Browse Results

Showing 17,901 through 17,925 of 54,104 results

Enabling Secure and Privacy Preserving Communications in Smart Grids

by Hongwei Li

This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in smart grids. The brief is designed for researchers and professionals working with computer communication networks and smart grids. Graduate students interested in networks and communication engineering will also find the brief an essential resource.

Enabling Smart Urban Services with GPS Trajectory Data

by Chao Chen Daqing Zhang Yasha Wang Hongyu Huang

With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.

Enabling Systems for Intelligent Manufacturing in Industry 4.0: Sensing, Smart and Sustainable Systems for the Design of S3 Products, Processes, Manufacturing Systems, and Enterprises

by Arturo Molina Pedro Ponce Jhonattan Miranda Daniel Cortés

This book introduces the concept of sensing, smart and sustainable systems (S3 systems) to support the design and redesign of products, services, business and manufacturing processes, manufacturing systems, and enterprises. The concept of S3 systems theory is introduced and explained in detail to support designers and engineers in their development task. This approach is embraced in the implementation of emergent Information and communication technologies and artificial intelligence techniques. The text helps the reader to understand the relationship between intelligent manufacturing, S3 systems and Industry 4.0. It presents a review of current approaches to design and development of technology-based products. Finally, it enlarges on the sensing, smart and sustainable systems theory to give examples of S3 systems as case studies.

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities

by Mohd Abdul Ahad Gabriella Casalino Bharat Bhushan

With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society’s future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.

Enabling Technologies for Next Generation Wireless Communications (Artificial Intelligence (AI): Elementary to Advanced Practices)

by Mohammed Usman Mohd Wajid Mohd Dilshad Ansari

Enabling Technologies for Next Generation Wireless Communications provides up-to-date information on emerging trends in wireless systems, their enabling technologies and their evolving application paradigms. This book includes the latest trends and developments toward next generation wireless communications. It highlights the requirements of next generation wireless systems, limitations of existing technologies in delivering those requirements and the need to develop radical new technologies. It focuses on bringing together information on various technological developments that are enablers vital to fulfilling the requirements of future wireless communication systems and their applications. Topics discussed include spectrum issues, network planning, signal processing, transmitter, receiver, antenna technologies, channel coding, security and application of machine learning and deep learning for wireless communication systems. The book also provides information on enabling business models for future wireless systems. This book is useful as a resource for researchers and practitioners worldwide, including industry practitioners, technologists, policy decision-makers, academicians, and graduate students.

Enabling Technologies for the Successful Deployment of Industry 4.0 (Manufacturing Design and Technology)

by Antonio Sartal Diego Carou J. Paulo Davim

This book offers the latest research advances in the field of Industry 4.0, focusing on enabling technologies for its deployment in a comprehensive way. This book offers successful implementation of technologies such as artificial intelligence, augmented and virtual reality, autonomous and collaborative robots, cloud computing, and up-to-date guidelines. It investigates how the technologies and principles surrounding Industry 4.0 (e.g., interoperability, decentralized decisions, information transparency, etc.) serve as support for organizational routines and workers (and vice versa). Included are applications of technologies for different sectors and environments as well as for the supply chain management. It also offers a domestic and international mix of case studies that spotlight successes and failures. Features Provides a historical review of Industry 4.0 and its roots Discusses the applications of technologies in different sectors and environments (e.g., public vs. private) Presents key enabling technologies for successful implementation in any industrial and service environment Offers case studies of successes and failures to illustrate how to put theory into practice Investigates how technologies serve as support for organizational routines and workers

Enabling the Internet of Things

by Massimo Alioto

This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).

