![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases
Business process reengineering (BPR) focuses on redesigning the strategic and value-added processes which transcend the organizational boundaries. It is a cross-functional approach that requires support from almost all the departments of the organization. Business Process Reengineering: Automation Decision Points in Process Reengineering offers a new framework based process reengineering and links it to organization life cycle, process life cycle, and process management. This volume describes the fundamental concepts behind business process reengineering and examines them through case studies, and should appeal to researchers and academics interested in business process reengineering, operations strategy, and organizational restructuring and design.
The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.
Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice. Current Internet of Things (IoT) based healthcare systems are incapable of sharing data between platforms in an efficient manner and holding them securely at the logical and physical level. To this end, blockchain technology guarantees a fully autonomous and secure ecosystem by exploiting the combined advantages of smart contracts and global consensus. However, incorporating blockchain technology in IoT healthcare systems is not easy. Centralized networks in their current capacity will be incapable to meet the data storage demands of the incoming surge of IoT based healthcare wearables.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
Over the years, advances in the business world as well as the changing of diverse application contexts, have caused Data Warehousing and Data Mining to become more paramount in our society. The two share many common issues and are commonly interrelated. Integrations of Data Warehousing, Data Mining and Database Technologies: Innovative Approaches provides a comprehensive compilation of knowledge covering state-of-the-art developments and research, as well as current innovative activities in data warehousing and mining. This book focuses on the integration between the fields of data warehousing and data mining, with emphasis on the applicability to real world problems and provides a broad perspective on the future of these two cohesive topic areas.
The development of Operations Research (OR) requires constant improvements, such as the integration of research results with business applications and innovative educational practice. The full deployment and commercial exploitation of goods and services generally need the construction of strong synergies between educational institutions and businesses. The IO2015 -XVII Congress of APDIO aims at strengthening the knowledge triangle in education, research and innovation, in order to maximize the contribution of OR for sustainable growth, the promoting of a knowledge-based economy, and the smart use of finite resources. The IO2015-XVII Congress of APDIO is a privileged meeting point for the promotion and dissemination of OR and related disciplines, through the exchange of ideas among teachers, researchers, students , and professionals with different background, but all sharing a common desire that is the development of OR.
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and ?exibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on human-machine interaction. The semantics of exchanged information and services should be useful not only for human to human communications, but also in that machines would be able to understand and automatically process web content. Semanticsgive well-de?nedmeaningto web content and enable computersand p- ple to work in cooperation. Today, the crucial challenge becomes the development of languages to express information in a machine processable format. Now more than ever, new advanced techniques and intelligent approaches are required to tra- form the Web into a universal reasoning and computing machine. Web intelligence attempts to deal with this challenge by exploiting information technologies and - ti?cial intelligence approaches to design the next generation of web-empowered systems and services.
The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform. The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques; big data analytics; and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems (R)) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification. The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.
This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.
This book assesses various intelligent-city evaluation systems around the globe, and subsequently combines that assessment with local-government and enterprise practices to create an evaluation index system for quantifying the Intelligent City concept. In addition, the book provides the results of the CityIQ indicator ranking of intelligent cities in China and worldwide, a system that focuses on three of the most crucial aspects of urban development: the development environment, future trends, and construction and operation. After data sorting, calculation and dimensionless treatment, a score system ranging from 0 to 100 is created for ranking and analyzing cities. Providing unique strategies for promoting an intelligent city evaluation system, the book offers a valuable reference guide for intelligent-city decision-makers, as well as leaders in public urban economy, social welfare and environmental authorities.
This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It shows how users' social context information can be acquired from different online social networks such as Facebook, LinkedIn, Twitter and Google Calendar. It further presents the use of social context information in developing innovative smart mobile applications to assist users in their daily life. The mix of both theoretical and applied research results makes this book attractive to a variety of readers from both academia and industry. This book provides a new platform for implementing different types of socially-aware mobile applications. The platform hides the complexity of managing social context, and thus provides essential support to application developers for the development of socially-aware applications. The book contains detailed descriptions of how the underlying platform has been implemented using available technologies such as ontology and rule engines, and how this platform can be used to develop socially-aware mobile applications using two exemplar applications. The book also presents evaluations of the proposed platform and applications using real-world data from Facebook, LinkedIn and Twitter. Therefore, this book is a syndication of scientific research with practical industrial applications, making it useful to researchers as well as to software engineers.
