|
|
Books > Computing & IT > General theory of computing > General
Due to the increasing availability of affordable internet services,
the number of users, and the need for a wider range of
multimedia-based applications, internet usage is on the rise. With
so many users and such a large amount of data, the requirements of
analyzing large data sets leads to the need for further
advancements to information processing. Big Data Processing with
Hadoop is an essential reference source that discusses possible
solutions for millions of users working with a variety of data
applications, who expect fast turnaround responses, but encounter
issues with processing data at the rate it comes in. Featuring
research on topics such as market basket analytics, scheduler load
simulator, and writing YARN applications, this book is ideally
designed for IoT professionals, students, and engineers seeking
coverage on many of the real-world challenges regarding big data.
Changing business environments and information technology
advancements fundamentally reshaped the traditional information
landscape in our contemporary society, urging companies to seek
innovative ways to diffuse and manage assets on a global scale. It
is crucial for society to understand the new methodologies and
common practices that organizations can utilize to leverage their
knowledge into practice. Global Information Diffusion and
Management in Contemporary Society is an essential reference source
featuring research on the development and implementation of
contemporary global information management initiatives in
organizations. Including coverage on a multitude of topics such as
data security, global manufacturing, and information governance,
this book explores the importance of information management in a
global context. This book is ideally designed for managers,
information systems specialists, professionals, researchers, and
administrators seeking current research on the theories and
applications of global information management.
The idea of this book grew out of a symposium that was held at
Stony Brook in September 2012 in celebration of David S.Warren's
fundamental contributions to Computer Science and the area of Logic
Programming in particular. Logic Programming (LP) is at the nexus
of Knowledge Representation, Artificial Intelligence, Mathematical
Logic, Databases, and Programming Languages. It is fascinating and
intellectually stimulating due to the fundamental interplay among
theory, systems, and applications brought about by logic. Logic
programs are more declarative in the sense that they strive to be
logical specifications of "what" to do rather than "how" to do it,
and thus they are high-level and easier to understand and maintain.
Yet, without being given an actual algorithm, LP systems implement
the logical specifications automatically. Several books cover the
basics of LP but focus mostly on the Prolog language with its
incomplete control strategy and non-logical features. At the same
time, there is generally a lack of accessible yet comprehensive
collections of articles covering the key aspects in declarative LP.
These aspects include, among others, well-founded vs. stable model
semantics for negation, constraints, object-oriented LP, updates,
probabilistic LP, and evaluation methods, including top-down vs.
bottom-up, and tabling. For systems, the situation is even less
satisfactory, lacking accessible literature that can help train the
new crop of developers, practitioners, and researchers. There are a
few guides onWarren's Abstract Machine (WAM), which underlies most
implementations of Prolog, but very little exists on what is needed
for constructing a state-of-the-art declarative LP inference
engine. Contrast this with the literature on, say, Compilers, where
one can first study a book on the general principles and algorithms
and then dive in the particulars of a specific compiler. Such
resources greatly facilitate the ability to start making meaningful
contributions quickly. There is also a dearth of articles about
systems that support truly declarative languages, especially those
that tie into first-order logic, mathematical programming, and
constraint solving. LP helps solve challenging problems in a wide
range of application areas, but in-depth analysis of their
connection with LP language abstractions and LP implementation
methods is lacking. Also, rare are surveys of challenging
application areas of LP, such as Bioinformatics, Natural Language
Processing, Verification, and Planning. The goal of this book is to
help fill in the previously mentioned void in the LP literature. It
offers a number of overviews on key aspects of LP that are suitable
for researchers and practitioners as well as graduate students. The
following chapters in theory, systems, and applications of LP are
included.
With technology creating a more competitive market, the global
economy has been continually evolving in recent years. These
technological developments have drastically changed the ways
organizations manage their resources, as they are constantly
seeking innovative methods to implement new systems. Because of
this, there is an urgent need for empirical research that studies
advancing theories and applications that organizations can use to
successfully handle information and supplies. Novel Theories and
Applications of Global Information Resource Management is a pivotal
reference source that provides vital research on developing
practices for businesses to effectively manage their assets on a
global scale. While highlighting topics such as enterprise systems,
library management, and information security, this publication
explores the implementation of technological innovation into
business techniques as well as the methods of controlling
information in a contemporary society. This book is ideally
designed for brokers, accountants, marketers, researchers, data
scientists, financiers, managers, and academicians seeking current
research on global resource management.
Competition in today's global market offers strong motivation for
the development of sophisticated tools within computer science. The
neuron multi-functional technology platform is a developing field
of study that regards the various interactive approaches that can
be applied within this subject matter. As advancing technologies
continue to emerge, managers and researchers need a compilation of
research that discusses the advancements and specific
implementations of these intelligent approaches with this platform.
Avatar-Based Control, Estimation, Communications, and Development
of Neuron Multi-Functional Technology Platforms is a pivotal
reference source that provides vital research on the application of
artificial and natural approaches towards neuron-based programs.
While highlighting topics such as natural intelligence,
neurolinguistics, and smart data storage, this publication presents
techniques, case studies, and methodologies that combine the use of
intelligent artificial and natural approaches with optimization
techniques for facing problems and combines many types of hardware
and software with a variety of communication technologies to enable
the development of innovative applications. This book is ideally
designed for researchers, practitioners, scientists, field experts,
professors, and students seeking current research on the
optimization of avatar-based advancements in multifaceted
technology systems.
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
In a world dependent on digital technologies, business corporations
continually try to stay ahead of their competitors by adopting the
most updated technology into their business processes. Many
companies are adopting digital transformation models, data
analytics, big data, data empowerment, and data sharing as key
strategies and as service disruptors for information delivery and
record management. Higher education institutions have adopted
digital service innovation as a core to driving their business
processes. Such services are key to ensuring efficiency and
improving organizational performance. Digital Transformation and
Innovative Services for Business and Learning is a collection of
innovative research on the latest digital services and their role
in supporting the digital transformation of businesses and
education. While highlighting topics including brand equality,
digital banking, and generational workforce, this book is ideally
designed for managers, executives, IT consultants, industry
professionals, academicians, researchers, and students.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
This volume features an extensive account of both research and
expository papers in a wide area of engineering and mathematics and
its various applications.Topics treated within this book include
optimization of control points, game theory, equilibrium points,
algorithms, Cartan matrices, integral inequalities, Volterra
integro-differential equations, Caristi-Kirk theorems, Laplace type
integral operators, etc.This useful reference text benefits
graduate students, beginning research engineers and mathematicians
as well as established researchers in these domains.
Interest in developing smart cities has grown exponentially over
the years with many governments across the world hoping to initiate
these projects in their own countries. One of the key challenges
for the success of any smart city project is the assurance of smart
security and privacy of the citizens. Due to the use of a wide
range of interconnected cyber-physical systems, traditional
security solutions cannot be applied to smart city applications,
and new practices must be sought. Secure Cyber-Physical Systems for
Smart Cities is an essential reference publication that examines
information security and privacy in smart city settings including
discussions on new security frameworks, solutions, cybersecurity
laws and regulations, and risk management frameworks for smart city
environments. Covering a wide range of topics including wireless
networks, security, and cyber-physical systems, this book is
ideally designed for IT specialists and consultants, engineers,
government officials, policymakers, researchers, academicians, and
industry professionals.
|
|