Advanced methodologies and technolog...
Khosrow-Pour, Mehdi, (1951-)

 

  • Advanced methodologies and technologies in network architecture, mobile computing, and data analytics [electronic resource] /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    杜威分類號: 004.6/167
    書名/作者: Advanced methodologies and technologies in network architecture, mobile computing, and data analytics/ Mehdi Khosrow-Pour, D.B.A., editor.
    其他作者: Khosrow-Pour, Mehdi,
    出版者: Hershey, Pennsylvania : : IGI Global,, [2019]
    面頁冊數: 1 online resource (2 v.)
    標題: Computer network architectures.
    標題: Mobile computing.
    標題: Big data.
    ISBN: 9781522575993 (e-book)
    ISBN: 9781522575986 (hardback)
    書目註: Includes bibliographical references and index.
    內容註: Section 1. Big data. Chapter 1. Adapting big data ecosystem for landscape of real world applications ; Chapter 2. Big data analysis and mining ; Chapter 3. Big data analytics for tourism destinations ; Chapter 4. Big data time series stream data segmentation methods ; Chapter 5. Challenges for big data security and privacy ; Chapter 6. How visualisation and interaction can optimize the cognitive processes towards big data ; Chapter 7. Managing and visualizing unstructured big data ; Chapter 8. Mining big data and streams -- Section 2. Cloud computing. Chapter 9. Cloud computing ; Chapter 10. Cloud governance at the local communities ; Chapter 11. Clouds of quantum machines ; Chapter 12. Cyberinfrastructure, cloud computing, science gateways, visualization, and cyberinfrastructure ease of use ; Chapter 13. Fault tolerant cloud systems ; Chapter 14. Fault tolerant data management for cloud services ; Chapter 15. From information systems outsourcing to cloud computing ; Chapter 16. Improved checkpoint using the effective management of i/o in a cloud environment ; Chapter 17. Service quality and perceived value of cloud computing-based service encounters ; Chapter 18. Understanding business models on the cloud ; Chapter 19. Understanding cloud computing in a higher education context ; Chapter 20. Vertical integration between providers with possible cloud migration ; Chapter 21. Virtualization as the enabling technology of cloud computing -- Section 3. Data analysis and statistics. Chapter 22. Advanced recommender systems ; Chapter 23. Centrality analysis of the United States network graph ; Chapter 24. Context-aware approach for restaurant recommender systems ; Chapter 25. Data-centric benchmarking ; Chapter 26. Data linkage discovery applications ; Chapter 27. Exploratory data analysis on breast cancer prognosis ; Chapter 28. In-memory analytics ; Chapter 29. Innovative formalism for biological data analysis ; Chapter 30. Learning from imbalanced data ; Chapter 31. Neighborhood rough-sets-based spatial data analytics ; Chapter 32. The ontology of randomness ; Chapter 33. Order statistics and applications ; Chapter 34. Recommender technologies and emerging applications ; Chapter 35. Use of data analytics for program impact evaluation and enhancement of faculty/staff development -- Section 4. Data mining and databases. Chapter 36. Corporate disclosure measurement ; Chapter 37. Data mining and knowledge discovery in databases ; Chapter 38. Data mining and the KDD process ; Chapter 39. Data mining to identify project management strategies in learning environments ; Chapter 40. Database techniques for new hardware ; Chapter 41. Ensemble clustering data mining and databases ; Chapter 42. Graph-based concept discovery ; Chapter 43. Healthcare data analysis in the internet of things era ; Chapter 44. N-tuple algebra as a unifying system to process data and knowledge ; Chapter 45. A proposed framework for incorporating big-data technology in national crisis management center ; Chapter 46. Quality evaluation for evolving conceptual database design ; Chapter 47. Query languages for graph databases ; Chapter 48. Schema evolution in conventional and emerging databases ; Chapter 49. Schema versioning in conventional and emerging databases ; Chapter 50. Twitter data mining for situational awareness -- Section 5. High performance computing. Chapter 51. Cost evaluation of synchronization algorithms for multicore architectures ; Chapter 52. The future of high-performance computing (HPC) ; Chapter 53. High-performance reconfigurable computing -- Section 6. Mobile and wireless computing. Chapter 54. Biogeography-based optimization applied to wireless communications