Résultats de recherche de titre
Articles 1 à 20 sur 2642
Comprendre l'intelligence artificielle (L'Encyclopédie d'Utovie)
Par Louis Belon. 2023
Un ouvrage pour faire toute la lumière sur l'intelligence artificielle qui, selon l'auteur, ne constitue pas un mal en soi…
mais qui nécessite de s'interroger sur celles et ceux qui sont à l'origine de cet outil.Building a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseGuide to Computer Network Security (Texts in Computer Science)
Par Joseph Migga Kizza. 2024
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going…
beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations.Topics and features:Explores the range of risks and vulnerabilities in all connected digital systemsPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsDescribes the fundamentals of traditional computer network security, and common threats to securityDiscusses the role and challenges of artificial intelligence in advancing the security of computing systems’ algorithms, protocols, and best practicesRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestionsThis important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.Technologie: Systemdenken und interdisziplinäres Ingenieurwesen
Par Horst Czichos. 2023
Dieses prägnante Lehrbuch führt einen Systemansatz in die Technik ein und beschreibt tribologische, mechatronische und cyber-physikalische Systeme sowie das technologische…
Konzept der Industrie 4.0 für Studierende verschiedener technischer Fachrichtungen. "Technologie" bezieht sich in diesem Buch auf die Gesamtheit der vom Menschen geschaffenen, nutzenorientierten Produkte, die auf technischen Kombinationen von Material, Energie und Information basieren. Dr. Czichos untersucht Technologie in diesem Band im Kontext des Systemdenkens im Hinblick auf die folgenden Haupttechnologiebereiche:Technische Systeme mit "interagierenden Oberflächen in Relativbewegung", insbesondere im Maschinenbau, in der Produktion und im Transportwesen; einschließlich der Analyse von reibungsbedingten Energieverlusten und verschleißbedingter Materialdissipation. Technische Systeme, die eine Kombination aus Mechanik, Elektronik, Steuerung und Computertechnik für die Bedürfnisse von Industrie und Gesellschaft erfordern. Technische Systeme mit einer Kombination aus Mechatronik und Internetkommunikation. Cyber-physikalische Systeme für die Digitalisierung der Industrie im Entwicklungsprojekt Industrie 4.0.Betrachtet Technik als Kombination aus der physischen Welt und der digitalen virtuellen Welt der Information und Kommunikation.Beschreibt den Produktzyklus von technischen Systemen und die Eckpfeiler der Technik: Material, Energie und Information.Stellt eine ganzheitliche Betrachtung von Technik und Engineering dar.This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, held as part…
of SCF 2023, in Shenzhen, China, during December 17–18, 2023.The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. The papers cover topics in the field of sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines.Ethik künstlicher Intelligenz: Eine Topographie zur praktischen Orientierung (essentials)
Par Michael Funk. 2023
Künstliche Intelligenz ist zum vielschichtigen Gegenstand ethischer Debatten geworden. Ob Richtlinien fairer Digitalisierung und vertrauenswürdiger Algorithmen, Gestaltung nachhaltiger Geschäftsmodelle, informatische…
Grundbildung in Schulen oder Existenzfragen freiheitlich-demokratischer Gesellschaften – KI-Ethik steht vor komplexen Herausforderungen. Grundsätzlicher Klärungsbedarf entsteht durch die verschiedenen Zugänge, Interessen und Begrifflichkeiten, die aufeinandertreffen. Vorliegendes essential präsentiert auf zugängliche Weise wissenschaftliches Überblickswissen zur KI-Ethik. Als praktische Orientierungshilfe im komplexen Terrain dient eine thematische Topographie, einschließlich zentraler Begriffe. Zusammenhänge zwischen Industrie 5.0, Regulierung, Post- und Transhumanismus, selbstfahrenden Autos, moralischen Maschinen, nachhaltiger Digitalisierung oder dem Anthropozän werden mit Blick auf KI-Ethik systematisch sichtbar gemacht.Data Science and Applications: Proceedings of ICDSA 2023, Volume 3 (Lecture Notes in Networks and Systems #820)
Par Satyasai Jagannath Nanda, Rajendra Prasad Yadav, Amir H. Gandomi, Mukesh Saraswat. 2024
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft…
Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023. The book is divided into four volumes, and it covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.New Developments and Environmental Applications of Drones: Proceedings of FinDrones 2023
Par Tomi Westerlund, Jorge Peña Queralta. 2024
This volume presents the conference proceedings from FinDrones 2023. The book highlights recent drone technology developments by experts and academicians…
for applications in agriculture, forestry, and other industries. This iteration of FinDrones presents research using autonomous drones in various fields from environmental monitoring to farm robotics and from photogrammetry to search and rescue missions. Emphasis is placed on contextualizing the conference presentations and content to Finland and the unique challenges typical to the region. The work will interest academicians, entrepreneurs, and professionals involved in remote sensing applications of unmanned aerial vehicles and enthusiasts of drone technological developments.Analytics Engineering with SQL and dbt
Par Rui Pedro Machado, Helder Russa. 2024
With the shift from data warehouses to data lakes, data now lands in repositories before it's been transformed, enabling engineers…