Dynamic programming is an efficient technique for solving optimization problems. It is based on breaking the initial problem down into simpler ones and solving these sub-problems, beginning with the simplest ones. A conventional dynamic programming algorithm returns an optimal object from a given set of objects. This book develops extensions of dynamic programming, enabling us to (i) describe the set of objects under consideration; (ii) perform a multi-stage optimization of objects relative to different criteria; (iii) count the number of optimal objects; (iv) find the set of Pareto optimal points for bi-criteria optimization problems; and (v) to study relationships between two criteria. It considers various applications, including optimization of decision trees and decision rule systems as algorithms for problem solving, as ways for knowledge representation, and as classifiers; optimization of element partition trees for rectangular meshes, which are used in finite element methods for solving PDEs; and multi-stage optimization for such classic combinatorial optimization problems as matrix chain multiplication, binary search trees, global sequence alignment, and shortest paths. The results presented are useful for researchers in combinatorial optimization, data mining, knowledge discovery, machine learning, and finite element methods, especially those working in rough set theory, test theory, logical analysis of data, and PDE solvers. This book can be used as the basis for graduate courses.
Learn how to create and profit from NFTs The NFT Handbook is a detailed guide on how to create, sell and buy non-fungible tokens without the need for a technical background. Learn exactly what NFTs are, how they evolved, and why they have value. We'll delve into the different types and aspects of NFTs and discuss the different NFT marketplaces and the pros and cons of each. Create Your Own NFTs Step by step instructions on all aspects of NFT creation, including what types of content to use, where to source content, adding artistic design, writing the NFT's description, adding optional unlockable content and setting an optional ongoing royalty. Mint Your NFTs You'll learn the process of how to get your NFTs on the blockchain. Sell Your NFTs We'll go through the whole process including creating a collection, and the different options such as setting a price or starting an auction. Buy NFTs What you'll need to bid on and purchase NFTs, and how to avoid getting scammed. You'll also get a primer on blockchain, particularly the Ethereum cryptocurrency and "gas" fees. You'll also be shown step by step how to create, secure and fund your own cryptocurrency wallet, where you'll store your NFTs and cryptocurrency. Whether you're experienced with the blockchain and crypto or a complete noob (beginner), The NFT Handbook will guide you in the process of creating, minting, selling and buying NFTs.
The aim of this book is to illustrate that advanced fuzzy clustering algorithms can be used not only for partitioning of the data. It can also be used for visualization, regression, classification and time-series analysis, hence fuzzy cluster analysis is a good approach to solve complex data mining and system identification problems. This book is oriented to undergraduate and postgraduate and is well suited for teaching purposes.
In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. Integrating and Streamlining Event-Driven IoT Services discusses how to observe isolated services running by different observation sources, how to fuse different observations to deal with observation conflict and incompleteness, and how to deal with adversaries and physical system features for real-time property enforcement over the fused knowledge. Overall, presenting an exploration of systematic theories and methods for the design of IoT services based on the principles of streamlining and integration, this book features research on topics such as CEP service, virtual machine technologies, and hybrid EPC. It is ideally designed for engineers, researchers, and university students seeking coverage on applications for smart cities, smart grids, and Industry 4.0.
The Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.
This book discusses challenges and solutions for the required information processing and management within the context of multi-disciplinary engineering of production systems. The authors consider methods, architectures, and technologies applicable in use cases according to the viewpoints of product engineering and production system engineering, and regarding the triangle of (1) product to be produced by a (2) production process executed on (3) a production system resource. With this book industrial production systems engineering researchers will get a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in future research and development activities. Engineers and managers from engineering domains will be able to get a better understanding of the benefits and limitations of applicable methods, architectures, and technologies for selected use cases. IT researchers will be enabled to identify research issues related to the development of new methods, architectures, and technologies for multi-disciplinary engineering, pushing forward the current state of the art.
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.
This book provides a coherent framework for understanding the essence of complex systems and the nature of digital transformations, analyzes challenges of and patterns in innovative development, and shares a wealth of insights and best practices, resulting in the most extensive coverage of the topic available. In particular, the book's cutting-edge contributions, prepared by scientists, engineers, and field experts,focus on the design, implementation, and evaluation of practical interventions that promote the innovative and sustainable development of complex systems. In addition to sharing a rich collection of cases from around the world, they provide a broad interdisciplinary analysis of collaboration mechanisms, theories and approaches to support and accelerate the development of complex systems. |
![]() ![]() You may like...
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, …
Paperback
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,539
Discovery Miles 15 390
|