0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (53)
  • R250 - R500 (380)
  • R500+ (14,857)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Cognitive Social Mining Applications in Data Analytics and Forensics (Hardcover): Anandakumar Haldorai, Arulmurugan Ramu Cognitive Social Mining Applications in Data Analytics and Forensics (Hardcover)
Anandakumar Haldorai, Arulmurugan Ramu
R5,264 Discovery Miles 52 640 Ships in 10 - 15 working days

Recently, there has been a rapid increase in interest regarding social network analysis in the data mining community. Cognitive radios are expected to play a major role in meeting this exploding traffic demand on social networks due to their ability to sense the environment, analyze outdoor parameters, and then make decisions for dynamic time, frequency, space, resource allocation, and management to improve the utilization of mining the social data. Cognitive Social Mining Applications in Data Analytics and Forensics is an essential reference source that reviews cognitive radio concepts and examines their applications to social mining using a machine learning approach so that an adaptive and intelligent mining is achieved. Featuring research on topics such as data mining, real-time ubiquitous social mining services, and cognitive computing, this book is ideally designed for social network analysts, researchers, academicians, and industry professionals.

Key Competencies in the Knowledge Society - IFIP TC 3 International Conference, KCKS 2010, Held as Part of WCC 2010, Brisbane,... Key Competencies in the Knowledge Society - IFIP TC 3 International Conference, KCKS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Nicolas Reynolds, Marta Turcsanyi-Szabo
R2,956 Discovery Miles 29 560 Ships in 10 - 15 working days

th It is fitting that there was a World Computer Congress in the 50 anniversary year of IFIP. Within the Learn IT Stream of WCC2010, the conference, Key Competencies in the Knowledge Society (KCKS), brought together some 43 papers from around the world covering many areas of ICT and its role in education. Of the papers presented here, three were selected as key theme papers for the KCKS conference. These papers' by Adams and Tatnall, Tarrago and Wilson, Diethelm and Dorge, are included in these proceedings. We congratulate these authors for the quality of their work that led to selection. The range of issues covered within this volume is too broad to set out here but c- ers, amongst other things, e-examination, Twitter, teacher education, school-based learning, methodological frameworks and human development theories. It has been an exciting and rewarding task to put these papers together. They rep- sent a coming together of great minds and cutting-edge research. We thank our contributors and our reviewers for producing such an impressive body of work."

Wellness Protocol for Smart Homes - An Integrated Framework for Ambient Assisted Living (Hardcover, 1st ed. 2017): Hemant... Wellness Protocol for Smart Homes - An Integrated Framework for Ambient Assisted Living (Hardcover, 1st ed. 2017)
Hemant Ghayvat, Subhas Chandra Mukhopadhyay
R4,033 Discovery Miles 40 330 Ships in 10 - 15 working days

This book focuses on the development of wellness protocols for smart home monitoring, aiming to forecast the wellness of individuals living in ambient assisted living (AAL) environments. It describes in detail the design and implementation of heterogeneous wireless sensors and networks as applied to data mining and machine learning, which the protocols are based on. Further, it shows how these sensor and actuator nodes are deployed in the home environment, generating real-time data on object usage and other movements inside the home, and therefore demonstrates that the protocols have proven to offer a reliable, efficient, flexible, and economical solution for smart home systems. Documenting the approach from sensor to decision making and information generation, the book addresses various issues concerning interference mitigation, errors, security and large data handling. As such, it offers a valuable resource for researchers, students and practitioners interested in interdisciplinary studies at the intersection of wireless sensing processing, radio communication, the Internet of Things and machine learning, and in how they can be applied to smart home monitoring and assisted living environments.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Amy Sliva,... Computational Analysis of Terrorist Groups: Lashkar-e-Taiba (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Amy Sliva, Jana Shakarian, John P. Dickerson
R3,382 Discovery Miles 33 820 Ships in 10 - 15 working days

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates.After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations.This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites.

"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book."

Smart Global Megacities - Collaborative Research: Chennai, Kochi-Kannur (Hardcover, 1st ed. 2021): T. M. Vinod Kumar Smart Global Megacities - Collaborative Research: Chennai, Kochi-Kannur (Hardcover, 1st ed. 2021)
T. M. Vinod Kumar
R4,429 Discovery Miles 44 290 Ships in 10 - 15 working days

This book, the second volume, highlights 7 out of a total of about 36 megacities in the World which by definition have 10 million inhabitants. The cities/chapters presented in this book are based on recent advance such as the wide use of ICT, IOT, e-Governance, e-Democracy, smart economy and flattening and acceleration of the world that is taking place in recent times as reported by 3 times Pulitzer Prize Winner Thomas Friedman. It therefor departs from other ideologies where only a certain megacity qualifies for the title of smart global megacities while in reality every megacity can, and presents how smart global megacities can be created.

