|
|
Books > Computing & IT > Internet
Service Design is an eminently practical guide to designing
services that work for people. It offers powerful insights,
methods, and case studies to help you design, implement, and
measure multichannel service experiences with greater impact for
customers, businesses, and society.
The massive volume of data that some medical and biological
applications generate require special processing resources that
guarantee privacy and security, creating a crucial need for cluster
and grid computing. Biomedical Diagnostics and Clinical
Technologies: Applying High-Performance Cluster and Grid Computing
disseminates knowledge regarding high performance computing for
medical applications and bioinformatics. Containing a defining body
of research on the subject, this critical reference source includes
a valuable collection of cutting-edge research chapters for those
working in the broad field of medical informatics and
bioinformatics.
Tired of writing all your user IDs and passwords on sticky notes
and pieces of scrap paper? This convenient address book stores them
all in one place. This is not your typical address book There are
also special sections for online banking info and one for storing
e-mail addresses.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman,
visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management
systems.
* Covers XML component architecture, data engineering, frameworks,
metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML
technologies in the context of organizational data management and
integration.
Smart homes, smart cities, and wearable technologies are the
growing applications of the internet of things (IoT). Ranging from
healthcare tracking applications to smart watches and smart bands
for personal safety, the IoT has turned out to be one of the most
indispensable parts of our lives even as it is becoming more
interconnected to better serve people. With the exponential growth
of the IoT and its applications, building the next-generation smart
world becomes much more feasible. The IoT and the Net Revolutions
Automating the World covers a spectrum of intelligent applications
of the IoT in parking, traffic management, waste management,
lighting, air pollution controlling, healthcare, weather tracking,
retail, and other areas calling for automation. Highlighting a wide
range of topics such as e-commerce, security management, and web
infrastructure, this book is ideal for academicians, students,
researchers, industry professionals, IT consultants, engineers, and
scientists.
Medical internet of things (IoT)-based applications are being
utilized in several industries and have been shown to provide
significant advantages to users in critical health applications.
Artificial intelligence (AI) plays a key role in the growth and
success of medical IoT applications and IoT devices in the medical
sector. To enhance revenue, improve competitive advantage, and
increase consumer engagement, the use of AI with medical IoT should
be encouraged in the healthcare and medical arena. Revolutionizing
Healthcare Through Artificial Intelligence and Internet of Things
Applications provides greater knowledge of how AI affects
healthcare and medical efficacy in order to improve outputs. It
focuses on a thorough and comprehensive introduction to machine
learning. Covering topics such as patient treatment, cyber-physical
systems, and telemedicine, this premier reference source is a
dynamic resource for hospital administrators, medical
professionals, government officials, students and faculty of higher
education, librarians, researchers, and academicians.
Fog computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Fog Computing: Breakthroughs in
Research and Practice contains a compendium of the latest academic
material on the evolving theory and practice related to fog
computing. Including innovative studies on distributed fog
computing environments, programming models, and access control
mechanisms, this publication is an ideal source for programmers, IT
professionals, students, researchers, and engineers.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
This title focuses on electronic learning communities created
through the development and use of the Internet for instruction and
training. Chapters focus on philosophies, background, reviews,
technologies, systems, tools, services, strategies, development,
implementation and research.
Geared towards technical professionals, marketing managers,
finance/business strategists, law/policy makers, and educators
whose work involves e-commerce, this unique book provides a clear
overview of the legal and public policy issues associated with
computer networks and electronic transaction and security. It
identifies various forms of potential legal and commercial
liability, and advises what legal claims may be raised, by whom,
and the potential impact of these claims. Methods to reduce or
eliminate liability are discussed, offering practical, operational
guidance to professionals. The book also describes the legal rights
of computer system and electronic commerce operators that can be
applied to help preserve security and to recover in the event that
security is breached.
|
|