Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Coverage

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Is the proportion of the resources that the production system contains the true value of throughput.
Published in Chapter:
Cyber Security Model of Artificial Social System Man-Machine
Calin Ciufudean (Stefan cel Mare University, Romania)
DOI: 10.4018/978-1-4666-6324-4.ch031
Abstract
Cyber Security Model of Artificial Social System Man-Machine takes advantage of an important chapter of artificial intelligence, discrete event systems applied for modelling and simulation of control, logistic supply, chart positioning, and optimum trajectory planning of artificial social systems. “An artificial social system is a set of restrictions on agents` behaviours in a multi-agent environment. Its role is to allow agents to coexist in a shared environment and pursue their respective goals in the presence of other agents” (Moses & Tennenholtz, n.d.). Despite conventional approaches, Cyber Security Model of Artificial Social System Man-Machine is not guided by rigid control algorithms but by flexible, event-adaptable ones that makes them more lively and available. All these allow a new design of artificial social systems dotted with intelligence, autonomous decision-making capabilities, and self-diagnosing properties. Heuristics techniques, data mining planning activities, scheduling algorithms, automatic data identification, processing, and control represent as many trumps for these new systems analyzing formalism. The authors challenge these frameworks to model and simulate the interaction of man-machine in order to have a better look at the human, social, and organizational privacy and information protection.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
New Model for Geospatial Coverages in JSON: Coverage Implementation Schema and Its Implementation With JavaScript
A feature that acts as a function to return values from its range for any direct position within its spatiotemporal domain.
Full Text Chapter Download: US $37.50 Add to Cart
DRL-Based Coverage Optimization in UAV Networks for Microservice-Based IoT Applications
This refers to the extent or range of an area that is being monitored, mapped, explored, or inspected by a system, sensor, or vehicle, such as UAVs. It is the measure of how much of a specific region is being covered or explored by a particular operation or device.
Full Text Chapter Download: US $37.50 Add to Cart
Collaborative Filtering Based Recommendation Systems
Coverage is measured as the percentage of user-item pairs in the test set for which recommendations can be made.
Full Text Chapter Download: US $37.50 Add to Cart
A Common Sense Approach to Interoperability
is a quality measure of the percentage of the material that any automatic processing can recognize.Database a computer program which stores and retrieves information, such as Microsoft Access or MySQL. Databases have been used since the 1950s for administrative tasks such as banking and for scientific data such as astronomy. A database organizes information in an electronic equivalent to an official form, and makes sure that this structure is used to keep the data valid.
Full Text Chapter Download: US $37.50 Add to Cart
Priority Encoding-Based Cluster Head Selection Approach in Wireless Sensor Networks
Coverage is considered as a quality of service parameter which determines how well and for how long the region of interest can be monitored by the sensor nodes. A region of interest is said to be monitored by a sensor node if it is within the sensing range of at least one sensor node. Depending on the number of nodes which can monitor a given point in the target region coverage is defined as 1-coverage, 2-coverage and k coverage. Mission critical applications may require higher degree of coverage. Coverage is categorized as three types: area coverage which intends to cover entire target region. Target/ Point coverage approaches aim to monitor a specific set of points. The barrier coverage problems are basically used in identifying the penetration points within the target region and are classified as Maximum Breach Path and Maximum Support Path.
Full Text Chapter Download: US $37.50 Add to Cart
Automatic Test Data Generation Using Bio-Inspired Algorithms: A Travelogue
The percent of code tested by a particular set of input data or by adopting a specific testing strategy is known as coverage.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR