![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > General
First of all, I would like to congratulate Gabriella Pasi and Gloria Bordogna for the work they accomplished in preparing this new book in the series "Study in Fuzziness and Soft Computing." "Recent Issues on the Management of Fuzziness in Databases" is undoubtedly a token of their long-lasting and active involvement in the area of Fuzzy Information Retrieval and Fuzzy Database Systems. This book is really welcome in the area of fuzzy databases where they are not numerous although the first works at the crossroads of fuzzy sets and databases were initiated about twenty years ago by L. Zadeh. Only five books have been published since 1995, when the first volume dedicated to fuzzy databases published in the series "Study in Fuzziness and Soft Computing" edited by J. Kacprzyk and myself appeared. Going beyond books strictly speaking, let us also mention the existence of review papers that are part of a couple of handbooks related to fuzzy sets published since 1998. The area known as fuzzy databases covers a bunch of topics among which: -flexible queries addressed to regular databases, -the extension of the notion of a functional dependency, -data mining and fuzzy summarization, -querying databases containing imperfect attribute values represented thanks to possibility distributions.
This open access book provides a comprehensive view on data ecosystems and platform economics from methodical and technological foundations up to reports from practical implementations and applications in various industries. To this end, the book is structured in four parts: Part I "Foundations and Contexts" provides a general overview about building, running, and governing data spaces and an introduction to the IDS and GAIA-X projects. Part II "Data Space Technologies" subsequently details various implementation aspects of IDS and GAIA-X, including eg data usage control, the usage of blockchain technologies, or semantic data integration and interoperability. Next, Part III describes various "Use Cases and Data Ecosystems" from various application areas such as agriculture, healthcare, industry, energy, and mobility. Part IV eventually offers an overview of several "Solutions and Applications", eg including products and experiences from companies like Google, SAP, Huawei, T-Systems, Innopay and many more. Overall, the book provides professionals in industry with an encompassing overview of the technological and economic aspects of data spaces, based on the International Data Spaces and Gaia-X initiatives. It presents implementations and business cases and gives an outlook to future developments. In doing so, it aims at proliferating the vision of a social data market economy based on data spaces which embrace trust and data sovereignty.
This book focuses on how businesses manage organizational innovation processes. It explores the innovative policies and practices that organizations need to develop to allow them to be successful in this digital age. These policies will be based on key resources such as research and development and human resources and need to enable companies to respond to challenges they may face due to the digital economy. It explains how organizational innovation can be used to improve business's development, performance, conduct and outcomes. Contributing to stimulate the growth and development of each individual in a dynamic, competitive and global economy, the present book can be used by a diverse range of readers, including academics, researchers, managers and engineers interested in matters related with Organizational Innovation in the Digital Age.
This book presents the latest cutting-edge research, theoretical methods, and novel applications in the field of computational intelligence techniques and methods for combating fake news. Fake news is everywhere. Despite the efforts of major social network players such as Facebook and Twitter to fight disinformation, miracle cures and conspiracy theories continue to rain down on the net. Artificial intelligence can be a bulwark against the diversity of fake news on the Internet and social networks. This book discusses new models, practical solutions, and technological advances related to detecting and analyzing fake news based on computational intelligence models and techniques, to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence techniques. Further, the book helps readers understand computational intelligence techniques combating fake news in a systematic and straightforward way.
This book provides a comprehensive methodology to measure systemic risk in many of its facets and dimensions based on state-of-the-art risk assessment methods. Systemic risk has gained attention in the public eye since the collapse of Lehman Brothers in 2008. The bankruptcy of the fourth-biggest bank in the USA raised questions whether banks that are allowed to become "too big to fail" and "too systemic to fail" should carry higher capital surcharges on their size and systemic importance. The Global Financial Crisis of 2008-2009 was followed by the Sovereign Debt Crisis in the euro area that saw the first Eurozone government de facto defaulting on its debt and prompted actions at international level to stem further domino and cascade effects to other Eurozone governments and banks. Against this backdrop, a careful measurement of systemic risk is of utmost importance for the new capital regulation to be successful and for sovereign risk to remain in check. Most importantly, the book introduces a number of systemic fragility indicators for banks and sovereigns that can help to assess systemic risk and the impact of macroprudential and microprudential policies.
