![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > General
This thesis presents an experimental study of quantum memory based on cold atomic ensembles and discusses photonic entanglement. It mainly focuses on experimental research on storing orbital angular momentum, and introduces readers to methods for storing a single photon carried by an image or an entanglement of spatial modes. The thesis also discusses the storage of photonic entanglement using the Raman scheme as a step toward implementing high-bandwidth quantum memory. The storage of photonic entanglement is central to achieving long-distance quantum communication based on quantum repeaters and scalable linear optical quantum computation. Addressing this key issue, the findings presented in the thesis are very promising with regard to future high-speed and high-capacity quantum communications.
This book reports on a novel concept of mechanism transitions for the design of highly scalable and adaptive publish/subscribe systems. First, it introduces relevant mechanisms for location-based filtering and locality-aware dissemination of events based on a thorough review of the state-of-the-art. This is followed by a detailed description of the design of a transition-enabled publish/subscribe system that enables seamless switching between mechanisms during runtime. Lastly, the proposed concepts are evaluated within the challenging context of location-based mobile applications. The book assesses in depth the performance and cost of transition execution, highlighting the impact of the proposed state transfer mechanism and the potential of coexisting transition-enabled mechanisms.
The Digital Humanities have arrived at a moment when digital Big Data is becoming more readily available, opening exciting new avenues of inquiry but also new challenges. This pioneering book describes and demonstrates the ways these data can be explored to construct cultural heritage knowledge, for research and in teaching and learning. It helps humanities scholars to grasp Big Data in order to do their work, whether that means understanding the underlying algorithms at work in search engines, or designing and using their own tools to process large amounts of information.Demonstrating what digital tools have to offer and also what 'digital' does to how we understand the past, the authors introduce the many different tools and developing approaches in Big Data for historical and humanistic scholarship, show how to use them, what to be wary of, and discuss the kinds of questions and new perspectives this new macroscopic perspective opens up. Authored 'live' online with ongoing feedback from the wider digital history community, Exploring Big Historical Data breaks new ground and sets the direction for the conversation into the future. It represents the current state-of-the-art thinking in the field and exemplifies the way that digital work can enhance public engagement in the humanities.Exploring Big Historical Data should be the go-to resource for undergraduate and graduate students confronted by a vast corpus of data, and researchers encountering these methods for the first time. It will also offer a helping hand to the interested individual seeking to make sense of genealogical data or digitized newspapers, and even the local historical society who are trying to see the value in digitizing their holdings.The companion website to Exploring Big Historical Data can be found at www.themacroscope.org/. On this site you will find code, a discussion forum, essays, and datafiles that accompany this book.
The Digital Humanities have arrived at a moment when digital Big Data is becoming more readily available, opening exciting new avenues of inquiry but also new challenges. This pioneering book describes and demonstrates the ways these data can be explored to construct cultural heritage knowledge, for research and in teaching and learning. It helps humanities scholars to grasp Big Data in order to do their work, whether that means understanding the underlying algorithms at work in search engines, or designing and using their own tools to process large amounts of information.Demonstrating what digital tools have to offer and also what 'digital' does to how we understand the past, the authors introduce the many different tools and developing approaches in Big Data for historical and humanistic scholarship, show how to use them, what to be wary of, and discuss the kinds of questions and new perspectives this new macroscopic perspective opens up. Authored 'live' online with ongoing feedback from the wider digital history community, Exploring Big Historical Data breaks new ground and sets the direction for the conversation into the future. It represents the current state-of-the-art thinking in the field and exemplifies the way that digital work can enhance public engagement in the humanities.Exploring Big Historical Data should be the go-to resource for undergraduate and graduate students confronted by a vast corpus of data, and researchers encountering these methods for the first time. It will also offer a helping hand to the interested individual seeking to make sense of genealogical data or digitized newspapers, and even the local historical society who are trying to see the value in digitizing their holdings.The companion website to Exploring Big Historical Data can be found at www.themacroscope.org/. On this site you will find code, a discussion forum, essays, and datafiles that accompany this book.
