Browse Results

Showing 3,576 through 3,600 of 61,568 results

Adventures in Computer Science: From Classical Bits to Quantum Bits

by Vicente Moret-Bonillo

The main focus of this textbook is the basic unit of information and the way in which our understanding of this has evolved over time. In particular the author covers concepts related to information, classical computing, logic, reversible computing, quantum mechanics, quantum computing, thermodynamics and some artificial intelligence and biology, all approached from the viewpoint of computer sciences. The book begins by asking the following nontrivial question: what is a bit? The author then discusses logic, logic gates, reversible computing and reversible architectures, and the concept of disorder. He then tries to establish the relationship between three essential questions that justify quantum approaches in computer sciences: the energy required to perform a real-life computation, the size of current processors, and the reversibility of quantum operations. Based on these concepts, the author establishes the conditions that justify the use of quantum techniques for certain kinds of computational tasks, and he uses formal descriptions and formal argumentations to introduce key quantum mechanical concepts and approaches. The rest of the book is formally different, focusing on practical issues, including a discussion of remarkable quantum algorithms in a treatment based on quantum circuit theory. The book is valuable for graduate students in computer science, and students of other disciplines who are engaged with physical models of information and computing.

Adventures in Minecraft

by Martin O'Hanlon David Whale

Here's your ticket to a world of adventures with Minecraft and programming.Learn how to extend Minecraft and create a new gaming experience, by exploring the magical world of Minecraft programming. Adventures in Minecraft, like other books in the highly successful Adventures series, is written especially for 11- to 15-year-olds. With this book you will learn new programming skills while having fun with Minecraft! Minecraft programming experts David Whale and Martin O'Hanlon walk you step-by-step through everything you need to know to: Get started writing Minecraft programs in Python on your PC, Mac, or Raspberry Pi * Build houses and other structures in the blink of an eye, and make a 3D duplicating machine * Write interactive games like a field that charges you rent, and a treasure hunt using magic vanishing bridges * Build custom game control panels using simple electronic circuits * Easily build huge 2D and 3D structures such as spheres and pyramids * Build intelligent objects like a massive Minecraft clock, and program an alien invasion * Plan and write a complete interactive arena game * Using the programming skills you learn from this book, writing Minecraft programs offers endless possibilities to create anything you can imagine.

Adventures in Minecraft (Adventures In ... Ser.)

by Martin O'Hanlon David Whale

Learn valuable programming skills while building your own Minecraft adventure! If you love playing Minecraft and want to learn how to code and create your own mods, this book was designed just for you. Working within the game itself, you'll learn to set up and run your own local Minecraft server, interact with the game on PC, Mac and Raspberry Pi, and develop Python programming skills that apply way beyond Minecraft. You'll learn how to use coordinates, how to change the player’s position, how to create and delete blocks and how to check when a block has been hit. The adventures aren't limited to the virtual – you'll also learn how to connect Minecraft to a BBC micro:bit so your Minecraft world can sense and control objects in the real world! The companion website gives you access to tutorial videos to make sure you understand the book, starter kits to make setup simple, completed code files, and badges to collect for your accomplishments. Written specifically for young people by professional Minecraft geeks, this fun, easy-to-follow guide helps you expand Minecraft for more exciting adventures, and put your personal stamp on the world you create. Your own Minecraft world will be unlike anyone else's on the planet, and you'll pick up programming skills that will serve you for years to come on other devices and projects. Among other things, you will: Write Minecraft programs in Python® on your Mac®, PC or Raspberry Pi® Build houses, structures, and make a 3D duplicating machine Build intelligent objects and program an alien invasion Build huge 2D and 3D structures like spheres and pyramids Build a custom game controller using a BBC micro:bit™ Plan and write a complete interactive arena game Adventures in Minecraft teaches you how to make your favourite game even better, while you learn to program by customizing you Minecraft journey.

