Browse Results

Showing 53,251 through 53,275 of 53,890 results

Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)

by Nur Syazreen Ahmad Junita Mohamad-Saleh Jiashen Teh

This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing, and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.

Predicting Real World Behaviors from Virtual World Data

by Muhammad Aurangzeb Ahmad Cuihua Shen Jaideep Srivastava Noshir Contractor

There is a growing body of literature that focuses on the similarities and differences between how people behave in the offline world vs. how they behave in these virtual environments. Data mining has aided in discovering interesting insights with respect to how people behave in these virtual environments. The book addresses prediction, mining and analysis of offline characteristics and behaviors from online data and vice versa. Each chapter will focus on a different aspect of virtual worlds to real world prediction e. g. , demographics, personality, location, etc.

Proceedings of International Conference on Information and Communication Technology for Development: ICICTD 2022 (Studies in Autonomic, Data-driven and Industrial Computing)

by Mohiuddin Ahmad Mohammad Shorif Uddin Yeong Min Jang

This book gathers outstanding research papers presented at the International Conference on Information and Communication Technology for Development (ICICTD 2022), held on July 29–30, 2022, at the Institute of Information and Communication Technology (IICT), Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh. The topics covered are ICT in health care, ICT in e-commerce, e-governance, collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics and IoT, information systems, computer network, algorithms, and natural language processing.

Affective Computing and Sentiment Analysis: Emotion, Metaphor and Terminology (Text, Speech and Language Technology #45)

by Khurshid Ahmad

This volume maps the watershed areas between two 'holy grails' of computer science: the identification and interpretation of affect - including sentiment and mood. The expression of sentiment and mood involves the use of metaphors, especially in emotive situations. Affect computing is rooted in hermeneutics, philosophy, political science and sociology, and is now a key area of research in computer science. The 24/7 news sites and blogs facilitate the expression and shaping of opinion locally and globally. Sentiment analysis, based on text and data mining, is being used in the looking at news and blogs for purposes as diverse as: brand management, film reviews, financial market analysis and prediction, homeland security. There are systems that learn how sentiments are articulated. This work draws on, and informs, research in fields as varied as artificial intelligence, especially reasoning and machine learning, corpus-based information extraction, linguistics, and psychology.

Software Security: Concepts & Practices

by Suhel Ahmad Khan Rajeev Kumar Raees Ahmad Khan

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy

by Khaleel Ahmad Nur Izura Udzir Ganesh Chandra Deka

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Emerging Security Algorithms and Techniques

by Khaleel Ahmad M. N. Doja Nur Izura Udzir Manu Pratap Singh

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

40 Algorithms Every Programmer Should Know: Hone Your Problem-solving Skills By Learning Different Algorithms And Their Implementation In Python

by Imran Ahmad

This book is for anyone who wants to understand essential algorithms and their implementation. Whether you are an experienced programmer who wants to gain a deeper understanding of the math behind the algorithms, or have limited data science and programming knowledge and want to learn more about this important area of active research and application, you’ll find this book useful. Although experience with Python programming is a must, knowledge of data science will be helpful but not necessary.

40 Algorithms Every Programmer Should Know - Second Edition: Tackle Computer Science Challenges With Classic To Modern Algorithms In Machine Learning, Software Design, Data Systems, And Cryptography

by Imran Ahmad

This computer science book is for programmers or developers who want to understand the use of algorithms for problem-solving and writing efficient code. Whether you are a beginner looking to learn the most used algorithms concisely or an experienced programmer looking to explore cutting-edge algorithms in data science, machine learning, and cryptography, you'll find this book useful. Python programming experience is a must, knowledge of data science will be helpful but not necessary.

