Résultats de recherche de titre
Articles 38321 à 38340 sur 45908
Artificial Intelligence and Digitalization for Sustainable Development: 10th EAI International Conference, ICAST 2022, Bahir Dar, Ethiopia, November 4-6, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telec
Par Bereket H. Woldegiorgis, Kibret Mequanint, Mekuanint A. Bitew, Teketay B. Beza, Abdulkerim M. Yibre. 2023
This proceedings, ICAST 2022, constitutes the refereed post-conference proceedings of the 10th International Conference on Advancement of Science and Technology,…
ICAST 2022, which took place in Bahir Dar, Ethiopia, in November 2022. The 17 revised full papers and one short paper were carefully reviewed and selected from 174 submissions. The papers present economic and technologic developments in modern societies related to important issues such digitization, energy transformation, impact on national economy, and its recent advancements.Advances in Real-Time Systems
Par Jörg Eberspächer, Samarjit Chakraborty. 2011
This volume contains the lectures given in honor to Georg Färber as tribute to his contributions in the area of…
real-time and embedded systems. The chapters of many leading scientists cover a wide range of aspects, like robot or automotive vision systems or medical aspects.Advances in Artificial Intelligence and Data Engineering: Select Proceedings of AIDE 2019 (Advances in Intelligent Systems and Computing #1133)
Par Niranjan N. Chiplunkar, Takanori Fukao. 2021
This book presents selected peer-reviewed papers from the International Conference on Artificial Intelligence and Data Engineering (AIDE 2019). The topics covered are broadly divided…
into four groups: artificial intelligence, machine vision and robotics, ambient intelligence, and data engineering. The book discusses recent technological advances in the emerging fields of artificial intelligence, machine learning, robotics, virtual reality, augmented reality, bioinformatics, intelligent systems, cognitive systems, computational intelligence, neural networks, evolutionary computation, speech processing, Internet of Things, big data challenges, data mining, information retrieval, and natural language processing. Given its scope, this book can be useful for students, researchers, and professionals interested in the growing applications of artificial intelligence and data engineering.Speech Processing and Soft Computing (SpringerBriefs in Speech Technology)
Par Sid-Ahmed Selouani. 2012
Speech Processing and Soft Computing includes coverage of synergy between speech technology and bio-inspired soft computing methods. Through practical cases,…
the author explores, dissects and examines how soft computing may complement conventional techniques in speech enhancement and speech recognition in order to provide robust systems. The material is especially useful to graduate students and experienced researchers who are interested in expanding their horizons and investigating new research directions through review of the theoretical and practical settings of soft computing methods in very recent speech applications.Data Privacy: A runbook for engineers
Par Nishant Bhajaria. 2022
Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits.In Data Privacy…
you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy controls to measure reidentification risk Implement technical privacy architectures to delete data Set up technical capabilities for data export to meet legal requirements like Data Subject Asset Requests (DSAR) Establish a technical privacy review process to help accelerate the legal Privacy Impact Assessment (PIA) Design a Consent Management Platform (CMP) to capture user consent Implement security tooling to help optimize privacy Build a holistic program that will get support and funding from the C-Level and board Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You&’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free language. The book&’s constant awareness of business requirements will help you balance trade-offs, and ensure your user&’s privacy can be improved without spiraling time and resource costs. About the technology Data privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user&’s trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy. About the book Data Privacy: A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you&’ll learn how to design and implement privacy programs that are easy to scale and automate. There&’s no bureaucratic process—just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals. What's inside Classify data based on privacy risk Set up capabilities for data export that meet legal requirements Establish a review process to accelerate privacy impact assessment Design a consent management platform to capture user consent About the reader For engineers and business leaders looking to deliver better privacy. About the author Nishant Bhajaria leads the Technical Privacy and Strategy teams for Uber. His previous roles include head of privacy engineering at Netflix, and data security and privacy at Google. Table of Contents PART 1 PRIVACY, DATA, AND YOUR BUSINESS 1 Privacy engineering: Why it&’s needed, how to scale it 2 Understanding data and privacy PART 2 A PROACTIVE PRIVACY PROGRAM: DATA GOVERNANCE 3 Data classification 4 Data inventory 5 Data sharing PART 3 BUILDING TOOLS AND PROCESSES 6 The technical privacy review 7 Data deletion 8 Exporting user data: Data Subject Access Requests PART 4 SECURITY, SCALING, AND STAFFING 9 Building a consent management platform 10 Closing security vulnerabilities 11 Scaling, hiring, and considering regulationsCybersecurity First Principles: A Reboot of Strategy and Tactics
Par Rick Howard. 2023
The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief…
Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first principle and then discusses the strategies and tactics required to achieve it. In the book, you'll explore: Infosec history from the 1960s until the early 2020s and why it has largely failed What the infosec community should be trying to achieve instead The arguments for the absolute and atomic cybersecurity first principle The strategies and tactics to adopt that will have the greatest impact in pursuing the ultimate first principle Case studies through a first principle lens of the 2015 OPM hack, the 2016 DNC Hack, the 2019 Colonial Pipeline hack, and the Netflix Chaos Monkey resilience program A top to bottom explanation of how to calculate cyber risk for two different kinds of companies This book is perfect for cybersecurity professionals at all levels: business executives and senior security professionals, mid-level practitioner veterans, newbies coming out of school as well as career-changers seeking better career opportunities, teachers, and students.Job Ready SQL
Par Haythem Balti, Kimberly A. Weiss. 2023
Learn the most important SQL skills and apply them in your job—quickly and efficiently! SQL (Structured Query Language) is the…
modern language that almost every relational database system supports for adding data, retrieving data, and modifying data in a database. Although basic visual tools are available to help end-users input common commands, data scientists, business intelligence analysts, Cloud engineers, Machine Learning programmers, and other professionals routinely need to query a database using SQL. Job Ready SQL provides you with the foundational skills necessary to work with data of any kind. Offering a straightforward ‘learn-by-doing’ approach, this concise and highly practical guide teaches you all the basics of SQL so you can apply your knowledge in real-world environments immediately. Throughout the book, each lesson includes clear explanations of key concepts and hands-on exercises that mirror real-world SQL tasks. Teaches the basics of SQL database creation and management using easy-to-understand language Helps readers develop an understanding of fundamental concepts and more advanced applications such as data engineering and data science Discusses the key types of SQL commands, including Data Definition Language (DDL) commands and Data Manipulation Language (DML) commands Includes useful reference information on querying SQL-based databasesJob Ready SQL is a must-have resource for students and working professionals looking to quickly get up to speed with SQL and take their relational database skills to the next level.A comprehensive guide to making the most of Apple's entry-level editing software—from the basics of editing to using iLife and…
open source apps to create unique non-fiction videosKey FeaturesLearn editing principles as you assemble coherent and concise videosMaster basic editing tools by importing, assembling, reframing, and embellishing footage with overlays and effectsCustomize animations and exports in iMovie and learn how to avoid the gotchas Apple won't tell you aboutBook DescriptionIt's not about having the shiniest tools; it's what you do with them. iMovie offers Apple users the ease of creating engaging videos using the free video editing application's support for macOS, iOS, and iPadOS devices. Complete with step-by-step tutorials for essential tools and concepts and explanations for why you should use them, this practical guide to iMovie will leave you well-prepared for the world of post-production. This book begins with an introduction to some of the core principles of editing. You'll learn how to easily make your videos coherent and concise and flex your creative muscles with Magic Movie and the Storyboard mode. Once you grasp how to use iMovie's full-blown Movie modes for mobile devices and macOS, you'll be able to use simple editing tools to deliver effective videos from import to export. Finally, you'll explore Keynote for creating custom titles and animations and building a personal visual brand that makes your videos uniquely yours. By the end of this iMovie book, you'll be on your way to becoming a creative problem-solver, using iMovie and other free apps to create high-quality, engaging videos for projects with different visual and technical requirements.What you will learnSoak up the principles of editing—coherence, conciseness, and adding meaningUse iMovie's Magic Movie and Storyboard tools to create simple, themed videosNavigate movie mode for iOS, iPadOS, and macOS and create videos without a templateImprove the viewing experience with overlays and use keyframes for smooth animationsCreate custom titles and animations using KeynoteUse open source software to transcode your exports for different platforms and requirementsIdentify the most common problems with iMovie and how to avoid themWho this book is forIf you have an Apple device and have to make a video for work or school, this book is where to turn. Suitable even for absolute beginners, this book includes simple, progressive guides to help you master editing principles and employ iMovie to create simple but effective videos to inform, educate and entertain your colleagues, friends, and family. For more advanced users such as YouTubers and other online content creators, this book contains valuable tips on how to stamp unique identity and brand USPs into videos.Five Nights at Freddy's Character Encyclopedia (Five Nights At Freddy's)