to model raw data into clean, well-defined datasets. dbt (data build tool) helps you take data further. This practical book shows data analysts, data engineers, BI developers, and data scientists how to create a true self-service transformation platform through the use of dynamic SQL.Authors Rui Machado from Monstarlab and Hélder Russa from Jumia show you how to quickly deliver new data products by focusing more on value delivery and less on architectural and engineering aspects. If you know your business well and have the technical skills to model raw data into clean, well-defined datasets, you'll learn how to design and deliver data models without any technical influence.With this book, you'll learn:What dbt is and how a dbt project is structuredHow dbt fits into the data engineering and analytics worldsHow to collaborate on building data modelsThe main tools and architectures for building useful, functional data modelsHow to fit dbt into data warehousing and laking architectureHow to build tests for data transformationsThis four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023.The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.This four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023. The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.Information Security Planning: A Practical Approach
Par Susan Lincke. 2024
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the…
technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing..Electromagnetic Sources and Electromagnetic Fields (Modern Antenna)
Par Gaobiao Xiao. 2024
This book presents a modified spherical harmonic expansion method in which the electromagnetic fields and their sources are expanded with…
the same set of spherical vector basis functions in a similar procedure. Explicit expressions for the electromagnetic fields, potentials, energies, and the related Green’s functions are derived for the spherical modes in both frequency domain and time domain. Based on the formulation, the relationships between the electromagnetic sources, the electromagnetic far fields, and the electromagnetic near fields are clearly revealed. In particular, a nonuniform transmission line model is developed for intuitively characterizing the total radiation process. The introduction of the cutoff radius and the cutoff mode degree provides a simple reference for determining the numbers of degrees of freedom of the fields associated with sources in a bounded region. Based on the theory, an efficient hybrid method for synthesizing antenna arrays with complex footprints is proposed and demonstrated with several numerical examples. Effective algorithms are also developed for reconstructing the radiating part of the current sources.This book is intended for researchers, engineers, and graduate students who are interested in studying the energy transfer in electromagnetic radiation, synthesis and measurement of antenna arrays, and applications of inverse electromagnetic source problems.Teach Yourself VISUALLY MacBook Pro and MacBook Air (Teach Yourself VISUALLY (Tech))
Par Guy Hart-Davis. 2024
The visual learner's guide to getting up and running with your Apple laptop Teach Yourself VISUALLY MacBook Pro and MacBook…
Air covers all the vital information you need to start working on your MacBook. With this highly illustrated and easy-to-follow guide, you'll learn to navigate the macOS interface like a pro; customize your desktop with the widgets you need; and get your MacBook working with iCloud, your iPhone, and your iPad. This book's graphical, step-by-step instructions walk you through everything from installation to troubleshooting, helping you to get the most out of the investment you've made in your MacBook. This fully updated edition helps you become a power user of the latest MacBook models and exploit the features in macOS Sonoma, Apple's state-of-the-art operating system, and the apps that come with it. If you prefer to learn visually, this is the book you need. Get up to speed with the latest macOS version, Sonoma, and its new features Perform everyday tasks quickly and easily Customize settings to make macOS and its apps work the way you prefer Communicate via audio and video with FaceTime, via instant messaging with Messages, and via email with Mail Organize your life with Calendar, Contacts, Reminders, Notes, and Maps Make the most of your iCloud account Instead of confusing tech-speak and vague instructions, this guide is packed with screenshots, easy-to-follow instructions, and a practical sensibility. Grab Teach Yourself VISUALLY MacBook Pro and MacBook Air and explore all that your MacBook can do.The VES Handbook of Visual Effects: Industry Standard VFX Practices and Procedures
Par Jeffrey A. Okun, Susan Zwerman, Christopher McKittrick, Lisa Sepp-Wilson. 2020
The award-winning VES Handbook of Visual Effects remains the most complete guide to visual effects techniques and best practices available…
