![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > General
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.
This edited book presents scientific results of the International Semi-Virtual Workshop on Data Science and Digital Transformation in the Fourth Industrial Revolution (DSDT 2020) which was held on October 15, 2020, at Soongsil University, Seoul, Korea. The aim of this workshop was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The workshop organizers selected the best papers from those papers accepted for presentation at the workshop. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 17 of the conference's most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
Ontologies and Databases brings together in one place important contributions and up-to-date research results in this fast moving area. Ontologies and Databases serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This open access book attends to the co-creation of digital public services for ageing societies. Increasingly public services are provided in digital form; their uptake however remains well below expectations. In particular, amongst older adults the need for public services is high, while at the same time the uptake of digital services is lower than the population average. One of the reasons is that many digital public services (or e-services) do not respond well to the life worlds, use contexts and use practices of its target audiences. This book argues that when older adults are involved in the process of identifying, conceptualising, and designing digital public services, these services become more relevant and meaningful. The book describes and compares three co-creation projects that were conducted in two European cities, Bremen and Zaragoza, as part of a larger EU-funded innovation project. The first part of the book traces the origins of co-creation to three distinct domains, in which co-creation has become an equally important approach with different understandings of what it is and entails: (1) the co-production of public services, (2) the co-design of information systems and (3) the civic use of open data. The second part of the book analyses how decisions about a co-creation project's governance structure, its scope of action, its choice of methods, its alignment with strategic policies and its embedding in existing public information infrastructures impact on the process and its results. The final part of the book identifies key challenges to co-creation and provides a more general assessment of what co-creation may achieve, where the most promising areas of application may be and where it probably does not match with the contingent requirements of digital public services. Contributing to current discourses on digital citizenship in ageing societies and user-centric design, this book is useful for researchers and practitioners interested in co-creation, public sector innovation, open government, ageing and digital technologies, citizen engagement and civic participation in socio-technical innovation.
This book provides a comprehensive description of the novel coronavirus infection, spread analysis, and related challenges for the effective combat and treatment. With a detailed discussion on the nature of transmission of COVID-19, few other important aspects such as disease symptoms, clinical application of radiomics, image analysis, antibody treatments, risk analysis, drug discovery, emotion and sentiment analysis, virus infection, and fatality prediction are highlighted. The main focus is laid on different issues and futuristic challenges of computational intelligence techniques in solving and identifying the solutions for COVID-19. The book drops radiance on the reasons for the growing profusion and complexity of data in this sector. Further, the book helps to focus on further research challenges and directions of COVID-19 for the practitioners as well as researchers.
Today, the use of machine intelligence, expert systems, and analytical technologies combined with Big Data is the natural evolution of both disciplines. As a result, there is a pressing need for new and innovative algorithms to help us find effective and practical solutions for smart applications such as smart cities, IoT, healthcare, and cybersecurity. This book presents the latest advances in big data intelligence for smart applications. It explores several problems and their solutions regarding computational intelligence and big data for smart applications. It also discusses new models, practical solutions,and technological advances related to developing and transforming cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
This book first provides a comprehensive review of state-of-the-art IoT technologies and applications in different industrial sectors and public services. The authors give in-depth analyses of fog computing architecture and key technologies that fulfill the challenging requirements of enabling computing services anywhere along the cloud-to-thing continuum. Further, in order to make IoT systems more intelligent and more efficient, a fog-enabled service architecture is proposed to address the latency requirements, bandwidth limitations, and computing power issues in realistic cross-domain application scenarios with limited priori domain knowledge, i.e. physical laws, system statuses, operation principles and execution rules. Based on this fog-enabled architecture, a series of data-driven self-learning applications in different industrial sectors and public services are investigated and discussed, such as robot SLAM and formation control, wireless network self-optimization, intelligent transportation system, smart home and user behavior recognition. Finally, the advantages and future directions of fog-enabled intelligent IoT systems are summarized. Provides a comprehensive review of state-of-the-art IoT technologies and applications in different industrial sectors and public services Presents a fog-enabled service architecture with detailed technical approaches for realistic cross-domain application scenarios with limited prior domain knowledge Outlines a series of data-driven self-learning applications (with new algorithms) in different industrial sectors and public services
The proceedings publishes new research results of scholars from the First International Conference on Agriculture and Information (ICAIT2019) organized by IRNet International Academic Communication Center, held during November 22-24, 2019. The book covers works from active researchers who are working on collaboration of agriculture and various information technologies such as ICT (Information and Communication Technologies) applicable/applied to agricultural produce, manufacturing preservation and distribution of agricultural products, etc. The book focuses on theory, design, development, testing and evaluation of all information technologies applicable/applied to various parts of agriculture and its infrastructure. The topics included are information technologies applicable to smart agriculture, intelligent information systems for smart farm systems, web-based intelligent information systems on agriculture, ICT-based marketing of agricultural products, agricultural product consumption network systems, IoT for agricultural produce and products, soft computing theories, intelligent management for agriculture, data science techniques for agriculture.
