Résultats de recherche de titre
Articles 61 à 80 sur 2612
This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu,…
China, in August 2023.The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China,…
during December 17–18, 2023.The 9 full papers in this book were carefully reviewed and selected from 14 submissions. They are organized in topical sections as follows: Cognitive Computing Technologies and Infrastructure, Cognitive Computing Applications, Sensing Intelligence, Cognitive Analysis, Mobile Services, Cognitive Computing on Smart Home, and Cognitive Computing on Smart City.This project is the first to explore how Bernard Shaw intersects constructively with automata, robots and artificial intelligence (AI). Shaw…
was born in the golden age of the automaton. His Bible on the Life Force and Creative Evolution, Back to Methuselah, was written when Karel and Josef Čapek coined the word “robot.” Shaw’s life ran in parallel with the rise of AI, and the big names in AI were his contemporaries. Moreover, empirical analyses of Shavian texts and images using AI uncovers possibilities for new interpretations, demonstrating how future renditions of his works may make use of these advanced technologies to broaden Shaw’s audience, readership and scholarship.Management, Tourism and Smart Technologies: ICMTT 2023 Volume 1 (Lecture Notes in Networks and Systems #773)
Par Carlos Montenegro, Álvaro Rocha, Juan Manuel Cueva Lovelle. 2024
This book presents advances in the research of various entities in the world, which are working on the application of…
technology or management in tourism. Indeed, one of the sectors hardest hit by the pandemic was tourism, likewise one of the post-pandemic effects is the rapid recovery of the sector, but more importantly is the great innovation that has occurred in marketing strategies for tourism using technology and applying management strategies not only to be more profitable but to have the best customer satisfaction. The book is aimed at the general public that seeks to innovate, learn from lessons learned and establish a knowledge base in mechanisms that apply technology or management in tourism, with the aim of improving the experience of all those involved in the business chain.This compendium aims to share all those great experiences and researches in the areas of: Managements, Tourism, Marketing strategies in Management, Tourism and Technology, Technology, Applied Computer Science, Artificial Intelligence, Business Administration, Cloud Computing, Educational Management, Finance, Insurance and Services Management, Health Tourism, Human Resource Management, Information Systems Planning and Management, Information Technologies in Tourism, Internet Technology, Knowledge Management, Management of Supply Chain and Logistics, Marketing Innovation, Robotics, Strategic Management Innovation, Sustainability Management, Technical Economy Management, Technical Innovation and Management, Technology in Tourism and Tourist Experience, Tourism Industry and Ecology, Tourism Management, a total of 77 research projects and many spaces and relationships between researchers to collaborate in the advancement of science are presented.Current Trends in Web Engineering: ICWE 2023 International Workshops: BECS, SWEET, WALS, Alicante, Spain, June 6–9, 2023, Revised Selected Papers (Communications in Computer and Information Science #1898)
Par Sven Casteleyn, Tommi Mikkonen, Alberto García Simón, In-Young Ko, Giuseppe Loseto. 2024
This volume constitutes the papers of several workshops which were held in conjunction with the International Conference on Web Engineering,…
ICWE 2023, held in Alicante, Spain, in June 6–9, 2023.The 10 revised full papers and 2 short papers presented in this book were carefully reviewed and selected from 23 submissions. They stem from the following workshops:Third International Workshop on Big Data Driven Edge Cloud Services (BECS 2023) Second International Workshop on the Semantic Web of Everything (SWEET 2023) Second International Workshop on Web Applications for Life Sciences (WALS2023)Numerical Analysis of Ordinary and Delay Differential Equations (UNITEXT #145)
Par Taketomo Mitsui, Guang-Da Hu. 2023
This book serves as a concise textbook for students in an advanced undergraduate or first-year graduate course in various disciplines…
such as applied mathematics, control, and engineering, who want to understand the modern standard of numerical methods of ordinary and delay differential equations. Experts in the same fields can also learn about the recent developments in numerical analysis of such differential systems. Ordinary differential equations (ODEs) provide a strong mathematical tool to express a wide variety of phenomena in science and engineering. Along with its own significance, one of the powerful directions toward which ODEs extend is to incorporate an unknown function with delayed argument. This is called delay differential equations (DDEs), which often appear in mathematical modelling of biology, demography, epidemiology, and control theory. In some cases, the solution of a differential equation can be obtained by algebraic combinations of known mathematical functions. In many practical cases, however, such a solution is quite difficult or unavailable, and numerical approximations