Résultats de recherche de titre
Articles 47781 à 47800 sur 47945
Bioinformatics and Computational Biology: Technological Advancements, Applications and Opportunities
Par Tiratha Raj Singh, Hemraj Saini, Moacyr Comar Junior. 2024
Bioinformatics and Computational Biology: Technological Advancements, Applications and Opportunities is an invaluable resource for general and applied researchers who analyze…
biological data that is generated, at an unprecedented rate, at the global level. After careful evaluation of the requirements for current trends in bioinformatics and computational biology, it is anticipated that the book will provide an insightful resource to the academic and scientific community. Through a myriad of computational resources, algorithms, and methods, it equips readers with the confidence to both analyze biological data and estimate predictions.The book offers comprehensive coverage of the most essential and emerging topics: Cloud-based monitoring of bioinformatics multivariate data with cloud platforms Machine learning and deep learning in bioinformatics Quantum machine learning for biological applications Integrating machine learning strategies with multiomics to augment prognosis in chronic diseases Biomedical engineering Next generation sequencing techniques and applications Computational systems biology and molecular evolution While other books may touch on some of the same issues and nuances of biological data analysis, they neglect to feature bioinformatics and computational biology exclusively, and as exhaustively. This book's abundance of several subtopics related to almost all of the regulatory activities of biomolecules from where real data is being generated brings an added dimension.Algorithmic Thinking, 2nd Edition: Learn Algorithms to Level Up Your Coding Skills
Par Daniel Zingaro. 2024
Get in the game and learn essential computer algorithms by solving competitive programming problems, in the fully revised second edition…
of the bestselling original. (Still no math required!)Are you hitting a wall with data structures and algorithms? Whether you&’re a student prepping for coding interviews or an independent learner, this book is your essential guide to efficient problem-solving in programming.UNLOCK THE POWER OF DATA STRUCTURES & ALGORITHMS:Learn the intricacies of hash tables, recursion, dynamic programming, trees, graphs, and heaps. Become proficient in choosing and implementing the best solutions for any coding challenge.REAL-WORLD, COMPETITION-PROVEN CODE EXAMPLES:The programs and challenges in this book aren&’t just theoretical—they&’re drawn from real programming competitions. Train with problems that have tested and honed the skills of coders around the world.GET INTERVIEW-READY:Prepare yourself for coding interviews with practice exercises that help you think algorithmically, weigh different solutions, and implement the best choices efficiently.WRITTEN IN C, USEFUL ACROSS LANGUAGES:The code examples are written in C and designed for clarity and accessibility to those familiar with languages like C++, Java, or Python. If you need help with the C code, no problem: We&’ve got recommended reading, too.Algorithmic Thinking is the complete package, providing the solid foundation you need to elevate your coding skills to the next level.AI-Assisted Programming
Par Tom Taulli. 2024
Get practical advice on how to leverage AI development tools for all stages of code creation, including requirements, planning, design,…
coding, debugging, testing, and documentation. With this book, beginners and experienced developers alike will learn how to use a wide range of tools, from general-purpose LLMs (ChatGPT, Gemini, and Claude) to code-specific systems (GitHub Copilot, Tabnine, Cursor, and Amazon CodeWhisperer).You'll also learn about more specialized generative AI tools for tasks such as text-to-image creation.Author Tom Taulli provides a methodology for modular programming that aligns effectively with the way prompts create AI-generated code. This guide also describes the best ways of using general purpose LLMs to learn a programming language, explain code, or convert code from one language to another.This book examines:The core capabilities of AI-based development toolsPros, cons, and use cases of popular systems such as GitHub Copilot and Amazon CodeWhispererWays to use ChatGPT, Gemini, Claude, and other generic LLMs for codingUsing AI development tools for the software development lifecycle, including requirements, planning, coding, debugging, and testingPrompt engineering for developmentUsing AI-assisted programming for tedious tasks like creating regular expressions, starter code, object-oriented programming classes, and GitHub ActionsHow to use AI-based low-code and no-code tools, such as to create professional UIsDigital Technologies in Education: Selected Cases (Studies in Systems, Decision and Control #529)
Par Rostyslav Shchokin, Anna Iatsyshyn, Valeriia Kovach, Artur Zaporozhets. 2024
Among the technologies that significantly change the modern world of human existence, it is worth mentioning, first of all, digital…
technologies. These technologies are actively and relentlessly implemented and integrated into all spheres of human activity and society, becoming a powerful catalyst and a determining source of social development. According to such a scenario of development, society acquires the features of digital, thus defining digital technologies as its leading technology. This process is called the digital transformation of society. The wide use of digital technologies to provide free access to information and knowledge is a basic principle of the digital society. Digital society significantly changes traditional ideas about work, education, culture, communication, social and political life. The development of citizens' digital culture is the main condition for the successful construction of a digital society. Therefore, it is important to carry out scientific research and targeted training to improve the qualifications of specialists in various branches of the economy, in particular, educators and scientists to acquire digital competence. After all, these specialists are key figures in ensuring the process of digitalization of education and science. The book presents various aspects of the digital transformation of education and science. A comprehensive view of the current state and prospects of the use of digital technologies for education and science is provided. The experience of using digital technologies and tools for training and improving the qualifications of specialists of various specialties, as well as for the preparation of future PhDs, is described. The book is addressed to education workers, managers, scientists, graduate students, librarians, and all those who are interested in the process of digital transformation of education and science.Linkerd: Up and Running