Recent Trends in Mechatronics Towards Industry 4.0: Selected Articles from iM3F 2020, Malaysia (Lecture Notes in Electrical Engineering #730)

by Ahmad Fakhri Ab. Nasir Ahmad Najmuddin Ibrahim Ismayuzri Ishak Nafrizuan Mat Yahya Muhammad Aizzat Zakaria Anwar P. P. Abdul Majeed

This book presents part of the iM3F 2020 proceedings from the Mechatronics track. It highlights key challenges and recent trends in mechatronics engineering and technology that are non-trivial in the age of Industry 4.0. It discusses traditional as well as modern solutions that are employed in the multitude spectra of mechatronics-based applications. The readers are expected to gain an insightful view on the current trends, issues, mitigating factors as well as solutions from this book.

From Internet of Things to Smart Cities: Enabling Technologies (Chapman & Hall/CRC Computer and Information Science Series)

by Bashar Ahmad Hongjian Sun Chao Wang

From Internet of Things to Smart Cities: Enabling Technologies explores the information and communication technologies (ICT) needed to enable real-time responses to current environmental, technological, societal, and economic challenges. ICT technologies can be utilized to help with reducing carbon emissions, improving resource utilization efficiency, promoting active engagement of citizens, and more. This book aims to introduce the latest ICT technologies and to promote international collaborations across the scientific community, and eventually, the general public. It consists of three tightly coupled parts. The first part explores the involvement of enabling technologies from basic machine-to-machine communications to Internet of Things technologies. The second part of the book focuses on state of the art data analytics and security techniques, and the last part of the book discusses the design of human-machine interfaces, including smart home and cities. Features Provides an extended literature review of relevant technologies, in addition to detailed comparison diagrams, making new readers be easier to grasp fundamental and wide knowledge Contains the most recent research results in the field of communications, signal processing and computing sciences for facilitating smart homes, buildings, and cities Includes future research directions in Internet of Things, smart homes, smart buildings, smart grid, and smart cities Presents real examples of applying these enabling technologies to smart homes, transportation systems and cities With contributions from leading experts, the book follows an easy structure that not only presents timely research topics in-depth, but also integrates them into real world applications to help readers to better understand them.

Proceedings of the International Conference on Computing, Mathematics and Statistics (iCMS #2015)

by Abd-Razak Ahmad Liew Kee Kor Illiasaak Ahmad Zanariah Idrus

This proceedings volume consists of refereed papers presented at the Second International Conference on Computing, Mathematics and Statistics (iCMS 2015) held in Langkawi, Malaysia in November 2015. Divided into three sections - Computer Science, Mathematics and Statistics - the book includes both quantitative and qualitative research that confronts current societal issues. Within the main sections, the book also covers education based research works and the applications of computer and mathematical sciences in social science, business, industries and the life and hard sciences. Drawing on the theme Bridging Research Endeavor on Computing, Mathematics and Statistics, each of the conference papers are carefully selected and edited to cater to readers from diverse applied and social sciences backgrounds. The book allows for the contemplation and reflection on the possibility of the knowledge growth and knowledge sharing in building a better world for future generations.

Hiding Data - Selected Topics

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

Devoted to information security, this volume begins with a short course on cryptography, mainly basedon lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid1990s. It was the second of his cycle of lectures on information theory whichopened with an introductory course on basic coding theorems, as covered inVolume 1 of this series. In this third volume, Shannon's historical work onsecrecy systems is detailed, followed by an introduction to aninformation-theoretic model of wiretap channels, and such important concepts ashomophonic coding and authentication. Once the theoretical arguments have beenpresented, comprehensive technical details of AES are given. Furthermore, ashort introduction to the history of public-key cryptology, RSA and El Gamalcryptosystems is provided, followed by a look at the basic theory of ellipticcurves, and algorithms for efficient addition in elliptic curves. Lastly, theimportant topic of "oblivious transfer" is discussed, which is stronglyconnected to the privacy problem in communication. Today, the importance ofthis problem is rapidly increasing, and further research and practical realizationsare greatly anticipated. This is the third of several volumes serving as thecollected documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. In thesupplement to the present volume, Rüdiger Reischuk contributes his insights. Classicalinformation processing concerns the main tasks of gaining knowledge and thestorage, transmission and hiding of data. The first task is the prime goal ofStatistics. For transmission and hiding data, Shannon developed an impressivemathematical theory called Information Theory, which he based on probabilisticmodels. The theory largely involves the concept of codes with small errorprobabilities in spite of noise in the transmission, which is modeled bychannels. The lectures presented in this work are suitable for graduatestudents in Mathematics, and also for those working in Theoretical ComputerScience, Physics, and Electrical Engineering with a background in basicMathematics. The lectures can be used as the basis for courses or to supplementcourses in many ways. Ph. D. students will also find research problems, oftenwith conjectures, that offer potential subjects for a thesis. More advancedresearchers may find questions which form the basis of entire researchprograms.

