![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > General
The proceedings publishes new research results of scholars from the First International Conference on Agriculture and Information (ICAIT2019) organized by IRNet International Academic Communication Center, held during November 22-24, 2019. The book covers works from active researchers who are working on collaboration of agriculture and various information technologies such as ICT (Information and Communication Technologies) applicable/applied to agricultural produce, manufacturing preservation and distribution of agricultural products, etc. The book focuses on theory, design, development, testing and evaluation of all information technologies applicable/applied to various parts of agriculture and its infrastructure. The topics included are information technologies applicable to smart agriculture, intelligent information systems for smart farm systems, web-based intelligent information systems on agriculture, ICT-based marketing of agricultural products, agricultural product consumption network systems, IoT for agricultural produce and products, soft computing theories, intelligent management for agriculture, data science techniques for agriculture.
This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.
This present book discusses the application of the methods to astrophysical data from different perspectives. In this book, the reader will encounter interesting chapters that discuss data processing and pulsars, the complexity and information content of our universe, the use of tessellation in astronomy, characterization and classification of astronomical phenomena, identification of extragalactic objects, classification of pulsars and many other interesting chapters. The authors of these chapters are experts in their field and have been carefully selected to create this book so that the authors present to the community a representative publication that shows a unique fusion of artificial intelligence and astrophysics.
An abundance of unique, interesting examples, use of the Unified Modeling Language throughout, and the newest Java 1.5 features characterize this text. Drake provides a concise and engaging introduction to Java and object-oriented programming, assuming familiarity with the basic control structures of Java or C and only a pre-calculus level of mathematics.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book plays a significant role in improvising human life to a great extent. The new applications of soft computing can be regarded as an emerging field in computer science, automatic control engineering, medicine, biology application, natural environmental engineering, and pattern recognition. Now, the exemplar model for soft computing is human brain. The use of various techniques of soft computing is nowadays successfully implemented in many domestic, commercial, and industrial applications due to the low-cost and very high-performance digital processors and also the decline price of the memory chips. This is the main reason behind the wider expansion of soft computing techniques and its application areas. These computing methods also play a significant role in the design and optimization in diverse engineering disciplines. With the influence and the development of the Internet of things (IoT) concept, the need for using soft computing techniques has become more significant than ever. In general, soft computing methods are closely similar to biological processes than traditional techniques, which are mostly based on formal logical systems, such as sentential logic and predicate logic, or rely heavily on computer-aided numerical analysis. Soft computing techniques are anticipated to complement each other. The aim of these techniques is to accept imprecision, uncertainties, and approximations to get a rapid solution. However, recent advancements in representation soft computing algorithms (fuzzy logic,evolutionary computation, machine learning, and probabilistic reasoning) generate a more intelligent and robust system providing a human interpretable, low-cost, approximate solution. Soft computing-based algorithms have demonstrated great performance to a variety of areas including multimedia retrieval, fault tolerance, system modelling, network architecture, Web semantics, big data analytics, time series, biomedical and health informatics, etc. Soft computing approaches such as genetic programming (GP), support vector machine-firefly algorithm (SVM-FFA), artificial neural network (ANN), and support vector machine-wavelet (SVM-Wavelet) have emerged as powerful computational models. These have also shown significant success in dealing with massive data analysis for large number of applications. All the researchers and practitioners will be highly benefited those who are working in field of computer engineering, medicine, biology application, signal processing, and mechanical engineering. This book is a good collection of state-of-the-art approaches for soft computing-based applications to various engineering fields. It is very beneficial for the new researchers and practitioners working in the field to quickly know the best performing methods. They would be able to compare different approaches and can carry forward their research in the most important area of research which has direct impact on betterment of the human life and health. This book is very useful because there is no book in the market which provides a good collection of state-of-the-art methods of soft computing-based models for multimedia retrieval, fault tolerance, system modelling, network architecture, Web semantics, big data analytics, time series, and biomedical and health informatics.
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes selected papers from the International Conference on Computational Intelligence and Data Engineering (ICCIDE 2020). It covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence and speech processing.
This book covers advances in system, control and computing. This book gathers selected high-quality research papers presented at the International Conference on Advances in Systems, Control and Computing (AISCC 2020), held at MNIT Jaipur during February 27-28, 2020. The first part is advances in systems and it is dedicated to applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi-agent systems, machine learning, other intelligent systems and related areas. In the second part, machine learning and other intelligent algorithms for design of control/control analysis are covered. The last part covers advancements, modifications, improvements and applications of intelligent algorithms.
