Résultats de recherche de titre
Articles 41 à 60 sur 4065
Proceedings of the 3rd Annual International Conference on Material, Machines and Methods for Sustainable Development: Volume 2: Materials Applications, Machining, and Renewable Energy (Lecture Notes in Mechanical Engineering)
Par Banh Tien Long, Kozo Ishizaki, Hyung Sun Kim, Yun-Hae Kim, Nguyen Duc Toan, Nguyen Thi Hong Minh, Pham Duc An. 2024
This book presents selected, peer-reviewed proceedings of the 3rd International Conference on Material, Machines and Methods for Sustainable Development (MMMS2022),…
held in the city of Can Tho, Vietnam, from 10 to 13 November 2022. The purpose of the conference is to explore and ensure an understanding of the critical aspects contributing to sustainable development with a focus on advanced mechanical engineering, automation, materials, machines and methods. The contributions published in this book come from authors representing universities, research institutes and industrial companies and reflect the results of a very broad spectrum of research, from micro- and nanoscale materials design and processing, to mechanical engineering technology in industry. Many of the contributions selected for these proceedings focus on materials modeling, eco-material processes and mechanical manufacturing. Volume 2 of this book focuses on topics dedicated to materials applications, machining, and renewable energy. Selected topics include: material machinability and economic efficiency, sustainable development manufacturing technology, environmental protection, as well as green development and climate change prevention.Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem
Par Chris Hughes, Nikki Robinson. 2024
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend…
tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.This book contains visionary and best papers from the workshops held at the International Conference on Autonomous Agents and Multiagent…
Systems, AAMAS 2023, held in London, UK, during May 29–June 2, 2023.The 12 regular papers, 5 best papers and 7 visionary papers, presented were carefully reviewed and selected from a total of more than 110 contributions to the workshops. They focus on emerging topics and new trends in the area of autonomous agents and multiagent systems and stem from the following workshops:- Workshop on Autonomous Robots and Multirobot Systems (ARMS)- Workshop on Adaptive and Learning Agents (ALA)- Workshop on Interdisciplinary Design of Emotion Sensitive Agents (IDEA)- Workshop on Rebellion and Disobedience in Artificial Intelligence (RaD-AI)- Workshop on Neuro-symbolic AI for Agent and Multi-Agent Systems (NeSyMAS)- Workshop on Multiagent Sequential Decision Making under Uncertainty (MSDM)- Workshop on Citizen-Centric Multi-Agent Systems (C-MAS)Artificial Life and Evolutionary Computation: 17th Italian Workshop, WIVACE 2023, Venice, Italy, September 6–8, 2023, Revised Selected Papers (Communications in Computer and Information Science #1977)
Par Marco Villani, Stefano Cagnoni, Roberto Serra. 2024
This book constitutes the refereed post proceedings of the 17th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2023, held in Venice, Italy, during September…
6–8, 2023.The 30 full papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: Algorithms for complex systems, Biologically inspired models, Complex chemical systems, Adaptation and swarms, Learning, Medicine and Social systems.The Map in the Machine: Charting the Spatial Architecture of Digital Capitalism
Par Luis F. Alvarez Leon. 2024
Digital technologies have changed how we shop, work, play, and communicate, reshaping our societies and economies. To understand digital capitalism,…
we need to grasp how advances in geospatial technologies underpin the construction, operation, and refinement of markets for digital goods and services. In The Map in the Machine, Luis F. Alvarez Leon examines these advances, from MapQuest and Google Maps to the rise of IP geolocation, ridesharing, and a new Earth Observation satellite ecosystem. He develops a geographical theory of digital capitalism centered on the processes of location, valuation, and marketization to provide a new vantage point from which to better understand, and intervene in, the dominant techno-economic paradigm of our time. By centering the spatiality of digital capitalism, Alvarez Leon shows how this system is the product not of seemingly intangible information clouds but rather of a vast array of technologies, practices, and infrastructures deeply rooted in place, mediated by geography, and open to contestation and change.Integrated Solutions for Smart and Sustainable Environmental Conservation (Studies in Systems, Decision and Control #527)
Par Jamal Mabrouki, Mourade Azrour. 2024
Resource depletion and ecological risks are more than ever at the heart of societal and economic debates. In the 1970s,…
the developed countries saw the Fordist growth regime crumble in parallel with the growing awareness of the ecological issue. Since the first industrial revolutions, technological dynamics have been the cause of many environmental problems, and there is a consensus on the diagnosis. Integrated technologies reduce resource use and/or pollution at source by using cleaner production methods. This generally leads to a reduction in the by-products, energy inputs and resources used by companies to produce goods. Integrated production technologies reduce negative environmental impacts at source by substituting or modifying cleaner technologies. Examples of integrated, or cleaner, production technologies are the recirculation of materials, the use of environmentally friendly materials (such as the substitution of water for organic solvents), etc. However, the implementation of integrated production technologies is often hampered by obstacles related to cost, coordination and skill inertia problems and to the productive organisation of companies. In addition to the high investment costs of new integrated technologies, additional barriers may emerge depending on the nature of the environmental problem and the type of environmental regulation in question.Advances in Remanufacturing: Proceedings of the VII International Workshop on Autonomous Remanufacturing (Lecture Notes in Mechanical Engineering)
Par Marcello Fera, Mario Caterino, Roberto Macchiaroli, Duc Truong Pham. 2024
This book features the papers presented at IWAR 2023. The overall objective of the event was to bring together international…
scientists and engineers to bridge the academic and industrial worlds in the field of remanufacturing. Various themes related to remanufacturing, including methods for operations management, methodologies for quality assessment and life cycle assessment, the integration of robots in remanufacturing, and the use of modern I4.0 technologies in a remanufacturing context among others were addressed. This book is intended for academics, graduate students, researchers, as well as industrial practitioners engaged in the field of remanufacturing.Digital Resilience: Navigating Disruption and Safeguarding Data Privacy (EAI/Springer Innovations in Communication and Computing)
Par Shishir Kumar Shandilya, Agni Datta, Yash Kartik, Atulya Nagar. 2024
