Data-Enabled Engineering - Böcker
Visar alla böcker i serien Data-Enabled Engineering. Handla med fri frakt och snabb leverans.
10 produkter
10 produkter
Social Media Analytics for User Behavior Modeling
A Task Heterogeneity Perspective
Inbunden, Engelska, 2020
1 748 kr
Skickas inom 10-15 vardagar
Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards.The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community.In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysisSocial Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.
731 kr
Skickas inom 10-15 vardagar
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network.The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security
1 804 kr
Skickas inom 10-15 vardagar
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network.The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/.Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security
2 426 kr
Skickas inom 10-15 vardagar
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications
733 kr
Skickas inom 10-15 vardagar
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications
Social Media Analytics for User Behavior Modeling
A Task Heterogeneity Perspective
Häftad, Engelska, 2021
733 kr
Skickas inom 10-15 vardagar
Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards.The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community.In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.
915 kr
Skickas inom 10-15 vardagar
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity–relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components.The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don’t have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.
1 105 kr
Skickas inom 10-15 vardagar
This book covers the fundamentals in designing and deploying techniques using deep architectures. It is intended to serve as a beginner's guide to engineers or students who want to have a quick start on learning and/or building deep learning systems. This book provides a good theoretical and practical understanding and a complete toolkit of basic information and knowledge required to understand and build convolutional neural networks (CNN) from scratch. The book focuses explicitly on convolutional neural networks, filtering out other material that co-occur in many deep learning books on CNN topics.
2 426 kr
Skickas inom 10-15 vardagar
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity–relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components.The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don’t have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.
2 356 kr
Skickas inom 10-15 vardagar
This book covers the fundamentals in designing and deploying techniques using deep architectures. It is intended to serve as a beginner's guide to engineers or students who want to have a quick start on learning and/or building deep learning systems. This book provides a good theoretical and practical understanding and a complete toolkit of basic information and knowledge required to understand and build convolutional neural networks (CNN) from scratch. The book focuses explicitly on convolutional neural networks, filtering out other material that co-occur in many deep learning books on CNN topics.