Showing 6,981 - 7,000 results of 7,100 for search '"big data"', query time: 0.22s Refine Results
  1. 6981
  2. 6982

    CYBER SECURITY FOR NEXT-GENERATION COMPUTING TECHNOLOGIES

    Published 2024
    Full text (WIT users only)
    Electronic eBook
  3. 6983

    Computational methods for next generation sequencing data analysis / edited by Ion Măndoiu, Alexander Zelikovsky.

    Published 2016
    Table of Contents: “…Hallam 2.1 Introduction & Overview 2.2 Background 2.3 MetaPathways Processes 2.3.1 Open Reading Frame (ORF) Prediction 2.3.2 Functional Annotation 2.3.3 Analysis Modules 2.3.4 ePGDB construction 2.4 Big Data Processing 2.4.1 A Master-worker model for grid distribution 2.4.2 GUI and Data Integration 2.5 Downstream Analyses 2.5.1 Large Table Comparisons 2.5.2 Pathway Tools Cellular Overview 2.5.3 R Statistics 2.5.4 VennDiagram 2.5.5 Clustering and Relating Samples by Pathways 2.5.6 Faceting Variables with ggplot2 2.6 Conclusions References 3 Pooling Strategy for Massive Viral Sequencing; Pavel Skums, Alexander Artyomenko, Olga Glebova, Sumathi Ramachandran, David S. …”
    Full text (Wentworth users only)
    Electronic eBook
  4. 6984

    Statistics for Data Science. by Miller, James D.

    Published 2017
    Table of Contents: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Transitioning from Data Developer to Data Scientist -- Data developer thinking -- Objectives of a data developer -- Querying or mining -- Data quality or data cleansing -- Data modeling -- Issue or insights -- Thought process -- Developer versus scientist -- New data, new source -- Quality questions -- Querying and mining -- Performance -- Financial reporting -- Visualizing -- Tools of the trade -- Advantages of thinking like a data scientist -- Developing a better approach to understanding data -- Using statistical thinking during program or database designing -- Adding to your personal toolbox -- Increased marketability -- Perpetual learning -- Seeing the future -- Transitioning to a data scientist -- Let's move ahead -- Summary -- Chapter 2: Declaring the Objectives -- Key objectives of data science -- Collecting data -- Processing data -- Exploring and visualizing data -- Analyzing the data and/or applying machine learning to the data -- Deciding (or planning) based upon acquired insight -- Thinking like a data scientist -- Bringing statistics into data science -- Common terminology -- Statistical population -- Probability -- False positives -- Statistical inference -- Regression -- Fitting -- Categorical data -- Classification -- Clustering -- Statistical comparison -- Coding -- Distributions -- Data mining -- Decision trees -- Machine learning -- Munging and wrangling -- Visualization -- D3 -- Regularization -- Assessment -- Cross-validation -- Neural networks -- Boosting -- Lift -- Mode -- Outlier -- Predictive modeling -- Big Data -- Confidence interval -- Writing -- Summary -- Chapter 3: A Developer's Approach to Data Cleaning -- Understanding basic data cleaning.…”
    Full text (Wentworth users only)
    Electronic eBook
  5. 6985

    Privacy Rights in the Digital Age / editors, Jane E. Kirtley, Michael Shally-Jensen.

    Published 2019
    Table of Contents: “…., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border security, immigration reform, and privacy -- Bots -- Boundless informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. …”
    Full text (Wentworth users only)
    Electronic eBook
  6. 6986

    Connect : how to use data and experience marketing to create lifetime customers / Lars Birkholm Petersen, Ron Person, Christopher Nash. by Petersen, Lars Birkholm

    Published 2014
    Table of Contents: “…-- Notes -- Chapter 11 Stage 7-Lifetime Customers -- The Lifetime Customers Stage -- Objectives -- Amazon.com, an Example of Stage 7 Maturity -- Benefits of Lifetime Customers -- Benefits to Your Customers -- Benefits to Your Organization -- What You Need to Do to Capture Lifetime Customers -- How to Approach Marketing for Lifetime Customers -- Identifying Processes Critical to Engaging Lifetime Customers -- Cross-Channel Marketing Portfolios -- Data-Driven Marketing and Big Data -- Personalize All Touch Points -- Automatic Recommendations to Optimize Marketing and Forecasting -- Breaking Barriers -- Maintaining Lifetime Customers -- People -- Process -- Technology.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 6987

    Perspectives in Dynamical Systems I — Applications DSTA, Łódź, Poland, December 6–9, 2021 / edited by Jan Awrejcewicz.

    Published 2024
    Table of Contents: “….) -- Nonlinear Dynamics, Stability and Control Strategies: Mathematical Modeling on the Big Data Analyses of Covid-19 in Poland (Batyuk, L., Kizilova,N.) -- Energy Pulse: Competitive and Accessible Application for Monitoring Electricity Consumption (Berciu, A. …”
    Full text (Wentworth users only)
    Electronic eBook
  8. 6988
  9. 6989

    MODERN TECHNOLOGIES AND TOOLS SUPPORTING THE DEVELOPMENT OF INDUSTRY 5.0

    Published 2024
    Full text (Wentworth users only)
    Electronic eBook
  10. 6990
  11. 6991

    Internet of things security : principles, applications, attacks, and countermeasures. by Gupta, Brij, 1982-

    Published 2020
    Table of Contents: “…</p><p> 2.3.2 Components of Business Models</p><p> 2.3.3 Challenges in developing Business Model Frameworks for IoT</p><p> 2.3.4 IoT Business Models</p><p> 2.3.5 Technological Perspective on Business Models</p><p><strong>2.4 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>3 </strong><strong>COMMUNICATION AND DEVELOPMENT PRIMITIVES IN IOT</strong></p><p><strong>3.1 Introduction </strong></p><p><strong>3.2 Communication Protocols, Standards and Policies</strong></p><p><strong>3.3 Design and Development Tools</strong></p><p><strong>3.4 Datasets</strong></p><p><strong>3.5 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>4 </strong><strong>CHALLENGES IN IOT</strong></p><p><strong>4.1 Introduction </strong></p><p><strong>4.2 Challenges associated with IoT Architecture </strong></p><p><strong>4.3 Challenges associated with Entities </strong></p><p><strong>4.4 Technology-oriented Challenges </strong></p><p><strong>4.5 Challenges associated with Features </strong></p><p><strong>4.6 Challenges associated with Development Practices </strong></p><p><strong>4.7 Chapter Summary</strong><strong></strong></p><p><strong> </strong></p><p><strong>5 </strong><strong>DATA EXPLOSION IN IOT</strong></p><p><strong>5.1 Introduction </strong></p><p><strong>5.2 Big Data Definition </strong></p><p><strong>5.3 Underlying Factors for Data Explosion in IoT </strong></p><p><strong>5.4 Key Challenges associated with managing Data Explosion in IoT </strong></p><p><strong>5.5 Technological Support</strong></p><p>5.5.1 Machine Learning</p><p>5.5.2 Artificial Intelligence</p><p>5.5.3 Intelligent Edge Processing</p><p><strong>5.6 Chapter Summary</strong></p><p><strong> </strong></p><p><strong>6 </strong><strong>COMPUTING PARADIGMS AND SECURITY ISSUES IN CONNECTED AND AUTONOMOUS DRIVING VEHICLES</strong></p><p><strong>6.1 Introduction </strong></p><p><strong>6.2 Connected and Autonomous Driving Vehicle (CADV) -- A Technical Background </strong></p><p>6.2.1 Functional Blocks</p><p>6.2.2 Underlying Technologies</p><p>6.2.3 Potential Benefits and Forecasts</p><p><strong>6.3 Computing Paradigms </strong></p><p>6.3.1 Artificial Intelligence (AI)</p><p>6.3.2 Vehicular Cloud Computing (VCC) or Edge Computing</p><p>6.3.3 End-to-End Networking</p><p><strong>6.4 Security Issues and Existing Countermeasures</strong></p><p>6.4.1 Challenges and Countermeasures associated with Computing Paradigms</p><p>6.4.2 Challenges and Countermeasures associated with Participating Entities</p><p><strong>6.5 Ongoing Research Efforts</strong></p><p><strong>6.6 Open Research Challenges </strong></p><p>6.6.1 Deployment and Operational Costs</p><p>6.6.2 Security</p><p>6.6.3 Privacy</p><p>6.6.4 Legal and Ethical Aspects</p><p>6.6.5 Validation and Testing</p><p>6.6.6 Standardization</p><p>6.6.7 Other Aspects</p><p><strong>6.7 Chapter Summary</strong></p><p><strong> </strong></p>…”
    Full text (Wentworth users only)
    Electronic eBook
  12. 6992
  13. 6993

    Privacy Rights in the Digital Age / editors, Jane E. Kirtley, Michael Shally-Jensen.

    Published 2019
    Table of Contents: “…., 532 U.S. 514 (2001) -- Beliefs, privacy of -- Big data -- Bioethics -- Biometric Center of Excellence -- Biometric Optical Surveillance System -- Biometrics -- Blockchain technologies -- Body, privacy of the -- Border security, immigration reform, and privacy -- Bots -- Boundless informant -- Brain-computer interfacing (BCI) -- Brandeis, Louis Dembitz -- Caller ID -- Cantrell v. …”
    Full text (Wentworth users only)
    Full text (Wentworth users only)
    Electronic eBook
  14. 6994
  15. 6995
  16. 6996

    CLOUD OF THINGS foundations, applications, and challenges.

    Published 2024
    Full text (Wentworth users only)
    Electronic eBook
  17. 6997

    Fundamentals of 5G Communications : Connectivity for Enhanced Mobile Broadband and Beyond / Wanshi Chen, Peter Gaal, Juan Montojo, Haris Zisimopoulos. by Chen, Wanshi, Gaal, Peter, Montojo, Juan, Zisimopoulos, Haris

    Published 2021
    Table of Contents: “…-- 3.5 Main Functional Entities of the 5G Core -- 3.6 High-Level Features of 5G Core -- 3.7 Network Slicing -- 3.8 QoS -- 3.9 Interworking with Non-3GPP Access Technologies -- 3.10 Policy Control -- 3.11 5G Security -- 3.12 Access Control and Barring -- 3.13 Support for Operator and Regulatory Services -- 3.14 Interworking with EPC -- 3.15 EPC to 5GC Migration -- 4 Evolution of 5G Architecture -- 4.1 Introduction -- 4.2 Non-Public Networks -- 4.3 Cellular V2X -- 4.4 Cellular IoT -- 4.5 "Big Data" Collection (Enhanced Network Automation) -- 4.6 Enhancements to Interworking with Non-3GPP Accesses -- 4.7 URLLC -- 4.8 Slice Authentication -- 4.9 Other Release 16 Features -- 5 Numerology and Slot Structure -- 5.1 Numerology and Slot Structure in 4G LTE -- 5.2 Lessons Learned from 4G LTE and 5G Considerations -- 5.3 SCSs for 5G NR -- 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR -- 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth -- 5.6 Symbol, Slot, Subframe, and Frame for 5G NR -- 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations -- 6 Initial Access and Mobility -- 6.1 Overview -- 6.2 Initial Access -- 6.3 Random Access -- 6.4 Paging -- 6.5 Mobility -- 7 Downlink Control Operation -- 7.1 Downlink Control in 4G LTE -- 7.2 Control Region Management in 5G NR -- 7.3 PDCCH Structure in 5G NR -- 7.4 Search Space for NR PDCCH -- 7.5 DCI Formats for NR PDCCH -- 7.6 Physical Layer Block Diagram for NR PDCCH -- 7.7 Power Saving Considerations -- 8 Downlink Data Operation -- 8.1 Channel Coding for Data -- 8.2 Channel Code Rate Matching -- 8.3 DL Soft Buffer Management -- 8.4 DL MCS and TBS Determination -- 8.5 DL Resource Allocation in the Time Domain -- 8.6 DL Resource Allocation in the Frequency Domain -- 8.7 DL Rate Matching -- 8.8 DL HARQ Operation -- 8.9 DL Data Rate Capability -- 8.10 Processing Time for DL Data -- 8.11 Demodulation Reference Signals for Data -- 8.12 PDSCH DM-RS -- 8.13 DL Phase Tracking Reference Signal -- 8.14 Channel State Information Reference Signal -- 8.15 Tracking Reference Signal -- 8.16 DL MIMO Scheme -- 8.17 CSI Feedback -- 8.18 Beam Management for the PDSCH -- 8.19 Signal Quasi Co-Location -- 9 Uplink Control Operation -- 9.1 Uplink Control in 4G LTE -- 9.2 UCI Types and Payload Sizes in 5G NR -- 9.3 PUCCH Formats in 5G NR -- 9.4 PUCCH Resource Determination in 5G NR -- 9.5 UCI on PUSCH in 5G NR -- 9.6 Channel Coding for UCI -- 10 Uplink Data Operation -- 10.1 UL MCS and TBS Determination -- 10.2 UL Resource Allocation in the Time Domain -- 10.3 UL Resource Allocation in the Frequency Domain -- 10.4 UL Rate Matching -- 10.5 UL HARQ Operation -- 10.6 UL Soft Buffer Management -- 10.7 UL Data Rate Capability -- 10.8 Processing Time for UL Data -- 10.9 PUSCH DM-RS -- 10.10 UL Phase Tracking Reference Signal -- 10.11 Sounding Reference Signal -- 10.12 UL MIMO Scheme -- 10.13 Beam Management for the PUSCH -- 10.14 UL Power Control -- 10.15 UL Timing -- 11 Coexistence of 4G and 5G -- 11.1 Adjacent Channel Coexistence -- 11.2 Same Channel Coexistence -- 11.3 EN-DC Power Control -- 11.4 Switched EN-DC UL -- 12 5G in Unlicensed and Shared Spectrum -- 12.1 Unlicensed Operation in LTE -- 12.2 Overview -- 12.3 Channel Access -- 12.4 Discovery Burst -- 12.5 Physical Layer Extensions for Uplink -- 12.6 Increased Scheduling Flexibility -- 13 Vertical Expansion: URLLC -- 13.1 A Brief History of 3GPP Standardization Related to URLLC -- 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC -- 13.3 Resource Management for URLLC -- 13.4 Optimizing Link Efficiency for URLLC -- 13.5 Downlink Resource Sharing for Distinct Service Types -- 13.6 Uplink Resource Sharing for Distinct Service Types -- 13.7 Handling Distinct Services at the UE -- 13.8 Other Related Aspects -- 14 Vertical Expansion: MTC -- 14.1 A Brief History of MTC in 3GPP -- 14.2 Key Technical Enablers for eMTC -- 14.3 Key Technical Enablers for NB-IoT -- 14.4 Integration of eMTC and NB-IoT into 5G NR -- 14.5 Future Trends -- 15 5G Vertical Expansion: V2X -- 15.1 Overview -- 15.2 Background: LTE V2X -- 15.3 NR V2X -- 16 Vertical Expansion: Broadcast and Multicast -- 17 Miscellaneous Topics for 5G -- 17.1 Overview -- 17.2 Interference Management -- 17.3 UE Power Savings -- 17.4 NR Positioning -- 17.5 Two-Step RACH -- 17.6 Multi-RAT DC/CA Enhancements -- 17.7 Mobility Enhancements -- 17.8 Integrated Access and Backhaul -- 18 A Look at Typical 5G Commercial Deployments -- 19 5G: What?…”
    Full text (Wentworth users only)
    Electronic eBook
  18. 6998
  19. 6999

    Mathematical Analysis and Numerical Methods IACMC 2023, Zarqa, Jordan, May 10–12 / edited by Aliaa Burqan, Rania Saadeh, Ahmad Qazza, Osama Yusuf Ababneh, Juan C. Cortés, Kai Dieth...

