語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced methodologies and technolog...
~
Khosrow-Pour, Mehdi, (1951-)
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics/ Mehdi Khosrow-Pour, D.B.A., editor.
其他作者:
Khosrow-Pour, Mehdi,
出版者:
Hershey, Pennsylvania :IGI Global, : [2019],
面頁冊數:
1 online resource (2 v.)
標題:
Computer network architectures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7598-6
ISBN:
9781522575993 (e-book)
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics
[electronic resource] /Mehdi Khosrow-Pour, D.B.A., editor. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (2 v.)
Includes bibliographical references and index.
Section 1. Big data. Chapter 1. Adapting big data ecosystem for landscape of real world applications ; Chapter 2. Big data analysis and mining ; Chapter 3. Big data analytics for tourism destinations ; Chapter 4. Big data time series stream data segmentation methods ; Chapter 5. Challenges for big data security and privacy ; Chapter 6. How visualisation and interaction can optimize the cognitive processes towards big data ; Chapter 7. Managing and visualizing unstructured big data ; Chapter 8. Mining big data and streams -- Section 2. Cloud computing. Chapter 9. Cloud computing ; Chapter 10. Cloud governance at the local communities ; Chapter 11. Clouds of quantum machines ; Chapter 12. Cyberinfrastructure, cloud computing, science gateways, visualization, and cyberinfrastructure ease of use ; Chapter 13. Fault tolerant cloud systems ; Chapter 14. Fault tolerant data management for cloud services ; Chapter 15. From information systems outsourcing to cloud computing ; Chapter 16. Improved checkpoint using the effective management of i/o in a cloud environment ; Chapter 17. Service quality and perceived value of cloud computing-based service encounters ; Chapter 18. Understanding business models on the cloud ; Chapter 19. Understanding cloud computing in a higher education context ; Chapter 20. Vertical integration between providers with possible cloud migration ; Chapter 21. Virtualization as the enabling technology of cloud computing -- Section 3. Data analysis and statistics. Chapter 22. Advanced recommender systems ; Chapter 23. Centrality analysis of the United States network graph ; Chapter 24. Context-aware approach for restaurant recommender systems ; Chapter 25. Data-centric benchmarking ; Chapter 26. Data linkage discovery applications ; Chapter 27. Exploratory data analysis on breast cancer prognosis ; Chapter 28. In-memory analytics ; Chapter 29. Innovative formalism for biological data analysis ; Chapter 30. Learning from imbalanced data ; Chapter 31. Neighborhood rough-sets-based spatial data analytics ; Chapter 32. The ontology of randomness ; Chapter 33. Order statistics and applications ; Chapter 34. Recommender technologies and emerging applications ; Chapter 35. Use of data analytics for program impact evaluation and enhancement of faculty/staff development -- Section 4. Data mining and databases. Chapter 36. Corporate disclosure measurement ; Chapter 37. Data mining and knowledge discovery in databases ; Chapter 38. Data mining and the KDD process ; Chapter 39. Data mining to identify project management strategies in learning environments ; Chapter 40. Database techniques for new hardware ; Chapter 41. Ensemble clustering data mining and databases ; Chapter 42. Graph-based concept discovery ; Chapter 43. Healthcare data analysis in the internet of things era ; Chapter 44. N-tuple algebra as a unifying system to process data and knowledge ; Chapter 45. A proposed framework for incorporating big-data technology in national crisis management center ; Chapter 46. Quality evaluation for evolving conceptual database design ; Chapter 47. Query languages for graph databases ; Chapter 48. Schema evolution in conventional and emerging databases ; Chapter 49. Schema versioning in conventional and emerging databases ; Chapter 50. Twitter data mining for situational awareness -- Section 5. High performance computing. Chapter 51. Cost evaluation of synchronization algorithms for multicore architectures ; Chapter 52. The future of high-performance computing (HPC) ; Chapter 53. High-performance reconfigurable computing -- Section 6. Mobile and wireless computing. Chapter 54. Biogeography-based optimization applied to wireless communications problems ; Chapter 55. BYOD (bring your own device), mobile technology providers, and its impacts on business/education and workplace/learning applications ; Chapter 56. Cell phone conversation and relative crash risk update ; Chapter 57. Comb filters characteristics and current applications ; Chapter 58. Consumer adoption of PC-based/mobile-based electronic word-of-mouth ; Chapter 59. Context-aware personalization for mobile services ; Chapter 60. Design of compensators for comb decimation filters ; Chapter 61. An empirical study of mobile/handheld app development using Android platforms ; Chapter 62. Enhancing the mobile user experience through colored contrasts ; Chapter 63. Ethical ambiguities in the privacy policies of mobile health and fitness applications ; Chapter 64. Exploring the growth of wireless communications systems and challenges facing 4g networks ; Chapter 65. Flying adhoc networks concept and challenges ; Chapter 66. Health wearables turn to fashion -- Volume II. Chapter 67. Human psychomotor performance under the exposure to mobile phones-like electromagnetic fields ; Chapter 68. Identification of wireless devices from their physical layer radio-frequency fingerprints ; Chapter 69. The impact of mobile phones on plastic surgery and burn management ; Chapter 70. The intersection of religion and mobile technology ; Chapter 71. Methods for simultaneous improvement of comb pass band and folding bands ; Chapter 72. Micro to macro social connectedness through mobile phone engagement ; Chapter 73. Mobile applications for automatic object recognition ; Chapter 74. Mobile apps threats ; Chapter 75. Mobile technologies impact on economic development in Sub-Saharan Africa ; Chapter 76. Mobile virtual reality to enhance subjective well-being ; Chapter 77. Novel methods to design low-complexity digital finite impulse response (FIR) filters ; Chapter 78. Open source ; Chapter 79. Power consumption in wireless access networks ; Chapter 80. Resource management for multimedia services in Long term evaluation networks ; Chapter 81. SMS and civil unrest ; Chapter 82. A Survey of people localization techniques utilizing mobile phones ; Chapter 83. Technological innovation and use in the early days of camera phone photo messaging ; Chapter 84. Viterbi decoder in hardware ; Chapter 85. Wireless implant communications using the human body -- Section 7. Networking and telecommunications. Chapter 86. Autonomic cooperative communications ; Chapter 87. Clique size and centrality metrics for analysis of real-world network graphs ; Chapter 88. Distributed methods for multi-sink wireless sensor networks formation ; Chapter 89. A graph-intersection-based algorithm to determine maximum lifetime communication topologies for cognitive radio ad hoc networks ; Chapter 90. Improving quality of business in next generation telecom networks ; Chapter 91. Information-centric networking ; Chapter 92. Interoperability frameworks for distributed systems ; Chapter 93. Neural networks and their accelerated evolution from an economic analysis perspective ; Chapter 94. Optimization of antenna arrays and microwave filters using differential evolution algorithms ; Chapter 95. Qos architectures for the IP network ; Chapter 96. Throughput dependence on SNR in IEEE802.11 WLAN systems -- Section 8. Systems and software engineering. Chapter 97. Adopting open source software in smartphone manufacturers' open innovation strategy ; Chapter 98. Assessing computer-aided design skills ; Chapter 99. The challenges of teaching and learning software programming to novice students ; Chapter 100. Developing a glossary for software projects ; Chapter 101. Displaying hidden information in glossaries ; Chapter 102. Dynamic situational adaptation of a requirements engineering process ; Chapter 103. A formal approach to the distributed software control for automated multi-axis manufacturing machines ; Chapter 104. Model-driven software modernization ; Chapter 105. Mutation testing applied to object-oriented languages ; Chapter 106. Object-oriented programming in computer science ; Chapter 107. The past, present, and future of UML ; Chapter 108. Petri nets identification techniques for automated modelling of discrete event processes ; Chapter 109.
Restricted to subscribers or individual electronic text purchasers.
"This book highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data"--Provided by publisher.
ISBN: 9781522575993 (e-book)Subjects--Topical Terms:
565372
Computer network architectures.
LC Class. No.: TK5105.52 / .A328 2019e
Dewey Class. No.: 004.6/167
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics
LDR
:11117nam a2200289 a 4500
001
947565
003
IGIG
005
20191025152632.0
006
m o d
007
cr cn
008
200604s2019 pau fob 001 0 eng d
010
$z
2018031660
020
$a
9781522575993 (e-book)
020
$a
9781522575986 (hardback)
035
$a
(OCoLC)1054430349
035
$a
1081021275
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
TK5105.52
$b
.A328 2019e
082
0 0
$a
004.6/167
$2
23
245
0 0
$a
Advanced methodologies and technologies in network architecture, mobile computing, and data analytics
$h
[electronic resource] /
$c
Mehdi Khosrow-Pour, D.B.A., editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (2 v.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Big data. Chapter 1. Adapting big data ecosystem for landscape of real world applications ; Chapter 2. Big data analysis and mining ; Chapter 3. Big data analytics for tourism destinations ; Chapter 4. Big data time series stream data segmentation methods ; Chapter 5. Challenges for big data security and privacy ; Chapter 6. How visualisation and interaction can optimize the cognitive processes towards big data ; Chapter 7. Managing and visualizing unstructured big data ; Chapter 8. Mining big data and streams -- Section 2. Cloud computing. Chapter 9. Cloud computing ; Chapter 10. Cloud governance at the local communities ; Chapter 11. Clouds of quantum machines ; Chapter 12. Cyberinfrastructure, cloud computing, science gateways, visualization, and cyberinfrastructure ease of use ; Chapter 13. Fault tolerant cloud systems ; Chapter 14. Fault tolerant data management for cloud services ; Chapter 15. From information systems outsourcing to cloud computing ; Chapter 16. Improved checkpoint using the effective management of i/o in a cloud environment ; Chapter 17. Service quality and perceived value of cloud computing-based service encounters ; Chapter 18. Understanding business models on the cloud ; Chapter 19. Understanding cloud computing in a higher education context ; Chapter 20. Vertical integration between providers with possible cloud migration ; Chapter 21. Virtualization as the enabling technology of cloud computing -- Section 3. Data analysis and statistics. Chapter 22. Advanced recommender systems ; Chapter 23. Centrality analysis of the United States network graph ; Chapter 24. Context-aware approach for restaurant recommender systems ; Chapter 25. Data-centric benchmarking ; Chapter 26. Data linkage discovery applications ; Chapter 27. Exploratory data analysis on breast cancer prognosis ; Chapter 28. In-memory analytics ; Chapter 29. Innovative formalism for biological data analysis ; Chapter 30. Learning from imbalanced data ; Chapter 31. Neighborhood rough-sets-based spatial data analytics ; Chapter 32. The ontology of randomness ; Chapter 33. Order statistics and applications ; Chapter 34. Recommender technologies and emerging applications ; Chapter 35. Use of data analytics for program impact evaluation and enhancement of faculty/staff development -- Section 4. Data mining and databases. Chapter 36. Corporate disclosure measurement ; Chapter 37. Data mining and knowledge discovery in databases ; Chapter 38. Data mining and the KDD process ; Chapter 39. Data mining to identify project management strategies in learning environments ; Chapter 40. Database techniques for new hardware ; Chapter 41. Ensemble clustering data mining and databases ; Chapter 42. Graph-based concept discovery ; Chapter 43. Healthcare data analysis in the internet of things era ; Chapter 44. N-tuple algebra as a unifying system to process data and knowledge ; Chapter 45. A proposed framework for incorporating big-data technology in national crisis management center ; Chapter 46. Quality evaluation for evolving conceptual database design ; Chapter 47. Query languages for graph databases ; Chapter 48. Schema evolution in conventional and emerging databases ; Chapter 49. Schema versioning in conventional and emerging databases ; Chapter 50. Twitter data mining for situational awareness -- Section 5. High performance computing. Chapter 51. Cost evaluation of synchronization algorithms for multicore architectures ; Chapter 52. The future of high-performance computing (HPC) ; Chapter 53. High-performance reconfigurable computing -- Section 6. Mobile and wireless computing. Chapter 54. Biogeography-based optimization applied to wireless communications problems ; Chapter 55. BYOD (bring your own device), mobile technology providers, and its impacts on business/education and workplace/learning applications ; Chapter 56. Cell phone conversation and relative crash risk update ; Chapter 57. Comb filters characteristics and current applications ; Chapter 58. Consumer adoption of PC-based/mobile-based electronic word-of-mouth ; Chapter 59. Context-aware personalization for mobile services ; Chapter 60. Design of compensators for comb decimation filters ; Chapter 61. An empirical study of mobile/handheld app development using Android platforms ; Chapter 62. Enhancing the mobile user experience through colored contrasts ; Chapter 63. Ethical ambiguities in the privacy policies of mobile health and fitness applications ; Chapter 64. Exploring the growth of wireless communications systems and challenges facing 4g networks ; Chapter 65. Flying adhoc networks concept and challenges ; Chapter 66. Health wearables turn to fashion -- Volume II. Chapter 67. Human psychomotor performance under the exposure to mobile phones-like electromagnetic fields ; Chapter 68. Identification of wireless devices from their physical layer radio-frequency