![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
This book shows how to model selected communication scenarios using game theory. The book helps researchers specifically dealing with scenarios motivated by the increasing use of the Internet of Things (IoT) and 5G Communications by using game theory to approach the study of such challenging scenarios. The author explains how game theory acts as a mathematical tool that models decision making in terms of strategies and mechanisms that can result in optimal payoffs for a number of interacting entities, offering often antagonistic behaviors. The book explores new technologies in terms of design, development and management from a theoretical perspective, using game theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book identifies and explores several significant applications/uses/situations that arise from the vast deployment of the IoT. The presentation of the technological scenarios is followed in each of the first four chapters by a step-by-step theoretical model often followed by equilibrium proof, and numerical simulation results, that are explained in a tutorial-like manner. The four chapters tackle challenging IoT and 5G related issues, including: new security threats that IoT brings, e.g. botnets, ad hoc vehicular networks and the need for trust in vehicular communications, content repetition by offloading traffic onto mobile users, as well as issues due to new wearable devices that enable data collection to become more intrusive.
"Applications, 2nd Edition" focuses on moving object management, from the location management perspective to determining how constantly changing locations affect the traditional database and data mining technology. The book specifically describes the topics of moving objects modeling and location tracking, indexing and querying, clustering, location uncertainty, traffic-aware navigation and privacy issues, as well as the application to intelligent transportation systems. Through the book, the readers will be made familiar with the cutting-edge technologies in moving object management that can be effectively applied in LBS and transportation contexts. The second edition of this book significantly expands the coverage of the latest research on location privacy, traffic-aware navigation and uncertainty. The book has also been reorganized, with nearly all chapters rewritten, and several new chapters have been added to address the latest topics on moving objects management. Xiaofeng Meng is a professor at the School of Information, Renmin University of China; Zhiming Ding is a professor at the Institute of Software, Chinese Academy of Sciences (ISCAS); Jiajie Xu is an assistant professor at the ISCAS.
This book examines the managerial dimensions of business intelligence (BI) systems. It develops a set of guidelines for value creation by implementing business intelligence systems and technologies. In particular the book looks at BI as a process - driven by a mix of human and technological capabilities - to serve complex information needs in building insights and providing aid in decision making. After an introduction to the key concepts of BI and neighboring areas of information processing, the book looks at the complexity and multidimensionality of BI. It tackles both data integration and information integration issues. Bodies of knowledge and other widely accepted collections of experience are presented and turned into lessons learned. Following a straightforward introduction to the processes and technologies of BI the book embarks on BI maturity and agility, the components, drivers and inhibitors of BI culture and soft BI factors like attention, sense and trust. Eventually the book attempts to provide a holistic view on business intelligence, possible structures and tradeoffs and embarks to provide an outlook on possible developments in BI and analytics.
This book discusses the latest progresses and developments on complex systems research and intends to give an exposure to prospective readers about the theoretical and practical aspects of mathematical modelling, numerical simulation and agent-based modelling frameworks. The main purpose of this book is to emphasize a unified approach to complex systems analysis, which goes beyond to examine complicated phenomena of numerous real-life systems; this is done by investigating a huge number of components that interact with each other at different (microscopic and macroscopic) scales; new insights and emergent collective behaviours can evolve from the interactions between individual components and also with their environments. These tools and concepts permit us to better understand the patterns of various real-life systems and help us to comprehend the mechanisms behind which distinct factors shaping some complex systems phenomena being influenced. This book is published in conjunction with the International Workshop on Complex Systems Modelling & Simulation 2019 (CoSMoS 2019): IoT & Big Data Integration. This international event was held at the Universiti Sains Malaysia Main Campus, Penang, Malaysia, from 8 to 11 April 2019. This book appeals to readers interested in complex systems research and other related areas such as mathematical modelling, numerical simulation and agent-based modelling frameworks.