Par Jason Morgan, Flynn. 2024
With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can…
help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how the Linkerd service mesh enables cloud-native developers—including platform and site reliability engineers—to solve the thorny issue of running distributed applications in Kubernetes.Jason Morgan and Flynn draw on their years of experience at Buoyant—the creators of Linkerd—to demonstrate how this service mesh can help ensure that your applications are secure, observable, and reliable. You'll understand why Linkerd, the original service mesh, can still claim the lowest time to value of any mesh option available today.Learn how Linkerd works and which tasks it can help you accomplishInstall and configure Linkerd in an imperative and declarative mannerSecure interservice traffic and set up secure multicluster linksLaunch a zero trust authorization strategy in Kubernetes clustersOrganize services in Linkerd to override error codes, set custom retries, and create timeoutsUse Linkerd to manage progressive delivery and pair this service mesh with the ingress of your choiceBlockchain-based Cyber Security: Applications and Paradigms
Par Kaushal Shah. 2024
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and…
the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security attacks by considering real-time applications based on IoT, Wireless Sensor Networks, Cyber-Physical Systems, and Smart Grids. The book is useful for academicians and research scholars worldwide working in cyber security. It is also useful for industry experts working in cyber security.Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 2 (Ubiquitous Computing, Healthcare and Well-being)
Par Md Atiqur Rahman Ahad, Sozo Inoue, Guillaume Lopez, Tahera Hossain. 2024
Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on two main subject areas: Movement and Sensors, and Sports Activity Analysis.The editors are experts in these arenas, and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Software Quality as a Foundation for Security: 16th International Conference on Software Quality, SWQD 2024, Vienna, Austria, April 23–25, 2024, Proceedings (Lecture Notes in Business Information Processing #505)
Par Peter Bludau, Rudolf Ramler, Dietmar Winkler, Johannes Bergsmann. 2024
This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2024, held in Vienna, Austria, during…
April 23-25, 2024. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conference on software quality in Europe. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2024 is “Software Quality as a Foundation for Security”. The 7 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The papers were organized in topical sections as follows: Requirements engineering; software quality; continuous integration and deployment; communication and collaboration; artificial intelligence; and security and compliance.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they…
evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingModern Fortran in Practice
Par Arjen Markus. 2012
From its earliest days, the Fortran programming language has been designed with computing efficiency in mind. The latest standard, Fortran…
2008, incorporates a host of modern features, including object-orientation, array operations, user-defined types, and provisions for parallel computing. This tutorial guide shows Fortran programmers how to apply these features in twenty-first-century style: modular, concise, object-oriented, and resource-efficient, using multiple processors. It offers practical real-world examples of interfacing to C, memory management, graphics and GUIs, and parallel computing using MPI, OpenMP, and coarrays. The author also analyzes several numerical algorithms and their implementations and illustrates the use of several open source libraries. Full source code for the examples is available on the book's Web site.CCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online
Par Arthur J. Deane. 2024
Get CCSP certified and elevate your career into the world of cloud security CCSP For Dummies is a valuable resource…
for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowledge in all six domains, with real-world examples and scenarios, so you can be sure that you’re heading into test day with the most current understanding of cloud security. You’ll also get tips on setting up a study plan and getting ready for exam day, along with digital flashcards and access to two updated online practice tests. . Review all content covered on the CCSP exam with clear explanations Prepare for test day with expert test-taking strategies, practice tests, and digital flashcards Get the certification you need to launch a lucrative career in cloud security Set up a study plan so you can comfortably work your way through all subject matter before test dayThis Dummies study guide is excellent for anyone taking the CCSP exam for the first time, as well as those who need to brush up on their skills to renew their credentials.What Every Engineer Should Know About Digital Accessibility (ISSN)
Par Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024,…
held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.Cybercrime and Digital Deviance
Par Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.