Adventures in Python

by Craig Richardson

The complete beginner's guide to Python, for young people whowant to start today Adventures in Python is designed for 11-to 15-year oldswho want to teach themselves Python programming, but don't knowwhere to start. Even if you have no programming experience at all,this easy to follow format and clear, simple instruction will getyou up and running quickly. The book walks you through nineprojects that teach you the fundamentals of programming in general,and Python in particular, gradually building your skills until youhave the confidence and ability to tackle your own projects. Videoclips accompany each chapter to provide even more detailedexplanation of important concepts, so you feel supported every stepof the way.Python is one of the top programming languages worldwide, withan install base in the millions. It's a favourite language atGoogle, YouTube, the BBC, and Spotify, and is the primaryprogramming language for the Raspberry Pi. As an open-sourcelanguage, Python is freely downloadable, with extensive librariesreadily available, making it an ideal entry into programming forthe beginner. Adventures in Python helps you get started,giving you the foundation you need to follow your curiosity.Start learning Python at its most basic levelLearn where to acquire Python and how to set it upUnderstand Python syntax and interpretation for moduleprogrammingDevelop the skills that apply to any programming languagePython programming skills are invaluable, and developingproficiency gives you a head start in learning other languages likeC++, Objective-C, and Java. When learning feels like fun, you won'tever want to stop - so get started today with Adventuresin Python.

Adventures in Raspberry Pi (Adventures In ... Ser.)

by Carrie Anne Philbin

Build cool Raspberry Pi projects with no experience required! Adventures in Raspberry Pi, 3rd Edition is the fun guide to learning programming. Starting from the very basics and building skill upon skill, you'll learn developing fundamentals—even if you've never programmed before. Learning is exciting when you're working your way through cool projects, but the concepts you learn and the skills you master will take you further than you ever thought possible. You'll learn how your Raspberry Pi 3 works and what it can do as you create stories and games, program shapes, code music, and even build Minecraft worlds with projects designed specifically for kids 11 to 15. Author Carrie Anne Philbin is a former high school teacher, and she showcases her skills with clear, easy to follow instructions and explanations every step of the way. If you're interested in programming but find other books hard to understand, this book is your ideal starting point for mastering the Raspberry Pi. Inexpensive, non-intimidating, yet surprisingly versatile, the Raspberry Pi 3 is an ideal way to learn programming. Updated to align with the newest board, this book will teach you fundamental programming skills while having a ton of fun! Get acquainted with your Raspberry Pi's bits and pieces Take control of your Pi's "insides" with simple commands Program games, code music, and build a jukebox Discover where your new skills can take you next The tiny, credit-card sized Raspberry Pi has become a huge hit among kids—and adults—interested in programming. It does everything your desktop can do, but with a few basic programming skills, you can make it do so much more. With simple instructions, fun projects, and solid skills, Adventures in Raspberry Pi is the ultimate kids' programming guide!

Adventures of a Creeper: An Unofficial Minecraft Diary (Minecraft #1)

by Books Kid

In this humorous, illustrated chapter-book diary, you’ll find out that life is not always a blast—even if you’re an exploding Minecraft creeper!Minecraft creeper Mervyn Miles has just one goal: to win the annual Creeper Combustion and Confusion Competition so his father will finally be proud of him. But, between family and school pressures and bullying by arch-rival Wesley, things turn out to be more difficult than Mervyn could have ever imagined. Read all about this little green monster’s quest to become the biggest exploder in the entire Overworld in this humorous, unofficial Minecraft chapter-book diary with black-and-white illustrations.

Adventures of a Slime: An Unofficial Minecraft Diary (Minecraft #2)

by Books Kid

A Simon & Schuster eBook. Simon & Schuster has a great book for every reader.

Adventures of a Zombie: An Unofficial Minecraft Diary (Minecraft #3)

by Books Kid

Follow the adventures of Bern the Zombie, the leader of the greatest zombie army in Minecraftian history, in this humorous, illustrated chapter book diary.It has taken years of determination, but finally the Bern the Zombie has assembled the largest army of zombies that Minecraftia has ever seen. What exactly does Bern plan to do with his army? Take over the Overworld, of course! But Bern is the first to admit that most zombies aren&’t terribly bright. For instance, they have trouble with basic things, like knowing their left from their right. Read every hilarious misstep of Bern&’s quest in Adventures of a Zombie, an unofficial Minecraft chapter book diary with black-and-white illustrations.