The book discusses how augmented intelligence can increase the efficiency and speed of diagnosis in healthcare organizations. The concept of augmented intelligence can reflect the enhanced capabilities of human decision-making in clinical settings when augmented with computation systems and methods. It includes real-life case studies highlighting impact of augmented intelligence in health care. The book offers a guided tour of computational intelligence algorithms, architecture design, and applications of learning in healthcare challenges. It presents a variety of techniques designed to represent, enhance, and empower multi-disciplinary and multi-institutional machine learning research in healthcare informatics. It also presents specific applications of augmented intelligence in health care, and architectural models and frameworks-based augmented solutions.
Knowledge management captures the right knowledge, to the right user, who in turn uses the knowledge to improve organizational or individual performance to increase effectiveness. ""Strategies for Knowledge Management Success: Exploring Organizational Efficacy"" collects and presents key research articles focused on identifying, defining, and measuring accomplishment in knowledge management. A significant collection of the latest international findings within the field, this book provides a strong reference for students, researchers, and practitioners involved with organizational knowledge management.
This edited book covers ongoing research in both theory and practical applications of using deep learning for social media data. Social networking platforms are overwhelmed by different contents, and their huge amounts of data have enormous potential to influence business, politics, security, planning and other social aspects. Recently, deep learning techniques have had many successful applications in the AI field. The research presented in this book emerges from the conviction that there is still much progress to be made toward exploiting deep learning in the context of social media data analytics. It includes fifteen chapters, organized into four sections that report on original research in network structure analysis, social media text analysis, user behaviour analysis and social media security analysis. This work could serve as a good reference for researchers, as well as a compilation of innovative ideas and solutions for practitioners interested in applying deep learning techniques to social media data analytics.
In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity. Examples of important applications of RTDBS include stock trading systems, navigation systems and computer integrated manufacturing. Different transaction scheduling algorithms and concurrency control protocols have been proposed to satisfy transaction timing data temporal constraints. Other design issues important to the performance of a RTDBS are buffer management, index accesses and I/O scheduling. Real-Time Database Systems: Architecture and Techniques summarizes important research results in this area, and serves as an excellent reference for practitioners, researchers and educators of real-time systems and database systems.
People have a hard time communicating, and also have a hard time
finding business knowledge in the environment. With the
sophistication of search technologies like Google, business people
expect to be able to get their questions answered about the
business just like you can do an internet search. The truth is,
knowledge management is primitive today, and it is due to the fact
that we have poor business metadata management.
This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.
A statisticallanguage model, or more simply a language model, is a prob abilistic mechanism for generating text. Such adefinition is general enough to include an endless variety of schemes. However, a distinction should be made between generative models, which can in principle be used to synthesize artificial text, and discriminative techniques to classify text into predefined cat egories. The first statisticallanguage modeler was Claude Shannon. In exploring the application of his newly founded theory of information to human language, Shannon considered language as a statistical source, and measured how weH simple n-gram models predicted or, equivalently, compressed natural text. To do this, he estimated the entropy of English through experiments with human subjects, and also estimated the cross-entropy of the n-gram models on natural 1 text. The ability of language models to be quantitatively evaluated in tbis way is one of their important virtues. Of course, estimating the true entropy of language is an elusive goal, aiming at many moving targets, since language is so varied and evolves so quickly. Yet fifty years after Shannon's study, language models remain, by all measures, far from the Shannon entropy liInit in terms of their predictive power. However, tbis has not kept them from being useful for a variety of text processing tasks, and moreover can be viewed as encouragement that there is still great room for improvement in statisticallanguage modeling."