are called for. Modern development of computers accelerates the situation and, moreover, launches more possibilities of numerical means. Henceforth, the knowledge and expertise of the numerical solution of differential equations becomes a requirement in broad areas of science and engineering.One might think that a well-organized software package such as MATLAB serves much the same solution. In a sense, this is true; but it must be kept in mind that blind employment of software packages misleads the user. The gist of numerical solution of differential equations still must be learned. The present book is intended to provide the essence of numerical solutions of ordinary differential equations as well as of delay differential equations. Particularly, the authors noted that there are still few concise textbooks of delay differential equations, and then they set about filling the gap through descriptions as transparent as possible. Major algorithms of numerical solution are clearly described in this book. The stability of solutions of ODEs and DDEs is crucial as well. The book introduces the asymptotic stability of analytical and numerical solutions and provides a practical way to analyze their stability by employing a theory of complex functions.Proceedings of International Conference on Communication and Artificial Intelligence: ICCAI 2021 (Lecture Notes in Networks and Systems #435)
Par Vishal Goyal, Manish Gupta, Seyedali Mirjalili, Aditya Trivedi. 2022
This book is a collection of best selected research papers presented at the International Conference on Communication and Artificial Intelligence…
(ICCAI 2021), held in the Department of Electronics & Communication Engineering, GLA University, Mathura, India, during 19–20 November 2021. The primary focus of the book is on the research information related to artificial intelligence, networks, and smart systems applied in the areas of industries, government sectors, and educational institutions worldwide. Diverse themes with a central idea of sustainable networking solutions are discussed in the book. The book presents innovative work by leading academics, researchers, and experts from industry.Über den Apple Store kann man zurzeit Millionen mobiler Anwendungen herunterladen. Die Einsatzmöglichkeiten sind vielfältig und die Bandbreite der Anwendungsszenarien bewegt sich…
von komplexen Computerspielen bis hin zu Geschäftsanwendungen. In den vergangenen Jahren wurden unterschiedliche Entwicklungsparadigmen bereitgestellt, die hinsichtlich verschiedener Aspekte wie zum Beispiel Plattformunabhängigkeit, Performanz, Kosten sowie dem Zugriff auf gerätespezifische, native Funktionen sowohl Vor- als auch Nachteile besitzen. Die Kapitel gehen didaktisch in die Breite und stellen die Entwicklungsparadigmen vor dem Hintergrund einer zentralen Fallstudie gegenüber. Es werden Techniken zur Entwicklung von mobilen Webanwendungen, hybriden Anwendungen, nativen Anwendungen für Android sowie Cross-Plattform-Anwendungen vorgestellt, ohne innerhalb eines Paradigmas zu sehr in die Tiefe zu gehen. Eine Ausnahme bildet das von Google bereitgestellte Flutter-Framework, das sowohl die Entwicklung auf Android- als auch iOS-Geräten unterstützt.Dieses Lehrbuch richtet sich an Studentinnen und Studenten, die bereits mit einer objektorientierten Programmiersprache vertraut sind und wesentliche Aspekte der Programmierung kennen und einen Einblick in das Mobile Computing erlangen möchten.Security, Privacy, and Applied Cryptography Engineering: 13th International Conference, SPACE 2023, Roorkee, India, December 14–17, 2023, Proceedings (Lecture Notes in Computer Science #14412)
Par Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran. 2024
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023,…
held in Roorkee, India, in December 2023.The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.Computer Supported Cooperative Work and Social Computing: 18th CCF Conference, ChineseCSCW 2023, Harbin, China, August 18–20, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2013)
Par Yuqing Sun, Tun Lu, Tong Wang, Hongfei Fan, Dongning Liu, Bowen Du. 2024
This two-volume set constitutes the revised selected papers of the 18th CCF Conference on Computer Supported Cooperative Work and Social…
Computing, ChineseCSCW 2023 held in Harbin, China, in August 2023. The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.This book constitutes the refereed post-conference proceedings of the 18th EAI International Conference on Tools for Design, Implementation and Verification…
of Emerging Information Technologies, TridentCom 2023, which was held in Nanjing, China, during November 11-13, 2023. The 9 full papers were selected from 30 submissions and deal the emerging technologies of big data, cyber-physical systems and computer communications. The papers are grouped in thematical sessions on blockchain and its applications; emerging applications; AI and its security.Computer Supported Cooperative Work and Social Computing: 18th CCF Conference, ChineseCSCW 2023, Harbin, China, August 18–20, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2012)
Par Yuqing Sun, Tun Lu, Tong Wang, Hongfei Fan, Dongning Liu, Bowen Du. 2024
This two-volume set constitutes the revised selected papers of the 18th CCF Conference on Computer Supported Cooperative Work and Social…