Enabling the Internet of Things: Fundamentals, Design and Applications (Wiley - IEEE)

by Muhammad Azhar Iqbal Sajjad Hussain Huanlai Xing Muhammad Ali Imran

LEARN MORE ABOUT FOUNDATIONAL AND ADVANCED TOPICS IN INTERNET OF THINGS TECHNOLOGY WITH THIS ALL-IN-ONE GUIDE Enabling the Internet of Things: Fundamentals, Design, and Applications delivers a comprehensive starting point for anyone hoping to understand the fundamentals and design of Internet of Things (IoT) systems. The book's distinguished academics and authors offer readers an opportunity to understand IoT concepts via programming in an abstract way. Readers will learn about IoT fundamentals, hardware and software components, IoT protocol stacks, security, IoT applications and implementations, as well as the challenges, and potential solutions, that lie ahead. Readers will learn about the social aspects of IoT systems, as well as receive an introduction to the Blockly Programming Language, IoT Microcontrollers, IoT Microprocessors, systems on a chip and IoT Gateway Architecture. The book also provides implementation of simple code examples in Packet Tracer, increasing the usefulness and practicality of the book. Enabling the Internet of Things examines a wide variety of other essential topics, including: The fundamentals of IoT, including its evolution, distinctions, definitions, vision, enabling technologies, and building blocks An elaboration of the sensing principles of IoT and the essentials of wireless sensor networks A detailed examination of the IoT protocol stack for communications An analysis of the security challenges and threats faced by users of IoT devices, as well as the countermeasures that can be used to fight them, from the perception layer to the application layer Perfect as a supplementary text for undergraduate students taking computer science or electrical engineering courses, Enabling the Internet of Things also belongs on the bookshelves of industry professionals and researchers who regularly work with and on the Internet of Things and who seek a better understanding of its foundational and advanced topics.

Enabling the Internet of Value: How Blockchain Connects Global Businesses (Future of Business and Finance)

by Paolo Tasca Jiahua Xu Nikhil Vadgama

This book shows how blockchain technology can transform the Internet, connecting global businesses in disruptive ways. It offers a comprehensive and multi-faceted examination of the potential of distributed ledger technology (DLT) from a new perspective: as an enabler of the Internet of Value (IoV). The authors discuss applications of blockchain technology to the financial services domain, e.g. in real estate, insurance and the emerging Decentralised Finance (DeFi) movement. They also cover applications to the media and e-commerce domains. DLT’s impacts on the circular economy, marketplace, Internet of Things (IoT) and oracle business models are also investigated. In closing, the book provides outlooks on the evolution of DLT, as well as the systemic governance and privacy risks of the IoV. The book is intended for a broad readership, including students, researchers and industry practitioners.

Enabling Things to Talk

by Alessandro Bassi Martin Bauer Martin Fiedler Thorsten Kramp Rob Kranenburg Sebastian Lange Stefan Meissner

The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Frequency Identification (RFID), which helped to automate inventory, tracking and basic identification, today IoT is characterized by a dynamic trend toward connecting smart sensors, objects, devices, data and applications. The next step will be "cognitive IoT," facilitating object and data re-use across application domains and leveraging hyper-connectivity, interoperability solutions and semantically enriched information distribution. The Architectural Reference Model (ARM), presented in this book by the members of the IoT-A project team driving this harmonization effort, makes it possible to connect vertically closed systems, architectures and application areas so as to create open interoperable systems and integrated environments and platforms. It constitutes a foundation from which software companies can capitalize on the benefits of developing consumer-oriented platforms including hardware, software and services. The material is structured in two parts. Part A introduces the general concepts developed for and applied in the ARM. It is aimed at end users who want to use IoT technologies, managers interested in understanding the opportunities generated by these novel technologies, and system architects who are interested in an overview of the underlying basic models. It also includes several case studies to illustrate how the ARM has been used in real-life scenarios. Part B then addresses the topic at a more detailed technical level and is targeted at readers with a more scientific or technical background. It provides in-depth guidance on the ARM, including a detailed description of a process for generating concrete architectures, as well as reference manuals with guidelines on how to use the various models and perspectives presented to create a concrete architecture. Furthermore, best practices and tips on how system engineers can use the ARM to develop specific IoT architectures for dedicated IoT solutions are illustrated and exemplified in reverse mapping exercises of existing standards and platforms.