Integrative Document and Content Management: Strategies for Exploiting Enterprise Knowledge blends theory and practice to provide practical knowledge and guidelines to enterprises wishing to understand the importance of managing documents to their operations along with presentation of document content to facilitate business planning and operations support. This book gives extensive pointers to those who propose to embark upon the implementation of integrated document management systems and to embrace Web content management within a life cycle framework covering document creation to Web publication.
Graphs are a powerful tool for representing and understanding objects and their relationships in various application domains. The growing popularity of graph databases has generated data management problems that include finding efficient techniques for compressing large graph databases and suitable techniques for visualizing, browsing, and navigating large graph databases. Graph Data Management: Techniques and Applications is a central reference source for different data management techniques for graph data structures and their application. This book discusses graphs for modeling complex structured and schemaless data from the Semantic Web, social networks, protein networks, chemical compounds, and multimedia databases and offers essential research for academics working in the interdisciplinary domains of databases, data mining, and multimedia technology.
Conceptual modeling has always been one of the main issues in information systems engineering as it aims to describe the general knowledge of the system at an abstract level that facilitates user understanding and software development. This collection of selected papers provides a comprehensive and extremely readable overview of what conceptual modeling is and perspectives on making it more and more relevant in our society. It covers topics like modeling the human genome, blockchain technology, model-driven software development, data integration, and wiki-like repositories and demonstrates the general applicability of conceptual modeling to various problems in diverse domains. Overall, this book is a source of inspiration for everybody in academia working on the vision of creating a strong, fruitful and creative community of conceptual modelers. With this book the editors and authors want to honor Prof. Antoni Olive for his enormous and ongoing contributions to the conceptual modeling discipline. It was presented to him on the occasion of his keynote at ER 2017 in Valencia, a conference that he has contributed to and supported for over 20 years. Thank you very much to Antoni for so many years of cooperation and friendship.
In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.
Data science has been playing a vital role in almost all major fields. Many researchers are interested in the development of IT applications, which are user-driven with a focus on issues. This can be addressed using data science. User-driven research and data science have gained much attention from many private, public, and government organizations and research institutions. The Handbook of Research on Designing User Interfaces With a Data Science Approach promotes the inclusion of more diversified users for user-centered designs of applications across domains and analyzes user data with a data science approach for effective and user-friendly user interface designs. It introduces the foundations of advanced topics of human-computer interaction, particularly with user-centered designs and techniques. Covering topics such as artificial neural networks, natural dialog systems, and machine learning, this book is an essential resource for faculty, research scholars, industry professionals, students of higher education, mathematicians, data scientists, interaction designers, visual designers, software engineers, user experience researchers, accessibility engineers, cognitive system engineers, academicians, and libraries.
Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.
This invaluable text/reference investigates the state of the art in approaches to building, monitoring, managing, and governing smart cities. A particular focus is placed on the distributed computing environments within the infrastructure of such cities, including issues of device connectivity, communication, security, and interoperability. A selection of experts of international repute offer their perspectives on current trends and best practices, and their suggestions for future developments, together with case studies supporting the vision of smart cities based on the Internet of Things (IoT). Topics and features: examines the various methodologies relating to next-level urbanization, including approaches to security and privacy relating to social and legal aspects; describes a recursive and layered approach to modeling large-scale resource management systems for self-sustainable cities; proposes a novel architecture for hybrid vehicular wireless sensor networks, and a pricing mechanism for the management of natural resources; discusses the challenges and potential solutions to building smart city surveillance systems, applying knowledge-based governance, and adopting electric vehicles; covers topics on intelligent distributed systems, IoT, fog computing paradigms, big data management and analytics, and smart grids; reviews issues of sustainability in the design of smart cities and healthcare services, illustrated by case studies taken from cities in Japan, India, and Brazil. This illuminating volume offers a comprehensive reference for researchers investigating smart cities and the IoT, students interested in the distributed computing technologies used by smart living systems, and practitioners wishing to adopt the latest security and connectivity techniques in smart city environments.