This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.
An abundance of unique, interesting examples, use of the Unified Modeling Language throughout, and the newest Java 1.5 features characterize this text. Drake provides a concise and engaging introduction to Java and object-oriented programming, assuming familiarity with the basic control structures of Java or C and only a pre-calculus level of mathematics.
This book plays a significant role in improvising human life to a great extent. The new applications of soft computing can be regarded as an emerging field in computer science, automatic control engineering, medicine, biology application, natural environmental engineering, and pattern recognition. Now, the exemplar model for soft computing is human brain. The use of various techniques of soft computing is nowadays successfully implemented in many domestic, commercial, and industrial applications due to the low-cost and very high-performance digital processors and also the decline price of the memory chips. This is the main reason behind the wider expansion of soft computing techniques and its application areas. These computing methods also play a significant role in the design and optimization in diverse engineering disciplines. With the influence and the development of the Internet of things (IoT) concept, the need for using soft computing techniques has become more significant than ever. In general, soft computing methods are closely similar to biological processes than traditional techniques, which are mostly based on formal logical systems, such as sentential logic and predicate logic, or rely heavily on computer-aided numerical analysis. Soft computing techniques are anticipated to complement each other. The aim of these techniques is to accept imprecision, uncertainties, and approximations to get a rapid solution. However, recent advancements in representation soft computing algorithms (fuzzy logic,evolutionary computation, machine learning, and probabilistic reasoning) generate a more intelligent and robust system providing a human interpretable, low-cost, approximate solution. Soft computing-based algorithms have demonstrated great performance to a variety of areas including multimedia retrieval, fault tolerance, system modelling, network architecture, Web semantics, big data analytics, time series, biomedical and health informatics, etc. Soft computing approaches such as genetic programming (GP), support vector machine-firefly algorithm (SVM-FFA), artificial neural network (ANN), and support vector machine-wavelet (SVM-Wavelet) have emerged as powerful computational models. These have also shown significant success in dealing with massive data analysis for large number of applications. All the researchers and practitioners will be highly benefited those who are working in field of computer engineering, medicine, biology application, signal processing, and mechanical engineering. This book is a good collection of state-of-the-art approaches for soft computing-based applications to various engineering fields. It is very beneficial for the new researchers and practitioners working in the field to quickly know the best performing methods. They would be able to compare different approaches and can carry forward their research in the most important area of research which has direct impact on betterment of the human life and health. This book is very useful because there is no book in the market which provides a good collection of state-of-the-art methods of soft computing-based models for multimedia retrieval, fault tolerance, system modelling, network architecture, Web semantics, big data analytics, time series, and biomedical and health informatics.
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes selected papers from the International Conference on Computational Intelligence and Data Engineering (ICCIDE 2020). It covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence and speech processing.
This book covers advances in system, control and computing. This book gathers selected high-quality research papers presented at the International Conference on Advances in Systems, Control and Computing (AISCC 2020), held at MNIT Jaipur during February 27-28, 2020. The first part is advances in systems and it is dedicated to applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi-agent systems, machine learning, other intelligent systems and related areas. In the second part, machine learning and other intelligent algorithms for design of control/control analysis are covered. The last part covers advancements, modifications, improvements and applications of intelligent algorithms.