Computing, ChineseCSCW 2023 held in Harbin, China, in August 2023. The 54 full papers and 28 short papers presented in these proceedings were carefully reviewed and selected from 221 submissions. The papers are organized in the following topical sections: Social Media and Online Communities; Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Crowd Intelligence and Crowd Cooperative Computing; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications.Multidimensional Signals, Augmented Reality and Information Technologies: Proceedings of 3DWCAI 2023 (Smart Innovation, Systems and Technologies #374)
Par Roumen Kountchev, Srikanta Patnaik, Wenfeng Wang, Roumiana Kountcheva. 2024
This book features a collection of high-quality, peer-reviewed research papers presented at Second 'World Conference on Intelligent and 3-D Technologies'…
(WCI3DT 2023), held in China during May 26–28, 2023. The book provides an opportunity to researchers and academia as well as practitioners from industry to publish their ideas and recent research development work on all aspects of 3D imaging technologies and artificial intelligence, their applications and other related areas. The book presents ideas and the works of scientists, engineers, educators and students from all over the world from institutions and industries.Blockchain in Healthcare: Analysis, Design and Implementation (Future of Business and Finance)
Par Chang Lu, Mohan Tanniru. 2023
This books brings readers a holistic understanding of blockchain adoption in healthcare by not only considering the technical fundamentals of…
use cases, but also the regulatory, informational and organizational challenges and solutions. The book also provides frameworks and toolkits to manage the entire life cycle of adoption, including analysing the environment and feasibility, application design from a user-centred perspective, and implementation strategies that would overcome organizational and informational barriers. Specific issues addressed include but are not limited to: How to analyse the value propositions in healthcare and which distributed actors should be engaged to fulfil these propositions? What policies and practices need to be reviewed to ensure security and privacy of the information shared? How to design blockchain systems that seamlessly integrate with other stakeholder applications, while only the needed information is in the distributed architecture? How can blockchain implementation be managed from governance and risk mitigation perspectives, especially when multiple actors are involved?By reading this book, blockchain enthusiasts, health informatics professionals and healthcare executives will be better prepared to leverage the transformative potential of blockchain for healthcare.Algorithms and Discrete Applied Mathematics: 10th International Conference, CALDAM 2024, Bhilai, India, February 15–17, 2024, Proceedings (Lecture Notes in Computer Science #14508)
Par Subrahmanyam Kalyanasundaram, Anil Maheshwari. 2024
This book constitutes the refereed proceedings of the 10th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2024, held in…
Bhilai, India during February 15–17, 2024. The 22 full papers included in this book were carefully reviewed and selected from 57 submissions. They were organized in topical sections as follows: Algorithms and Complexity; Computational Geometry; Discrete Applied Mathematics; Graph Algorithms; Graph Theory.Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2021 (Lecture Notes on Data Engineering and Communications Technologies #68)
Par Subarna Shakya, Robert Bestak, Ram Palanisamy, Khaled A. Kamel. 2022
This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2021) organized…
by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 29–30 January 2021. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.WordPress All-in-One For Dummies
Par Lisa Sabin-Wilson. 2024
The no-nonsense guide to building your own WordPress site With the help of WordPress All-in-One For Dummies, you can get…
your first WordPress blog or website set up in no time. Fully updated for the latest WordPress releases, this 8-books-in-1 guide walks you through all the features of this powerful web builder. You’ll discover how to choose and customize a theme, pick the perfect web host and URL, and manage multiple websites with multiple authors. Use WordPress as a content management software (CMS) platform, work with multimedia formats, and add plugins to your site. With state-of-the-art features, WordPress has become the go-to platform for website owners and bloggers who want to be noticed. This beginner-friendly Dummies guide gives you the know-how to make WordPress work for you. Build a website or blog with WordPress, the leading open-source web builder Discover the powerful, customizable features of the latest versions of WordPress Allow multiple people to contribute to your site and keep your content organized Easily make changes and modifications with the WordPress interface Both WordPress novices and more experienced users looking to dive into new features will love the easy-to-follow instructions and tips in WordPress All-in-One For Dummies.In his bestselling first book, Eric Siegel explained how machine learning works. Now, in The AI Playbook, he shows how…
