Résultats de recherche de titre
Articles 141 à 160 sur 1228
Data Management: Der Weg zum datengetriebenen Unternehmen
Par Klaus-Dieter Gronwald. 2024
Dieses Lehrbuch betrachtet Data Management als interdisziplinäres Konzept mit Fokus auf den Zielen datengetriebener Unternehmen. Im Zentrum steht die interaktive Entwicklung eines Unternehmensdatenmodells für ein virtuelles…
Unternehmen mit Unterstützung eines online Learning Games unter Einbeziehung der Aufgaben, Ziele und Grundsätze des Data Managements, typischer Data-Management-Komponenten und Frameworks wie Datenmodellierung und Design, Metadaten Management, Data Architecture, und Data Governance, und verknüpft diese mit datengetriebenen Anwendungen wie Business Warehousing, Big Data, In-Memory Data Management, und Machine Learning im Data Management Kontext.Das Buch dient als Lehrbuch für Studierende der Informatik, der Wirtschaft und der Wirtschaftsinformatik an Universitäten, Hochschulen und Fachschulen und zur industriellen Aus- und Weiterbildung.Fourth Congress on Intelligent Systems: CIS 2023, Volume 2 (Lecture Notes in Networks and Systems #869)
Par Sandeep Kumar, K. Balachandran, Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by…
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)
Par Nur Syazreen Ahmad, Junita Mohamad-Saleh, Jiashen Teh. 2024
This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing,…
and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.Die Digitalisierung und Entwicklungen im Gebiet der künstlichen Intelligenz haben in den letzten Jahren erhebliche Veränderungen in der Gesellschaft und…
der Unternehmenspraxis hervorgerufen. Aufkommende Technologien in den Feldern Big Data und Advanced Analytics werden auch im Controlling zunehmend diskutiert oder bereits eingesetzt. Dabei befinden sich der Wissensstand, inwieweit Big Data und Advanced Analytics das Controlling beeinflussen und verändern können, und die praktische Anwendung noch in einem frühen Stadium. Diese Arbeit befasst sich deshalb mit der Untersuchung der möglichen Auswirkungen von Big Data und Advanced Analytics im Controlling. Vor diesem Hintergrund werden die Einflüsse dieser digitalen Trends auf den Informationsversorgungsprozess des Controllings, auf die Erfüllung Controlling-spezifischer Anforderungen an Informationen und auf das Forecasting, die Budgetierung und die strategische Planung analysiert. Ferner werden praxisrelevante Herausforderungen, Grenzen und Risiken bei der Implementierung und Nutzung identifiziert sowie Implikationen zu deren Umgang zur Ausschöpfung der Potenziale abgeleitet.This book constitutes the refereed post proceedings of the Third International Scientific and Practical Conference on Information Technologies and Intelligent…
Decision Making Systems, ITIDMS 2023, held in Moscow, Russia, during December, 12-14, 2023. The 18 full papers included in this book were carefully reviewed and selected from 54 submissions. The papers presented in this volume focus on topics such as digital, intellectual and information transformation, the development of computer models and the improvement of automated and computing processes.Computational Fluid Dynamics: Finite Difference Method and Lattice Boltzmann Method (Engineering Applications of Computational Methods #20)
Par Guoxiang Hou, Caikan Chen, Shenglei Qin, Yuan Gao, Kai Wang. 2024
This book provides a concise and comprehensive introduction to several basic methods with more attention to their theoretical basis and…
applications in fluid dynamics. Furthermore, some new ideas are presented in this book, for example, a method to solve the transition matrix by difference operator transformation. For this method, the book gives the definition of Fourier integral transformation of translation operator, and proves the transition matrix equaling to the differential operator transformation, so that it is extended to general situations of explicit, implicit, multi-layer difference equations, etc. This flexible approach is also used in the differential part. In addition, the book also includes six types of equivalent stability definitions in two ways and deeply analyzes their errors, stabilities and convergences of the difference equations. What is more important, some new scientific contributions on lattice Boltzmann method (LBM) in recent years are presented in the book as well. The authors write the book combining their ten years teaching experience and research results and this book is intended for graduate students who are interested in the area of computational fluid dynamics (CFD). Authors list some new research achievements, such as simplified lattice Boltzmann method, the simplified lattice Boltzmann flux solver and discrete unified gas kinetic scheme, and expect that this new information could give readers possible further investigating ideas in their future research on CFD area.Störungstolerante Datenauthentifizierung für drahtlose Kommunikation
Par Obaid Ur-Rehman, Natasa Zivic. 2024
Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die…
etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten; · Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren; · Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basierenSmart and Healthy Walking: Toward Better Health and Life in Smart Cities (SpringerBriefs in Applied Sciences and Technology)
Par Tin-Chih Toly Chen, Yun-Ju Lee. 2024
This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users. From meticulously planned…
walking routes to precise footprint detection and analysis, as well as cutting-edge fall detection and prevention mechanisms, these intelligent technologies have the potential to revolutionize healthy and smart walking. Against the backdrop of the post-COVID-19 era, where unrestricted mobility has become pivotal for restoring normalcy, the demand for smart healthcare solutions has soared. The book explores latest advances in sensor technology, cloud computing, deep learning, and networking and related innovative applications that can leverage smart technologies to enhance healthy walking.Safe All Along: Trading Our Fears and Anxieties for God's Unshakable Peace
Par Katie Davis Majors. 2023
Leave behind your anxious thoughts and embrace a steady confidence that you are never beyond the reach of God&’s loving…
hand, from the bestselling author of Kisses from Katie.&“Safe All Along will help you break the cycle of what-if worries and experience the peace of God in new ways.&”—Jennie Allen, New York Times bestselling author of Get Out of Your HeadAs a missionary, wife, and mom of fifteen, Katie Davis Majors knows how hard it can be to receive God&’s peace instead of giving in to fear and worry. Family emergencies, unexpected life-shifting events, and the busy rhythms of family life have at times left her reeling. In Safe All Along, Katie offers reflections and stories from around the world and from her own kitchen table about her personal journey toward living from a place of surrendered trust. Every chapter leads us deep into Scripture as we learn what it looks like to break free from anxiety and take hold of peace.Rich in biblical explorations of lament and praise, forgiveness and hope, service and surrender, Safe All Along asks, What practical choices can we make to experience the peace Jesus promised amid disappointment and uncertainty? How can we live with joy and confidence even when we&’re pulled into the rapids of life?Our God has promised us a peace that transcends all understanding. And we can accept His promise, trusting that in Him we are safe all along.Frontier Information Technology and Systems Research in Cooperative Economics (Studies in Systems, Decision and Control #316)
Par Aleksei V. Bogoviz, Alexander E. Suglobov, Alexandr N. Maloletko, Olga V. Kaurova, Svetlana V. Lobova. 2021
This book is the very first book-length study devoted to the advances in technological development and systems research in cooperative…
economics. The chapters provide, first of all, a coherent framework for understanding and applying the concepts and approaches of complexity and systems science for the advanced study of cooperative networks and particular cooperative enterprises and communities. Second, the book serves as a unique source of reliable information on the frontier information technologies available for the production, consumer, credit, and agricultural cooperative enterprises, discussing predominant strategies, potential drivers of change, and responses to complex problems. Given the diverse range of backgrounds and advanced research results, researchers, decision-makers, and stakeholders from all fields of cooperative economics in any country of the world will undoubtedly benefit from this book.A snappy book of simple conversational swaps that reveals how to talk so everyone will listen Words matter. They can…
inform, soothe, sting, reverberate, and leave scars. And the wrong words can turn off—literally—the listener, transforming what should be an exchange of information, feelings, and ideas into dead air time. So many of our dialogues with others are like scripts—we say the same things, ask the same questions, react in the same ways, and get the same (predictably bad) responses. Our verbal interactions with others often illustrate that famous definition of insanity: doing the same thing over and over and expecting a different response. With quick-take visuals and a smart sense of how human beings really talk to each other, What to Say to Get Your Way can turn dead air time into something productive. It's a simple, effective toolbox that will train anyone to say what they mean effectively and powerfully.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingWhat Every Engineer Should Know About Digital Accessibility (ISSN)