Enacting Electronic Government Success

by J. Ramon Gil-Garcia

Many countries around the world are investing a great amount of resources in government IT initiatives. However, few of these projects achieve their stated goals and some of them are complete failures. Therefore, understanding e-government success has become very important and urgent in recent years. In order to develop relevant knowledge about this complex phenomenon, researchers and practitioners need to identify and assess what are the main conditions, variables, or factors that have an impact on e-government success. However, before being able to evaluate these impacts, it is necessary to define what e-government success is and what some e-government success measures are. This book presents a review of both e-government success measures and e-government success factors. It also provides empirical evidence from quantitative analysis and two in-depth case studies. Although based on sound theory and rigorous empirical analysis, the book not only significantly contributes to academic knowledge, but also includes some practical recommendations for government officials and public managers. Theoretically, the book proposes a way to quantitatively operationalize Fountain's enactment framework. Based on the institutional tradition, the technology enactment framework attempts to explain the effects of organizational forms and institutional arrangements on the information technology used by government agencies. According to Fountain (1995; 2001) the technology enactment framework pays attention to the relationships among information technology, organizations, embeddedness, and institutions. This framework is very well known in the e-government field, but is normally used for qualitative analysis and there is no previous proposal of how to use it with quantitative data. The book proposes variables to measure each of the different constructs in this framework and also tests the relationships hypothesized by Fountain's theory. Finally, using the advantages of the selected quantitative analysis technique (Partial Least Squares), the study also proposes some adjustments and extensions to the original framework in a theory building effort. Methodologically, the book reports on one of the first multi-method studies in the field of e-government in general and e-government success in particular. This study uses a nested research design, which combines statistical analysis with two in depth case studies. The study begins with a statistical analysis using organizational, institutional, and contextual factors as the independent variables. An overall score representing e-government success in terms of the functionality of state websites is the dependent variable. Second, based on the statistical results two cases are selected based on their relative fitness to the model (residuals) and their position in the general ranking of website functionality (which includes four different measures). In order to complement the results of the statistical analysis, case studies were developed for the two selected states (New York and Indiana), using semi-structured interviews and document analysis. In terms of the statistical analysis, the book constitutes one of the first applications of Partial Least Squares (PLS) to an e-government success study. PLS is a structural equations modeling (SEM) technique and, therefore, allows estimating the measurement model and the structural model simultaneously. The use of this sophisticated statistical strategy helped to test the relationships between e-government success and different factors influencing it, as well as some of the relationships between several of the factors, thus allowing exploring some indirect effects too.

EnCase Computer Forensics -- The Official EnCE

by Steve Bunting

The official, Guidance Software-approved book on the newest EnCE exam!The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The only official Guidance-endorsed study guide on the topic, this book prepares you for the exam with extensive coverage of all exam topics, real-world scenarios, hands-on exercises, up-to-date legal information, and sample evidence files, flashcards, and more. Guides readers through preparation for the newest EnCase Certified Examiner (EnCE) exam Prepares candidates for both Phase 1 and Phase 2 of the exam, as well as for practical use of the certification Covers identifying and searching hardware and files systems, handling evidence on the scene, and acquiring digital evidence using EnCase Forensic 7 Includes hands-on exercises, practice questions, and up-to-date legal information Sample evidence files, Sybex Test Engine, electronic flashcards, and more If you're preparing for the new EnCE exam, this is the study guide you need.

The Enchanted Creeper (Creeper Diaries #7)

by Greyson Mann Amanda Brack

Gerald is falling behind in his toughest class yet—Enchantment. The homework! The quizzes! The stack of books! It all seems so unfair. But when Gerald discovers a way that enchantments might help him win the science fair, class gets a whole lot more interesting. And that Efficiency Enchantment? Well, that could sure come in handy when it's time to get homework done. Pretty soon, Gerald isn't dreading Enchantment Class—he's acing it. But his new skills could get him into a whole lot of trouble . . .

Enchanting Robots: Intimacy, Magic, and Technology (Social and Cultural Studies of Robots and AI)

by Maciej Musiał

This book argues that robots are enchanting humans (as potential intimate partners), because humans are enchanting robots (by performing magical thinking), and that these processes are a part of a significant re-enchantment of the “modern” world. As a foundation, the author examines arguments for and against intimate relationships with robots, particularly sex robots and care robots. Moreover, the book provides a consideration of human-robot interactions and philosophical reflections about robots through the lens of magic and magical thinking as well as theoretical and practical re-evaluations of their status and presence. Furthermore, the author discusses the abovementioned issues in the context of disenchantment and re-enchantment of the world, characterizing modernity as a coexistence of these two processes. The book closes with a consideration of future scenarios regarding the meaning of life in the age of rampant automation and the possibility that designing robots becomes a sort of new eugenics as a consequence of recognizing robots as persons.

The Enclave Economy: Foreign Investment and Sustainable Development in Mexico's Silicon Valley

by Lyuba Zarsky Kevin P. Gallagher

Foreign investment has been widely perceived as a panacea for developing countries--as a way to reduce poverty and jump-start sustainable modern industries. In The Enclave Economy,Kevin Gallagher and Lyuba Zarsky call this prescription into question, showing that Mexico's post-NAFTA experience of foreign direct investment in its information technology sector, particularly in the Guadalajara region, did not result in the expected benefits. Charting the rise and fall of Mexico's "Silicon Valley," they explore issues that resonate through much of Latin America and the developing world: the social, economic, and environmental effects of market-driven globalization. In the 1990s, Mexico was a poster child for globalization, throwing open its borders to trade and foreign investment, embracing NAFTA, and ending the government's role in strengthening domestic industry. But The Enclave Economyshows that although Mexico was initially successful in attracting multinational corporations, foreign investments waned in the absence of active government support and because China became increasingly competitive. Moreover, foreign investment created an "enclave economy" the benefits of which were confined to an international sector not connected to the wider Mexican economy. In fact, foreign investment put many local IT firms out of business and transferred only limited amounts of environmentally sound technology. Gallagher and Zarsky suggest policies and strategies that will enable Mexico and other developing countries to foster foreign investment for sustainable development in the future.

Encounters in End City: The Unofficial Minecrafters Academy Series, Book Six (Unofficial Minecrafters Academy #6)

by Winter Morgan

It’s graduation week at Minecrafters Academy, but a battle is brewing between the top five students at the school. With the school’s top five students wrapped up in an endless prank war as they compete over the coveted position of class speaker, one of their classmates finds a solution: the students will travel to an End city and hunt for treasure; the student who not only survives, but returns with the most treasures, will be chosen. The students set off on their journey, but they quickly learn that the End is no joke. Face-to-face with shulkers, the deadly Void, and the mighty Ender Dragon, the school’s top students learn there’s more to success than making the grade. They must learn to fight together—or no one will make it back alive.In this final installment of the Unofficial Minecrafters Academy series, the risks—and the potential rewards—are greater than ever.

Encrypt, Sign, Attack: A compact introduction to cryptography (Mathematics Study Resources #4)

by Olaf Manz

This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher, signature and authentication methods. Both symmetric encryption and public-key ciphers are discussed. In each case, the strategies used to attack and attempt to "crack" encryption are also discussed. Special emphasis is placed on the practical use of ciphers, especially in the everyday environment. The book is suitable for working groups at STEM schools and STEM teacher training, for introductory courses at universities as well as for interested students and adults.

Encrypted Email

by Hilarie Orman

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

Encryption and Decryption Algorithms for Plain Text and Images using Fractional Calculus (Synthesis Lectures on Engineering, Science, and Technology)

by Rafael Martínez-Guerra Juan Javier Montesinos-García Juan Pablo Flores-Flores

This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes. The authors first establish the class of observers capable of carrying out this work. Then, the type of observers to treat either the integer or fractional order type and their main characteristics is mentioned. The book also presents an essential property of some systems such as Liouville, which is vital for the encryption and decryption of messages in integer and fractional order nonlinear systems by using the synchronization property of chaotic systems. Finally, it addresses some logistic maps such as Mandelbrot sets including Julia and fractal sets, taking advantage of their characteristics to encrypt or recover messages.

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

by Robert Ciesla

Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter themMoving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems.Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. What You Will LearnAppreciate how digital encryption algorithms workSecure your infrastructure from cryptographic attacksUnderstand the basics of quantum information scienceDiscover how cryptography relates to quantum computingImplement Quantum Key Distribution (QKD) Who This Book Is ForThis book is aimed at readers who have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.

Encyclopedia of Algorithms

by Ming-Yang Kao

One of Springer's renowned Major Reference Works, this awesome achievement provides a comprehensive set of solutions to important algorithmic problems for students and researchers interested in quickly locating useful information. This first edition of the reference focuses on high-impact solutions from the most recent decade, while later editions will widen the scope of the work. All entries have been written by experts, while links to Internet sites that outline their research work are provided. The entries have all been peer-reviewed. This defining reference is published both in print and on line.