This open access book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to significantly economize the cost of transactions. Creating a ledger on data, a blockchain makes it possible to designate the owner of each piece of data, to trade data pieces, and to market them. This book examines the formation of markets for various types of data from the theory of market quality proposed and developed by M. Yano. Blockchains are expected to give data itself the status of a new production factor. Bringing ownership of data to the hands of data producers, blockchains can reduce the possibility of information leakage, enhance the sharing and use of IoT data, and prevent data monopoly and misuse. The industry will have a bright future as soon as better technology is developed and when a healthy infrastructure is created to support the blockchain market.
For courses in object-oriented systems analysis and design. This text teaches students object-oriented systems analysis and design in a highly practical and accessible way.
Artificial Intelligence (AI), when incorporated with machine learning and deep learning algorithms, has a wide variety of applications today. This book focuses on the implementation of various elementary and advanced approaches in AI that can be used in various domains to solve real-time decision-making problems. The book focuses on concepts and techniques used to run tasks in an automated manner. It discusses computational intelligence in the detection and diagnosis of clinical and biomedical images, covers the automation of a system through machine learning and deep learning approaches, presents data analytics and mining for decision-support applications, and includes case-based reasoning, natural language processing, computer vision, and AI approaches in real-time applications. Academic scientists, researchers, and students in the various domains of computer science engineering, electronics and communication engineering, and information technology, as well as industrial engineers, biomedical engineers, and management, will find this book useful. By the end of this book, you will understand the fundamentals of AI. Various case studies will develop your adaptive thinking to solve real-time AI problems. Features Includes AI-based decision-making approaches Discusses computational intelligence in the detection and diagnosis of clinical and biomedical images Covers automation of systems through machine learning and deep learning approaches and its implications to the real world Presents data analytics and mining for decision-support applications Offers case-based reasoning
Real-time systems are defined as those for which correctness depends not only on the logical properties of the produced results, but also on the temporal properties of these results. In a database, real-time means that in addition to typical logical consistency constraints, such as a constraint on a data item's value, there are constraints on when transactions execute and on the freshness' of the data transactions access. The challenges and tradeoffs faced by the designers of real-time database systems are quite different from those faced by the designers of general-purpose database systems. To achieve the fundamental requirements of timeliness and predictability, not only do conventional methods for scheduling and transaction management have to be redesigned, but also new concepts that have not been considered in conventional database systems or in real-time systems need to be added. Real-Time Database and Information Systems: Research Advances is devoted to new techniques for scheduling of transactions, concurrency management, transaction logging, database languages, and new distributed database architectures. Real-Time Database and Information Systems: Research Advances is primarily intended for practicing engineers and researchers working in the growing area of real-time database and information retrieval systems. For practitioners, the book will provide a much needed bridge for technology transfer and continued education. For researchers, the book will provide a comprehensive reference for well-established results. The book can also be used in a senior or graduate level course on real-time systems, real-time database systems, and database systems, or closely related courses.
This book contributes to the progress towards intelligent transportation. It emphasizes new data management and machine learning approaches such as big data, deep learning and reinforcement learning. Deep learning and big data are very energetic and vital research topics of today's technology. Road sensors, UAVs, GPS, CCTV and incident reports are sources of massive amount of data which are crucial to make serious traffic decisions. Herewith this substantial volume and velocity of data, it is challenging to build reliable prediction models based on machine learning methods and traditional relational database. Therefore, this book includes recent research works on big data, deep convolution networks and IoT-based smart solutions to limit the vehicle's speed in a particular region, to support autonomous safe driving and to detect animals on roads for mitigating animal-vehicle accidents. This book serves broad readers including researchers, academicians, students and working professional in vehicles manufacturing, health and transportation departments and networking companies.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
This book provides comprehensive guidance on leveraging SAP IBP technology to connect strategic (to be understood as long term SC&O), tactical and operational planning into one coherent process framework, presenting experience shared by practitioners in workshops, customer presentations, business, and IT transformation projects. It offers use cases and a wealth of practical tips to ensure that readers understand the challenges and advantages of IBP implementation. The book starts by characterizing disconnected planning and contrasting this with key elements of a transformation project approach. It explains the functional foundations and SAP Hybris, Trade Promotion Planning, Customer Business Planning, ARIBA, and S/4 integration with SAP IBP. It then presents process for integrating finance in IBP. Annual planning and monthly planning are taken as examples of explain Long term planning (in some companies labeled as strategic). The core of the book is about sales and operations planning (S&OP) and its process steps, product demand, supply review, integrated reconciliation and management business review, illustrating all steps with use cases. It describes unconstrained and constrained optimized supply planning, inventory optimization, shelf life planning. We explain how to improve responsiveness with order-based allocation planning, sales order confirmation, and big deal / tender management coupled with simultaneous re-planning of supply. The book closes with a chapter on performance measurement, measurement of effectiveness, efficiency, and adherence.