This book offers an in-depth overview of digital resilience, defined as the ability of individuals, organizations, and societies to adapt…
to and counter various digital threats such as cyberattacks, data breaches, and other forms of cyber threats. Digital resilience not only enables proactive measures but also ensures fault-tolerant planning and design. The book elaborates on the necessary techniques and methods to achieve digital resilience. Key methodologies, including quantum computing, post-quantum cryptography, nature-inspired cybersecurity, zero-trust systems, zero-knowledge proofs, multi-party computation, and the emerging field of space security, are discussed in detail. The book provides insights into artificial intelligence and machine learning, examining their impact on society and organizations. It critically analyses the role of cybersecurity in businesses, emphasizing its importance for safety and economic stability. In addition, the book discusses notable cyber incidents, offering valuable insights into digital resilience. It serves as a comprehensive compilation, featuring key terms, definitions, case studies, and references to existing literature and research in cybersecurity, analytics, information sciences, future computing, digital resilience, and related fields.Smart Trends in Computing and Communications: Proceedings of SmartCom 2023, Volume 2 (Lecture Notes in Networks and Systems #650)
Par Tomonobu Senjyu, Chakchai So-In, Amit Joshi. 2023
This book gathers high-quality papers presented at the Seventh International Conference on Smart Trends in Computing and Communications (SmartCom 2022),…
organized by Global Knowledge Research Foundation (GR Foundation) from January 24–25, 2023, in Jaipur, India. It covers the state-of-the-art and emerging topics in information, computer communications, and effective strategies for their use in engineering and managerial applications. It also explores and discusses the latest technological advances in, and future directions for, information and knowledge computing and its applications.Computing Intelligence in Capital Market (Studies in Computational Intelligence #1154)
Par Asef Yelghi, Aref Yelghi, Mehmet Apan, Shirmohammad Tavangari. 2024
The book is divided into sections according to the content of the chapters. The first section covers AI concepts with…
NP and financial issues. The second section covers AI techniques in relation to Fintech issues. The remaining sections are implementation and analysis. As science and technology development and algorithms are widely used in various fields, their influence and development have increased efficiency and productivity. The introduction of algorithms in the financial field has not been an exception to this. In recent years, the growth and development of the financial system have been in sync with the growth of technology. Fintechs were born at the intersection of these two sectors. What happens through the application of computer knowledge in the financial field, or the examination of the efficiency and effectiveness of their use and the interaction and combination of these two fields has been written very infrequently in the majority of books. In Fintech, there are problems that researchers focus on such as customer support, portfolio management, trading algorithms, fraud detection, credit risk assessment, insurance, and wealth management. The mentioned problems are complex and are mapped to NP problems in the field of artificial intelligence. In the last two decades, optimization algorithms, neural networks, and deep learning have been widely applied in many scientific and engineering fields to solve the mentioned problems. The purpose of this book is to provide the reader with the most used artificial intelligence methods for scientific and engineering problems. This book is used by students, scientists, and practitioners in various fields. The chapters are self-explanatory, and the reader can read each one separately. They describe the algorithm used, the chosen problem, and the implementation. In addition, practical examples, comparisons, and experimental results are presented.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Linkerd: Up and Running
Par Jason Morgan, Flynn. 2024
With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can…
help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how the Linkerd service mesh enables cloud-native developers—including platform and site reliability engineers—to solve the thorny issue of running distributed applications in Kubernetes.Jason Morgan and Flynn draw on their years of experience at Buoyant—the creators of Linkerd—to demonstrate how this service mesh can help ensure that your applications are secure, observable, and reliable. You'll understand why Linkerd, the original service mesh, can still claim the lowest time to value of any mesh option available today.Learn how Linkerd works and which tasks it can help you accomplishInstall and configure Linkerd in an imperative and declarative mannerSecure interservice traffic and set up secure multicluster linksLaunch a zero trust authorization strategy in Kubernetes clustersOrganize services in Linkerd to override error codes, set custom retries, and create timeoutsUse Linkerd to manage progressive delivery and pair this service mesh with the ingress of your choiceBlockchain-based Cyber Security: Applications and Paradigms
Par Kaushal Shah. 2024
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and…
the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security attacks by considering real-time applications based on IoT, Wireless Sensor Networks, Cyber-Physical Systems, and Smart Grids. The book is useful for academicians and research scholars worldwide working in cyber security. It is also useful for industry experts working in cyber security.Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 2 (Ubiquitous Computing, Healthcare and Well-being)
Par Md Atiqur Rahman Ahad, Sozo Inoue, Guillaume Lopez, Tahera Hossain. 2024
Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on two main subject areas: Movement and Sensors, and Sports Activity Analysis.The editors are experts in these arenas, and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Software Quality as a Foundation for Security: 16th International Conference on Software Quality, SWQD 2024, Vienna, Austria, April 23–25, 2024, Proceedings (Lecture Notes in Business Information Processing #505)
Par Peter Bludau, Rudolf Ramler, Dietmar Winkler, Johannes Bergsmann. 2024
This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2024, held in Vienna, Austria, during…
April 23-25, 2024. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conference on software quality in Europe. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2024 is “Software Quality as a Foundation for Security”. The 7 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The papers were organized in topical sections as follows: Requirements engineering; software quality; continuous integration and deployment; communication and collaboration; artificial intelligence; and security and compliance.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they…
evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.