|
|
Books > Computing & IT > Internet
Social media platforms have emerged as an influential and popular
tool in the digital era. No longer limited to just personal use,
the applications of social media have expanded in recent years into
the business realm. Analyzing the Strategic Role of Social
Networking in Firm Growth and Productivity examines the role of
social media technology in organizational settings to promote
business development and growth. Highlighting a range of relevant
discussions from the public and private sectors, this book is a
pivotal reference source for professionals, researchers,
upper-level students, and academicians.
Too often the suggestion of using games and virtual environments in
an educational setting is met with skepticism and objections. Many
traditionally-oriented educators are simply not aware of the
benefits that come from implementing digital games into an
instructional environment. Serious Games and Virtual Worlds in
Education, Professional Development, and Healthcare seeks to
counter these doubts by explaining how digital environments can
easily become familiar and beneficial for educational and
professional development. Highlighting techniques beyond the
traditional practice, this reference source is useful for
researchers, academics, professionals, and students interested in
the benefits to implementing these games into various aspects of
our environment.
Algorithmic recommender systems, deployed by media companies to
suggest content based on users' viewing histories, have inspired
hopes for personalized, curated media but also dire warnings of
filter bubbles and media homogeneity. Curiously, both proponents
and detractors assume that recommender systems for choosing films
and series are novel, effective, and widely used. Scrutinizing the
world's most subscribed streaming service, Netflix, this book
challenges that consensus. Investigating real-life users, marketing
rhetoric, technical processes, business models, and historical
antecedents, Mattias Frey demonstrates that these choice aids are
neither as revolutionary nor as alarming as their celebrants and
critics maintain-and neither as trusted nor as widely used. Netflix
Recommends brings to light the constellations of sources that real
viewers use to choose films and series in the digital age and
argues that although some lament AI's hostile takeover of
humanistic cultures, the thirst for filters, curators, and critics
is stronger than ever.
This book has a focus on the development and deployment of the
Industrial Internet of Things (IIoT) paradigm, discussing
frameworks, methodologies, benefits and limitations, as well as
providing case studies of employing the IoT vision in the
industrial domain. IIoT is becoming an attractive business reality
for many organisations such as manufacturing, logistics, oil and
gas, energy and other utilities, mining, aviation, and many more.
The opportunities for this paradigm are huge, and according to one
report, the IIoT market is predicted to reach $125 billion by 2021.
The driving philosophy behind the IIoT is that smart machines are
better than humans at accurately capturing, analysing and
communicating real-time data. The underlying technologies include
distributed computing, machine learning, artificial intelligence,
and machine-to-machine communication, with a typical IIoT system
consisting of intelligent systems (applications, controllers,
sensors, and security mechanisms), data communication
infrastructure (cloud computing, edge computing, etc.), data
analytics (to support business intelligence and corporate decision
making), and most importantly the human element. The promised
benefits of the IIoT include enhanced safety, better reliability,
smart metering, inventory management, equipment tracking, and
facilities management. There are, however, numerous issues that are
also becoming the focus of active research, such as concerns
regarding service availability, data security, and device
communication. Lack of ubiquitous interoperability between
heterogeneous devices is also a major concern. This book intends to
fill a gap in the IIoT literature by providing the scientific
contributions and latest developments from researchers and
practitioners of international repute, focusing on frameworks,
methodologies, benefits, and inherent issues/barriers to connected
environments, especially in industrial settings. The intended
audience includes network specialists, hardware engineers, and
security experts who wish to adopt newer approaches for device
connectivity, IoT security, and sensor-based devices design.
University level students, researchers and practitioners will also
find the latest innovation in technology and newer approaches
relevant to the IIoT from a distributed computing perspective.
Over one million people write political blogs, yet a select few
wield enormous power within the political blogosphere and over
politics in general. Known as the "political blogging A-list",
these bloggers command the majority of blogging traffic; set the
agenda for the rest of the political blogosphere; and have a strong
influence on politics, whether it is directly through blogging, or
indirectly through influencing mainstream news media. In Making it
in the Political Blogosphere, Tanni Haas profiles and interviews
twenty of the world's top political bloggers, who share the secrets
of their success. Despite the partisan nature of blogging, in which
Liberals, Conservatives and Libertarians share the same space, the
twenty bloggers are in surprising agreement about what makes a
successful blogger. In securing access to the political blogging
A-list, Haas has provided us with an entertaining sequence of
interviews, which are invaluable to any aspiring political blogger.
