|
|
Books > Computing & IT > General theory of computing
Multinational organizations have begun to realize that sentiment
mining plays an important role for decision making and market
strategy. The revolutionary growth of digital marketing not only
changes the market game, but also brings forth new opportunities
for skilled professionals and expertise. Currently, the
technologies are rapidly changing, and artificial intelligence (AI)
and machine learning are contributing as game-changing
technologies. These are not only trending but are also increasingly
popular among data scientists and data analysts. New Opportunities
for Sentiment Analysis and Information Processing provides
interdisciplinary research in information retrieval and sentiment
analysis including studies on extracting sentiments from textual
data, sentiment visualization-based dimensionality reduction for
multiple features, and deep learning-based multi-domain sentiment
extraction. The book also optimizes techniques used for sentiment
identification and examines applications of sentiment analysis and
emotion detection. Covering such topics as communication networks,
natural language processing, and semantic analysis, this book is
essential for data scientists, data analysts, IT specialists,
scientists, researchers, academicians, and students.
The proliferation of wireless communications has led to mobile
computing, a new era in data communication and processing allowing
people to access information anywhere and anytime using lightweight
computer devices. Aligned with this phenomenon, a vast number of
mobile solutions, systems, and applications have been continuously
developed. However, despite the opportunities, there exist
constraints, challenges, and complexities in realizing the full
potential of mobile computing, requiring research and
experimentation. Algorithms, Methods, and Applications in Mobile
Computing and Communications is a critical scholarly publication
that examines the various aspects of mobile computing and
communications from engineering, business, and organizational
perspectives. The book details current research involving mobility
challenges that hinder service applicability, mobile money transfer
services and anomaly detection, and mobile fog environments. As a
resource rich in information about mobile devices, wireless
broadcast databases, and machine communications, it is an ideal
source for computer scientists, IT specialists, service providers,
information technology professionals, academicians, and researchers
interested in the field of mobile computing.
Changing business environments and information technology
advancements fundamentally reshaped the traditional information
landscape in our contemporary society, urging companies to seek
innovative ways to diffuse and manage assets on a global scale. It
is crucial for society to understand the new methodologies and
common practices that organizations can utilize to leverage their
knowledge into practice. Global Information Diffusion and
Management in Contemporary Society is an essential reference source
featuring research on the development and implementation of
contemporary global information management initiatives in
organizations. Including coverage on a multitude of topics such as
data security, global manufacturing, and information governance,
this book explores the importance of information management in a
global context. This book is ideally designed for managers,
information systems specialists, professionals, researchers, and
administrators seeking current research on the theories and
applications of global information management.
With technology creating a more competitive market, the global
economy has been continually evolving in recent years. These
technological developments have drastically changed the ways
organizations manage their resources, as they are constantly
seeking innovative methods to implement new systems. Because of
this, there is an urgent need for empirical research that studies
advancing theories and applications that organizations can use to
successfully handle information and supplies. Novel Theories and
Applications of Global Information Resource Management is a pivotal
reference source that provides vital research on developing
practices for businesses to effectively manage their assets on a
global scale. While highlighting topics such as enterprise systems,
library management, and information security, this publication
explores the implementation of technological innovation into
business techniques as well as the methods of controlling
information in a contemporary society. This book is ideally
designed for brokers, accountants, marketers, researchers, data
scientists, financiers, managers, and academicians seeking current
research on global resource management.
Electric power systems have become much more complex in the past
years, due to the integration of distributed generation including
renewable energy sources and the challenges caused by intermittency
of renewables. This complexity makes power systems potentially more
vulnerable. However, use of computer-based protection methods
(i.e., digital protection relays) supported by communication
technology have helped in protecting electrical networks from
faults to which they are subjected to. This second edition of the
book covers a comprehensive introduction to the protection of
electrical power systems using digital protective relays. The new
edition offers a thorough revision and update, and comprehensive
additional material. Chapters treat the mathematical background of
protection algorithms including, sinusoidal-wave-based algorithms,
Walsh function and S-Transform-based techniques, least squares and
differential equation-based techniques, travelling wave-based
protection, protection of transformers, digital line differential
protection, a comparison between digital protection algorithms, and
importantly, protection of networks with distributed generation
including renewable energy resources. The book is written for
researchers in electrical engineering and power engineering, in
industry, utilities and universities, and for advanced students.
