This book offers students an introduction to the concepts of big data and artificial intelligence (AI) and their applications in the business world. It answers questions such as what are the main concepts of artificial intelligence and big data? What applications for artificial intelligence and big data analytics are used in the business field? It offers application-oriented overviews and cases from different sectors and fields to help readers discover and gain useful insights. Each chapter features discussion questions and summaries. To assist professors in teaching, the book...
This book offers students an introduction to the concepts of big data and artificial intelligence (AI) and their applications in the business world...
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the build...
The world is moving away from demand-driven electricity markets supplied by centralized generation and distribution of fossil-fuel-produced electricity. Increasing reliance on weather-dependent renewable sources will require a shift toward a supply-driven paradigm, while beneficial electrification, including widespread adoption of electric vehicles, heat pumps, and batteries will offer considerable but widely distributed demand flexibility that can be used to compensate for supply variability. The open-source Power Trading Agent Competition (Power TAC) platform simulates a decentralized...
The world is moving away from demand-driven electricity markets supplied by centralized generation and distribution of fossil-fuel-produced elect...
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the build...