You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Spatial and temporal properties are key aspects of many data analysis problems in business, government, and science. GPS technology is quickly enabling a number of new applications, including tracking fleets of vehicles, navigating boats and ships, pedestrian's tracking and tracking of wildlife. Another popular application of this technology is in cellular phones with embedded GPS sensors for vehicle and pedestrian's tracking. Through the availability of cheap sensor devices, we have witnessed an exponential growth of geo-tagged data in the last few years resulting in the availability of fine-grained spatial data at small temporal sampling intervals. Therefore, the actual challenge in spatio-temporal analysis is moving from acquiring the right data towards large-scale analysis of the available data. As this multidimensional data add more complexities in storing, indexing and querying, efficient methodologies have to be derived to manage these data using existing data base technology.
Web Usage Mining, also known as Web Log Mining, is the result of user interaction with a Web server including Web logs, click streams and database transaction or the visits of search engine crawlers at a Website. Log files provide an immense source of information about the behavior of users as well as search engine crawlers. Web Usage Mining concerns the usage of common browsing patterns, i.e. pages requested in sequence from Web logs. These patterns can be utilized to enhance the design and modification of a Website. Analyzing and discovering user behavior is helpful for understanding what online information users inquire and how they behave. The analyzed result can be used in intelligent o...
This book 'Introduction to Computing and Problem Solving with Python' will help every student,teacher and researcher to understand the computing basics and advanced PythonProgramming language. The Python programming topics include the reserved keywords,identifiers, variables, operators, data types and their operations, flowcontrol techniques which include decision making and looping, modules, filesand exception handling techniques. Advanced topics like Python regularexpressions, Database Programming and Object Oriented Programming concepts arealso covered in detail. All chapters have worked out programs, illustrations,review and frequently asked interview questions. The simple style of prese...
This volume is the third part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 70 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on security, trust and privacy; sensor networks; signal and image processing; soft computing techniques; system software; vehicular communications networks.
This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 68 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on ad hoc networks; advanced micro architecture techniques; autonomic and context-aware computing; bioinformatics and bio-computing; cloud, cluster, grid and P2P computing; cognitive radio and cognitive networks; cyber forensics; database and information systems.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
This book presents the proceedings of the International Conference on Health, Safety, Fire, Environment, and Allied Sciences. It highlights latest developments in the field of science and technology aimed at improving health and safety in the workplace. The volume comprises content from leading scientists, engineers, and policy makers discussing issues relating to industrial safety, fire hazards and their management in industry, forests and other settings. Also dealt with are issues of occupational health in engineering, process and agricultural industry and protection against incidents of arson and terror attacks. The contents of this volume will be of interest to researchers, practitioners, and policy makers alike.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, held in Beijing, China, in July 2011. The 8 revised full papers and the 5 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on terrorism informatics and crime analysis; intelligence analysis and knowledge discovery; information access and security; and infectious disease informatics.
This book presents the proceedings of the International Conference on Health, Safety, Fire, Environment, and Allied Sciences (HSFEA 2016). The book highlights the latest developments in the field of science and technology aimed at improving health and safety in the workplace. The volume comprises content from leading scientists, engineers, and policy makers. The papers included in this volume look at identifying the limitations of the existing approaches and open new avenues for future research. The book also looks at the accident and work-health records, specifically in Asian countries, and discusses measures to improve the Asian standards and implementation issues with regards to workplace health and safety. The contents of this volume will be of interest to researchers, practitioners, and policy makers alike.
This book comprises selected papers on advances in the field of health and environment safety that were presented at the leading international conference on advances in the field of health, safety, fire, environment, allied sciences and engineering (HSFEA 2016). The book focuses on the latest developments in the field of health and environment safety, and highlights related opportunities and challenges. The book also presents methods that can be used to effectively monitor and measure climate change and global warming. Further, the contents of this work stress the importance of maintaining safety and healthy work environments that are free of occupational health hazards. This book will be of interest to researchers, professionals, and policy makers alike.