The treatment is logically structured, covering mathematics and
principles for the development and implementation of the major
algorithms underlying different protection techniques. These
techniques can be applied to protection of generator transformers,
lines, switchgear and cable circuits: the main components of
transmission and distribution systems with and without integrated
distributed energy sources including renewables.
Interest in developing smart cities has grown exponentially over
the years with many governments across the world hoping to initiate
these projects in their own countries. One of the key challenges
for the success of any smart city project is the assurance of smart
security and privacy of the citizens. Due to the use of a wide
range of interconnected cyber-physical systems, traditional
security solutions cannot be applied to smart city applications,
and new practices must be sought. Secure Cyber-Physical Systems for
Smart Cities is an essential reference publication that examines
information security and privacy in smart city settings including
discussions on new security frameworks, solutions, cybersecurity
laws and regulations, and risk management frameworks for smart city
environments. Covering a wide range of topics including wireless
networks, security, and cyber-physical systems, this book is
ideally designed for IT specialists and consultants, engineers,
government officials, policymakers, researchers, academicians, and
industry professionals.
Competition in today's global market offers strong motivation for
the development of sophisticated tools within computer science. The
neuron multi-functional technology platform is a developing field
of study that regards the various interactive approaches that can
be applied within this subject matter. As advancing technologies
continue to emerge, managers and researchers need a compilation of
research that discusses the advancements and specific
implementations of these intelligent approaches with this platform.
Avatar-Based Control, Estimation, Communications, and Development
of Neuron Multi-Functional Technology Platforms is a pivotal
reference source that provides vital research on the application of
artificial and natural approaches towards neuron-based programs.
While highlighting topics such as natural intelligence,
neurolinguistics, and smart data storage, this publication presents
techniques, case studies, and methodologies that combine the use of
intelligent artificial and natural approaches with optimization
techniques for facing problems and combines many types of hardware
and software with a variety of communication technologies to enable
the development of innovative applications. This book is ideally
designed for researchers, practitioners, scientists, field experts,
professors, and students seeking current research on the
optimization of avatar-based advancements in multifaceted
technology systems.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Because trainees need to learn about the underlying technologies to
use automation safely and efficiently, the development of automated
aviation systems training is a growing challenge. Task analysis has
been singled out as the basis of the training, but it can be more
time-consuming than traditional development techniques. Cases on
Modern Computer Systems in Aviation is an essential reference
source that covers new information technology use in aviation
systems to streamline the cybersecurity, decision-making, planning,
and design processes within the aviation industry. Featuring
coverage on a broad range of topics such as computer systems in
aviation, artificial intelligence, software-defined networking
(SDN), air navigation systems, decision support systems (DSS), and
more, this publication is ideally designed for aviation specialists
and industry professionals, technicians, practitioners,
researchers, and academicians seeking current research on modern
modeling approaches to streamline management in aviation.
In a world dependent on digital technologies, business corporations
continually try to stay ahead of their competitors by adopting the
most updated technology into their business processes. Many
companies are adopting digital transformation models, data
analytics, big data, data empowerment, and data sharing as key
strategies and as service disruptors for information delivery and
record management. Higher education institutions have adopted
digital service innovation as a core to driving their business
processes. Such services are key to ensuring efficiency and
improving organizational performance. Digital Transformation and
Innovative Services for Business and Learning is a collection of
innovative research on the latest digital services and their role
in supporting the digital transformation of businesses and
education. While highlighting topics including brand equality,
digital banking, and generational workforce, this book is ideally
designed for managers, executives, IT consultants, industry
professionals, academicians, researchers, and students.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
|
|