Storing and Transmitting Data

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

The volume "Storing and Transmitting Data" is based on Rudolf Ahlswede's introductory course on "Information Theory I" and presents an introduction to Shannon Theory. Readers, familiar or unfamiliar with the technical intricacies of Information Theory, will benefit considerably from working through the book; especially Chapter VI with its lively comments and uncensored insider views from the world of science and research offers informative and revealing insights. This is the first of several volumes that will serve as a collected research documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. Holger Boche contributed his insights in the supplement of the present volume. Classical information processing concerns the main tasks of gaining knowledge, storage, transmitting and hiding data. The first task is the prime goal of Statistics. For the two next, Shannon presented an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also in Theoretical Computer Science, Physics, and Electrical Engineering with background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph. D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find the basis of entire research programs.

Transmitting and Gaining Data

by Rudolf Ahlswedealexander Ahlswede Ingo Althöfer Christian Deppe Ulrich Tamm

The calculation of channel capacities was one of Rudolf Ahlswede's specialties and is the main topic of this second volume of his Lectures on Information Theory. Here we find a detailed account of some very classical material from the early days of Information Theory, including developments from the USA, Russia, Hungary and (which Ahlswede was probably in a unique position to describe) the German school centered around his supervisor Konrad Jacobs. These lectures made an approach to a rigorous justification of the foundations of Information Theory. This is the second of several volumes documenting Rudolf Ahlswede's lectures on Information Theory. Each volume includes comments from an invited well-known expert. In the supplement to the present volume, Gerhard Kramer contributes his insights. Classical information processing concerns the main tasks of gaining knowledge and the storage, transmission and hiding of data. The first task is the prime goal of Statistics. For transmission and hiding data, Shannon developed an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph. D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Probabilistic Methods and Distributed Information: Rudolf Ahlswede’s Lectures on Information Theory 5 (Foundations in Signal Processing, Communications and Networking #15)

by Rudolf Ahlswede Alexander Ahlswede Ingo Althöfer Christian Deppe Vladimir Blinovsky Ulrich Tamm Holger Boche Ulrich Krengel Ahmed Mansour

The fifth volume of Rudolf Ahlswede’s lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: "multiple descriptions", on which he produced some of the best research worldwide, and "network coding", which had Ahlswede among the authors of its pioneering paper. The final Part IV on "Statistical Inference under Communication constraints" is mainly based on Ahlswede’s joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.

Handelsmarketing: Grundlagen Der Marktorientierten Führung Von Handelsbetrieben (Springer-Lehrbuch)

