The book presents original contributions to the theories and practices of emerging internet, data, and web technologies and their applicability in businesses, engineering, and academia. As a key feature, it addresses advances in the life-cycle exploitation of data generated from the digital ecosystem data technologies that create value for the knowledge and businesses toward a collective intelligence approach.
Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two most prominent paradigms, in a variety of forms such as data centers, cloud computing, mobile cloud, and mobile web services. These technologies altogether create a digital ecosystem whose corner stone is the data cycle, from capturing to processing, analysis, and visualization. The investigation of various research and development issues in this digital ecosystem is boosted by the ever-increasing needs of real-life applications, which are based on storing and processing large amounts of data.
Researchers, software developers, practitioners, and students interested in the field of data and web technologies will find this book useful and a reference for their activity.
Cuprins
Few Shot Ner on Augmented Unstructured Text from Cardiology Records.- The Influence of Financial Literacy and Financial Technology on Smes’ Sustainability.- The Effect of Digital and Human Capital Transformation on Sme Performance With Accounting Information Systems as an Intervening Variable.- Openvslam-based Development Framework for Web-based Vr Tours Using 360vr Videos and Its Extensions.- Implementation of a Fuzzy-based System for Assessment of Logical Trust Considering Reliability as a New Parameter.- Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms.- An Efficient Vulnerability Detection Method for 5g Nas Protocol Based on Combinatorial Testing.- Graph-based Detection of Encrypted Malicious Traffic with Spatio-temporal Features.- Fuzzing Iot Devices via Android App Interfaces with Large Language Model.- Towards the Automated Population of Thesauri Using Bert: A Use Case on the Cybersecurity Domain.- Network Scanning Detection Based on Spatiotemporal Behavior.- Iotaint: An Optimized Static Taint Analysis Method in Embedded Firmware.- An Innovative Approach to Real-time Concept Drift Detection in Network Security.- Formal Analysis of 5g Eap-tls 1.3.- Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering.