Résultats de recherche de titre
Articles 161 à 180 sur 3185
Statistics and Data Analysis for Engineers and Scientists (Transactions on Computer Systems and Networks)
Par Tanvir Mustafy, Md. Tauhid Rahman. 2024
This textbook summarizes the different statistical, scientific, and financial data analysis methods for users ranging from a high school level…
to a professional level. It aims to combine the data analysis methods using three different programs—Microsoft Excel, SPSS, and MATLAB. The book combining the different data analysis tools is a unique approach. The book presents a variety of real-life problems in data analysis and machine learning, delivering the best solution. Analysis methods presented in this book include but are not limited to, performing various algebraic and trigonometric operations, regression modeling, and correlation, as well as plotting graphs and charts to represent the results. Fundamental concepts of applied statistics are also explained here, with illustrative examples. Thus, this book presents a pioneering solution to help a wide range of students, researchers, and professionals learn data processing, interpret different findings derived from the analyses, and apply them to their research or professional fields. The book also includes worked examples of practical problems. The primary focus behind designing these examples is understanding the concepts of data analysis and how it can solve problems. The chapters include practice exercises to assist users in enhancing their skills to execute statistical analysis calculations using software instead of relying on tables for probabilities and percentiles in the present world.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.Take Control of the Mac Command Line with Terminal
Par Joe Kissell. 2022
Release your inner geek and harness the power of the Unix underpinnings to Mac OS X! This ebook from Joe…
Kissell explains everything you need to know to become comfortable working on the command line in Terminal, and provides numerous "recipes" for performing useful tasks.Conversational Artificial Intelligence
Par Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya, Krishnan Sakthidasan Sankaran. 2024
Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system…
to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots’ increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.AI for Radiology (AI for Everything)
Par Oge Marques. 2024
Artificial intelligence (AI) has revolutionized many areas of medicine and is increasingly being embraced. This book focuses on the integral…
role of AI in radiology, shedding light on how this technology can enhance patient care and streamline professional workflows. This book reviews, explains, and contextualizes some of the most current, practical, and relevant developments in artificial intelligence and deep learning in radiology and medical image analysis. AI for Radiology presents a balanced viewpoint of the impact of AI in these fields, underscoring that AI technologies are not intended to replace radiologists but rather to augment their capabilities, freeing professionals to focus on more complex cases. This book guides readers from the basic principles of AI to their practical applications in radiology, moving from the role of data in AI to the ethical and regulatory considerations of using AI in radiology and concluding with a selection of resources for further exploration. This book has been crafted with a diverse readership in mind. It is a valuable asset for medical professionals eager to stay up to date with AI developments, computer scientists curious about AI’s clinical applications, and anyone interested in the intersection of healthcare and technology.Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14344)
Par Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis. 2024
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS…
2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD…
2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.Pen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.Becoming SRE
Par David N. Blank-Edelman. 2024
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk…
you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs and more with three interconnected sections: the essential groundwork for understanding SRE and SRE culture, advice for individuals on becoming an SRE, and guidance for organizations on creating and developing a thriving SRE practice. Acting as your personal and personable guide, author David Blank-Edelman takes you through subjects like: SRE mindset, SRE culture, and SRE advocacyWhat you need to get started and hired in SRE and what the job will be like when you get thereWhat you need to bring SRE into an organization and what is required for a good organizational fit so it can thrive thereHow to work with your business folks and management around SREHow SRE can grow and mature in an organization over time Ready to become an SRE or introduce SRE into your organization? This book is here to help.The WhatsApp India Story: Inside the Digital Maya Sphere
Par Sunetra Sen Narayan, Shalini Narayanan. 2024
WhatsApp is used by over half a billion people in India today in all fields – in business, corporate and…
informal sectors, in government, for education and among friends, families and acquaintances. This book critically explores the social messaging app’s rapid expansion in India and its growing influence and looks at whether, as a form of horizontal communication, it poses a challenge to more traditional structures of communication. The book examines WhatsApp’s spread in the personal and professional lives of Indians and the myriad ways in which people in India are using the app in social and business interactions, including among people living with disabilities. Using case studies, interviews, surveys and in-depth research, it analyses key aspects of WhatsApp’s massive popularity and its impact on how people communicate. It also explores its impact on the psycho-social dynamics in India, including the dissemination of fake news and politically motivated content, and the consequent need for media regulation in the country. One of the first books to analyse the pervasiveness of WhatsApp and social media apps in different areas of Indian society, this book will be of interest to scholars and students of media studies, communication studies, digital media, cultural studies, cyberculture studies, sociology and social policy and media law.This book presents a detailed assessment of the role of navies in the Korean War. It highlights that, despite being…
predominantly a land war, navies played a vital part. Moreover, the naval war was not solely a U.S. operation. Smaller navies from many countries made important contributions both in supporting the United States and carrying out independent and combined naval operations. This subject holds special importance since current Western strategic thinking and capabilities emphasise the necessity of combined naval operations involving multiple navies in any potential future naval conflict. The example set by the Korean War therefore offers valuable insights into the operational and strategic problems, and benefits and opportunities of contemporary and future combined coalition naval operations.Acing the System Design Interview
Par Zhiyong Tan. 2024
The system design interview is one of the hardest challenges you&’ll face in the software engineering hiring process. This practical…
book gives you the insights, the skills, and the hands-on practice you need to ace the toughest system design interview questions and land the job and salary you want.In Acing the System Design Interview you will master a structured and organized approach to present system design ideas like: Scaling applications to support heavy traffic Distributed transactions techniques to ensure data consistency Services for functional partitioning such as API gateway and service mesh Common API paradigms including REST, RPC, and GraphQL Caching strategies, including their tradeoffs Logging, monitoring, and alerting concepts that are critical in any system design Communication skills that demonstrate your engineering maturity Don&’t be daunted by the complex, open-ended nature of system design interviews! In this in-depth guide, author Zhiyong Tan shares what he&’s learned on both sides of the interview table. You&’ll dive deep into the common technical topics that arise during interviews and learn how to apply them to mentally perfect different kinds of systems. Foreword by Anthony Asta, Michael D. Elder. About the technology The system design interview is daunting even for seasoned software engineers. Fortunately, with a little careful prep work you can turn those open-ended questions and whiteboard sessions into your competitive advantage! In this powerful book, Zhiyong Tan reveals practical interview techniques and insights about system design that have earned developers job offers from Amazon, Apple, ByteDance, PayPal, and Uber. About the book Acing the System Design Interview is a masterclass in how to confidently nail your next interview. Following these easy-to-remember techniques, you&’ll learn to quickly assess a question, identify an advantageous approach, and then communicate your ideas clearly to an interviewer. As you work through this book, you&’ll gain not only the skills to successfully interview, but also to do the actual work of great system design. What's inside Insights on scaling, transactions, logging, and more Practice questions for core system design concepts How to demonstrate your engineering maturity Great questions to ask your interviewer About the reader For software engineers, software architects, and engineering managers looking to advance their careers. About the author Zhiyong Tan is a manager at PayPal. He has worked at Uber, Teradata, and at small startups. Over the years, he has been in many system design interviews, on both sides of the table. The technical editor on this book was Mohit Kumar. Table of Contents PART 1 1 A walkthrough of system design concepts 2 A typical system design interview flow 3 Non-functional requirements 4 Scaling databases 5 Distributed transactions 6 Common services for functional partitioning PART 2 7 Design Craigslist 8 Design a rate-limiting service 9 Design a notification/alerting service 10 Design a database batch auditing service 11 Autocomplete/typeahead 12 Design Flickr 13 Design a Content Distribution Network (CDN) 14 Design a text messaging app 15 Design Airbnb 16 Design a news feed 17 Design a dashboard of top 10 products on Amazon by sales volume Appendix A Monoliths vs. microservices Appendix B OAuth 2.0 authorization and OpenID Connect authentication Appendix C C4 Model Appendix D Two-phase commit (2PC)Blockchain Intelligent Systems: Protocols, Application and Approaches for Future Generation Computing
Par E. Golden Julie, Y. Harold Robinson, J. Jesu Vedha Nayahi, Thavavel Vaiyapuri. 2022
Blockchain provides an environment where technologies converge to provide numerous benefits. However, there are still many problems ahead, and changes…
are required at all levels - technology, algorithms, and human-computer interaction for widespread acceptance of blockchain intelligence systems. This book reviews blockchain technology and the current developments in research and business applications. It explores the real-time applications and issues that will bring the synergy needed to materialize the goal of blockchain intelligence. Researchers in various fields such as Blockchain, Data Analysis, IoT, Data Science, Crypto currencies will find this book useful. Students and professionals working on Blockchain in artificial intelligence, IoT, Healthcare, Robotics, Soft computing, and Data science will also benefit from this. It offers a realistic and thorough introduction that supports programmers, students and researchers in other disciplines. The book comprises chapters dealing with various issues, to provide readers with greater readability, versatility and adaptability.Dynamic Logic. New Trends and Applications: 5th International Workshop, DaLí 2023, Tbilisi, Georgia, September 15–16, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14401)
Par Nina Gierasimczuk, Fernando R. Velázquez-Quesada. 2024
This book constitutes the revised selected papers of the 5th International Workshop on Dynamic Logic. New Trends and Applications, DaLí…