Literature-based Discovery (Hardcover, 2008 ed.): Peter Bruza, Marc Weeber Literature-based Discovery (Hardcover, 2008 ed.)
Peter Bruza, Marc Weeber
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

When Don Swanson hypothesized a connection between Raynaud's phenomenon anddietary?shoil, the?eldofliterature-baseddiscovery(LBD)wasborn. During thesubsequenttwodecadesasteadystreamofresearchershavepublishedarticles aboutLBDandthe?eldhasmadesteadyprogressinlayingfoundationsandc- ating an identity. It is curiously signi?cant that LBD is not "owned" by any p- ticulardiscipline, forexample, knowledge discoveryortextmining. Rather, LBD researchersoriginatefromarangeof?eldsincludinginformationscience, infor- tionretrieval, logic, andthebiomedicalsciences. Thisre?ectsthefactLBDisan inherentlymulti-disciplinaryenterprisewherecollaborationsbetweentheinfor- tionandbiomedicalsciencesarereadilyencountered. Thismulti-disciplinaryaspect ofLBDhasmadeitharderforthe?eldtoplanta?ag, sotospeak. Thepresentv- umecanbeseenasanattempttoredressthis. Itpresentschaptersprovidingabroad brushstrokeofLBDbyleadingresearchersprovidinganoverviewofthestateofthe art, themodelsandtheoriesused, experimentalstudies, lessonslearnt, application areas, andfuturechallenges. Inshort, itattemptstoconveyalearnedimpressionof whereandhowLBDisbeingdeployed. DonSwansonhaskindlyagreedtoprovide theintroductorychapter. Itisthehopeandintentionthatthisvolumewillplanta ?aginthegroundandinspirenewresearcherstotheLBDchallenge. PeterBruza July2007 MarcWeeber v Contents Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Contributors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Part I General Outlook and Possibilities Literature-Based Discovery? The Very Idea . . . . . . . . . . . . . . . . . . . . . . . . . 3 D. R. Swanson The Place of Literature-Based Discovery in Contemporary Scienti?c Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 NeilR. SmalheiserandVetleI. Torvik The Tip of the Iceberg: The Quest for Innovation at the Base of the Pyramid. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 M. D. GordonandN. F. Awad The 'Open Discovery' Challenge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 JonathanD. Wren Where is the Discovery in Literature-Based Discovery?. . . . . . . . . . . . . . . . 57 R. N. Kostoff Part II Methodology and Applications Analyzing LBD Methods using a General Framework. . . . . . . . . . . . . . . . . 75 A. K. Sehgal, X. Y. Qiu, andP. Srinivasan Evaluation of Literature-Based Discovery Systems. . . . . . . . . . . . . . . . . . . . 101 M. Yetisgen-YildizandW. Pratt vii viii Contents Factor Analytic Approach to Transitive Text Mining using Medline Descriptors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 J. StegmannandG. Grohmann Literature-Based Knowledge Discovery using Natural Language Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 D. Hristovski, C. Friedman, T. C. Rind?esch, andB. Peterlin Information Retrieval in Literature-Based Discovery. . . . . . . . . . . . . . . . . . 153 W. Hersh Biomedical Application of Knowledge Discovery . . . . . . . . . . . . . . . . . . . . . 173 A. Koike Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Contributors NeveenFaragAwad SchoolofBusiness, WayneStateUniversity, USA CarolFriedman

Business Intelligence and Performance Management - Theory, Systems and Industrial Applications (Hardcover, 2013 ed.): Peter... Business Intelligence and Performance Management - Theory, Systems and Industrial Applications (Hardcover, 2013 ed.)
Peter Rausch, Alaa F. Sheta, Aladdin Ayesh
R4,165 R3,595 Discovery Miles 35 950 Save R570 (14%) Ships in 12 - 19 working days

During the 21st century business environments have become more complex and dynamic than ever before. Companies operate in a world of change influenced by globalisation, volatile markets, legal changes and technical progress. As a result, they have to handle growing volumes of data and therefore require fast storage, reliable data access, intelligent retrieval of information and automated decision-making mechanisms, all provided at the highest level of service quality. Successful enterprises are aware of these challenges and efficiently respond to the dynamic environment in which their business operates. Business Intelligence (BI) and Performance Management (PM) offer solutions to these challenges and provide techniques to enable effective business change. The important aspects of both topics are discussed within this state-of-the-art volume. It covers the strategic support, business applications, methodologies and technologies from the field, and explores the benefits, issues and challenges of each. Issues are analysed from many different perspectives, ranging from strategic management to data technologies, and the different subjects are complimented and illustrated by numerous examples of industrial applications. Contributions are authored by leading academics and practitioners representing various universities, research centres and companies worldwide. Their experience covers multiple disciplines and industries, including finance, construction, logistics, and public services, amongst others. Business Intelligence and Performance Management is a valuable source of reference for graduates approaching MSc or PhD programs and for professionals in industry researching in the fields of BI and PM for industrial application.

Advances in Research Methods for Information Systems Research - Data Mining, Data Envelopment Analysis, Value Focused Thinking... Advances in Research Methods for Information Systems Research - Data Mining, Data Envelopment Analysis, Value Focused Thinking (Hardcover, 2014 ed.)
Kweku-Muata Osei-Bryson, Ojelanki Ngwenyama
R3,545 Discovery Miles 35 450 Ships in 12 - 19 working days

Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems.

"Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science.

IE&EM 2019 - Proceedings of the 25th International Conference on Industrial Engineering and Engineering Management 2019... IE&EM 2019 - Proceedings of the 25th International Conference on Industrial Engineering and Engineering Management 2019 (Hardcover, 1st ed. 2020)
Chen-Fu Chien, Ershi Qi, Runliang Dou
R2,907 Discovery Miles 29 070 Ships in 10 - 15 working days

This book records the new research findings and development in the field of industrial engineering and engineering management, and it will serve as the guidebook for the potential development in future. It gathers the accepted papers from the 25th International conference on Industrial Engineering and Engineering Management held at Anhui University of Technology in Maanshan during August 24-25, 2019. The aim of this conference was to provide a high-level international forum for experts, scholars and entrepreneurs at home and abroad to present the recent advances, new techniques and application, to promote discussion and interaction among academics, researchers and professionals to promote the developments and applications of the related theories and technologies in universities and enterprises, and to establish business or research relations to find global partners for future collaboration in the field of Industrial Engineering. It addresses diverse themes in smart manufacturing, artificial intelligence, ergonomics, simulation and modeling, quality and reliability, logistics engineering, data mining and other related fields. This timely book summarizes and promotes the latest achievements in the field of industrial engineering and related fields over the past year, proposing prospects and vision for the further development.

Distributed User Interfaces - Designing Interfaces for the Distributed Ecosystem (Hardcover, 2011): Jose A. Gallud, Ricardo... Distributed User Interfaces - Designing Interfaces for the Distributed Ecosystem (Hardcover, 2011)
Jose A. Gallud, Ricardo Tesoriero, Victor M. R. Penichet
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.

Implementations and Applications of Machine Learning (Hardcover, 1st ed. 2020): Saad Subair, Christopher Thron Implementations and Applications of Machine Learning (Hardcover, 1st ed. 2020)
Saad Subair, Christopher Thron
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.

Net-Centric Approaches to Intelligence and National Security (Hardcover, 2005 ed.): Roy Ladner, Frederick E. Petry Net-Centric Approaches to Intelligence and National Security (Hardcover, 2005 ed.)
Roy Ladner, Frederick E. Petry
R2,979 Discovery Miles 29 790 Ships in 10 - 15 working days

The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback): Bharat Bhushan, Sudhir Kumar... Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems (Paperback)
Bharat Bhushan, Sudhir Kumar Sharma, Muzafer Saracevic, Azedine Boulmakoul
R3,449 R3,128 Discovery Miles 31 280 Save R321 (9%) Ships in 12 - 19 working days

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.

Networks for Pervasive Services - Six Ways to Upgrade the Internet (Hardcover, 2011 ed.): Antonio Liotta, George Exarchakos Networks for Pervasive Services - Six Ways to Upgrade the Internet (Hardcover, 2011 ed.)
Antonio Liotta, George Exarchakos
R2,871 Discovery Miles 28 710 Ships in 10 - 15 working days

Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.

Big Data Technologies and Applications (Hardcover, 1st ed. 2016): Borko Furht, Flavio Villanustre Big Data Technologies and Applications (Hardcover, 1st ed. 2016)
Borko Furht, Flavio Villanustre
R4,437 Discovery Miles 44 370 Ships in 12 - 19 working days

The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform. The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques; big data analytics; and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems (R)) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification. The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.