fingerprints ; Chapter 69. The impact of mobile phones on plastic surgery and burn management ; Chapter 70. The intersection of religion and mobile technology ; Chapter 71. Methods for simultaneous improvement of comb pass band and folding bands ; Chapter 72. Micro to macro social connectedness through mobile phone engagement ; Chapter 73. Mobile applications for automatic object recognition ; Chapter 74. Mobile apps threats ; Chapter 75. Mobile technologies impact on economic development in Sub-Saharan Africa ; Chapter 76. Mobile virtual reality to enhance subjective well-being ; Chapter 77. Novel methods to design low-complexity digital finite impulse response (FIR) filters ; Chapter 78. Open source ; Chapter 79. Power consumption in wireless access networks ; Chapter 80. Resource management for multimedia services in Long term evaluation networks ; Chapter 81. SMS and civil unrest ; Chapter 82. A Survey of people localization techniques utilizing mobile phones ; Chapter 83. Technological innovation and use in the early days of camera phone photo messaging ; Chapter 84. Viterbi decoder in hardware ; Chapter 85. Wireless implant communications using the human body -- Section 7. Networking and telecommunications. Chapter 86. Autonomic cooperative communications ; Chapter 87. Clique size and centrality metrics for analysis of real-world network graphs ; Chapter 88. Distributed methods for multi-sink wireless sensor networks formation ; Chapter 89. A graph-intersection-based algorithm to determine maximum lifetime communication topologies for cognitive radio ad hoc networks ; Chapter 90. Improving quality of business in next generation telecom networks ; Chapter 91. Information-centric networking ; Chapter 92. Interoperability frameworks for distributed systems ; Chapter 93. Neural networks and their accelerated evolution from an economic analysis perspective ; Chapter 94. Optimization of antenna arrays and microwave filters using differential evolution algorithms ; Chapter 95. Qos architectures for the IP network ; Chapter 96. Throughput dependence on SNR in IEEE802.11 WLAN systems -- Section 8. Systems and software engineering. Chapter 97. Adopting open source software in smartphone manufacturers' open innovation strategy ; Chapter 98. Assessing computer-aided design skills ; Chapter 99. The challenges of teaching and learning software programming to novice students ; Chapter 100. Developing a glossary for software projects ; Chapter 101. Displaying hidden information in glossaries ; Chapter 102. Dynamic situational adaptation of a requirements engineering process ; Chapter 103. A formal approach to the distributed software control for automated multi-axis manufacturing machines ; Chapter 104. Model-driven software modernization ; Chapter 105. Mutation testing applied to object-oriented languages ; Chapter 106. Object-oriented programming in computer science ; Chapter 107. The past, present, and future of UML ; Chapter 108. Petri nets identification techniques for automated modelling of discrete event processes ; Chapter 109.
505
0
$a
Research and development on software testing techniques and tools ; Chapter 110. The role of feedback in software process assessment ; Chapter 111. Secure software development of cyber-physical and IoT systems ; Chapter 112. Software literacy ; Chapter 113. Software process improvement for web-based projects comparative view ; Chapter 114. A study of contemporary system performance testing framework ; Chapter 115. A tale of two agile requirements engineering practices ; Chapter 116. Towards an understanding of performance, reliability, and security ; Chapter 117. Understanding user experience ; Chapter 118. The what, how, and when of formal methods -- Section 9. Theoretical computer science. Chapter 119. Efficient optimization using metaheuristics ; Chapter 120. An essay on denotational mathematics ; Chapter 121. Quantum computing and quantum communication ; Chapter 122. Sleptsov net computing -- Section 10. Web technologies. Chapter 123. Anger and internet in Japan ; Chapter 124. Determine democracy in web design ; Chapter 125. Discussion processes in online forums ; Chapter 126. The economics of internetization ; Chapter 127. An efficient and effective index structure for query evaluation in search engines ; Chapter 128. Improving usability of website design using W3C guidelines ; Chapter 129. Internet phenomenon ; Chapter 130. An overview of crowdsourcing ; Chapter 131. Revisiting web 2.0 ; Chapter 132. Search engine optimization ; Chapter 133. Toward trustworthy web services coordination ; Chapter 134. Usability of Captcha in online communities and its link to user satisfaction ; Chapter 135. Visual identity design for responsive web ; Chapter 136. Web site mobilization techniques ; Chapter 137. What accounts for the differences in internet diffusion rates around the world?.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book highlights the challenges associated with creating a strong network architecture in a perpetually online society. Readers will learn various methods in building a seamless mobile computing option and the most effective means of analyzing big data"--Provided by publisher.
650
0
$a
Computer network architectures.
$3
565372
650
0
$a
Mobile computing.
$3
562918
650
0
$a
Big data.
$3
981821
700
1
$a
Khosrow-Pour, Mehdi,
$d
1951-
$e
editor.
$3
1057202
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7598-6
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入
第一次登入時,112年前入學、到職者,密碼請使用身分證號登入;112年後入學、到職者,密碼請使用身分證號"後六碼"登入,請注意帳號密碼有區分大小寫!
帳號(學號)
密碼
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)