industry 4.0" trend to form a concrete vision for future production industries. Subsequently, chapter 3 introduces the basic concepts of S-BPM and its capabilities, in particular for supporting the restructuring of processes. The next three chapters then present various case studies, e.g. at an SME offering the production of atypical, unique and special purpose machinery, equipment and technologically complex units particularly useful in the automotive and electronic industries; and at a further SME producing highly-customized floor cleaning machines. Rounding out the coverage, the last two chapters summarize the achievements and lessons learned with regard to the road ahead. Overall, the book provides a realistic portrait of the status quo based on current findings, and outlines the future activities to be pursued in order to establish stakeholder-centred digital production systems. As such, developers, educators, and practitioners will find both the conceptual background and results from the field reflecting the state-of-the-art in vertical and horizontal process integration.
This thesis deals with two important and very timely aspects of the future power system operation - assessment of demand flexibility and advanced demand side management (DSM) facilitating flexible and secure operation of the power network. It provides a clear and comprehensive literature review in these two areas and states precisely the original contributions of the research. The book first demonstrates the benefits of data mining for a reliable assessment of demand flexibility and its composition even with very limited observability of the end-users. It then illustrates the importance of accurate load modelling for efficient application of DSM and considers different criteria in designing DSM programme to achieve several objectives of the network performance simultaneously. Finally, it demonstrates the importance of considering realistic assumptions when planning and estimating the success of DSM programs. The findings presented here have both scientific and practical significance; they gained her BSc and MSc degrees in electrical engineering from the University of Belgrade in 2011 and 2012 respectively. She graduated with her PhD from the University of Manchester. She has presented at several conferences, and has won runner-up prizes in poster presentation at three. She has authored or co-authored more than 40 journal, conference and technical papers.provide a basis for further research, and can be used to guide future applications in industry.
This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
This book aims through 11 chapters discussing the problems and challenges and some future research points from the recent technologies point of view such as artificial intelligence and the Internet of things (IoT) that can help the environment and healthcare sectors reducing COVID-19.
The Digital Humanities have arrived at a moment when digital Big Data is becoming more readily available, opening exciting new avenues of inquiry but also new challenges. This pioneering book describes and demonstrates the ways these data can be explored to construct cultural heritage knowledge, for research and in teaching and learning. It helps humanities scholars to grasp Big Data in order to do their work, whether that means understanding the underlying algorithms at work in search engines, or designing and using their own tools to process large amounts of information.Demonstrating what digital tools have to offer and also what 'digital' does to how we understand the past, the authors introduce the many different tools and developing approaches in Big Data for historical and humanistic scholarship, show how to use them, what to be wary of, and discuss the kinds of questions and new perspectives this new macroscopic perspective opens up. Authored 'live' online with ongoing feedback from the wider digital history community, Exploring Big Historical Data breaks new ground and sets the direction for the conversation into the future. It represents the current state-of-the-art thinking in the field and exemplifies the way that digital work can enhance public engagement in the humanities.Exploring Big Historical Data should be the go-to resource for undergraduate and graduate students confronted by a vast corpus of data, and researchers encountering these methods for the first time. It will also offer a helping hand to the interested individual seeking to make sense of genealogical data or digitized newspapers, and even the local historical society who are trying to see the value in digitizing their holdings.The companion website to Exploring Big Historical Data can be found at www.themacroscope.org/. On this site you will find code, a discussion forum, essays, and datafiles that accompany this book.
The proceedings from the eighth KMO conference represent the findings of this international meeting which brought together researchers and developers from industry and the academic world to report on the latest scientific and technical advances on knowledge management in organizations. This conference provided an international forum for authors to present and discuss research focused on the role of knowledge management for innovative services in industries, to shed light on recent advances in social and big data computing for KM as well as to identify future directions for researching the role of knowledge management in service innovation and how cloud computing can be used to address many of the issues currently facing KM in academia and industrial sectors.
This text presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational manufacturers, service companies, and the public sector. Features: provides a state-of-the-art introduction to the field, integrating contributions from both academia and industry; reviews novel information aggregation services; discusses personalization and recommendation systems; examines sensor-based knowledge acquisition services, describing how the analysis of sensor data can be used to provide a clear picture of our world.
Through interaction with other databases such as social media, geographic information systems have the ability to build and obtain not only statistics defined on the flows of people, things, and information but also on perceptions, impressions, and opinions about specific places, territories, and landscapes. It is thus necessary to systematize, integrate, and coordinate the various sources of data (especially open data) to allow more appropriate and complete analysis, descriptions, and elaborations. Spatial Planning in the Big Data Revolution is a critical scholarly resource that aims to bring together different methodologies that combine the potential of large data analysis with GIS applications in dedicated tools specifically for territorial, social, economic, environmental, transport, energy, real estate, and landscape evaluation. Additionally, the book addresses a number of fundamental objectives including the application of big data analysis in supporting territorial analysis, validating crowdsourcing and crowdmapping techniques, and disseminating information and community involvement. Urban planners, architects, researchers, academicians, professionals, and practitioners in such fields as computer science, data science, and business intelligence will benefit most from the research contained within this publication. |
![]() ![]() You may like...
Operator Theory and Harmonic Analysis…
Alexey N. Karapetyants, Igor V. Pavlov, …
Hardcover
R6,319
Discovery Miles 63 190
Communication Protocol Specification and…
Richard Lai, Ajin Jirachiefpattana
Hardcover
R5,767
Discovery Miles 57 670
Modern Problems in Applied Analysis
Piotr Drygas, Sergei Rogosin
Hardcover
R3,526
Discovery Miles 35 260
Resource Allocation and MIMO for 4G and…
Francisco Rodrigo Porto Cavalcanti
Hardcover
Associative and Non-Associative Algebras…
Mercedes Siles Molina, Laiachi El Kaoutit, …
Hardcover
R2,921
Discovery Miles 29 210
|