Currently, Internet and virtual reality communication is essentially audio-visual. The next important breakthrough of the Internet will be the communication and sharing of smell and taste experiences digitally. Audio-visual stimuli are frequency based, and they can be easily digitized and actuated. On the other hand, taste and smell stimuli are based on chemical molecules, therefore, they are not easy to digitize or actuate. To solve this problem, we are required to discover new digital actuation technologies for taste and smell. The authors of this book have experimented on developing digital actuation devices for several years. This book will provide a complete overview of the importance of digitizing taste and smell, prior works, proposed technologies by the authors, other state of the art research, advantages and limitations of the proposed methods, and future applications. We expect digital taste and smell technologies will revolutionize the field of multisensory augmented reality and open up new interaction possibilities in different disciplines such as Human Computer Interaction, Communication, and Augmented and Virtual Reality.
"Social Data Analytics" is the first practical guide for professionals who want to employ social data for analytics and business intelligence (BI). This book provides a comprehensive overview of the technologies and platforms and shows you how to access and analyze the data. You'll explore the five major types of social data and learn from cases and platform examples to help you make the most of sentiment, behavioral, social graph, location, and rich media data. A four-step approach to the social BI process will help you access, evaluate, collaborate, and share social data with ease. You'll learn everything you need to know to monitor social media
and get an overview of the leading vendors in a crowded space of BI
applications. By the end of this book, you will be well prepared
for your organization s next social data analytics project.
The main objectives of this book are to expose key aspects that have a relevance when dealing with open data viewed from different perspectives and to provide appealing examples of how open data is implemented worldwide. The concept of open data as we know it today is the result of many different initiatives, both of a legislative and non-legislative nature, and promoted by a wide range of actors. Numerous regulatory antecedents to foster the concept of open data and embed it in national and international policy agendas have been undertaken on both sides of the Atlantic, as well as at a supranational level. The book highlights a number of the efforts made to promote open data in Europe, Asia and the United States. In addition to new insights, practical guidance and multiple disciplinary perspectives on open data, the book also addresses the transformation of current developments towards open data, which may be referred to as the democratisation of data. This book will support open data practitioners as well as open data scholars in their endeavours to promote open data implementation and research. Bastiaan van Loenen is associate professor and director of the Knowledge Centre Open Data at the Faculty of Architecture and The Built Environment of Delft University of Technology in the Netherlands, as is Glenn Vancauwenberghe, who is a post-doctoral researcher, and Joep Crompvoets is a professor at the Public Governance Institute of the KU Leuven in Belgium.
"Time and Relational Theory" provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally, database management systems provide little or no special support for temporal data at all. This situation is changing because: Cheap storage enables retention of large volumes of historical data in data warehousesUsers are now faced with temporal data problems, and need solutions Temporal features have recently been incorporated into the SQL standard, and vendors have begun to add temporal support to their DBMS products Based on the groundbreaking text "Temporal Data & the Relational Model" (Morgan Kaufmann, 2002) and new research led by the authors, "Time and Relational Theory" is the only book to offer a complete overview of the functionality of a temporal DBMS. Expert authors Nikos Lorentzos, Hugh Darwen, and Chris Date describe an approach to temporal database management that is firmly rooted in classical relational theory and will stand the test of time. This book covers the SQL:2011 temporal extensions in depth and
identifies and discusses the temporal functionality still missing
from SQL.