2023, held in Tbilisi, Georgia, during September 15–16, 2023. The 8 full papers in this book were carefully reviewed and selected from 10 submissions. They deal with new trends and applications in the area of Dynamic Logic.Adoption of Emerging Information and Communication Technology for Sustainability
Par Ewa Ziemba, Jarosław. 2024
This book represents an important voice in the discourse on the adoption of emerging ICT for sustainability. It focuses on…
how emerging ICT acts as a crucial enabler of sustainability, offering new forward-looking approaches to this field. The book explores how emerging ICT adoption drives sustainability efforts in business and public organizations, promoting ecological, economic, social, cultural, and political sustainability. The book's theoretical discussions, conceptual approaches, empirical studies, diverse perspectives, and views make it a valuable and comprehensive reference work. Appealing to both researchers and practitioners, this book provides significant areas for research and practice related to the contribution of emerging ICT adoption to sustainability. It also suggests vital considerations for programming and building sustainable development-driven emerging ICT adoption. Readers will find answers to important contemporary questions, such as: What are the concepts, frameworks, models, and approaches to enhance sustainable development through the adoption of emerging ICT? How does the adoption of emerging ICT influence sustainability? How can emerging ICT be adopted to enhance sustainability? What are the current practices and successful cases of emerging ICT adoption for sustainability? What factors influence emerging ICT adoption to enhance sustainability?This book examines Israel’s civil-military relations (CMR) in order to explore alternatives to orthodox Western models of security sector reform…
(SSR) in post-conflict societies. This book argues that the guidelines of SSR have always tended to draw on theoretical work in the field of CMR and focus too heavily on Western, liberal democratic models of governance. Consequently, reform programs based on these guidelines, and intended for use in post-conflict and conflict-affected states, have had, at best, mixed results. The book challenges the necessity for this over-reliance on traditional Western liberal democratic solutions and instead advocates an alternative approach. It proposes that by drawing on an unconventional CMR model, that in turn references the specific context and cultural background of the particular state being subject to reform, there is a significantly higher chance of success. Drawing on a case study of Israel's CMR, the author seeks to provide practical assistance to those working in this area and considers the question of how this unorthodox CMR model might usefully inform post-conflict and conflict-affected SSR programmes. This book will be of interest to students of military studies, security studies, Israeli politics, and International Relations.Emerging Technologies in Electrical Engineering for Reliable Green Intelligence: Proceedings of ICSTACE 2023 (Lecture Notes in Electrical Engineering #1117)
Par Vasundhara Mahajan, Anandita Chowdhury, Sri Niwas Singh, Mohammad Shahidehpour. 2024
The book includes peer-reviewed papers from the International Conference on Sustainable Technology and Advanced Computing in Electrical Engineering (ICSTACE 2023).…
The main focus of the book is to provide the global perspective of sustainable research related to computer advancement in electrical engineering. This involves the areas related to sustainable development. This volume covers artificial intelligence, machine learning, the Internet of Things (IoT), cloud computing, big data analysis, blockchain, cyber security of the smart grid, etc. The book focuses on the areas related to sustainable development and includes research works from academicians and industry experts. The book discusses new challenges and provides solutions at the interface of technology, information, complex systems, and future research directions.Cryptocoding Based on Quasigroups (SpringerBriefs in Information Security and Cryptography)
Par Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva. 2024
This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. Therefore, it…
is necessary to improve constantly existing and develop new algorithms that will ensure accurate and secure data transfer. This leads to the intensive development of coding theory and cryptography as scientific fields which solve these problems. To ensure efficient and secure data transmission at the same time, the concept of cryptcoding is developed such that the coding and encryption processes are merged into one process. Cryptcodes provide correction of a certain number of errors in the transmitted message and data confidentiality, using only one algorithm. The main research in this field is to define new algorithms for coding that detects and corrects errors, random codes, stream ciphers, block ciphers, pseudo-random generators, hash functions, etc. This monograph examines an application of quasigroups for designing error-correcting cryptcodes, called Random Codes Based on Quasigroups (RCBQ ). These codes are a combination of cryptographic algorithms and error-correcting codes and depend on several parameters. Some modifications (new coding/decoding algorithms) of RCBQ for improving their performances for transmission ordinary messages, images, and audio files trough a binary-symmetric channel, Gaussian channel, and burst channels are considered. Also, authors propose and analyze filter for visually enhance of the decoded images and improving the quality of decoded audio files.This book constitutes the refereed proceedings of the 19th International Conference on Formal Aspects of Component Software, FACS 2023, which took…
place virtually during October 19-20, 2023.The 11 full papers included in this book were carefully reviewed and selected from 23 submissions. They were organized in topical sections as follows: cloud computing, cyber-physical and critical systems, and the Internet of Things.