Adventures of an It Leader

by Robert D. Austin Richard L. Nolan Shannon O'Donnell

Becoming an effective IT manager presents a host of challenges--from anticipating emerging technology to managing relationships with vendors, employees, and other managers. A good IT manager must also be a strong business leader.This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.You'll turn to this book many times as you face IT-related issues in your own career.

Adversarial Deep Learning in Cybersecurity: Attack Taxonomies, Defence Mechanisms, and Learning Theories

by Bo Liu Wei Liu Wanlei Zhou Aneesh Sreevallabh Chivukula Xinghao Yang

A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.

Adversarial Machine Learning

by Anthony D. Joseph Blaine Nelson Benjamin I. Rubinstein J. D. Tygar

Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.

Adversarial Multimedia Forensics (Advances in Information Security #104)

by Kassem Kallas Ehsan Nowroozi Alireza Jolfaei

This book explores various aspects of digital forensics, security and machine learning, while offering valuable insights into the ever-evolving landscape of multimedia forensics and data security. This book’s content can be summarized in two main areas. The first area of this book primarily addresses techniques and methodologies related to digital image forensics. It discusses advanced techniques for image manipulation detection, including the use of deep learning architectures to generate and manipulate synthetic satellite images. This book also explores methods for face recognition under adverse conditions and the importance of forensics in criminal investigations. Additionally, the book highlights anti-forensic measures applied to photos and videos, focusing on their effectiveness and trade-offs.The second area of this book focuses on the broader landscape of security, including the detection of synthetic human voices, secure deep neural networks (DNNs) and federated learning in the context of machine learning security. It investigates novel methods for detecting synthetic human voices using neural vocoder artifacts, and it explores the vulnerabilities and security challenges of federated learning in the face of adversarial attacks. Furthermore, this book delves into the realms of linguistic steganography and steganalysis, discussing the evolving techniques that utilize deep learning and natural language processing to enhance payload and detection accuracy.Overall, this book provides a comprehensive overview of the ever-evolving field of digital forensics and security, making it an invaluable resource for researchers and students interested in image forensics, machine learning security and information protection. It equips readers with the latest knowledge and tools to address the complex challenges posed by the digital landscape. Professionals working in this related field will also find this book to be a valuable resource.

Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind (Chapman & Hall/CRC Computer and Information Science Series)

by Alexander Kott William M. McEneaney

The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

by Dan Borges

Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand advanced red team and blue team techniques with code examplesLearn to battle in short-term memory, whether remaining unseen (red teams) or monitoring an attacker's traffic (blue teams)Book DescriptionLittle has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse. This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors' motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker's and a defender's perspective.What you will learnUnderstand how to implement process injection and how to detect itTurn the tables on the offense with active defenseDisappear on the defender's system, by tampering with defensive sensorsUpskill in using deception with your backdoors and countermeasures including honeypotsKick someone else from a computer you are on and gain the upper handAdopt a language agnostic approach to become familiar with techniques that can be applied to both the red and blue teamsPrepare yourself for real-time cybersecurity conflict by using some of the best techniques currently in the industryWho this book is forPentesters to red teamers, security operations center analysts to incident responders, attackers, defenders, general hackers, advanced computer users, and security engineers will benefit from this book. Participants in purple teaming or adversarial simulations will also learn a lot from its practical examples of processes for gaining an advantage over the opposing team.Basic knowledge of Python, Go, Bash, PowerShell, system administration as well as knowledge of incident response in Linux and prior exposure to any kind of cybersecurity knowledge, penetration testing, and ethical hacking basics will help you follow along.

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security (Lecture Notes in Computer Science #11830)

by Sushil Jajodia Cliff Wang Peng Liu George Cybenko Michael Wellman

Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.

