![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
Recently, there has been a rapid increase in interest regarding social network analysis in the data mining community. Cognitive radios are expected to play a major role in meeting this exploding traffic demand on social networks due to their ability to sense the environment, analyze outdoor parameters, and then make decisions for dynamic time, frequency, space, resource allocation, and management to improve the utilization of mining the social data. Cognitive Social Mining Applications in Data Analytics and Forensics is an essential reference source that reviews cognitive radio concepts and examines their applications to social mining using a machine learning approach so that an adaptive and intelligent mining is achieved. Featuring research on topics such as data mining, real-time ubiquitous social mining services, and cognitive computing, this book is ideally designed for social network analysts, researchers, academicians, and industry professionals.
th It is fitting that there was a World Computer Congress in the 50 anniversary year of IFIP. Within the Learn IT Stream of WCC2010, the conference, Key Competencies in the Knowledge Society (KCKS), brought together some 43 papers from around the world covering many areas of ICT and its role in education. Of the papers presented here, three were selected as key theme papers for the KCKS conference. These papers' by Adams and Tatnall, Tarrago and Wilson, Diethelm and Dorge, are included in these proceedings. We congratulate these authors for the quality of their work that led to selection. The range of issues covered within this volume is too broad to set out here but c- ers, amongst other things, e-examination, Twitter, teacher education, school-based learning, methodological frameworks and human development theories. It has been an exciting and rewarding task to put these papers together. They rep- sent a coming together of great minds and cutting-edge research. We thank our contributors and our reviewers for producing such an impressive body of work."
This book focuses on the development of wellness protocols for smart home monitoring, aiming to forecast the wellness of individuals living in ambient assisted living (AAL) environments. It describes in detail the design and implementation of heterogeneous wireless sensors and networks as applied to data mining and machine learning, which the protocols are based on. Further, it shows how these sensor and actuator nodes are deployed in the home environment, generating real-time data on object usage and other movements inside the home, and therefore demonstrates that the protocols have proven to offer a reliable, efficient, flexible, and economical solution for smart home systems. Documenting the approach from sensor to decision making and information generation, the book addresses various issues concerning interference mitigation, errors, security and large data handling. As such, it offers a valuable resource for researchers, students and practitioners interested in interdisciplinary studies at the intersection of wireless sensing processing, radio communication, the Internet of Things and machine learning, and in how they can be applied to smart home monitoring and assisted living environments.
"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates.After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. "Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations.This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. "Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book."
This book, the second volume, highlights 7 out of a total of about 36 megacities in the World which by definition have 10 million inhabitants. The cities/chapters presented in this book are based on recent advance such as the wide use of ICT, IOT, e-Governance, e-Democracy, smart economy and flattening and acceleration of the world that is taking place in recent times as reported by 3 times Pulitzer Prize Winner Thomas Friedman. It therefor departs from other ideologies where only a certain megacity qualifies for the title of smart global megacities while in reality every megacity can, and presents how smart global megacities can be created.
When Don Swanson hypothesized a connection between Raynaud's phenomenon anddietary?shoil, the?eldofliterature-baseddiscovery(LBD)wasborn. During thesubsequenttwodecadesasteadystreamofresearchershavepublishedarticles aboutLBDandthe?eldhasmadesteadyprogressinlayingfoundationsandc- ating an identity. It is curiously signi?cant that LBD is not "owned" by any p- ticulardiscipline, forexample, knowledge discoveryortextmining. Rather, LBD researchersoriginatefromarangeof?eldsincludinginformationscience, infor- tionretrieval, logic, andthebiomedicalsciences. Thisre?ectsthefactLBDisan inherentlymulti-disciplinaryenterprisewherecollaborationsbetweentheinfor- tionandbiomedicalsciencesarereadilyencountered. Thismulti-disciplinaryaspect ofLBDhasmadeitharderforthe?eldtoplanta?ag, sotospeak. Thepresentv- umecanbeseenasanattempttoredressthis. Itpresentschaptersprovidingabroad brushstrokeofLBDbyleadingresearchersprovidinganoverviewofthestateofthe art, themodelsandtheoriesused, experimentalstudies, lessonslearnt, application areas, andfuturechallenges. Inshort, itattemptstoconveyalearnedimpressionof whereandhowLBDisbeingdeployed. DonSwansonhaskindlyagreedtoprovide theintroductorychapter. Itisthehopeandintentionthatthisvolumewillplanta ?aginthegroundandinspirenewresearcherstotheLBDchallenge. PeterBruza July2007 MarcWeeber v Contents Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Contributors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Part I General Outlook and Possibilities Literature-Based Discovery? The Very Idea . . . . . . . . . . . . . . . . . . . . . . . . . 