This book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
Continuous Media Databases brings together in one place important contributions and up-to-date research results in this fast moving area. Continuous Media Databases serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This volume offers the reader a systematic and throughout account of branches of logic instrumental for computer science, data science and artificial intelligence. Addressed in it are propositional, predicate, modal, epistemic, dynamic, temporal logics as well as applicable in data science many-valued logics and logics of concepts (rough logics). It offers a look into second-order logics and approximate logics of parts. The book concludes with appendices on set theory, algebraic structures, computability, complexity, MV-algebras and transition systems, automata and formal grammars. By this composition of the text, the reader obtains a self-contained exposition that can serve as the textbook on logics and relevant disciplines as well as a reference text.
This book discusses the various open issues of blockchain technology, such as the efficiency of blockchain in different domains of digital cryptocurrency, smart contracts, smart education system, smart cities, cloud identity and access, safeguard to cybersecurity and health care. For the first time in human history, people across the world can trust each other and transact over a large peer-to-peer networks without any central authority. This proves that, trust can be built not only by centralized institution but also by protocols and cryptographic mechanisms. The potential and collaboration between organizations and individuals within peer networks make it possible to potentially move to a global collaborative network without centralization. Blockchain is a complex social, economic and technological phenomenon. This questions what the established terminologies of the modern world like currency, trust, economics and exchange would mean. To make any sense, one needs to realize how much insightful and potential it is in the context and the way it is technically developed. Due to rapid changes in accessing the documents through online transactions and transferring the currency online, many previously used methods are proving insufficient and not secure to solve the problem which arises in the safe and hassle-free transaction. Nowadays, the world changes rapidly, and a transition flow is also seen in Business Process Management (BPM). The traditional Business Process Management holds good establishment last one to two decades, but, the internal workflow confined in a single organization. They do not manage the workflow process and information across organizations. If they do so, again fall in the same trap as the control transfers to the third party that is centralized server and it leads to tampering the data, and single point of failure. To address these issues, this book highlights a number of unique problems and effective solutions that reflects the state-of-the art in blockchain Technology. This book explores new experiments and yields promising solutions to the current challenges of blockchain technology. This book is intended for the researchers, academicians, faculties, scientists, blockchain specialists, business management and software industry professionals who will find it beneficial for their research work and set new ideas in the field of blockchain. This book caters research work in many fields of blockchain engineering, and it provides an in-depth knowledge of the fields covered.
Although an emerging technology, blockchain is here to stay. Since its inception, imaginative thinkers have identified new ways for this powerful technology to bring innovative solutions to problems in the business world. Considered by many as an extreme and disruptive change, how can business leaders overcome resistance to the implementation of blockchain solutions and maximize its potential? The Emerald Handbook of Blockchain for Business equips academics, practitioners, and students with a broad understanding of the cutting-edge developments and applications of emerging blockchain technology. Covering the basic concepts while also showcasing practical applications in intricate real-world situations, this handbook bridges the gap between theory and practice, providing a useful balance of detailed and user-friendly coverage. Facilitating readers with a working knowledge of how blockchain functions and integrates within the business world, this handbook is essential reading for academics looking for a springboard for further research and practitioners needing a go-to resource for navigating the implementation of this fast-moving new technology.
This book is devoted to the leading research in applying learning automaton (LA) and heuristics for solving benchmark and real-world optimization problems. The ever-increasing application of the LA as a promising reinforcement learning technique in artificial intelligence makes it necessary to provide scholars, scientists, and engineers with a practical discussion on LA solutions for optimization. The book starts with a brief introduction to LA models for optimization. Afterward, the research areas related to LA and optimization are addressed as bibliometric network analysis. Then, LA's application in behavior control in evolutionary computation, and memetic models of object migration automata and cellular learning automata for solving NP hard problems are considered. Next, an overview of multi-population methods for DOPs, LA's application in dynamic optimization problems (DOPs), and the function evaluation management in evolutionary multi-population for DOPs are discussed. Highlighted benefits * Presents the latest advances in learning automata-based optimization approaches. * Addresses the memetic models of learning automata for solving NP-hard problems. * Discusses the application of learning automata for behavior control in evolutionary computation in detail. * Gives the fundamental principles and analyses of the different concepts associated with multi-population methods for dynamic optimization problems.