by Dieter Ahlert Peter Kenning Christian Brock

Dieses Lehrbuch führt in die grundlegenden Konzepte, Methoden und Anwendungen der marktorientierten Führung von Handelsbetrieben ein. Die Autoren veranschaulichen diese anhand von Erkenntnissen aus der Forschung sowie Beispielen aus der Unternehmenspraxis. Leser und Leserinnen können sich so ein Basiswissen verschaffen, das ihnen auch den Zugang zu speziellen Teilgebieten des Handelsmarketing ermöglicht. Für die 2. Auflage wurden alle Kapitel überarbeitet und um Kontrollfragen erweitert. Die mit der Digitalisierung verbundenen Entwicklungen wurden in der zweiten Auflage systematisch integriert. Neue Kapitel zum Customer Relationship Management und Multikanalmanagement kommen hinzu.Der Inhalt• Grundlagen des Handelsmarketing• Informationsgrundlagen des Handelsmarketing• Ziele und Strategien• Die Betriebstypenpolitik• Markenpolitik im Handel• Die Standortpolitik• Die Sortimentspolitik• Die Personalpolitik• Die Preispolitik• Die Präsentationspolitik• Die Kommunikationspolitik• Customer Relationship Management im Handel• Multikanalmanagement• Handelscontrolling

Handelsmarketing: Grundlagen der marktorientierten Führung von Handelsbetrieben (Springer-lehrbuch Ser.)

by Dieter Ahlert Peter Kenning Christian Brock

Dieses Lehrbuch führt in die grundlegenden Konzepte, Methoden und Anwendungen der marktorientierten Führung von Handelsbetrieben ein. Die Autoren veranschaulichen diese anhand von Erkenntnissen aus der Forschung sowie Beispielen aus der Unternehmenspraxis. Leser und Leserinnen können sich so ein Basiswissen aneignen, das ihnen auch den Zugang zu speziellen Teilgebieten des Handelsmarketing ermöglicht. In der dritten Auflage wurden die mit der Digitalisierung verbundenen neueren Entwicklungen, Methoden und Konzepte – wie z. B. die Ausführungen zu den Themen „Plattformökonomie“, „Dynamic Pricing“ sowie „Instore Kommunikation“ – systematisch integriert. Insbesondere wurde die dritte Auflage um digitale Karteikarten („Flashcards“) als Lehr- und Lernmittel ergänzt. Laden Sie die Springer Nature Flashcards-App kostenlos herunter und nutzen Sie exklusives Zusatzmaterial, um Ihr Wissen zu prüfen. Der Inhalt• Grundlagen des Handelsmarketing • Informationsgrundlagen des Handelsmarketing • Ziele und Strategien • Die Betriebstypenpolitik • Markenpolitik im Handel • Die Standortpolitik • Die Sortimentspolitik • Die Personalpolitik • Die Preispolitik • Die Präsentationspolitik • Die Kommunikationspolitik • Customer Relationship Management im Handel • Multikanalmanagement • Handelscontrolling

Innovation Through Information Systems: Volume III: A Collection of Latest Research on Management Issues (Lecture Notes in Information Systems and Organisation #48)

by Frederik Ahlemann Reinhard Schütte Stefan Stieglitz

This book presents the current state of research in information systems and digital transformation. Due to the global trend of digitalization and the impact of the Covid 19 pandemic, the need for innovative, high-quality research on information systems is higher than ever. In this context, the book covers a wide range of topics, such as digital innovation, business analytics, artificial intelligence, and IT strategy, which affect companies, individuals, and societies. This volume gathers the revised and peer-reviewed papers on the topic "Management" presented at the International Conference on Information Systems, held at the University of Duisburg-Essen in 2021.

Innovation Through Information Systems: Volume I: A Collection of Latest Research on Domain Issues (Lecture Notes in Information Systems and Organisation #46)

by Frederik Ahlemann Reinhard Schütte Stefan Stieglitz

This book presents the current state of research in information systems and digital transformation. Due to the global trend of digitalization and the impact of the Covid 19 pandemic, the need for innovative, high-quality research on information systems is higher than ever. In this context, the book covers a wide range of topics, such as digital innovation, business analytics, artificial intelligence, and IT strategy, which affect companies, individuals, and societies. This volume gathers the revised and peer-reviewed papers on the topic "Domain" presented at the International Conference on Information Systems, held at the University of Duisburg-Essen in 2021.

