Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Databases
This book comprises the best deliberations with the theme "Machine Learning Technologies and Applications" in the "International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2020)," organized by the Department of Computer Science and Engineering, VNR Vignana Jyothi Institute of Engineering and Technology. The book provides insights into the recent trends and developments in the field of computer science with a special focus on the machine learning and big data. The book focuses on advanced topics in artificial intelligence, machine learning, data mining and big data computing, cloud computing, Internet of things, distributed computing and smart systems.
Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye - from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot. "Palm and Treo Hacks" gives you tips and tools that show you how to make the most of your Palm. A few minutes spent reading some of the hacks in this book will save you hours of research. Inside this book, you'll learn how to: find great applications for your Palm and make the most of the ones you're using now; get super-organized, getting more from the built-in Personal Information Manager and learning how to manage complex projects with your Palm; extend the Palm with must-have software and hardware add-ons; take your Palm online, reading email, surfing the web, and sending instant messages; and get some rest and relaxation with your Palm, whether it's listening to music, playing classic games, or watching video. Written for beginning to experienced Palm users, "Palm and Treo Hacks" is full of practical, ingenious tips and tricks you can apply immediately. Whether you're looking to master the built-in applications or you want to trick out your Palm to its fullest extent, this book will show you how to get it.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
This book focuses on data and how modern business firms use social data, specifically Online Social Networks (OSNs) incorporated as part of the infrastructure for a number of emerging applications such as personalized recommendation systems, opinion analysis, expertise retrieval, and computational advertising. This book identifies how in such applications, social data offers a plethora of benefits to enhance the decision making process. This book highlights that business intelligence applications are more focused on structured data; however, in order to understand and analyse the social big data, there is a need to aggregate data from various sources and to present it in a plausible format. Big Social Data (BSD) exhibit all the typical properties of big data: wide physical distribution, diversity of formats, non-standard data models, independently-managed and heterogeneous semantics but even further valuable with marketing opportunities. The book provides a review of the current state-of-the-art approaches for big social data analytics as well as to present dissimilar methods to infer value from social data. The book further examines several areas of research that benefits from the propagation of the social data. In particular, the book presents various technical approaches that produce data analytics capable of handling big data features and effective in filtering out unsolicited data and inferring a value. These approaches comprise advanced technical solutions able to capture huge amounts of generated data, scrutinise the collected data to eliminate unwanted data, measure the quality of the inferred data, and transform the amended data for further data analysis. Furthermore, the book presents solutions to derive knowledge and sentiments from BSD and to provide social data classification and prediction. The approaches in this book also incorporate several technologies such as semantic discovery, sentiment analysis, affective computing and machine learning. This book has additional special feature enriched with numerous illustrations such as tables, graphs and charts incorporating advanced visualisation tools in accessible an attractive display.
This book introduces readers to recent advancements in financial technologies. The contents cover some of the state-of-the-art fields in financial technology, practice, and research associated with artificial intelligence, big data, and blockchain-all of which are transforming the nature of how products and services are designed and delivered, making less adaptable institutions fast become obsolete. The book provides the fundamental framework, research insights, and empirical evidence in the efficacy of these new technologies, employing practical and academic approaches to help professionals and academics reach innovative solutions and grow competitive strengths.
This book is one of the first books that deal with the COVID-19 pandemic. COVID-19 pandemic has affected countries all over the world and has made a significant impact on daily life and healthcare facilities and treatment systems. The book covers the main recent emerging technologies that are related to the COVID-19 crisis. The technologies that are included in this book play a significant role in tackling COVID-19 in the future. The scope of this book is to cover all advanced emerging technologies and artificial intelligence techniques to fight against COVID-19 pandemic.
This book examines the managerial dimensions of business intelligence (BI) systems. It develops a set of guidelines for value creation by implementing business intelligence systems and technologies. In particular the book looks at BI as a process - driven by a mix of human and technological capabilities - to serve complex information needs in building insights and providing aid in decision making. After an introduction to the key concepts of BI and neighboring areas of information processing, the book looks at the complexity and multidimensionality of BI. It tackles both data integration and information integration issues. Bodies of knowledge and other widely accepted collections of experience are presented and turned into lessons learned. Following a straightforward introduction to the processes and technologies of BI the book embarks on BI maturity and agility, the components, drivers and inhibitors of BI culture and soft BI factors like attention, sense and trust. Eventually the book attempts to provide a holistic view on business intelligence, possible structures and tradeoffs and embarks to provide an outlook on possible developments in BI and analytics.
This book sheds light on the recent research directions in intelligent systems and their applications. It involves two main themes, including management information systems and advances in information security and networking. The discussion of the most recent designs, advancements, and modifications of intelligent systems, as well as their applications, is a key component of the chapters contributed to the aforementioned subjects.
The popularity of enterprise architecture (EA) has increased in the last two decades, in both business and academic domains. Despite the cumulative interest from all sectors, the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently, some organisations continue to theorise the concept, which has ramifications on practice and ROI. This has led to many studies that have been conducted, to understand the complexities impacting the implementation and practice of EA in organisations. Yet, the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now, implementation and practice of EA have been slow, despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement, sustainability, and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes, from three main fronts. First, it explains the implications that lack of understanding of EA have on organisational activities and processes. Second, it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third, it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates, researchers, academics, and professionals in the fields of EA, IT, and information systems, this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.