3 D. R. Swanson The Place of Literature-Based Discovery in Contemporary Scienti?c Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 NeilR. SmalheiserandVetleI. Torvik The Tip of the Iceberg: The Quest for Innovation at the Base of the Pyramid. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 M. D. GordonandN. F. Awad The 'Open Discovery' Challenge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 JonathanD. Wren Where is the Discovery in Literature-Based Discovery?. . . . . . . . . . . . . . . . 57 R. N. Kostoff Part II Methodology and Applications Analyzing LBD Methods using a General Framework. . . . . . . . . . . . . . . . . 75 A. K. Sehgal, X. Y. Qiu, andP. Srinivasan Evaluation of Literature-Based Discovery Systems. . . . . . . . . . . . . . . . . . . . 101 M. Yetisgen-YildizandW. Pratt vii viii Contents Factor Analytic Approach to Transitive Text Mining using Medline Descriptors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 J. StegmannandG. Grohmann Literature-Based Knowledge Discovery using Natural Language Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 D. Hristovski, C. Friedman, T. C. Rind?esch, andB. Peterlin Information Retrieval in Literature-Based Discovery. . . . . . . . . . . . . . . . . . 153 W. Hersh Biomedical Application of Knowledge Discovery . . . . . . . . . . . . . . . . . . . . . 173 A. Koike Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Contributors NeveenFaragAwad SchoolofBusiness, WayneStateUniversity, USA CarolFriedman
During the 21st century business environments have become more complex and dynamic than ever before. Companies operate in a world of change influenced by globalisation, volatile markets, legal changes and technical progress. As a result, they have to handle growing volumes of data and therefore require fast storage, reliable data access, intelligent retrieval of information and automated decision-making mechanisms, all provided at the highest level of service quality. Successful enterprises are aware of these challenges and efficiently respond to the dynamic environment in which their business operates. Business Intelligence (BI) and Performance Management (PM) offer solutions to these challenges and provide techniques to enable effective business change. The important aspects of both topics are discussed within this state-of-the-art volume. It covers the strategic support, business applications, methodologies and technologies from the field, and explores the benefits, issues and challenges of each. Issues are analysed from many different perspectives, ranging from strategic management to data technologies, and the different subjects are complimented and illustrated by numerous examples of industrial applications. Contributions are authored by leading academics and practitioners representing various universities, research centres and companies worldwide. Their experience covers multiple disciplines and industries, including finance, construction, logistics, and public services, amongst others. Business Intelligence and Performance Management is a valuable source of reference for graduates approaching MSc or PhD programs and for professionals in industry researching in the fields of BI and PM for industrial application.
Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems. "Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science.
This book records the new research findings and development in the field of industrial engineering and engineering management, and it will serve as the guidebook for the potential development in future. It gathers the accepted papers from the 25th International conference on Industrial Engineering and Engineering Management held at Anhui University of Technology in Maanshan during August 24-25, 2019. The aim of this conference was to provide a high-level international forum for experts, scholars and entrepreneurs at home and abroad to present the recent advances, new techniques and application, to promote discussion and interaction among academics, researchers and professionals to promote the developments and applications of the related theories and technologies in universities and enterprises, and to establish business or research relations to find global partners for future collaboration in the field of Industrial Engineering. It addresses diverse themes in smart manufacturing, artificial intelligence, ergonomics, simulation and modeling, quality and reliability, logistics engineering, data mining and other related fields. This timely book summarizes and promotes the latest achievements in the field of industrial engineering and related fields over the past year, proposing prospects and vision for the further development.
The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform. The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques; big data analytics; and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems (R)) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification. The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.
Over the years, advances in the business world as well as the changing of diverse application contexts, have caused Data Warehousing and Data Mining to become more paramount in our society. The two share many common issues and are commonly interrelated. Integrations of Data Warehousing, Data Mining and Database Technologies: Innovative Approaches provides a comprehensive compilation of knowledge covering state-of-the-art developments and research, as well as current innovative activities in data warehousing and mining. This book focuses on the integration between the fields of data warehousing and data mining, with emphasis on the applicability to real world problems and provides a broad perspective on the future of these two cohesive topic areas.