Digital Libraries and Multimedia brings together in one place important contributions and up-to-date research results in this fast moving area. Digital Libraries and Multimedia serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20-21 March 2020 at the Central University of Jammu, India, and organized by the university's Department of Computer Science & Information Technology. It includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
This book projects a futuristic scenario that is more existent than they have been at any time earlier. To be conscious of the bursting prospective of IoT, it has to be amalgamated with AI technologies. Predictive and advanced analysis can be made based on the data collected, discovered and analyzed. To achieve all these compatibility, complexity, legal and ethical issues arise due to automation of connected components and gadgets of widespread companies across the globe. While these are a few examples of issues, the authors' intention in editing this book is to offer concepts of integrating AI with IoT in a precise and clear manner to the research community. In editing this book, the authors' attempt is to provide novel advances and applications to address the challenge of continually discovering patterns for IoT by covering various aspects of implementing AI techniques to make IoT solutions smarter. The only way to remain pace with this data generated by the IoT and acquire the concealed acquaintance it encloses is to employ AI as the eventual catalyst for IoT. IoT together with AI is more than an inclination or existence; it will develop into a paradigm. It helps those researchers who have an interest in this field to keep insight into different concepts and their importance for applications in real life. This has been done to make the edited book more flexible and to stimulate further interest in topics. All these motivated the authors toward integrating AI in achieving smarter IoT. The authors believe that their effort can make this collection interesting and highly attract the student pursuing pre-research, research and even master in multidisciplinary domain.
Improve the performance of relational databases with indexes
designed for today's hardware
Explains the basic concepts of Python and its role in machine learning Provides comprehensive coverage of feature-engineering including real-time case studies Perceive the structural patterns with reference to data science and statistics and analytics Includes machine learning based structured exercises Appreciates different algorithmic concepts of machine learning including unsupervised, supervised and reinforcement learning
This book addresses the emerging paradigm of data-driven engineering design. In the big-data era, data is becoming a strategic asset for global manufacturers. This book shows how the power of data can be leveraged to drive the engineering design process, in particular, the early-stage design. Based on novel combinations of standing design methodology and the emerging data science, the book presents a collection of theoretically sound and practically viable design frameworks, which are intended to address a variety of critical design activities including conceptual design, complexity management, smart customization, smart product design, product service integration, and so forth. In addition, it includes a number of detailed case studies to showcase the application of data-driven engineering design. The book concludes with a set of promising research questions that warrant further investigation. Given its scope, the book will appeal to a broad readership, including postgraduate students, researchers, lecturers, and practitioners in the field of engineering design.
Information Retrieval has become a very active research field in the 21st century. Many from academia and industry present their innovations in the field in a wide variety of conferences and journals. Companies transfer this new knowledge directly to the general public via services such as web search engines in order to improve their information seeking experience. In parallel, teaching IR is turning into an important aspect of IR generally, not only because it is necessary to impart effective search techniques to make the most of the IR tools available, but also because we must provide a good foundation for those students who will become the driving force of future IR technologies. There are very few resources for teaching and learning in IR, the major problem which this book is designed to solve. The objective is to provide ideas and practical experience of teaching and learning IR, for those whose job requires them to teach in one form or another, and where delivering IR courses is a major part of their working lives. In this context of providing a higher profile for teaching and learning as applied to IR, the co-editor of this book, Efthimis Efthimiathis, had maintained a leading role in teaching and learning within the domain of IR for a number of years. This book represents a posthumous example of his efforts in the area, as he passed away in April 2011. This book, his book, is dedicated to his memory." |
You may like...
Change in Psychotherapy - A Unifying…
The Boston Process Change Study Group
Hardcover
The Super-Afrikaners - Inside The…
Ivor Wilkins, Hans Strydom
Paperback
(1)
|