to capitalize on it.&“Eric Siegel delivers a robust primer on machine learning, the key mechanism in AI. A forward-looking, practical book and a must-read for anyone in the information economy.&” —Scott Galloway, NYU Stern Professor of Marketing; bestselling author of The Four &“An antidote to today&’s relentless AI hype—why some AI initiatives thrive while others fail and what it takes for companies and people to succeed.&”—Charles Duhigg, author of bestsellers The Power of Habit and Smarter Faster BetterThe greatest tool is the hardest to use. Machine learning is the world&’s most important general-purpose technology—but it&’s notoriously difficult to launch. Outside Big Tech and a handful of other leading companies, machine learning initiatives routinely fail to deploy, never realizing value. What&’s missing? A specialized business practice suitable for wide adoption. In The AI Playbook, bestselling author Eric Siegel presents the gold-standard, six-step practice for ushering machine learning projects from conception to deployment. He illustrates the practice with stories of success and of failure, including revealing case studies from UPS, FICO, and prominent dot-coms. This disciplined approach serves both sides: It empowers business professionals, and it establishes a sorely needed strategic framework for data professionals. Beyond detailing the practice, this book also upskills business professionals—painlessly. It delivers a vital yet friendly dose of semi-technical background knowledge that all stakeholders need to lead or participate in machine learning projects, end to end. This puts business and data professionals on the same page so that they can collaborate deeply, jointly establishing precisely what machine learning is called upon to predict, how well it predicts, and how its predictions are acted upon to improve operations. These essentials make or break each initiative—getting them right paves the way for machine learning&’s value-driven deployment.What kind of AI does this book cover? The buzzword AI can mean many things, but this book is about machine learning, which is a central basis for—and what many mean by—AI. To be specific, this book covers the most vital use cases of machine learning, those designed to improve a wide range of business operations.An Introduction to Cyberpsychology (BPS Core Textbooks Series)
Par Gráinne Kirwan, Irene Connolly, Hannah Barton, and Marion Palmer. 2024
An Introduction to Cyberpsychology provides a comprehensive introduction to this rapidly growing discipline. Fully updated in its second edition, the…
book encourages students to critically evaluate the psychology of online interactions and to develop appropriate research methodologies to complete their own work in this field.The book examines cyberpsychology and online research methodologies, social psychology in an online context, practical applications of cyberpsychology, and the psychological aspects of other technologies. This new edition has been carefully updated to include additional coverage of: Expanded content relating to major developments in the field and new content on gaming and screentime A new chapter examining the relationship between older adults and technology Cyberpsychology in focus feature boxes in each chapter that examine topics in depth Interviews with professionals working in fields relating to cyberpsychology Each chapter includes key terms and a glossary, content summaries, discussion questions, and recommended reading to guide further study.Supported by extensive online resources for students and instructors, this authoritative book is an essential core text for undergraduate modules in cyberpsychology, and an ideal primer for students of postgraduate programs in cyberpsychology.To view the additional student and instructor resources for this book, please visit bpscoretextbooks.routledge.comAzure Security
Par Bojan Magusic. 2024
Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy…
to keep your data safe.As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you&’ll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the book Azure Security details best practices for configuring and deploying Azure&’s native security services—from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you&’ve learned. What's inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the reader For software and security engineers building and securing Azure applications. About the author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Table of Contents PART 1 FIRST STEPS 1 About Azure security 2 Securing identities in Azure: The four pillars of identity and Azure Active Directory PART 2 SECURING AZURE RESOURCES 3 Implementing network security in Azure: Firewall, WAF, and DDoS protection 4 Securing compute resources in Azure: Azure Bastion, Kubernetes, and Azure App Service 5 Securing data in Azure Storage accounts: Azure Key Vault 6 Implementing good security hygiene: Microsoft Defender for Cloud and Defender CSPM 7 Security monitoring for Azure resources: Microsoft Defender for Cloud plans PART 3 GOING FURTHER 8 Security operations and response: Microsoft Sentinel 9 Audit and log data: Azure Monitor 10 Importance of governance: Azure Policy and Azure Blueprints 11 DevSecOps: Microsoft Defender for DevOps