The development of Operations Research (OR) requires constant improvements, such as the integration of research results with business applications and innovative educational practice. The full deployment and commercial exploitation of goods and services generally need the construction of strong synergies between educational institutions and businesses. The IO2015 -XVII Congress of APDIO aims at strengthening the knowledge triangle in education, research and innovation, in order to maximize the contribution of OR for sustainable growth, the promoting of a knowledge-based economy, and the smart use of finite resources. The IO2015-XVII Congress of APDIO is a privileged meeting point for the promotion and dissemination of OR and related disciplines, through the exchange of ideas among teachers, researchers, students , and professionals with different background, but all sharing a common desire that is the development of OR.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and ?exibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on human-machine interaction. The semantics of exchanged information and services should be useful not only for human to human communications, but also in that machines would be able to understand and automatically process web content. Semanticsgive well-de?nedmeaningto web content and enable computersand p- ple to work in cooperation. Today, the crucial challenge becomes the development of languages to express information in a machine processable format. Now more than ever, new advanced techniques and intelligent approaches are required to tra- form the Web into a universal reasoning and computing machine. Web intelligence attempts to deal with this challenge by exploiting information technologies and - ti?cial intelligence approaches to design the next generation of web-empowered systems and services.
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.
Business process reengineering (BPR) focuses on redesigning the strategic and value-added processes which transcend the organizational boundaries. It is a cross-functional approach that requires support from almost all the departments of the organization. Business Process Reengineering: Automation Decision Points in Process Reengineering offers a new framework based process reengineering and links it to organization life cycle, process life cycle, and process management. This volume describes the fundamental concepts behind business process reengineering and examines them through case studies, and should appeal to researchers and academics interested in business process reengineering, operations strategy, and organizational restructuring and design.
This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.
This book assesses various intelligent-city evaluation systems around the globe, and subsequently combines that assessment with local-government and enterprise practices to create an evaluation index system for quantifying the Intelligent City concept. In addition, the book provides the results of the CityIQ indicator ranking of intelligent cities in China and worldwide, a system that focuses on three of the most crucial aspects of urban development: the development environment, future trends, and construction and operation. After data sorting, calculation and dimensionless treatment, a score system ranging from 0 to 100 is created for ranking and analyzing cities. Providing unique strategies for promoting an intelligent city evaluation system, the book offers a valuable reference guide for intelligent-city decision-makers, as well as leaders in public urban economy, social welfare and environmental authorities.
This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It shows how users' social context information can be acquired from different online social networks such as Facebook, LinkedIn, Twitter and Google Calendar. It further presents the use of social context information in developing innovative smart mobile applications to assist users in their daily life. The mix of both theoretical and applied research results makes this book attractive to a variety of readers from both academia and industry. This book provides a new platform for implementing different types of socially-aware mobile applications. The platform hides the complexity of managing social context, and thus provides essential support to application developers for the development of socially-aware applications. The book contains detailed descriptions of how the underlying platform has been implemented using available technologies such as ontology and rule engines, and how this platform can be used to develop socially-aware mobile applications using two exemplar applications. The book also presents evaluations of the proposed platform and applications using real-world data from Facebook, LinkedIn and Twitter. Therefore, this book is a syndication of scientific research with practical industrial applications, making it useful to researchers as well as to software engineers.
Despite blockchain being an emerging technology that is mainly applied in the financial and logistics domain areas, it has great potential to be applied in other industries to generate a wider impact. Due to the need for social distancing globally, blockchain has great opportunities to be adopted in digital health including health insurance, pharmaceutical supply chain, remote diagnosis, and more. Revolutionizing Digital Healthcare Through Blockchain Technology Applications explores the current applications and future opportunities of blockchain technology in digital health and provides a reference for the development of blockchain in digital health for the future. Covering key topics such as privacy, blockchain economy, and cryptocurrency, this reference work is ideal for computer scientists, healthcare professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students. |
![]() ![]() You may like...
A Very Important Power - Vippi Mouse…
Wild West Wendy Jo Bradshaw, Wendy Jo Bradshaw
Hardcover
R617
Discovery Miles 6 170
|