The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia app- cations. Multimedia is practically everywhere and all around us we can feel its presence in almost all applications ranging from online video databases, IPTV, - teractive multimedia and more recently in multimedia based social interaction. These new growing applications require high-quality data storage, easy access to multimedia content and reliable delivery. Moving ever closer to commercial - ployment also aroused a higher awareness of security and intellectual property management issues. All the aforementioned requirements resulted in higher demands on various - eas of research (signal processing, image/video processing and analysis, com- nication protocols, content search, watermarking, etc.). This book covers the most prominent research issues in multimedia and is divided into four main sections: i) content based retrieval, ii) storage and remote access, iii) watermarking and co- right protection and iv) multimedia applications. Chapter 1 of the first section presents an analysis on how color is used and why is it crucial in nowadays multimedia applications. In chapter 2 the authors give an overview of the advances in video abstraction for fast content browsing, transm- sion, retrieval and skimming in large video databases and chapter 3 extends the discussion on video summarization even further. Content retrieval problem is tackled in chapter 4 by describing a novel method for producing meaningful s- ments suitable for MPEG-7 description based on binary partition trees (BPTs).
Data analysis forms the basis of many modes of research ranging from scientific discoveries to governmental findings. With the advent of machine intelligence and neural networks, extracting and modeling, approaching data has been unimpeachably altered. These changes, seemingly small, affect the way societies organize themselves, deliver services, or interact with each other. Predictive Analysis on Large Data for Actionable Knowledge: Emerging Research and Opportunities provides emerging information on extraction and prediction patterns in data mining along with knowledge discovery. While highlighting the current issues in data extraction, readers will learn new methodologies comprising of different algorithms that automate the multidimensional schema that remove the manual processes. This book is a vital resource for researchers, academics, and those seeking new information on data mining techniques and trends.
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consists of contributions covering topics including machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful Inter national Conferences on IT Convergence and Security, previously held in Prague, Czech Republic (2016), Kuala Lumpur, Malaysia (2015), Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).
An ontology is a formal description of concepts and relationships that can exist for a community of human and/or machine agents. The notion of ontologies is crucial for the purpose of enabling knowledge sharing and reuse. The Handbook on Ontologies provides a comprehensive overview of the current status and future prospectives of the field of ontologies considering ontology languages, ontology engineering methods, example ontologies, infrastructures and technologies for ontologies, and how to bring this all into ontology-based infrastructures and applications that are among the best of their kind. The field of ontologies has tremendously developed and grown in the five years since the first edition of the "Handbook on Ontologies." Therefore, its revision includes 21 completely new chapters as well as a major re-working of 15 chapters transferred to this second edition.
This book presents the first paradigm of social multimedia computing completely from the user perspective. Different from traditional multimedia and web multimedia computing which are content-centric, social multimedia computing rises under the participatory Web2.0 and is essentially user-centric. The goal of this book is to emphasize the user factor in facilitating effective solutions towards both multimedia content analysis, user modeling and customized user services. Advanced topics like cross-network social multimedia computing are also introduced as extensions and potential directions along this research line.
This book presents the latest research ideas and topics on how to enhance current database systems, improve information storage, refine existing database models, and develop advanced applications. It provides insights into important developments in the field of database and database management. With emphasis on theoretical issues regarding databases and database management, the book describes the capabilities and features of new technologies and methodologies, and addresses the needs of database researchers and practitioners. *Note: This book is part of a new series entitled "Advanced Topics in Database Research." This book is Volume Three within this series (Vol. III, 2004).
This book addresses the mapping of soil-landscape parameters in the geospatial domain. It begins by discussing the fundamental concepts, and then explains how machine learning and geomatics can be applied for more efficient mapping and to improve our understanding and management of 'soil'. The judicious utilization of a piece of land is one of the biggest and most important current challenges, especially in light of the rapid global urbanization, which requires continuous monitoring of resource consumption. The book provides a clear overview of how machine learning can be used to analyze remote sensing data to monitor the key parameters, below, at, and above the surface. It not only offers insights into the approaches, but also allows readers to learn about the challenges and issues associated with the digital mapping of these parameters and to gain a better understanding of the selection of data to represent soil-landscape relationships as well as the complex and interconnected links between soil-landscape parameters under a range of soil and climatic conditions. Lastly, the book sheds light on using the network of satellite-based Earth observations to provide solutions toward smart farming and smart land management.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.
This book discusses the psychological traits associated with drug consumption through the statistical analysis of a new database with information on 1885 respondents and use of 18 drugs. After reviewing published works on the psychological profiles of drug users and describing the data mining and machine learning methods used, it demonstrates that the personality traits (five factor model, impulsivity, and sensation seeking) together with simple demographic data make it possible to predict the risk of consumption of individual drugs with a sensitivity and specificity above 70% for most drugs. It also analyzes the correlations of use of different substances and describes the groups of drugs with correlated use, identifying significant differences in personality profiles for users of different drugs. The book is intended for advanced undergraduates and first-year PhD students, as well as researchers and practitioners. Although no previous knowledge of machine learning, advanced data mining concepts or modern psychology of personality is assumed, familiarity with basic statistics and some experience in the use of probabilities would be helpful. For a more detailed introduction to statistical methods, the book provides recommendations for undergraduate textbooks.