Integrations of Data Warehousing, Data Mining and Database Technologies - Innovative Approaches (Hardcover, New): David Taniar,... Integrations of Data Warehousing, Data Mining and Database Technologies - Innovative Approaches (Hardcover, New)
David Taniar, Li Chen
R4,993 Discovery Miles 49 930 Ships in 10 - 15 working days

Over the years, advances in the business world as well as the changing of diverse application contexts, have caused Data Warehousing and Data Mining to become more paramount in our society. The two share many common issues and are commonly interrelated. Integrations of Data Warehousing, Data Mining and Database Technologies: Innovative Approaches provides a comprehensive compilation of knowledge covering state-of-the-art developments and research, as well as current innovative activities in data warehousing and mining. This book focuses on the integration between the fields of data warehousing and data mining, with emphasis on the applicability to real world problems and provides a broad perspective on the future of these two cohesive topic areas.

Operations Research and Big Data - IO2015-XVII Congress of Portuguese Association of Operational Research (APDIO) (Hardcover,... Operations Research and Big Data - IO2015-XVII Congress of Portuguese Association of Operational Research (APDIO) (Hardcover, 1st ed. 2015)
Ana Paula Ferreira Dias Barbosa Povoa, Joao Luis De Miranda
R4,434 R3,577 Discovery Miles 35 770 Save R857 (19%) Ships in 12 - 19 working days

The development of Operations Research (OR) requires constant improvements, such as the integration of research results with business applications and innovative educational practice. The full deployment and commercial exploitation of goods and services generally need the construction of strong synergies between educational institutions and businesses. The IO2015 -XVII Congress of APDIO aims at strengthening the knowledge triangle in education, research and innovation, in order to maximize the contribution of OR for sustainable growth, the promoting of a knowledge-based economy, and the smart use of finite resources. The IO2015-XVII Congress of APDIO is a privileged meeting point for the promotion and dissemination of OR and related disciplines, through the exchange of ideas among teachers, researchers, students , and professionals with different background, but all sharing a common desire that is the development of OR.

Foundations of Computer Security (Hardcover, 2006 ed.): David Salomon Foundations of Computer Security (Hardcover, 2006 ed.)
David Salomon
R1,789 Discovery Miles 17 890 Ships in 12 - 19 working days

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Emergent Web Intelligence: Advanced Semantic Technologies (Hardcover, 2010): Youakim Badr, Richard Chbeir, Ajith Abraham, Aboul... Emergent Web Intelligence: Advanced Semantic Technologies (Hardcover, 2010)
Youakim Badr, Richard Chbeir, Ajith Abraham, Aboul Ella Hassanien
R4,644 Discovery Miles 46 440 Ships in 10 - 15 working days

The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and ?exibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on human-machine interaction. The semantics of exchanged information and services should be useful not only for human to human communications, but also in that machines would be able to understand and automatically process web content. Semanticsgive well-de?nedmeaningto web content and enable computersand p- ple to work in cooperation. Today, the crucial challenge becomes the development of languages to express information in a machine processable format. Now more than ever, new advanced techniques and intelligent approaches are required to tra- form the Web into a universal reasoning and computing machine. Web intelligence attempts to deal with this challenge by exploiting information technologies and - ti?cial intelligence approaches to design the next generation of web-empowered systems and services.

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover): Brij B. Gupta, Dragan Perakovic, Ahmed... Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover)
Brij B. Gupta, Dragan Perakovic, Ahmed A. Abd El-Latif, Deepak Gupta
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.

Business Process Reengineering - Automation Decision Points in Process Reengineering (Hardcover, 2013 ed.): Sanjay Mohapatra Business Process Reengineering - Automation Decision Points in Process Reengineering (Hardcover, 2013 ed.)
Sanjay Mohapatra
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

Business process reengineering (BPR) focuses on redesigning the strategic and value-added processes which transcend the organizational boundaries. It is a cross-functional approach that requires support from almost all the departments of the organization. Business Process Reengineering: Automation Decision Points in Process Reengineering offers a new framework based process reengineering and links it to organization life cycle, process life cycle, and process management. This volume describes the fundamental concepts behind business process reengineering and examines them through case studies, and should appeal to researchers and academics interested in business process reengineering, operations strategy, and organizational restructuring and design.

Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018): Pandian Vasant, Igor Litvinchev, Jose Antonio... Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R3,430 Discovery Miles 34 300 Ships in 12 - 19 working days

This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.

Intelligent City Evaluation System (Hardcover, 1st ed. 2018): Zhiqiang Wu Intelligent City Evaluation System (Hardcover, 1st ed. 2018)
Zhiqiang Wu
R3,779 R3,497 Discovery Miles 34 970 Save R282 (7%) Ships in 12 - 19 working days

This book assesses various intelligent-city evaluation systems around the globe, and subsequently combines that assessment with local-government and enterprise practices to create an evaluation index system for quantifying the Intelligent City concept. In addition, the book provides the results of the CityIQ indicator ranking of intelligent cities in China and worldwide, a system that focuses on three of the most crucial aspects of urban development: the development environment, future trends, and construction and operation. After data sorting, calculation and dimensionless treatment, a score system ranging from 0 to 100 is created for ranking and analyzing cities. Providing unique strategies for promoting an intelligent city evaluation system, the book offers a valuable reference guide for intelligent-city decision-makers, as well as leaders in public urban economy, social welfare and environmental authorities.

Pervasive Social Computing - Socially-Aware Pervasive Systems and Mobile Applications (Hardcover, 1st ed. 2016): Muhammad Ashad... Pervasive Social Computing - Socially-Aware Pervasive Systems and Mobile Applications (Hardcover, 1st ed. 2016)
Muhammad Ashad Kabir, Jun Han, Alan Colman
R3,900 R3,618 Discovery Miles 36 180 Save R282 (7%) Ships in 12 - 19 working days

This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It shows how users' social context information can be acquired from different online social networks such as Facebook, LinkedIn, Twitter and Google Calendar. It further presents the use of social context information in developing innovative smart mobile applications to assist users in their daily life. The mix of both theoretical and applied research results makes this book attractive to a variety of readers from both academia and industry. This book provides a new platform for implementing different types of socially-aware mobile applications. The platform hides the complexity of managing social context, and thus provides essential support to application developers for the development of socially-aware applications. The book contains detailed descriptions of how the underlying platform has been implemented using available technologies such as ontology and rule engines, and how this platform can be used to develop socially-aware mobile applications using two exemplar applications. The book also presents evaluations of the proposed platform and applications using real-world data from Facebook, LinkedIn and Twitter. Therefore, this book is a syndication of scientific research with practical industrial applications, making it useful to researchers as well as to software engineers.

Revolutionizing Digital Healthcare Through Blockchain Technology Applications (Hardcover): Yuk Ming Tang, Ka Yin Chau, George... Revolutionizing Digital Healthcare Through Blockchain Technology Applications (Hardcover)
Yuk Ming Tang, Ka Yin Chau, George To Sum Ho, Yan Wan
R8,630 Discovery Miles 86 300 Ships in 10 - 15 working days

Despite blockchain being an emerging technology that is mainly applied in the financial and logistics domain areas, it has great potential to be applied in other industries to generate a wider impact. Due to the need for social distancing globally, blockchain has great opportunities to be adopted in digital health including health insurance, pharmaceutical supply chain, remote diagnosis, and more. Revolutionizing Digital Healthcare Through Blockchain Technology Applications explores the current applications and future opportunities of blockchain technology in digital health and provides a reference for the development of blockchain in digital health for the future. Covering key topics such as privacy, blockchain economy, and cryptocurrency, this reference work is ideal for computer scientists, healthcare professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Economic Engine: Effective…
Yunxian Chen Hardcover R3,365 Discovery Miles 33 650
One Demerit, Two Demerits
T R Prouty Hardcover R837 Discovery Miles 8 370
Financialisation - Measurement, Driving…
Imad A Moosa Hardcover R2,965 Discovery Miles 29 650
The Little Palace
Jeffery Erlacher Hardcover R674 R601 Discovery Miles 6 010
Max and Taylor - The Mischief Makers
Kim Quigley Hardcover R612 Discovery Miles 6 120
A Very Important Power - Vippi Mouse…
Wild West Wendy Jo Bradshaw, Wendy Jo Bradshaw Hardcover R617 Discovery Miles 6 170
Mud On The Path - Sound-Out Phonics…
Pamela Brookes Hardcover R408 Discovery Miles 4 080
Video Games and Creativity
Garo Green, James C Kaufman Hardcover R1,573 Discovery Miles 15 730
Programming Concepts In Java
Robert Burns Hardcover R737 Discovery Miles 7 370
Handbook of Computer Games Technology…
Akira Hanako Hardcover R3,427 R3,097 Discovery Miles 30 970

 

Partners