A groundbreaking, flexible approach to computer science anddata
science The Deitels' Introduction to Python for ComputerScience and
Data Science: Learning to Program with AI, Big Data and the
Cloudoffers a unique approach to teaching introductory Python
programming,appropriate for both computer-science and data-science
audiences. Providing themost current coverage of topics and
applications, the book is paired withextensive traditional
supplements as well as Jupyter Notebooks supplements.Real-world
datasets and artificial-intelligence technologies allow students
towork on projects making a difference in business, industry,
government andacademia. Hundreds of examples, exercises, projects
(EEPs) and implementationcase studies give students an engaging,
challenging and entertainingintroduction to Python programming and
hands-on data science. The book's modular architecture enables
instructors toconveniently adapt the text to a wide range of
computer-science anddata-science courses offered to audiences drawn
from many majors.Computer-science instructors can integrate as much
or as little data-scienceand artificial-intelligence topics as
they'd like, and data-science instructorscan integrate as much or
as little Python as they'd like. The book aligns withthe latest
ACM/IEEE CS-and-related computing curriculum initiatives and
withthe Data Science Undergraduate Curriculum Proposal sponsored by
the NationalScience Foundation.
XML has become the lingua franca for representing business data,
for exchanging information between business partners and
applications, and for adding structure
and sometimes meaning to text-based documents. XML offers some
special challenges and opportunities in the area of search:
querying XML can produce very precise, fine-grained results, if you
know how to express and execute those queries.
For software developers and systems architects: this book teaches
the most useful approaches to querying XML documents and
repositories. This book will also help managers and project leaders
grasp how querying XML fits into the larger context of querying and
XML. Querying XML provides a comprehensive background from
fundamental concepts (What is XML?) to data models (the Infoset,
PSVI, XQuery Data Model), to APIs (querying XML from SQL or Java)
and more.
* Presents the concepts clearly, and demonstrates them with
illustrations and examples; offers a thorough mastery of the
subject area in a single book.
* Provides comprehensive coverage of XML query languages, and the
concepts needed to understand them completely (such as the XQuery
Data Model).
* Shows how to query XML documents and data using: XPath (the XML
Path Language); XQuery, soon to be the new W3C Recommendation for
querying XML; XQuery's companion XQueryX; and SQL, featuring the
SQL/XML
* Includes an extensive set of XQuery, XPath, SQL, Java, and other
examples, with links to downloadable code and data samples."
Service Design is an eminently practical guide to designing
services that work for people. It offers powerful insights,
methods, and case studies to help you design, implement, and
measure multichannel service experiences with greater impact for
customers, businesses, and society.
The massive volume of data that some medical and biological
applications generate require special processing resources that
guarantee privacy and security, creating a crucial need for cluster
and grid computing. Biomedical Diagnostics and Clinical
Technologies: Applying High-Performance Cluster and Grid Computing
disseminates knowledge regarding high performance computing for
medical applications and bioinformatics. Containing a defining body
of research on the subject, this critical reference source includes
a valuable collection of cutting-edge research chapters for those
working in the broad field of medical informatics and
bioinformatics.
Tired of writing all your user IDs and passwords on sticky notes
and pieces of scrap paper? This convenient address book stores them
all in one place. This is not your typical address book There are
also special sections for online banking info and one for storing
e-mail addresses.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman,
visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management
systems.
* Covers XML component architecture, data engineering, frameworks,
metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML
technologies in the context of organizational data management and
integration.
Smart homes, smart cities, and wearable technologies are the
growing applications of the internet of things (IoT). Ranging from
healthcare tracking applications to smart watches and smart bands
for personal safety, the IoT has turned out to be one of the most
indispensable parts of our lives even as it is becoming more
interconnected to better serve people. With the exponential growth
of the IoT and its applications, building the next-generation smart
world becomes much more feasible. The IoT and the Net Revolutions
Automating the World covers a spectrum of intelligent applications
of the IoT in parking, traffic management, waste management,
lighting, air pollution controlling, healthcare, weather tracking,
retail, and other areas calling for automation. Highlighting a wide
range of topics such as e-commerce, security management, and web
infrastructure, this book is ideal for academicians, students,
researchers, industry professionals, IT consultants, engineers, and
scientists.
Fog computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Fog Computing: Breakthroughs in
Research and Practice contains a compendium of the latest academic
material on the evolving theory and practice related to fog
computing. Including innovative studies on distributed fog
computing environments, programming models, and access control
mechanisms, this publication is an ideal source for programmers, IT
professionals, students, researchers, and engineers.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
|
|