This book presents state-of-the-art solution methods and applications of stochastic optimal control. It is a collection of extended papers discussed at the traditional Liverpool workshop on controlled stochastic processes with participants from both the east and the west. New problems are formulated, and progresses of ongoing research are reported. Topics covered in this book include theoretical results and numerical methods for Markov and semi-Markov decision processes, optimal stopping of Markov processes, stochastic games, problems with partial information, optimal filtering, robust control, Q-learning, and self-organizing algorithms. Real-life case studies and applications, e.g., queueing systems, forest management, control of water resources, marketing science, and healthcare, are presented. Scientific researchers and postgraduate students interested in stochastic optimal control,- as well as practitioners will find this book appealing and a valuable reference.
SQL Clearly Explained, Third Edition, provides an in-depth introduction to using SQL (Structured Query Language). Readers will learn not only SQL syntax, but also how SQL works. Although the core of the SQL language remains relatively unchanged, the most recent release of the SQL standard (SQL:2008) includes two sets of extensions: 1) support for object-relational databases and 2) support for XML. As a result, the set of standard SQL commands has been greatly extended and this new edition takes that into account. This new edition includes updated tips and tricks to reflect the current concepts of SQL and XML standards; several new chapters covering object-relational and XML extensions; and an ancillary package that includes case studies, a syllabus, exams and more. This book is intended for working SQL programmers, database administrators, database designers, database analysts, and application system developers as well as those who are developing new features for database management systems who want to know about user needs. This would include anyone working with electronic content in the relational database context but also XML. Web services, etc.
This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.
This book systematically summarizes China Internet development over the past 25 years, highlighting its strong impact on China's economy and society, and discussing the Chinese people's transition from beneficiaries and participants to builders, contributors and joint maintainers of cyberspace development. It describes the development achievements, status and development and trends in China Internet in 2019, systematically summarizes the main lessons learned during development, and analyzes China's strategic planning and policy actions. Further, it discusses topics such as development outcomes, future trends in information infrastructure, network information technology, digital economy, e-government, construction and management of network contents, cyberspace security, the legal construction of cyberspace, and international cyberspace governance. In addition, the book suggests improvements to the index system for China Internet development and offers an overall assessment of cyberspace security and informatization work throughout China in order to comprehensively and accurately demonstrate the level of China Internet development.
This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.
This book explores how PPPM, clinical practice, and basic research could be best served by information technology (IT). A use-case was developed for hepatocellular carcinoma (HCC). The subject was approached with four interrelated tasks: (1) review of clinical practices relating to HCC; (2) propose an IT system relating to HCC, including clinical decision support and research needs; (3) determine how a clinical liver cancer center can contribute; and, (4) examine the enhancements and impact that the first three tasks will have on the management of HCC. An IT System for Personalized Medicine (ITS-PM) for HCC will provide the means to identify and determine the relative value of the wide number of variables, including clinical assessment of the patient -- functional status, liver function, degree of cirrhosis, and comorbidities; tumor biology, at a molecular, genetic and anatomic level; tumor burden and individual patient response; medical and operative treatments and their outcomes. |
![]() ![]() You may like...
Computational Intelligence for Machine…
Rajshree Srivastava, Pradeep Kumar Mallick, …
Hardcover
R4,117
Discovery Miles 41 170
Deep Network Design for Medical Image…
Haofu Liao, S. Kevin Zhou, …
Paperback
R2,343
Discovery Miles 23 430
Avatar-Based Control, Estimation…
Vardan Mkrttchian, Ekaterina Aleshina, …
Hardcover
R7,266
Discovery Miles 72 660
Research Advancements in Smart…
Pandian Vasant, Gerhard Weber, …
Hardcover
R6,736
Discovery Miles 67 360
Type-2 Fuzzy Neural Networks and Their…
Rafik Aziz Aliev, Babek Ghalib Guirimov
Hardcover
Adaptive Modelling, Estimation and…
Chris Harris, Xia Hong, …
Hardcover
R2,921
Discovery Miles 29 210
|