This open access book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to significantly economize the cost of transactions. Creating a ledger on data, a blockchain makes it possible to designate the owner of each piece of data, to trade data pieces, and to market them. This book examines the formation of markets for various types of data from the theory of market quality proposed and developed by M. Yano. Blockchains are expected to give data itself the status of a new production factor. Bringing ownership of data to the hands of data producers, blockchains can reduce the possibility of information leakage, enhance the sharing and use of IoT data, and prevent data monopoly and misuse. The industry will have a bright future as soon as better technology is developed and when a healthy infrastructure is created to support the blockchain market.
This book presents a comprehensive overview of fundamental issues and recent advances in graph data management. Its aim is to provide beginning researchers in the area of graph data management, or in fields that require graph data management, an overview of the latest developments in this area, both in applied and in fundamental subdomains. The topics covered range from a general introduction to graph data management, to more specialized topics like graph visualization, flexible queries of graph data, parallel processing, and benchmarking. The book will help researchers put their work in perspective and show them which types of tools, techniques and technologies are available, which ones could best suit their needs, and where there are still open issues and future research directions. The chapters are contributed by leading experts in the relevant areas, presenting a coherent overview of the state of the art in the field. Readers should have a basic knowledge of data management techniques as they are taught in computer science MSc programs.
As data is an important asset for any organization, it is essential to apply semantic technologies in data science to fulfill the need of any organization. This volume of a two-volume handbook set provides a roadmap for new trends and future developments of data science with semantic technologies. Data Science with Semantic Technologies: New Trends and Future Developments highlights how data science enables the user to create intelligence through these technologies. In addition, this book offers the answers to various questions such as can semantic technologies be able to facilitate data science? Which type of data science problems can be tackled by semantic technologies? How can data scientists get benefited from these technologies? What is the role of semantic technologies in data science? What is the current progress and future of data science with semantic technologies? Which types of problems require the immediate attention of the researchers? What should be the vision 2030 for data science? This volume can serve as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for scholars, researchers, professionals, and practitioners in this field.
Gone are the days when data was interlinked with related data by humans and to find insights coherently, human interpretation was required. Data is no more just data. It is now considered a Thing or Entity or Concept- to bring the meaning to it, so that a machine not only understands the concept but also extrapolates the way humans do. Data Science with Semantic Technologies: Deployment and Exploration volume of a two-volume handbook set provides a roadmap for the deployment of semantic technologies in the field of data science and enables the user to create intelligence through these technologies by exploring the opportunities and eradicating the challenges in the current and future time frame. In addition, this book offers the answer to various questions like What makes a technology semantic as opposed to other approaches to data science? What is knowledge data science? How does knowledge data science relate to other fields? This book explores the optimal use of these technologies to provide the highest benefit to the user under one comprehensive source and title. As there is no dedicated book available in the market on this topic at this time, this proposed new book becomes a unique and only resource for scholars, researchers, data scientists, professionals, and practitioners. This volume can serve as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for scholars, researchers, professionals, and practitioners in this field.
This book presents practical as well as conceptual insights into the latest trends, tools, techniques and methodologies of blockchains for the Internet of Things. The decentralised Internet of Things (IoT) not only reduces infrastructure costs, but also provides a standardised peer-to-peer communication model for billions of transactions. However, there are significant security challenges associated with peer-to-peer communication. The decentralised concept of blockchain technology ensures transparent interactions between different parties, which are more secure and reliable thanks to distributed ledger and proof-of-work consensus algorithms. Blockchains allow trustless, peer-to-peer communication and have already proven their worth in the world of financial services. The blockchain can be implanted in IoT systems to deal with the issues of scale, trustworthiness and decentralisation, allowing billions of devices to share the same network without the need for additional resources. This book discusses the latest tools and methodology and concepts in the decentralised Internet of Things. Each chapter presents an in-depth investigation of the potential of blockchains in the Internet of Things, addressing the state-of-the-art in and future perspectives of the decentralised Internet of Things. Further, industry experts, researchers and academicians share their ideas and experiences relating to frontier technologies, breakthrough and innovative solutions and applications.
For courses in object-oriented systems analysis and design. This text teaches students object-oriented systems analysis and design in a highly practical and accessible way.