Adversary Emulation with MITRE ATT&CK

by Drinor Selmanaj

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. You'll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization.Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations, and provides a common language that's standardized and accessible to everyone.You'll learn how to:Map Cyber Threat Intelligence to ATT&CKDefine Adversary Emulation goals and objectivesResearch Adversary Emulation TTPs using ATT&CK knowledge basePlan Adversary Emulation activityImplement Adversary tradecraftConduct Adversary EmulationCommunicate Adversary Emulation findingsAutomate Adversary Emulation to support repeatable testingExecute FIN6, APT3, and APT29 emulation plans

Adversary-Aware Learning Techniques and Trends in Cybersecurity

by Ranjeev Mittu Prithviraj Dasgupta Joseph B. Collins

This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.

Advertising Account Planning: Planning and Managing Strategic Communication Campaigns

by Sarah Turnbull Larry Kelley Donald Jugenheimer

This practical and comprehensive text effectively provides advertising account planning principles within an integrated marketing communications framework. With a world-renowned textbook author team, this 4th edition has been fully updated to include: Fresh professional examples and mini-case studies within each chapter with a more global outlook than previous editions, bringing the theoretical concepts to life A new chapter on International Advertising addressing the challenges of managing a global campaign Pedagogical features and visual aids to support student learning and comprehension, including reflective questions and mini-cases drawn from current industry examples New and expanded content covering digital marketing and technologies; the customer journey; ethics and corporate social responsibility; global positioning of the brand; paid, earned and owned media; influencer marketing, and campaign measurement and analytics. Providing a full understanding of the advertising account planning process, this textbook is perfect for both the industry and classroom. The textbook will equip students of Marketing Communications, Advertising Management and Brand Management with the knowledge and skills they need to plan and manage a strategic communications campaign, including prominent advertising student competitions such as American Advertising Federation ( AAF) National Student Advertising Competition ( NSAC) or the Collegiate EFFIES. Online resources include PowerPoint slides and a test bank.

Advertising Media Planning: A Brand Management Approach

by Donald W. Jugenheimer Larry D. Kelley Kim Bartel Sheehan Lisa Dobias David E. Koranda

Advertising Media Planning blends the latest methods for digital communication and an understanding of the global landscape with the best practices of the functional areas of media planning. Taking a unique brand communication approach from an agency perspective, the textbook is organized into four key parts, walking the student through the foundations of brand communication, communication planning, the different media channels available, and the process of preparing, presenting, and evaluating a media plan. This 5th edition has been fully updated to include: • An emphasis throughout on digital and global media planning • New chapters on the role of brand communication, media planning and data analytics, paid media, mobile media, influencer marketing, and B2B media • New mini-case studies and innovation-focused call-out boxes throughout, showcasing media examples from Europe, the United States, and Asia • Discussion questions to foster engagement and understanding A highly regarded new edition, this practical and integrated textbook should be core reading for advanced undergraduate and postgraduate students studying Media Planning, Advertising Management, Integrated Marketing Communication, and Brand Management. Instructor resources include: PowerPoint slides, a test bank, and an instructor manual.

Advertising on Google: The High Performance Cookbook

by Kristina Cutura

This book contains practical recipes on everything from creating an Adwords account, reporting, analyzing, bidding effectively to remarketing. The book is a guide to getting hands-on experience in Adwords strategies. It is extensively focussed on helping you build an Adwords account, which appeals to the visitors and attracts more clicks!This book is great for the users, who are ready to start using Adwords, as well as for experienced advertisers, who are looking to take their accounts to the next level. Just create an Adwords account and run ad campaigns to take advantage of the hands-on recipes.