today. This new edition has been updated to include the latest, industry-standard techniques, technologies, and workflows for the ever-evolving fast paced world of visual effects. The Visual Effects Society (VES) tasked the original authors to update their areas of expertise, such as AR/VR Moviemaking, Color Management, Cameras, VFX Editorial, Stereoscopic and the Digital Intermediate, as well as provide detailed chapters on interactive games and full animation. Additionally, 56 contributors share their best methods, tips, tricks, and shortcuts developed through decades of trial and error and real-world, hands-on experience.This third edition has been expanded to feature lessons on 2.5D/3D Compositing; 3D Scanning; Digital Cinematography; Editorial Workflow in Animated and Visual Effects Features; Gaming updates; General Geometry Instancing; Lens Mapping for VFX; Native Stereo; Real-Time VFX and Camera Tracking; Shot/Element Pulls and Delivery to VFX; Techvis; VFX Elements and Stereo; Virtual Production; and VR/AR (Virtual Reality / Augmented Reality).A must-have for anyone working in or aspiring to work in visual effects, The VES Handbook of Visual Effects, Third Edition covers essential techniques and solutions for all VFX artists, producers, and supervisors, from pre-production to digital character creation, compositing of both live-action and CG elements, photorealistic techniques, and much more. With subjects and techniques clearly and definitively presented in beautiful four-color, this handbook is a vital resource for any serious VFX artist.Artificial Intelligence. ECAI 2023 International Workshops: XAI^3, TACTIFUL, XI-ML, SEDAMI, RAAIT, AI4S, HYDRA, AI4AI, Kraków, Poland, September 30 – October 4, 2023, Proceedings, Part II (Communications in Computer and Information Science #1948)
Par Sławomir Nowaczyk, Przemysław Biecek, Neo Christopher Chung, Mauro Vallati, Paweł Skruch, Joanna Jaworek-Korjakowska, Simon Parkinson, Alexandros Nikitas, Martin Atzmüller, Tomáš Kliegr, Ute Schmid, Szymon Bobek, Nada Lavrac, Marieke Peeters, Roland Van Dierendonck, Saskia Robben, Eunika Mercier-Laurent, Gülgün Kayakutlu, Mieczyslaw Lech Owoc, Karl Mason, Abdul Wahid, Pierangela Bruno, Francesco Calimeri, Francesco Cauteruccio, Giorgio Terracina, Diedrich Wolter, Jochen L. Leidner, Michael Kohlhase, Vania Dimitrova. 2024
This volume constitutes the refereed proceedings presented at the international workshops of the 26th European Conference on Artificial Intelligence, ECAI 2023,…
which was held in Kraków, Poland, in September-October 2023. The papers in this volume were presented at the following workshops: XAI^3, TACTIFUL, XI-ML, SEDAMI, RAAIT, AI4S, HYDRA, AI4AI.Guide to Electricity and Magnetism: Using Mathematica for Calculations and Visualizations
Par James W. Rohlf. 2024
This is a “how to guide” for a calculus-based introductory course in electricity and magnetism. Students taking the subject at…
an intermediate or advanced level may also find it to be a useful reference. The calculations are performed in Mathematica, and stress graphical visualization, units, and numerical answers. The techniques show the student how to learn the physics without being hung up on the math. There is a continuing movement to introduce more advanced computational methods into lower-level physics courses. Mathematica is a unique tool in that code is written as "human readable" much like one writes a traditional equation on the board.Key Features: Concise summary of the physics concepts. Over 300 worked examples in Mathematica. Tutorial to allow a beginner to produce fast results. The companion code for this book can be found here: https://physics.bu.edu/~rohlf/code.htmlAbsolute Essentials of Ethereum (Absolute Essentials of Business and Economics)
Par Paul Dylan-Ennis. 2024
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum…
ecosystem, from the basics of how its blockchain works to cutting-edge applications.Written by an experienced educator, each chapter is designed to progress potential students from class to class. Technical concepts are clearly explained for those new to the topic and readers are supported with definitions and summaries in each chapter. Real-life case studies situate the overviews in a contemporary context. Topics covered include the Ethereum Execution and Consensus layers, Ethereum governance and community, Decentralised Autonomous Organisations (DAOs), Decentralised Finance (DeFi), Non-Fungible Tokens (NFTs) and Layer 2.This book is the ideal text to support undergraduate and postgraduate courses on blockchain technologies, cryptocurrencies, Web3 and fintech, as well as for those who want to know how Ethereum really works.Introduction to Compiler Design (Undergraduate Topics in Computer Science)
Par Torben Ægidius Mogensen. 2024
The third edition of this textbook has been fully revised and adds material about the SSA form, polymorphism, garbage collection,…
and pattern matching. It presents techniques for making realistic compilers for simple to intermediate-complexity programming languages. The techniques presented in the book are close to those used in professional compilers, albeit in places slightly simplified for presentation purposes. "Further reading" sections point to material about the full versions of the techniques.All phases required for translating a high-level language to symbolic machine language are covered, and some techniques for optimising code are presented. Type checking and interpretation are also included.Aiming to be neutral with respect to implementation languages, algorithms are mostly presented in pseudo code rather than in any specific language, but suggestions are in many places given for how these can be realised in different language paradigms.Depending on how much of the material from the book is used, it is suitable for both undergraduate and graduate courses for introducing compiler design and implementation.Pattern Recognition and Computer Vision: 6th Chinese Conference, PRCV 2023, Xiamen, China, October 13–15, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14428)
Par Qingshan Liu, Hanzi Wang, Zhanyu Ma, Weishi Zheng, Hongbin Zha, Xilin Chen, Liang Wang, Rongrong Ji. 2024
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,…
PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis