You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This comprehensive text, now in its Second Edition, continues to provide the entire spectrum of e-governance—from definition of e-governance to its history, evaluation, e-governance models, infrastructure and manpower facilities, data warehousing possibilities in implementation of e-government projects, and strategies of success of such projects. The text covers 22 case studies—18 Indian case studies and four International case studies. The Indian case studies include Bhoomi, a project of Karnataka Government, CARD (Computer-aided Administration of Registration Department), Smart Nagarpalika (Computerization of Urban Local Bodies or Municipalities), IT in judiciary, Sachivalaya Vahini (e...
The Third Edition of this well-received text analyses the fundamental concepts of data warehousing, data marts, and OLAP. The author discusses, in an easy-to-understand language, important topics such as data mining, how to build a data warehouse, and potential applications of data warehousing technology in government. Besides, the text compares and contrasts the currently available software tools used to design and develop data warehouses. While retaining the six existing case studies, it gives four new case studies: HARBOR, A Highly Available Data Warehouse A Typical Business Data Warehouse for a Trading Company Customer Data Warehouse for the World’s First and Largest Online Bank in the United Kingdom A German Supermarket EDEKA’s Data Warehouse The book, which is a blend of principles and real-life case studies, is intended as a text for students of B.Tech/M.Tech (Computer Science and Engineering), B.Tech/M.Tech (Information Technology), MBA, M.Sc. (Computer Science), M.Sc. (Information Technology), and MCA. It should also be of considerable utility and worth to software professionals and database practitioners.
Bluetooth is a short range wireless radio technology standard that packs the potential to meet the demands of the present and of the future. Bluetooth is the most secure among all wireless technologies. This up-to-date, well-organized book provides a comprehensive coverage of Bluetooth and shows how various Bluetooth-enabled applications can be developed in Java and J2ME. The text provides a detailed description and a skilful analysis of the techniques involved in developing Bluetooth-enabled applications with a host of illustrative codes. This book, which treats a topic of current interest, will be extremely useful to students of computer science as well as to professionals in the field.
Papers presented at the National Conference on Mobile Computing, held at Hyderabad during 11-12 December 2001.
This book provides a comprehensive picture of fog computing technology, including of fog architectures, latency aware application management issues with real time requirements, security and privacy issues and fog analytics, in wide ranging application scenarios such as M2M device communication, smart homes, smart vehicles, augmented reality and transportation management. This book explores the research issues involved in the application of traditional shallow machine learning and deep learning techniques to big data analytics. It surveys global research advances in extending the conventional unsupervised or clustering algorithms, extending supervised and semi-supervised algorithms and associ...
This book provides a comprehensive survey of techniques, technologies and applications of Big Data and its analysis. The Big Data phenomenon is increasingly impacting all sectors of business and industry, producing an emerging new information ecosystem. On the applications front, the book offers detailed descriptions of various application areas for Big Data Analytics in the important domains of Social Semantic Web Mining, Banking and Financial Services, Capital Markets, Insurance, Advertisement, Recommendation Systems, Bio-Informatics, the IoT and Fog Computing, before delving into issues of security and privacy. With regard to machine learning techniques, the book presents all the standard...
Grid Computing and Cluster Computing are advanced topics and latest trends in computer science that find a place in the computer science and information technology curricula of many engineering institutes and universities today. Divided into two parts—Part I, Grid Computing and Part II, Cluster Computing—, this compact and concise text strives to make the concepts of grid computing and cluster computing comprehensible to the students through its fine presentation and accessible style. Part I of the book enables the student not only to understand the concepts involved in grid computing but also to build their own grids for specific applications. Similarly, as today supercomputers are bein...
With wit and humor, popular Lost Cities author David Hatcher Childress takes us around the world and back in his trippy finalé to the Lost Cities series. He’s off on an adventure in search of the apocalypse and end times. Childress hits the road from the fortress of Megiddo, the legendary citadel in northern Israel where Armageddon is prophesied to start. Hitchhiking around the world, Childress takes us from one adventure to another, to ancient cities in the deserts and the legends of worlds before our own. Childress muses on the rise and fall of civilizations, and the forces that have shaped mankind over the millennia, including wars, invasions and cataclysms. He discusses the ancient Armageddons of the past, and chronicles recent Middle East developments and their ominous undertones. In the meantime, he becomes a cargo cult god on a remote island off New Guinea, gets dragged into the Kennedy Assassination by one of the “conspirators,†investigates a strange power operating out of the Altai Mountains of Mongolia, and discovers how the Knights Templar and their off-shoots have driven the world toward an epic battle centered around Jerusalem and the Middle East.
This book promotes the idea of creative thinking to those working on qualitative and quantitative analysis for reinforcing engineering designs relating to industrial and manufacturing domains. The book focuses on the development of the theoretical foundations and discusses the utility of integration of critical components and systems engineering for effective systems design. The book presents research directions and can be used as a tool to understand in-depth possible ways related to the management of industrial and manufacturing activities, processes, actions, benchmarks, and so on. The new ideas, theories, and methods related to qualitative and quantitative research will improve manufactu...
This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011. The 73 papers included in this book were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on distributed computing, image processing, pattern recognition, applied algorithms, wireless networking, sensor networks, network infrastructure, cryptography, Web security, and application security.