This book highlights cutting-edge applications of machine learning techniques for disaster management by monitoring, analyzing, and forecasting hydro-meteorological variables. Predictive modelling is a consolidated discipline used to forewarn the possibility of natural hazards. In this book, experts from numerical weather forecast, meteorology, hydrology, engineering, agriculture, economics, and disaster policy-making contribute towards an interdisciplinary framework to construct potent models for hazard risk mitigation. The book will help advance the state of knowledge of artificial intelligence in decision systems to aid disaster management and policy-making. This book can be a useful reference for graduate student, academics, practicing scientists and professionals of disaster management, artificial intelligence, and environmental sciences.
This book serves as a single-source reference to the state-of-the-art in Internet of Things (IoT) platforms, services, tools, programming languages, and applications. In particular, the authors focus on IoT-related requirements such as low-power, time-to-market, connectivity, reliability, interoperability, security, and privacy. Authors discuss the question of whether we need new IoT standardization bodies or initiatives, toward a fully connected, cyber-physical world. Coverage includes the research outcomes of several, current European projects related to IoT platforms, services, APIs, tools, and applications.
What makes information useful? This seemingly simple and yet intriguing and complicated question is discussed in this book. It examines ways in which the quality of information can be improved in knowledge-intensive processes (such as on-line communication, strategy, product development, or consulting). The book proposes a conceptual framework to manage information quality for knowledge-based content, presenting four proven principles to apply the framework to a variety of information products. Five in-depth company case studies show how information quality can be managed systematically in order to increase the satisfaction of knowledge workers and information consumers. The book uses frequent diagrams and tables, as well as diagnostic questions and summary boxes to make its content actionable.
This book presents a comprehensive overview of fundamental issues and recent advances in graph data management. Its aim is to provide beginning researchers in the area of graph data management, or in fields that require graph data management, an overview of the latest developments in this area, both in applied and in fundamental subdomains. The topics covered range from a general introduction to graph data management, to more specialized topics like graph visualization, flexible queries of graph data, parallel processing, and benchmarking. The book will help researchers put their work in perspective and show them which types of tools, techniques and technologies are available, which ones could best suit their needs, and where there are still open issues and future research directions. The chapters are contributed by leading experts in the relevant areas, presenting a coherent overview of the state of the art in the field. Readers should have a basic knowledge of data management techniques as they are taught in computer science MSc programs.
This book presents practical as well as conceptual insights into the latest trends, tools, techniques and methodologies of blockchains for the Internet of Things. The decentralised Internet of Things (IoT) not only reduces infrastructure costs, but also provides a standardised peer-to-peer communication model for billions of transactions. However, there are significant security challenges associated with peer-to-peer communication. The decentralised concept of blockchain technology ensures transparent interactions between different parties, which are more secure and reliable thanks to distributed ledger and proof-of-work consensus algorithms. Blockchains allow trustless, peer-to-peer communication and have already proven their worth in the world of financial services. The blockchain can be implanted in IoT systems to deal with the issues of scale, trustworthiness and decentralisation, allowing billions of devices to share the same network without the need for additional resources. This book discusses the latest tools and methodology and concepts in the decentralised Internet of Things. Each chapter presents an in-depth investigation of the potential of blockchains in the Internet of Things, addressing the state-of-the-art in and future perspectives of the decentralised Internet of Things. Further, industry experts, researchers and academicians share their ideas and experiences relating to frontier technologies, breakthrough and innovative solutions and applications.