Aerial Robotic Manipulation: Research, Development and Applications (Springer Tracts in Advanced Robotics #129)

by Anibal Ollero Bruno Siciliano

Aerial robotic manipulation integrates concepts and technologies coming from unmanned aerial systems and robotics manipulation. It includes not only kinematic, dynamics, aerodynamics and control but also perception, planning, design aspects, mechatronics and cooperation between several aerial robotics manipulators. All these topics are considered in this book in which the main research and development approaches in aerial robotic manipulation are presented, including the description of relevant systems. In addition of the research aspects, the book also includes the deployment of real systems both indoors and outdoors, which is a relevant characteristic of the book because most results of aerial robotic manipulation have been validated only indoor using motion tracking systems. Moreover, the book presents two relevant applications: structure assembly and inspection and maintenance, which has started to be applied in the industry. The Chapters of the book will present results of two main European Robotics Projects in aerial robotics manipulation: FP7 ARCAS and H2020 AEROARMS. FP7 ARCAS defined the basic concepts on aerial robotic manipulation, including cooperative manipulation. The H2020 AEROARMS on aerial robot with multiple arms and advanced manipulation capabilities for inspection and maintenance has two general objectives: (1) development of advanced aerial robotic manipulation methods and technologies, including manipulation with dual arms and multi-directional thrusters aerial platforms; and (2) application to the inspection and maintenance.

Aeronautical Telecommunications Network: Advances, Challenges, and Modeling

by Sarhan M. Musa Zhijun Wu

Addresses the Challenges of Modern-Day Air TrafficAir traffic control (ATC) directs aircraft in the sky and on the ground to safety, while the Aeronautical Telecommunications Network (ATN) comprises all systems and phases that assist in aircraft departure and landing. The Aeronautical Telecommunications Network: Advances, Challenges, and Mod

Aerosol Atmospheric Rivers: Availability, Spatiotemporal Characterisation, Predictability, and Impacts (SpringerBriefs in Applied Sciences and Technology)

by Manish Kumar Goyal Kuldeep Singh Rautela

This book thoroughly examines aerosol pollution and aerosol atmospheric rivers (narrow corridors of concentrated suspended aerosols in the sky), exploring their significant effects on human health, the environment, and global climate. Readers will find detailed discussions on these phenomena' sources, composition, patterns, and advanced methods for their detection, monitoring, and mitigation. Each chapter examines the complex dynamics of aerosol atmospheric rivers and the use of data mining and artificial intelligence in analyzing aerosol pollution. The book also highlights the interactions between aerosol pollution, aerosol atmospheric rivers, and particulate matter concentrations with associated risk, offering practical adaptation, mitigation, and resilience strategies.

Aerospace System Analysis and Optimization in Uncertainty (Springer Optimization and Its Applications #156)

by Loïc Brevault Mathieu Balesdent Jérôme Morio

Spotlighting the field of Multidisciplinary Design Optimization (MDO), this book illustrates and implements state-of-the-art methodologies within the complex process of aerospace system design under uncertainties. The book provides approaches to integrating a multitude of components and constraints with the ultimate goal of reducing design cycles. Insights on a vast assortment of problems are provided, including discipline modeling, sensitivity analysis, uncertainty propagation, reliability analysis, and global multidisciplinary optimization. The extensive range of topics covered include areas of current open research. This Work is destined to become a fundamental reference for aerospace systems engineers, researchers, as well as for practitioners and engineers working in areas of optimization and uncertainty. Part I is largely comprised of fundamentals. Part II presents methodologies for single discipline problems with a review of existing uncertainty propagation, reliability analysis, and optimization techniques. Part III is dedicated to the uncertainty-based MDO and related issues. Part IV deals with three MDO related issues: the multifidelity, the multi-objective optimization and the mixed continuous/discrete optimization and Part V is devoted to test cases for aerospace vehicle design.

Aerospike: Developing on a Modern Operational Database for Globally Distributed Apps

by V. Srinivasan Paige Roberts Tim Faulkes Albert Autin

If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike database up and running. You will learn how to power your globally distributed applications and take advantage of Aerospike's hybrid memory architecture with the real-time performance of in-memory plus dependable persistence. After reading this book, you'll be able to build applications that can process up to tens of millions of transactions per second for millions of concurrent users on any scale of data.This practical guide provides:Step-by-step instructions on installing and connecting to AerospikeA clear explanation of the programming models availableAll the advice you need to develop your Aerospike applicationCoverage of issues such as administration, connectors, consistency, and securityCode examples and tutorials to get you up and running quicklyAnd more

Refine Search

Showing 3,576 through 3,600 of 61,568 results