problems ; Chapter 55. BYOD (bring your own device), mobile technology providers, and its impacts on business/education and workplace/learning applications ; Chapter 56. Cell phone conversation and relative crash risk update ; Chapter 57. Comb filters characteristics and current applications ; Chapter 58. Consumer adoption of PC-based/mobile-based electronic word-of-mouth ; Chapter 59. Context-aware personalization for mobile services ; Chapter 60. Design of compensators for comb decimation filters ; Chapter 61. An empirical study of mobile/handheld app development using Android platforms ; Chapter 62. Enhancing the mobile user experience through colored contrasts ; Chapter 63. Ethical ambiguities in the privacy policies of mobile health and fitness applications ; Chapter 64. Exploring the growth of wireless communications systems and challenges facing 4g networks ; Chapter 65. Flying adhoc networks concept and challenges ; Chapter 66. Health wearables turn to fashion -- Volume II. Chapter 67. Human psychomotor performance under the exposure to mobile phones-like electromagnetic fields ; Chapter 68. Identification of wireless devices from their physical layer radio-frequency fingerprints ; Chapter 69. The impact of mobile phones on plastic surgery and burn management ; Chapter 70. The intersection of religion and mobile technology ; Chapter 71. Methods for simultaneous improvement of comb pass band and folding bands ; Chapter 72. Micro to macro social connectedness through mobile phone engagement ; Chapter 73. Mobile applications for automatic object recognition ; Chapter 74. Mobile apps threats ; Chapter 75. Mobile technologies impact on economic development in Sub-Saharan Africa ; Chapter 76. Mobile virtual reality to enhance subjective well-being ; Chapter 77. Novel methods to design low-complexity digital finite impulse response (FIR) filters ; Chapter 78. Open source ; Chapter 79. Power consumption in wireless access networks ; Chapter 80. Resource management for multimedia services in Long term evaluation networks ; Chapter 81. SMS and civil unrest ; Chapter 82. A Survey of people localization techniques utilizing mobile phones ; Chapter 83. Technological innovation and use in the early days of camera phone photo messaging ; Chapter 84. Viterbi decoder in hardware ; Chapter 85. Wireless implant communications using the human body -- Section 7. Networking and telecommunications. Chapter 86. Autonomic cooperative communications ; Chapter 87. Clique size and centrality metrics for analysis of real-world network graphs ; Chapter 88. Distributed methods for multi-sink wireless sensor networks formation ; Chapter 89. A graph-intersection-based algorithm to determine maximum lifetime communication topologies for cognitive radio ad hoc networks ; Chapter 90. Improving quality of business in next generation telecom networks ; Chapter 91. Information-centric networking ; Chapter 92. Interoperability frameworks for distributed systems ; Chapter 93. Neural networks and their accelerated evolution from an economic analysis perspective ; Chapter 94. Optimization of antenna arrays and microwave filters using differential evolution algorithms ; Chapter 95. Qos architectures for the IP network ; Chapter 96. Throughput dependence on SNR in IEEE802.11 WLAN systems -- Section 8. Systems and software engineering. Chapter 97. Adopting open source software in smartphone manufacturers' open innovation strategy ; Chapter 98. Assessing computer-aided design skills ; Chapter 99. The challenges of teaching and learning software programming to novice students ; Chapter 100. Developing a glossary for software projects ; Chapter 101. Displaying hidden information in glossaries ; Chapter 102. Dynamic situational adaptation of a requirements engineering process ; Chapter 103. A formal approach to the distributed software control for automated multi-axis manufacturing machines ; Chapter 104. Model-driven software modernization ; Chapter 105. Mutation testing applied to object-oriented languages ; Chapter 106. Object-oriented programming in computer science ; Chapter 107. The past, present, and future of UML ; Chapter 108. Petri nets identification techniques for automated modelling of discrete event processes ; Chapter 109.
    摘要、提要註: "This book highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data"--Provided by publisher.
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7598-6
Export
取書館別
 
 
變更密碼
登入