Par Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.Get Quiet: 7 Simple Paths to the Truth of Who You Are
Par Elaine Glass. 2024
"This book has the power to connect you with your soul and transform your life."— Kristen Butler, founder of Power…
of PositivityWe're living in frenetic times. Amid the busyness and complexity, you may also feel directionless and overwhelmed. Maybe you know there&’s more to life, but you have no idea what that "more" is. Maybe you sense there's a message you need to hear, but the noise of everyday life is drowning it out.Get Quiet is your guide to turn down the volume and tune in to the voice of your soul.In these pages, coach and healer Elaine Glass invites you to walk with her on the Get Quiet Way—a practice of healing and transformation inspired by the classical form of the labyrinth. You&’ll follow seven circuits of reflection and discovery, each engaging an energy point on the body to awaken its particular power, until you reach a still point at the center—a sacred space where you can connect deeply with the truth of who you are. Finally, you'll step back into the world feeling stronger and clearer, more at peace, and open to new possibilities for a life of purpose and joy."A timely antidote to the overwhelm that so many of us are feeling. Just as healthy foods are the right medicine for your body, Get Quiet is the right medicine for your soul."— Mark Hyman, M.D., author of the #1 New York Times bestseller Young ForeverWherever You Go, There You Are: Mindfulness Meditation in Everyday Life
Par Jon Kabat-Zinn. 2023
Find quiet reflective moments in your life—and reduce your stress levels drastically—with this classic bestselling guide updated and featuring a…
new introduction and afterword. When Wherever You Go, There You Are was first published in 1994, no one could have predicted that the book would launch itself onto bestseller lists nationwide and sell over 1 million copies to date. Thirty years later, Wherever You Go, There You Are remains a foundational guide to mindfulness and meditation, introducing readers to the practice and guiding them through the process. The author of over half a dozen books on mindfulness, Jon Kabat-Zinn combines his research and medical background with his spiritual knowledge to help readers find peace and change their lives. In this new edition, readers will find a new introduction and afterword from Kabat-Zinn, as well as factual updates throughout to address changes in research and knowledge since it was originally published. After the special tumult of the last few years, as well as the promise of more unrest in the future, Wherever You Go, There You Are serves as an anchor for a whole new generation of readers looking to find their center and achieve their true self.Cybercrime and Digital Deviance
Par Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
Par James Forshaw. 2024
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google…
Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.Surf Therapy: The Evidence-Based Science for Physical, Mental & Emotional Well-Being
Par Cash Lambert. 2024
A deep look into the surf therapy movement, the therapists at the forefront of this radical new treatment, and its…
many applications for treating anxiety, PTSD, and more. Surfing? As a form of therapy? It&’s not just possible—it&’s powerful. Surf therapy is an emerging field with promising results which aims to address the mental, physical and emotional epidemics of the modern age. In Surf Therapy, author Cash Lambert paddles out with today&’s leading surf therapy practitioners and surf therapy organizations to discover how surfing is changing lives for the better.See how much surf therapy can help in treating: • Drug addiction and addiction recovery• Children and adults diagnosed with autism• Social development of at-risk inner-city children• Physical disabilities like spinal cord injuries• PTSD in active-duty police officers• Terminal illnesses like cystic fibrosis• Women recovering from abusive living situationsWith interviews from today&’s leading surf therapy practitioners and data from groundbreaking studies, Surf Therapy is a story of science, resilience, and the lengths that humans will go to help one another in need.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024,…
held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.