This book presents a new perspective on and a new approach to a wide spectrum of situations, related to data analysis, actually, a kind of a new paradigm. Namely, for a given data set and its partition, whose origins may be of any kind, the authors try to reconstruct this partition on the basis of the data set given, using very broadly conceived clustering procedure. The main advantages of this new paradigm concern the substantive aspects of the particular cases considered, mainly in view of the variety of interpretations, which can be assumed in the framework of the paradigm. Due to the novel problem formulation and the flexibility in the interpretations of this problem and its components, the domains, which are encompassed (or at least affected) by the potential use of the paradigm, include cluster analysis, classification, outlier detection, feature selection, and even factor analysis as well as geometry of the data set. The book is useful for all those who look for new, nonconventional approaches to their data analysis problems.
This book is interesting and full of new ideas. It provokes the curiosity of the readers. The book targets both researchers and practitioners. The students and the researchers will acquire knowledge about ant colony optimization and its possible applications as well as practitioners will find new ideas and solutions of their combinatorial optimization and decision-making problems. Ant colony optimization is between the best method for solving difficult optimization problems arising in real life and industry. It has obtained distinguished results on some applications with very restrictive constraints. The reader will find theoretical aspects of ant method as well as applications on a variety of problems. The following applications could be mentioned: multiple knapsack problem, which is an important economical problem; grid scheduling problem; GPS surveying problem; E. coli cultivation modeling; wireless sensor network positioning; image edges detection; workforce planning.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.
This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.
The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.
The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.
This book contributes to the body of scholarly knowledge by exploring the main ideas of wireless networks of past, present, and future, trends in the field of networking, the capabilities of 5G and technologies that are potential enablers of 6G, potential 6G applications and requirements, as well as unique challenges and opportunities that 6G research is going to offer over the next decade. It covers research topics such as communication via millimeter-waves, terahertz waves and visible light to enable faster speeds, as well as research into achieving other basic requirements of 6G networks. These include low end-to-end latency, high energy efficiency, coverage that is ubiquitous and always-on, integration of terrestrial wireless with non-terrestrial networks, network management that is made more effective by connected intelligence with machine learning capabilities, as well as support for the evolution of old service classes and support for new ones.
This book presents best selected papers presented at the International Conference on Paradigms of Computing, Communication and Data Sciences (PCCDS 2020), organized by National Institute of Technology, Kurukshetra, India, during 1-3 May 2020. It discusses high-quality and cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.
This book focuses on the combination of IoT and data science, in particular how methods, algorithms, and tools from data science can effectively support IoT. The authors show how data science methodologies, techniques and tools, can translate data into information, enabling the effectiveness and usefulness of new services offered by IoT stakeholders. The authors posit that if IoT is indeed the infrastructure of the future, data structure is the key that can lead to a significant improvement of human life. The book aims to present innovative IoT applications as well as ongoing research that exploit modern data science approaches. Readers are offered issues and challenges in a cross-disciplinary scenario that involves both IoT and data science fields. The book features contributions from academics, researchers, and professionals from both fields.
This proceedings book presents state-of-the-art developments in theory, methodology, and applications of network analysis across sociology, computational science, education research, literature studies, political science, international relations, social media research, and urban studies. The papers comprising this collection were presented at the Fifth 'Networks in the Global World' conference organized by the Centre for German and European Studies of St. Petersburg University and Bielefeld University and held on July 7-9, 2020. This biannual conference series revolves around key interdisciplinary issues in the focus of network analysts, such as the multidimensional approach to social reality, translation of theories and methods across disciplines, and mixing of data and methods. The distinctive features of this book are the emphasis on in-depth linkages between theory, method, and applications, the blend of qualitative and quantitative methods, and the joint consideration of different network levels, types, and contexts. The topics covered by the papers include interrelation of social and cultural structures, constellations of power, and patterns of interaction in areas ranging from various types of communities (local, international, educational, political, and so on) to social media and literature. The book is useful for practicing researchers, graduate and postgraduate students, and educators interested in network analysis of social relations, politics, economy, and culture. Features that set the book apart from others in the field: * The book offers a unique cross-disciplinary blend of computational and ethnographic network analyses applied to a diverse spectrum of spheres, from literature and education to urban planning and policymaking. * Embracing conceptual, methodological, and empirical works, the book is among the few in network analysis to emphasize connections between theory, method, and applications. * The book brings together authors and empirical contexts from all over the globe, with a particular emphasis on European societies. |
You may like...
ISE Data Analytics for Accounting
Vernon Richardson, Katie Terrell, …
Paperback
R1,858
Discovery Miles 18 580
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
ISE Database System Concepts
Abraham Silberschatz, Henry Korth, …
Paperback
R2,043
Discovery Miles 20 430
Handbook of Data Science with Semantic…
Archana Patel, Narayan C Debnath
Hardcover
R8,198
Discovery Miles 81 980
|