This book presents a comprehensive introduction to Integrated Business Planning (IBP), building on practitioner's experience and showcasing the value gains when moving from disconnected planning to IBP. It also proposes a road map for the transformation of planning, including technological initiatives, business priorities and organizational processes, and demonstrates how to motivate different IBP stakeholders to work together, when and how to connect strategic (to be understood as long term SC&O), tactical and operational planning and how to leverage functional and data integration features of SAP IBP. Real-world business-process use cases help to show the practical implications of implementing SAP IBP. Furthermore the book explores new capabilities, talent acquisition and retention, career development leadership, IBP Center of Expertise. A discussion of how disruptive technology trends like big data, Internet of Things, machine learning and artificial intelligence can influence IBP now and in the near future rounds out the book.
This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.
During the last few years, software evolution research has explored new domains such as the study of socio-technical aspects and collaboration between different individuals contributing to a software system, the use of search-based techniques and meta-heuristics, the mining of unstructured software repositories, the evolution of software requirements, and the dynamic adaptation of software systems at runtime. Also more and more attention is being paid to the evolution of collections of inter-related and inter-dependent software projects, be it in the form of web systems, software product families, software ecosystems or systems of systems. With this book, the editors present insightful contributions on these and other domains currently being intensively explored, written by renowned researchers in the respective fields of software evolution. Each chapter presents the state of the art in a particular topic, as well as the current research, available tool support and remaining challenges. The book is complemented by a glossary of important terms used in the community, a reference list of nearly 1,000 papers and books and tips on additional resources that may be useful to the reader (reference books, journals, standards and major scientific events in the domain of software evolution and datasets).This book is intended for all those interested in software engineering, and more particularly, software maintenance and evolution. Researchers and software practitioners alike will find in the contributed chapters an overview of the most recent findings, covering a broad spectrum of software evolution topics. In addition, it can also serve as the basis of graduate or postgraduate courses on e.g., software evolution, requirements engineering, model-driven software development or social informatics.
This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.
This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets
The book reports on advanced theories and methods in two related engineering fields: electrical and electronic engineering, and communications engineering and computing. It highlights areas of global and growing importance, such as renewable energy, power systems, mobile communications, security and the Internet of Things (IoT). The contributions cover a number of current research issues, including smart grids, photovoltaic systems, wireless power transfer, signal processing, 4G and 5G technologies, IoT applications, mobile cloud computing and many more. Based on the proceedings of the first International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM 2016), held in Voila Bagatelle, Mauritius from November 25 to 27, 2016, the book provides graduate students, researchers and professionals with a snapshot of the state-of-the-art and a source of new ideas for future research and collaborations.
The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applications. This Book will specifically focus on exploring recent advances in architectures, algorithms, and applications for an Internet of Things based on Smart Objects. Topics appropriate for this Book include, but are not necessarily limited to: - Methods for SO development - IoT Networking - Middleware for SOs - Data Management for SOs - Service-oriented SOs - Agent-oriented SOs - Applications of SOs in Smart Environments: Smart Cities, Smart Health, Smart Buildings, etc. Advanced IoT Projects.
This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.
This book presents an investigative approach to globalization-driving technologies that efficiently deliver ubiquitous, last-mile, broadband internet access to emerging markets and rural areas. Research has shown that ubiquitous internet access boosts socio-economic growth through innovations in science and technology, and has a positive effect on the lives of individuals. Last-mile internet access in developing countries is not only intended to provide areas with stable, efficient, and cost-effective broadband capabilities, but also to encourage the use of connectivity for human capacity development. The book offers an overview of the principles of various technologies, such as light fidelity and millimeter-wave backhaul, as last-mile internet solutions and describes these potential solutions from a signal propagation perspective. It also provides readers with the notional context needed to understand their operation, benefits, and limitations, and enables them to investigate feasible and tailored solutions to ensure sustainable infrastructures that are expandable and maintainable.
This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more "green" supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains |
You may like...
Advances in the Convergence of…
Tiago M. Fernandez-Carames, Paula Fraga-Lamas
Hardcover
R2,555
Discovery Miles 25 550
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian
Digital product license key
R1,024
Discovery Miles 10 240
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Build A Large Language Model - From…
Sebastian Raschka
Paperback
|