Encyclopedia of Big Data

by Laurie A. Schintler Connie L. McNeely

This encyclopedia will be an essential resource for our times, reflecting the fact that we currently are living in an expanding data-driven world. Technological advancements and other related trends are contributing to the production of an astoundingly large and exponentially increasing collection of data and information, referred to in popular vernacular as “Big Data.” Social media and crowdsourcing platforms and various applications ― “apps” ― are producing reams of information from the instantaneous transactions and input of millions and millions of people around the globe. The Internet-of-Things (IoT), which is expected to comprise tens of billions of objects by the end of this decade, is actively sensing real-time intelligence on nearly every aspect of our lives and environment. The Global Positioning System (GPS) and other location-aware technologies are producing data that is specific down to particular latitude and longitude coordinates and seconds of the day. Large-scale instruments, such as the Large Hadron Collider (LHC), are collecting massive amounts of data on our planet and even distant corners of the visible universe. Digitization is being used to convert large collections of documents from print to digital format, giving rise to large archives of unstructured data. Innovations in technology, in the areas of Cloud and molecular computing, Artificial Intelligence/Machine Learning, and Natural Language Processing (NLP), to name only a few, also are greatly expanding our capacity to store, manage, and process Big Data. In this context, the Encyclopedia of Big Data is being offered in recognition of a world that is rapidly moving from gigabytes to terabytes to petabytes and beyond. While indeed large data sets have long been around and in use in a variety of fields, the era of Big Data in which we now live departs from the past in a number of key respects and with this departure comes a fresh set of challenges and opportunities that cut across and affect multiple sectors and disciplines, and the public at large. With expanded analytical capacities at hand, Big Data is now being used for scientific inquiry and experimentation in nearly every (if not all) disciplines, from the social sciences to the humanities to the natural sciences, and more. Moreover, the use of Big Data has been well established beyond the Ivory Tower. In today’s economy, businesses simply cannot be competitive without engaging Big Data in one way or another in support of operations, management, planning, or simply basic hiring decisions. In all levels of government, Big Data is being used to engage citizens and to guide policy making in pursuit of the interests of the public and society in general. Moreover, the changing nature of Big Data also raises new issues and concerns related to, for example, privacy, liability, security, access, and even the veracity of the data itself.Given the complex issues attending Big Data, there is a real need for a reference book that covers the subject from a multi-disciplinary, cross-sectoral, comprehensive, and international perspective. The Encyclopedia of Big Data will address this need and will be the first of such reference books to do so. Featuring some 500 entries, from "Access" to "Zillow," the Encyclopedia will serve as a fundamental resource for researchers and students, for decision makers and leaders, and for business analysts and purveyors. Developed for those in academia, industry, and government, and others with a general interest in Big Data, the encyclopedia will be aimed especially at those involved in its collection, analysis, and use. Ultimately, the Encyclopedia of Big Data will provide a common platform and language covering the breadth and depth of the topic for different segments, sectors, and disciplines.

Encyclopedia of Color Science and Technology

by Renzo Shamey

This fully revised and expanded 2nd edition provides a single authoritative resource describing the concepts of color and the application of color science across research and industry. Significant changes for the 2nd edition include: New and expanded sections on color engineeringMore entries on fundamental concepts of color science and color termsMany additional entries on specific materialsFurther material on optical concepts and human visual perceptionAdditional articles on organisations, tools and systems relevant to colorA new set of entries on 3D presentation of color In addition, many of the existing entries have been revised and updated to ensure that the content of the encyclopedia is current and represents the state of the art. The work covers the full gamut of color: the fundamentals of color science; the physics and chemistry; color as it relates to optical phenomena and the human visual system; and colorants and materials. The measurement of color is described through entries on colorimetry, color spaces, color difference metrics, color appearance models, color order systems and cognitive color. The encyclopedia also has extensive coverage of applications throughout industry, including color imaging, color capture, display and printing, and descriptions of color encodings, color management, processing color and applications relating to color synthesis for computer graphics are included. The broad scope of the work is illustrated through entries on color in art conservation, color and architecture, color and education, color and culture, and biographies of some of the key figures involved in color research throughout history. With over 250 entries from color science researchers across academia and industry, this expanded 2nd edition of the Encyclopedia of Color Science and Technology remains the most important single resource in color science.