Par Scott Cawthon. 2023
An in-depth look at all the characters from Five Nights at Freddy's in a beautiful, deluxe hardcover format!The massive roster…
of characters from Five Nights at Freddy's is presented here in a giant hardcover that will make the perfect addition to any fan’s library. From the games to the novels and short stories, all the characters are here and laid out in awesome detail that will deepen the knowledge of even the most enthusiastic player. With over 200 pages of full-color art, this encyclopedia is not to be missed!Cybertax: Managing the Risks and Results (IT Pro Practice Notes)
Par James Ransome, George K. Tsantes. 2023
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every…
current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their…
applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems.The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.This book constitutes the joint refereed proceedings of the 22nd International Conference on Internet of Things, Smart Spaces, and Next…
Generation Networks and Systems, NEW2AN 2022, held in Tashkent, Uzbekistan, in December 2022.The 58 regular papers presented in this volume were carefully reviewed and selected from 282 submissions. The papers of NEW2AN address various aspects of next-generation data networks, while special attention is given to advanced wireless networking and applications. In particular, the authors have demonstrated novel and innovative approaches to performance and efficiency analysis of 5G and beyond systems, employed game-theoretical formulations, advanced queuing theory, and machine learning. It is also worth mentioning the rich coverage of the Internet of Things, optics, signal processing, as well as digital economy and business aspects.Intelligent Decision Support Systems
Par Miquel Sànchez-Marrè. 2022
This book presents the potential use and implementation of intelligent techniques in decision making processes involved in organizations and companies.…
It provides a thorough analysis of decisions, reviewing the classical decision theory, and describing usual methods for modeling the decision process. It describes the chronological evolution of Decision Support Systems (DSS) from early Management Information Systems until the appearance of Intelligent Decision Support Systems (IDSS). It explains the most commonly used intelligent techniques, both data-driven and model-driven, and illustrates the use of knowledge models in Decision Support through case studies. The author pays special attention to the whole Data Science process, which provides intelligent data-driven models in IDSS. The book describes main uncertainty models used in Artificial Intelligence to model inexactness; covers recommender systems; and reviews available development tools for inducing data-driven models, for using model-driven methods and for aiding the development of Intelligent Decision Support SystemsNetworks of today are going through a rapid evolution and there are many emerging areas of information networking and their…
applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.Information Systems: 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, Virtual Event, December 21–22, 2022, Proceedings (Lecture Notes in Business Information Processing #464)
Par Paulo Rupino da Cunha, Marinos Themistocleous, Maria Papadaki, Klitos Christodoulou. 2023
This book constitutes selected papers from the 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, which was held virtually…
during December 7-8, 2022.EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners. It focuses on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 47 papers presented in this volume were carefully reviewed and selected from a total of 136 submissions. They were organized in topical sections named: Artificial intelligence; big data and analytics; blockchain technology and applications; cloud computing; digital governance; digital services and social media; emerging computing technologies and trends for business process management; enterprise systems; information system security and information privacy protection; innovative research projects; IT governance and alignment; management and organizational issues in information systems; and metaverse.Advances and Innovations in Statistics and Data Science (ICSA Book Series in Statistics)
Par Jiahua Chen, Wenqing He, Liqun Wang, Chunfang Devon Lin. 2022
This book highlights selected papers from the 4th ICSA-Canada Chapter Symposium, as well as invited articles from established researchers in…
the areas of statistics and data science. It covers a variety of topics, including methodology development in data science, such as methodology in the analysis of high dimensional data, feature screening in ultra-high dimensional data and natural language ranking; statistical analysis challenges in sampling, multivariate survival models and contaminated data, as well as applications of statistical methods. With this book, readers can make use of frontier research methods to tackle their problems in research, education, training and consultation.Security Engineering for Embedded and Cyber-Physical Systems (Advances In Cybersecurity Management Ser.)
Par Yassine Maleh, Saad Motahhir. 2022
Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ agendas. Such…
a transformation stimulates innovation in new products and services, the digital transformation of processes, and the creation of new business models and ecosystems. In the world of manufacturing, Industry 4.0 is based on various technological advances, among which we can mainly cite CPS (cyber-physical systems), IoT (Internet of Things), and IoS (internet of services). While engaging, this fourth wave also brings significant challenges for manufacturers. Business operations and the supply chain are becoming more vulnerable to cyber threats. Security Engineering for Embedded and Cyber-Physical Systems is an invaluable resource to discover cybersecurity and privacy techniques for embedded and cyber-physical systems. This book presents the latest studies and research results on all aspects of security engineering for embedded and cyber-physical systems. It also provides a premier interdisciplinary reference for researchers, practitioners, and educators to discover the most recent innovations, trends, concerns, and practical challenges encountered and solutions adopted in security engineering for embedded and cyber-physical systems. The book offers comprehensive coverage of the essential topics, including the following: Embedded and cyber-physical systems threats and vulnerabilities Security engineering techniques for embedded and cyber-physical systems Security engineering for embedded and cyber-physical systems and potential future-use cases Artificial intelligence techniques for cybersecurity and privacy Security engineering for Internet of Things Blockchain for cybersecurity in embedded and cyber-physical systems This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in security engineering for embedded and cyber-physical systems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances and future trends related to security engineering for embedded and cyber-physical systems.Smart Distributed Embedded Systems for Healthcare Applications (Explainable AI (XAI) for Engineering Applications)
Par Jafar A. Alzubi, Joel J. P. C. Rodrigues, Bhawna Singla, Preeti Nagrath, A. K. Verma. 2023
This book discusses the applications and optimization of emerging smart technologies in the field of healthcare. It further explains different…
modeling scenarios of the latest technologies in the healthcare system and compares the results to better understand the nature and progress of diseases in the human body, which would ultimately lead to early diagnosis and better treatment and cure of diseases with the help of distributed technology. Covers the implementation models using technologies such as artificial intelligence, machine learning, and deep learning with distributed systems for better diagnosis and treatment of diseases. Gives in-depth review of technological advancements like advanced sensing technologies such as plasmonic sensors, usage of RFIDs, and electronic diagnostic tools in the field of healthcare engineering. Discusses possibilities of augmented reality and virtual reality interventions for providing unique solutions in medical science, clinical research, psychology, and neurological disorders. Highlights the future challenges and risks involved in the application of smart technologies such as cloud computing, fog computing, IOT, and distributed computing in healthcare. Confers to utilize the AI and ML and associated aids in healthcare sectors in the post-Covid 19 period to revitalize the medical setup. Contributions included in the book will motivate technological developers and researchers to develop new algorithms and protocols in the healthcare field. It will serve as a vast platform for gaining knowledge regarding healthcare delivery, health- care management, healthcare in governance, and health monitoring approaches using distributed environments. It will serve as an ideal reference text for graduate students and researchers in diverse engineering fields including electrical, electronics and communication, computer, and biomedical fields.An international and interdisciplinary perspective on the adoption and governance of artificial intelligence (AI) and machine learning (ML) in defence…
and military innovation by major and middle powers. Advancements in AI and ML pose pressing questions related to evolving conceptions of military power, compliance with international humanitarian law, peace promotion, strategic stability, arms control, future operational environments, and technology races. To navigate the breadth of this AI and international security agenda, the contributors to this book include experts on AI, technology governance, and defence innovation to assess military AI strategic perspectives from major and middle AI powers alike. These include views of how the United States, China, Japan, South Korea, the European Union, and Russia see AI/ML as a technology with the potential to reshape military affairs and power structures in the broader international system. This diverse set of views aims to help elucidate key similarities and differences between AI powers in the evolving strategic context. A valuable read for scholars of security studies, public policy, and STS studies with an interest in the impacts of AI and ML technologies.Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022 (Lecture Notes in Networks and Systems #600)
Par Sateesh K. Peddoju, Rajendra Prasad Mahapatra, Sudip Roy, Pritee Parwekar. 2023
This book is a collection of high-quality peer-reviewed research papers presented at International Conference on Recent Trends in Computing (ICRTC…
2022) held at SRM Institute of Science and Technology, Ghaziabad, Delhi, India, during 3 – 4 June 2022. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. The book presents original works from researchers from academic and industry in the field of networking, security, big data and the Internet of things.