This volume is the second (II) of four under the main themes of Digitizing Agriculture and Information and Communication Technologies (ICT). The four volumes cover rapidly developing processes including Sensors (I), Data (II), Decision (III), and Actions (IV). Volumes are related to 'digital transformation" within agricultural production and provision systems, and in the context of Smart Farming Technology and Knowledge-based Agriculture. Content spans broadly from data mining and visualization to big data analytics and decision making, alongside with the sustainability aspects stemming from the digital transformation of farming. The four volumes comprise the outcome of the 12th EFITA Congress, also incorporating chapters that originated from select presentations of the Congress. The first part of this book (II) focuses on data technologies in relation to agriculture and presents three key points in data management, namely, data collection, data fusion, and their uses in machine learning and artificial intelligent technologies. Part 2 is devoted to the integration of these technologies in agricultural production processes by presenting specific applications in the domain. Part 3 examines the added value of data management within agricultural products value chain. The book provides an exceptional reference for those researching and working in or adjacent to agricultural production, including engineers in machine learning and AI, operations management, decision analysis, information analysis, to name just a few. Specific advances covered in the volume: Big data management from heterogenous sources Data mining within large data sets Data fusion and visualization IoT based management systems Data Knowledge Management for converting data into valuable information Metadata and data standards for expanding knowledge through different data platforms AI - based image processing for agricultural systems Data - based agricultural business Machine learning application in agricultural products value chain
This book constitutes the refereed proceedings of six International Workshops held as parallel events of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, virtually and in Hersonissos, Crete, Greece, in June 2021: the 6th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2021; Artificial Intelligence in Biomedical Engineering and Informatics Workshop, AI-BIO 2021; Workshop on Defense Applications of AI, DAAI 2021; Distributed AI for Resource-Constrained Platforms Workshop, DARE 2021; Energy Efficiency and Artificial Intelligence Workshop, EEAI 2021; and the 10th Mining Humanistic Data Workshop, MHDW 2021. The 24 full papers and 16 short papers presented at these workshops were carefully reviewed and selected from 72 submissions. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and AI in modern 5G-oriented telecommunications infrastructures. The papers chosen for AI-BIO 2021 present research on the subject of AI, in its broadest sense, in biomedical engineering and health informatics. The DAAI 2021 papers aim at presenting recent evolutions in artificial intelligence applicable to defense and security applications. The papers selected for DARE 2021 address a variety of pertinent and challenging topics within the scope of distributed AI for resource-constrained platforms. The papers presented at EEAI 2021 aim to bring together interdisciplinary approaches that focus on the application of AI-driven solutions for increasing and improving energy efficiency of residential and tertiary buildings and of occupant behavior. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series.
This book gathers state-of-the-art research contributions written by academics and researchers, which address emerging trends in system design and implementation for the Internet of Things (IoT), and discuss how to promote IoT technologies and applications. The book is chiefly intended for researchers and academics who want to get caught up with the latest trends in enabling technologies for IoT and related applications and services. However, it also includes chapters on the fundamentals of IoT, offering essential orientation for general readers.
Adhering to the combination of theoretical introduction and practical case introduction, this book summarizes the basic concepts and methods in management and big data analysis at home and abroad and introduces a large number of relevant practical cases, especially new cases in the Internet era, to help readers integrate theoretical knowledge into practical applications. The chapters of this book are interrelated and independent of each other, making it easy for the reader to study in pieces or to delve deeper into a particular topic of interest. Covering an array of theories about management and big data at home and abroad, this book lays a solid foundation for being an authentic manager. It is organized into sections on decision-making, organization, leadership, control, innovation, and big data to fully dissect and summarize the basic concepts of these characters in management and to show the basic methods that managers can use to solve problems. Each section contains a large number of examples to demonstrate how entrepreneurs successfully manage their large companies and overcome the difficulties in the business, utilizing the corresponding management functions or big data technology. Further, in order to adapt to the development of the Internet era, this book also absorbs a lot of practice cases of management innovation and big data which have emerged in recent years based on advanced network platform and big data analysis. This book puts great emphasis on the innovative function of management, adding more comprehensive methods and more updated cases related to the Internet.
The book brings together the contributions of the 7th International Conference on Smart Learning Ecosystems and Regional Development (SLERD 2022), which aims at promoting reflection and discussion concerning R&D work, policies, case studies, and entrepreneur experiences with a special focus on understanding the relevance of smart learning ecosystems (e.g., schools, campus, working places, informal learning contexts, etc.) for regional development and social innovation and how the effectiveness of the relation of citizens and smart ecosystems can be boosted. This forum has a special interest in understanding how technology mediated instruments can foster the citizen's engagement with learning ecosystems and territories, namely by understanding innovative human-centric design and development models/techniques, education/training practices, informal social learning, innovative citizen-driven policies, technology mediated experiences, and their impact. This set of concerns will contribute to foster the social innovation sectors and ICT and economic development and deployment strategies alongside new policies for smarter proactive citizens. |
You may like...
Expanding Horizon of Electroacoustic…
Simon Emmerson, Leigh Landy
Hardcover
R2,989
Discovery Miles 29 890
Handbook of Computational Social Science…
Uwe Engel, Anabel Quan-Haase, …
Hardcover
R10,943
Discovery Miles 109 430
|