Encyclopedia of Computer Graphics and Games

by Newton Lee

Encyclopedia of Computer Graphics and Games (ECGG) is a unique reference resource tailored to meet the needs of research and applications for industry professionals and academic communities worldwide. The ECGG covers the history, technologies, and trends of computer graphics and games.EditorNewton Lee, Institute for Education, Research, and Scholarships, Los Angeles, CA, USA Academic Co-ChairsShlomo Dubnov, Department of Music and Computer Science and Engineering, University of California San Diego, San Diego, CA, USAPatrick C. K. Hung, University of Ontario Institute of Technology, Oshawa, ON, CanadaJaci Lee Lederman, Vincennes University, Vincennes, IN, USAIndustry Co-ChairsShuichi Kurabayashi, Cygames, Inc. & Keio University, Kanagawa, JapanXiaomao Wu, Gritworld GmbH, Frankfurt am Main, Hessen, Germany Editorial Board MembersLeigh Achterbosch, School of Science, Engineering, IT and Physical Sciences, Federation University Australia Mt Helen, Ballarat, VIC, AustraliaRamazan S. Aygun, Department of Computer Science, Kennesaw State University, Marietta, GA, USABarbaros Bostan, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAnthony L. Brooks, Aalborg University, Aalborg, DenmarkGuven Catak, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAlvin Kok Chuen Chan, Cambridge Corporate University, Lucerne, SwitzerlandAnirban Chowdhury, Department of User Experience and Interaction Design, School of Design (SoD), University of Petroleum and Energy Studies (UPES), Dehradun, Uttarakhand, IndiaSaverio Debernardis, Dipartimento di Meccanica, Matematica e Management, Politecnico di Bari, Bari, ItalyAbdennour El Rhalibi, Liverpool John Moores University, Liverpool, UKStefano Ferretti, Department of Computer Science and Engineering, University of Bologna, Bologna, ItalyHan Hu, School of Information and Electronics, Beijing Institute of Technology, Beijing, ChinaMs. Susan Johnston, Select Services Films Inc., Los Angeles, CA, USAChris Joslin, Carleton University, Ottawa, CanadaSicilia Ferreira Judice, Department of Computer Science, University of Calgary, Calgary, CanadaHoshang Kolivand, Department Computer Science, Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool, UKDario Maggiorini, Department of Computer Science, University of Milan, Milan, ItalyTim McGraw, Purdue University, West Lafayette, IN, USAGeorge Papagiannakis, ORamaVR S.A., Heraklion, Greece; FORTH-ICS, Heraklion Greece University of Crete, Heraklion, GreeceFlorian Richoux, Nantes Atlantic Computer Science Laboratory (LINA), Université de Nantes, Nantes, FranceAndrea Sanna, Dipartimento di Automatica e Informatica, Politecnico di Torino, Turin, ItalyYann Savoye, Institut fur Informatik, Innsbruck University, Innsbruck, AustriaSercan Şengün, Wonsook Kim School of Art, Illinois State University, Normal, IL, USARuck Thawonmas, Ritsumeikan University, Shiga, JapanVinesh Thiruchelvam, Asia Pacific University of Technology & Innovation, Kuala Lumpur, MalaysiaRojin Vishkaie, Amazon, Seattle, WA, USADuncan A. H. Williams, Digital Creativity Labs, Department of Computer Science, University of York, York, UKSai-Keung Wong, National Chiao Tung University, Hsinchu, TaiwanEditorial Board InternSa

Encyclopedia of Computer Science and Technology: Volume 16 - Index (Computer Science And Technology Encyclopedia Ser.)

by Jack Belzer

""This comprehensive reference work provides immediate, fingertip access to state-of-the-art technology in nearly 700 self-contained articles written by over 900 international authorities. Each article in the Encyclopedia features current developments and trends in computers, software, vendors, and applications...extensive bibliographies of leading figures in the field, such as Samuel Alexander, John von Neumann, and Norbert Wiener...and in-depth analysis of future directions.

Refine Search

Showing 17,901 through 17,925 of 54,104 results