    Published 2024
    Table of Contents: “…D. Al-Nasser, Fitting Big Data using Structural Measurement Error Model -- S. …”
    Full text (Wentworth users only)
    Electronic eBook
  20. 7000

    Artificial Intelligence and Computational Intelligence 4th International Conference, AICI 2012, Chengdu, China, October 26-28, 2012. Proceedings / edited by Jingsheng Lei, Fu Lee W... by Lei, Jingsheng

    Published 2012
    Table of Contents: “…Expressive Secondo Performances of a Realtime Person-Computer Ensemble System -- Different-Level Schemes’ Equivalence for Self-Motion Planning of Robot Manipulators -- Grey Incidence Optimization Model Based on Hybrid Differential Evolution Algorithm -- A Data Mining Based Approach to Research the Relationship between Kansei and Usability: A Case Study of Mobile Phones -- Making Use of the Big Data: Next Generation of Algorithm Trading -- Dynamic Causality Analysis on Default Mode Network -- The Canny Edge Detection and Its Improvement -- Multi-modality Medical Image Registration Based on Improved I-alpha Information (SNI) with Gradient -- Design of Smart Home Control System Based on ZigBee and Embedded Web Technology -- Using Gaussian Potential Function for Underdetermined Blind Sources Separation Based on DUET -- A New Balancing Type of Wireless Sensor Network Routing Algorithm -- Development of Portable Gait Analysis System Based on a DSP -- Improved Neural Networks Based Method for Infrared Focal Plane Arrays Nonuniformity Correction -- Images Classifications Based on Color-Texture Feature -- A Synchronization Strengthen RFID Authentication Protocol Based on Key Array -- Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing -- Knowledge-Guided Clustering of Large-Scale Time Series under Wavelet Transformation -- A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks -- Analysis of Association Rule Mining on Quantitative Concept Lattice -- Composite Rough Sets -- Analysis of Requirement and Constrained Model of Inter-Satellite-Link TT&C Scheduling Problem on Navigation Constellation -- NHFCNNC: A New Fuzzy Neural Network Algorithm Based on Matrix and Its Application -- Research of Emergency Logistics Distribution Routing Optimization Based on Simulated Annealing Ant Colony Optimization -- A Spatial Structure Analysis of Candidate Chinese Hyponymy Based on Concept Space -- Prediction of Energy Consumption Based on Grey Model - GM (1,1) -- Fuzzy Decision Making Based on Fuzzy Logic with Contradictory Negation, Opposite Negation and Medium Negation -- An Approach of Affection Thinking Based on Ant Colony Strategy -- Studies on the Covering Rough Set and Its Matrix Description -- Yard Allocation for Outbound Containers Based on the Unified Neutral Theory of Biodiversity and Biogeography -- An Auto-Adapted Method to Generate Pairwise Test Data Set -- The Application of Evolutionary Algorithm in B-Spline Curved Surface Ffitting -- Self-adaptive Optimization for Traffic Flow Model Based on Evolvable Hardware -- An Improved Decision Tree Algorithm Using Rough Set Theory in Clinical Decision Support System -- An AHP-Based Assessment Model for Clinical Diagnosis and Decision -- The Solution of Smart Home Indoor Positioning Based on WiFi -- Modified Cosine Similarity Measure between Intuitionistic Fuzzy Sets -- An Equipment Failure Prediction Accuracy Improvement Method Based on the Gray GM(1,1) Model -- A Group Decision Making Procedure for Selecting Data Warehouse Systems -- An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection -- Robust Algorithm for Detection of Copy-Move Forgery in Digital Images Based on Ridgelet Transform -- Function Projective Synchronization and Parameters Identification of Different Hyperchaotic Systems Based on Adaptive Control -- A General Construction for Multi-authority Attribute-Based Encryption -- GIS-Based Urban Land Development Intensity Impact Factors Analysis -- Application of Adaptive Fuzzy Control in the Variable Speed Wind Turbines -- Short-Term Traffic Flow Forecasting Based on Grey Delay Model -- A Novel Color Image Segmentation Method Based on Improved Region Growing -- A Self-adaptive Segmentation Method by Fusion of Multi-color Space Components -- Traffic Vehicle Behavior Prediction Using Hidden Markov Models -- Efficient Visual Tracking by Using LBP Descriptor -- Trilateral Filtering-Based Retinex for Image Enhancement -- Face Recognition Using a Modified Fuzzy Linear Discriminant Analysis Method -- Progressive Image Registration Based on Probability Boosting Tree -- Rapid Image Segmentation Using Color, Texture and Syntactic Visual Features -- Multi-resolution Image Fusion Algorithm Based on Regional Cross Entropy and Regional Priority -- Graph-Cut Optimization for Video Moving Objects Detection with Geodesic Active Contour -- A Video Copy Detection Algorithm Based on Two-Level Features Measure -- Analyzing Feature Selection of Chromatographic Fingerprints for Oil Production Allocation -- Studies on Wheat Pests Image Segmentation Based on Variational Level Set -- Video Quality Assessment Combining Structural Distortion and Human Visual System -- A Novel Ocean Wind Field Estimation Method SAR Images Based -- Research of Decentralized Collaborative Target Tracking Architecture in the Sea Battlefield for the Complex Sensor Networks -- The Application of Intuitionistic Fuzzy MADM Based on Projection Model in Threat Assessment -- Fault Analysis of Condenser Based on RBF Network and D-S Evidence Theory -- Simulation Research on Singularity Detection of Transient Power Disturbance -- CMMB Image Sequences Measurement Based on Computation in High-Dimension Space -- Two-Dimensional Gibbs Phenomenon for Fractional Fourier Series and Its Resolution -- Horizontally UCA DOA Estimation Performance via Spatial Averaging -- Automatic Object Extraction in Nature Scene Based on Visual Saliency and Super Pixels -- Learning a Ground Object Manifold for Interpreting High-Resolution Sensor Image -- Robust Adaptive Beamforming with Null Widening under Quadratic Constraint -- Conceptual Analysis of Chinese Query of the Interrogative Sentence -- Measuring Information Transmission in Izhikevich Neuron -- Color Image Segmentation Using Centroid Neural Network -- Zhang Fractals Yielded via Solving Time-Varying Nonlinear Complex Equations by Discrete-Time Complex-Valued ZD -- Sub-optimal Multiuser Detector Using a Chaotic Neural Network with Decaying Chaotic Noise -- A Formal Method for Testing Reactive System from Symbolic Model -- Study on the Medium and Long Term of Fishery Forecasting Based on Neural Network -- Application of Wavelet Neural Network in the Fault Diagnosis of Turbine Generator Unit -- Density Based Grid Clustering Partition of the Input Space for RBF Neural Network -- Research of the Urban Air Quality Forecast Method Based on Resource Allocation Network -- A Novel Neural Network Approach for Computing Eigen-Pairs of Real Antisymmetric Matrices -- Pavement Distress Image Recognition Based on Multilayer Autoencoders -- MPSO-Based Operational Conditions Optimization in Chemical Process: A Case Study -- Velocity-Free Multi-Objective Particle Swarm Optimizer with Centroid for Wireless Sensor Network Optimization -- The Improved Particle Swarm Optimization Based on Swarm Distribution Characteristics -- An Analysis of Nonlinear Acceleration Coefficients Adjustment for PSO -- Acoustic Sensor Network Node Self-localization Based on Adaptive Particle Swarm Optimization -- Bimodal Biometrics Based on a Two-Stage Test Sample Representation -- Sparse Discriminating Neighborhood Preserving Embedding -- Complex-Matrix-Based Horizontal and Vertical Discriminant Analysis for Feature Fusion -- Segmentation of CAPTCHAs Based on Complex Networks -- A Robust Kernel-Based Fuzzy C-Means Algorithm by Incorporating Suppressed and Magnified Membership for MRI Image Segmentation -- Quantitative and Qualitative Coordination for Multi-robot Systems -- Image Edge Detection Based on Relative Degree of Grey Incidence and Sobel Operator -- Background Modeling from Surveillance Video Using Rank Minimization -- A Complete Set of Pseudo-Zernike Moment Invariants by Image Shape Description.…”
    Full text (Wentworth users only).
    Electronic eBook