Database System Concepts by Silberschatz, Korth and Sudarshan is now in its 7th edition and is one of the cornerstone texts of database education. It presents the fundamental concepts of database management in an intuitive manner geared toward allowing students to begin working with databases as quickly as possible. The text is designed for a first course in databases at the junior/senior undergraduate level or the first year graduate level. It also contains additional material that can be used as supplements or as introductory material for an advanced course. Because the authors present concepts as intuitive descriptions, a familiarity with basic data structures, computer organization, and a high-level programming language are the only prerequisites. Important theoretical results are covered, but formal proofs are omitted. In place of proofs, figures and examples are used to suggest why a result is true.
Real-time systems are defined as those for which correctness depends not only on the logical properties of the produced results, but also on the temporal properties of these results. In a database, real-time means that in addition to typical logical consistency constraints, such as a constraint on a data item's value, there are constraints on when transactions execute and on the freshness' of the data transactions access. The challenges and tradeoffs faced by the designers of real-time database systems are quite different from those faced by the designers of general-purpose database systems. To achieve the fundamental requirements of timeliness and predictability, not only do conventional methods for scheduling and transaction management have to be redesigned, but also new concepts that have not been considered in conventional database systems or in real-time systems need to be added. Real-Time Database and Information Systems: Research Advances is devoted to new techniques for scheduling of transactions, concurrency management, transaction logging, database languages, and new distributed database architectures. Real-Time Database and Information Systems: Research Advances is primarily intended for practicing engineers and researchers working in the growing area of real-time database and information retrieval systems. For practitioners, the book will provide a much needed bridge for technology transfer and continued education. For researchers, the book will provide a comprehensive reference for well-established results. The book can also be used in a senior or graduate level course on real-time systems, real-time database systems, and database systems, or closely related courses.
This book contributes to the progress towards intelligent transportation. It emphasizes new data management and machine learning approaches such as big data, deep learning and reinforcement learning. Deep learning and big data are very energetic and vital research topics of today's technology. Road sensors, UAVs, GPS, CCTV and incident reports are sources of massive amount of data which are crucial to make serious traffic decisions. Herewith this substantial volume and velocity of data, it is challenging to build reliable prediction models based on machine learning methods and traditional relational database. Therefore, this book includes recent research works on big data, deep convolution networks and IoT-based smart solutions to limit the vehicle's speed in a particular region, to support autonomous safe driving and to detect animals on roads for mitigating animal-vehicle accidents. This book serves broad readers including researchers, academicians, students and working professional in vehicles manufacturing, health and transportation departments and networking companies.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
This book provides comprehensive guidance on leveraging SAP IBP technology to connect strategic (to be understood as long term SC&O), tactical and operational planning into one coherent process framework, presenting experience shared by practitioners in workshops, customer presentations, business, and IT transformation projects. It offers use cases and a wealth of practical tips to ensure that readers understand the challenges and advantages of IBP implementation. The book starts by characterizing disconnected planning and contrasting this with key elements of a transformation project approach. It explains the functional foundations and SAP Hybris, Trade Promotion Planning, Customer Business Planning, ARIBA, and S/4 integration with SAP IBP. It then presents process for integrating finance in IBP. Annual planning and monthly planning are taken as examples of explain Long term planning (in some companies labeled as strategic). The core of the book is about sales and operations planning (S&OP) and its process steps, product demand, supply review, integrated reconciliation and management business review, illustrating all steps with use cases. It describes unconstrained and constrained optimized supply planning, inventory optimization, shelf life planning. We explain how to improve responsiveness with order-based allocation planning, sales order confirmation, and big deal / tender management coupled with simultaneous re-planning of supply. The book closes with a chapter on performance measurement, measurement of effectiveness, efficiency, and adherence. |
You may like...
Conceivability and Possibility
Tamar Szabo Gendler, John Hawthorne
Hardcover
R5,226
Discovery Miles 52 260
Donald Davidson's Truth-Theoretic…
Ernest LePore, Kirk Ludwig
Hardcover
R3,034
Discovery Miles 30 340
The Ethics of Internet Research - A…
Heidi McKee, James E. Porter
Paperback
R868
Discovery Miles 8 680
|