The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that are fully supported by IoT sensing, machine learning and analytics systems. To that end, the authors draw upon their original research and proven track record in the field to describe a practical approach ...
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work. ...
Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two main components, the objective is to accomplish the feasible set framed by the system constraints. The aim of this book is expose optimization problems that can be expressed as graphs, by detailing, for each ...
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security inc ...
Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified engineering methods, statistical methods, and artificial intelligence methods. The text also simulates energy consumption profiles for single and multiple buildings. Based on these datasets, Support Vector Machine ...
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences, similarities and relationships between strategic design and prospective ergonomics are reviewed using existing theories and frameworks from design, ergonomics, and strategic and innovation manageme ...
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has unexpectedly progressed beyond our imagination, from a tool of management and control into one of widespread communication and expression. This book revisits the major questions that have emerged with the ...
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the production of wealth. In order to make this intangible resource bear fruit, organizations are looking for ways, methods, procedures, processes and technical solutions to efficiently manage knowledge Withi ...
The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how synchronization between conscious processes and unconscious processes is established for a sense of smoothness, and how memory processes and action selection processes are coordinated. The first half this book ...