Innovation Through Information Systems: Volume II: A Collection of Latest Research on Technology Issues (Lecture Notes in Information Systems and Organisation #47)

by Frederik Ahlemann Reinhard Schütte Stefan Stieglitz

This book presents the current state of research in information systems and digital transformation. Due to the global trend of digitalization and the impact of the Covid 19 pandemic, the need for innovative, high-quality research on information systems is higher than ever. In this context, the book covers a wide range of topics, such as digital innovation, business analytics, artificial intelligence, and IT strategy, which affect companies, individuals, and societies. This volume gathers the revised and peer-reviewed papers on the topic "Technology" presented at the International Conference on Information Systems, held at the University of Duisburg-Essen in 2021.

The Multi-Agent Programming Contest 2019: Agents Assemble – Block by Block to Victory (Lecture Notes in Computer Science #12381)

by Tobias Ahlbrecht Jürgen Dix Niklas Fiekas Tabajara Krausburg

This book constitutes the 14th edition of the annual Multi-Agent Programming Contest, MAPC 2019, and presents its participants.The 2019 scenario and all its changes from previous competitions are described in the first contribution, together with a brief description and analysis of the five participating teams and a closer look at the matches. It is followed by a contribution from each team, introducing their methods and tools used to create their agent team and analyzing their performance and the contest.

The Multi-Agent Programming Contest 2021: One-and-a-Half Decades of Exploring Multi-Agent Systems (Lecture Notes in Computer Science #12947)

by Tobias Ahlbrecht Jürgen Dix Niklas Fiekas Tabajara Krausburg

This book constitutes the 15th edition of the annual Multi-Agent Programming Contest, MAPC 2020. It gives an overview of the competition, describes the current scenario. Furthermore, it summarises this year's participants and their approaches and analyses some of the matches played and the contest as a whole. In the second part, each team contributed a paper describing their approach and experiences with creating a team of agents to participate in the contest.

The Multi-Agent Programming Contest 2022: Coordinating Agents in a Dynamic World: Agents Follow the Rules, or Not (Lecture Notes in Computer Science #13997)

by Tobias Ahlbrecht Jürgen Dix Niklas Fiekas Tabajara Krausburg

This book constitutes the 16th edition of the annual Multi-Agent Programming Contest, MAPC 2022. It gives an overview of the competition, describes the current scenario. The first paper describes the contest in general and this edition in particular, focusing on the organizers’ observations. The following papers are written by the participants of the contest, describing their team of agents and its performance in more detail.

Reinforcement Learning for Finance: Solve Problems in Finance with CNN and RNN Using the TensorFlow Library

by Samit Ahlawat

This book introduces reinforcement learning with mathematical theory and practical examples from quantitative finance using the TensorFlow library.Reinforcement Learning for Finance begins by describing methods for training neural networks. Next, it discusses CNN and RNN – two kinds of neural networks used as deep learning networks in reinforcement learning. Further, the book dives into reinforcement learning theory, explaining the Markov decision process, value function, policy, and policy gradients, with their mathematical formulations and learning algorithms. It covers recent reinforcement learning algorithms from double deep-Q networks to twin-delayed deep deterministic policy gradients and generative adversarial networks with examples using the TensorFlow Python library. It also serves as a quick hands-on guide to TensorFlow programming, covering concepts ranging from variables and graphs to automatic differentiation, layers, models, and loss functions.After completing this book, you will understand reinforcement learning with deep q and generative adversarial networks using the TensorFlow library.What You Will LearnUnderstand the fundamentals of reinforcement learningApply reinforcement learning programming techniques to solve quantitative-finance problemsGain insight into convolutional neural networks and recurrent neural networksUnderstand the Markov decision processWho This Book Is ForData Scientists, Machine Learning engineers and Python programmers who want to apply reinforcement learning to solve problems.

Refine Search

Showing 53,251 through 53,275 of 53,890 results