Browse Results

Showing 176 through 200 of 53,320 results

Secure and Resilient Digital Transformation of Healthcare: First Workshop, SUNRISE 2023, Stavanger, Norway, November 30, 2023, Proceedings (Communications in Computer and Information Science #1884)

by Habtamu Abie Vasileios Gkioulos Sokratis Katsikas Sandeep Pirbhulal

This CCIS post conference volume constitutes the proceedings of First Workshop, SUNRISE 2023, in Stavanger, Norway, in November 2023. The 4 full papers together in this volume were carefully reviewed and selected from 9 submissions. The workshop offers a wide range of techniques addressing cybersecurity skills, access control, privacy risks, and resilience in healthcare systems.

Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12618)

by Habtamu Abie Silvio Ranise Luca Verderame Enrico Cambiaso Rita Ugarelli Gabriele Giunta Isabel Praça Federica Battisti

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis.The book contains 6 chapters which are available open access under a CC-BY license.

Practical Git: Confident Git Through Practice

by Johan Abildskov

Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then enforces this learning through exercises - the Git katas. You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client – either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in. The importance of Git is hard to overstate – it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn’t need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today. What You'll LearnUse Git through scripted exercises and the Git katas Understand Git’s graph modelTroubleshoot common and rare scenarios you may faceSelect and apply the right Git tool for the taskMaintain and collaborate on Git repositoriesTweak Git to gain the most from this powerful tool Who This Book Is For Anyone who is currently using Git in a copy-paste fashion. It will take you from using Git to knowing Git.

Liblouis User's and Programmer's Manual

by Abilitiessoft

A guide for users and programmers on Liblouis, an open-source braille translator and back-translator.

The Age of Algorithms

by Serge Abiteboul Gilles Dowek

Algorithms are probably the most sophisticated tools that people have had at their disposal since the beginnings of human history. They have transformed science, industry, society. They upset the concepts of work, property, government, private life, even humanity. Going easily from one extreme to the other, we rejoice that they make life easier for us, but fear that they will enslave us. To get beyond this vision of good vs evil, this book takes a new look at our time, the age of algorithms. Creations of the human spirit, algorithms are what we made them. And they will be what we want them to be: it's up to us to choose the world we want to live in.

Pattern Recognition and Information Processing: 14th International Conference, PRIP 2019, Minsk, Belarus, May 21–23, 2019, Revised Selected Papers (Communications in Computer and Information Science #1055)

by Sergey V. Ablameyko Viktor V. Krasnoproshin Maryna M. Lukashevich

This book constitutes the refereed proceedings of the 14th International Conference on Pattern Recognition and Information Processing, PRIP 2019, held in Minsk, Belarus, in May 2019. The 25 revised full papers were carefully reviewed and selected from 120 submissions. The papers of this volume are organized in topical sections on pattern recognition and image analysis; information processing and applications.

Android in Action

by Frank Ableson Chris King C. Enrique Ortiz

SummaryAndroid in Action, Third Edition is a comprehensive tutorial for Android developers. This fast-paced book puts you in the driver's seat -- you'll master the SDK, build WebKit apps using HTML 5, and even learn to extend or replace Android's built-in features by building useful and intriguing examples.About the TechnologyWhen it comes to mobile apps, Android can do almost anything, and with this book, so can you! Android, Google's popular mobile operating system and SDK for tablets and smart phones, is the broadest mobile platform available. It is Java-based, HTML5-aware, and loaded with the features today's mobile users demand.About this BookAndroid in Action, Third Edition takes you far beyond "Hello Android." You'll master the SDK, build WebKit apps using HTML 5, and even learn to extend or replace Android's built-in features. You'll find interesting examples on every page as you explore cross-platform graphics with RenderScript, the updated notification system, and the Native Development Kit. This book also introduces important tablet concepts like drag-and-drop, fragments, and the Action Bar, all new in Android 3. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book. What's InsideCovers Android 3.xSDK and WebKit development from the ground upDriving a robot with Bluetooth and sensorsImage processing with Native C codeThis book is written for hobbyists and developers. A background in Java is helpful. No prior experience with Android is assumed.==================================Table of ContentsPART 1 WHAT IS ANDROID? THE BIG PICTUREIntroducing AndroidAndroid's development environmentPART 2 EXERCISING THE ANDROID SDKUser interfacesIntents and ServicesStoring and retrieving dataNetworking and web servicesTelephonyNotifications and alarmsGraphics and animationMultimedia1Location, location, locationPART 3 ANDROID APPLICATIONSPutting Android to work in a field service applicationBuilding Android applications in CPART 4 THE MATURING PLATFORMBluetooth and sensorsIntegrationAndroid web developmentAppWidgetsLocalizationAndroid Native Development KitActivity fragmentsAndroid 3.0 action barDrag-and-drop

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

by Lillian Ablon Martin C. Libicki Andrea A. Golay

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks).

Cyber Security. Simply. Make it Happen.: Leveraging Digitization Through IT Security (Management for Professionals)

by Ferri Abolhassan

This book provides a practical and strategic perspective on IT and cyber security for corporations and other businesses. Leading experts from industry, politics and research discuss the status quo and future prospects of corporate cyber security. They answer questions such as: How much will IT security cost? Who will provide IT security? Can security even be fun? The book claims that digitization will increasingly pervade all areas of the economy, as well as our daily professional and personal lives. It will produce speed, agility and cost efficiency, but also increasing vulnerability in the context of public, corporate and private life. Consequently, cyber security is destined to become the great facilitator of digitization, providing maximum protection for data, networks, data centres and terminal devices.

The Drivers of Digital Transformation

by Ferri Abolhassan

Inthis book, leading CEOs, CIOs and experts from international corporationsexplore the role of digitalization and cloud-based processes as the mainbusiness drivers of the 21st century. Focusing on how to get started withdigitalization and how to handle the technologies involved, they employanalyses and practical case studies to demonstrate how to unleash the potentialoffered by the cloud, and how to achieve the most critical success factors -quality and security - through the right partnerships. Readers will discoverwhy the cloud will soon take over the driver's seat in cars, and why HeinekenCIO Anne Teague claims that innovation is impossible without high-quality IT. The book reveals what IT managers can learn from Silicon Valley and Chinatoday, and why Deutsche Telekom CEO Tim Hoettges believes Europe's futuredepends on successful digitalization. In a closing strategic assessment, theeditor Ferri Abolhassan presents the cloud as the essential backbone ofdigitalization. In short, the book provides readers the first comprehensive,high-level assessment of cloud-based digital transformation in the era ofIndustry 4. 0.

Kundenzufriedenheit im IT-Outsourcing: Das Optimum realisieren

by Ferri Abolhassan

Anknüpfend an "Der Weg zur modernen IT-Fabrik" zeigt das Fachbuch anhand von Best-Practice-Beispielen und Erfahrungswerten, welche Maßnahmen ein Unternehmen heute ergreifen kann, um Kunden langfristig zufriedenzustellen und den Qualitätsanspruch an Lösungen - von der Produktion zur Implementierung und darüber hinaus - zu sichern.

The Road to a Modern IT Factory

by Ferri Abolhassan

IT is currently going through one of its most critical phases of transformation. IT vendors and IT service organizations are revolutionizing their production and service processes, adopting industrial practices. It is only through the consistent transformation into factory-like structures that quality, effectiveness and efficiency can be increased. By integrating professional concepts and methods taken from the context of industrial production, it is possible to meet functional and qualitative requirements from the departments and therefore from the end user. On top of that this new paradigm enables the implementation of optimal processes in the organization. An interdisciplinary team of authors addresses the current challenges for global IT services organizations and describes the process of IT industrialization. The transformation of the IT industry towards the model of an IT factory is the core theme of this book, which takes the latest findings from applied research, consulting and IT business practices and combines them into a consistent and innovative approach to IT services.

Interpretability of Computational Intelligence-Based Regression Models

by János Abonyi Tamás Kenesei

The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques. The first part of the book deals with the identification of hinging hyperplane-based regression trees. The next part deals with the validation, visualization and structural reduction of neural networks based on the transformation of the hidden layer of the network into an additive fuzzy rule base system. Finally, based on the analogy of support vector regression and fuzzy models, a three-step model reduction algorithm is proposed to get interpretable fuzzy regression models on the basis of support vector regression. The authors demonstrate real-world use of the algorithms with examples taken from process engineering, and they support the text with downloadable Matlab code. The book is suitable for researchers, graduate students and practitioners in the areas of computational intelligence and machine learning.

Network-Based Analysis of Dynamical Systems: Methods for Controllability and Observability Analysis, and Optimal Sensor Placement (SpringerBriefs in Computer Science)

by János Abonyi Ágnes Vathy-Fogarassy Dániel Leitold

This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis. Furthermore, it argues that certain dynamical behaviours can stem from the existence of specific motifs in the network representation.Over the last decade, network science has become a widely applied methodology for the analysis of dynamical systems. Representing the system as a mathematical graph allows several network-based methods to be applied, and centrality and clustering measures to be calculated in order to characterise and describe the behaviours of dynamical systems. The applicability of the algorithms developed here is presented in the form of well-known benchmark examples. The algorithms are supported by more than 50 figures and more than 170 references; taken together, they provide a good overview of the current state of network science-based analysis of dynamical systems, and suggest further reading material for researchers and students alike. The files for the proposed toolbox can be downloaded from a corresponding website.

Medical Big Data and Internet of Medical Things: Advances, Challenges and Applications

by Aboul Ella Hassanien, Nilanjan Dey and Surekha Borra

Big data and the Internet of Things (IoT) play a vital role in prediction systems used in biological and medical applications, particularly for resolving issues related to disease biology at different scales. Modelling and integrating medical big data with the IoT helps in building effective prediction systems for automatic recommendations of diagnosis and treatment. The ability to mine, process, analyse, characterize, classify and cluster a variety and wide volume of medical data is a challenging task. There is a great demand for the design and development of methods dealing with capturing and automatically analysing medical data from imaging systems and IoT sensors. Addressing analytical and legal issues, and research on integration of big data analytics with respect to clinical practice and clinical utility, architectures and clustering techniques for IoT data processing, effective frameworks for removal of misclassified instances, practicality of big data analytics, methodological and technical issues, potential of Hadoop in managing healthcare data is the need of the hour. This book integrates different aspects used in the field of healthcare such as big data, IoT, soft computing, machine learning, augmented reality, organs on chip, personalized drugs, implantable electronics, integration of bio-interfaces, and wearable sensors, devices, practical body area network (BAN) and architectures of web systems. Key Features: Addresses various applications of Medical Big Data and Internet of Medical Things in real time environment Highlights recent innovations, designs, developments and topics of interest in machine learning techniques for classification of medical data Provides background and solutions to existing challenges in Medical Big Data and Internet of Medical Things Provides optimization techniques and programming models to parallelize the computationally intensive tasks in data mining of medical data Discusses interactions, advantages, limitations, challenges and future perspectives of IoT based remote healthcare monitoring systems. Includes data privacy and security analysis of cryptography methods for the Web of Medical Things (WoMT) Presents case studies on the next generation medical chair, electronic nose and pill cam are also presented.

System Level Design with .Net Technology

by El Mostapha Aboulhamid Frédéric Rousseau

The first book to harness the power of .NET for system design, System Level Design with .NET Technology constitutes a software-based approach to design modeling verification and simulation. World class developers, who have been at the forefront of system design for decades, explain how to tap into the power of this dynamic programming environment for more effective and efficient management of metadata—and introspection and interoperability between tools. Using readily available technology, the text details how to capture constraints and requirements at high levels and describes how to percolate them during the refinement process. Departing from proprietary environments built around System Verilog and VHDL, this cutting-edge reference includes an open source environment (ESys.NET) that readers can use to experiment with new ideas, algorithms, and design methods; and to expand the capabilities of their current tools. It also covers: Modeling and simulation—including requirements specification, IP reuse, and applications of design patterns to hardware/software systems Simulation and validation—including transaction-based models, accurate simulation at cycle and transaction levels, cosimulation and acceleration technique, as well as timing specification and validation Practical use of the ESys.NET environment Worked examples, end of chapter references, and the ESys.NET implementation test bed make this the ideal resource for system engineers and students looking to maximize their embedded system designs.

Oracle SOA Suite 11g Administrator's Handbook

by Ahmed Aboulnaga Arun Pareek

The book explains core concepts while providing real world implementation specifics, detailing the administration-related activities with Oracle SOA Suite 11g with a step-by-step approach using real-world examples. The authors demonstrate the use of WLST scripts that administrators can reuse and extend to perform most administration tasks such as deployments, tuning, migration, and installation. If you are an Oracle SOA Suite administrator, WebLogic Server administrator, Database administrator, or developer that needs to administer and secure your Oracle SOA Suite services and applications, then this book is for you. Basic knowledge of Oracle SOA Suite Administration is beneficial, but not necessary.

Real World Data Mining Applications

by Mahmoud Abou-Nasr Stefan Lessmann Robert Stahlbock Gary M. Weiss

Data mining applications range from commercial to social domains, with novel applications appearing swiftly; for example, within the context of social networks. The expanding application sphere and social reach of advanced data mining raise pertinent issues of privacy and security. Present-day data mining is a progressive multidisciplinary endeavor. This inter- and multidisciplinary approach is well reflected within the field of information systems. The information systems research addresses software and hardware requirements for supporting computationally and data-intensive applications. Furthermore, it encompasses analyzing system and data aspects, and all manual or automated activities. In that respect, research at the interface of information systems and data mining has significant potential to produce actionable knowledge vital for corporate decision-making. The aim of the proposed volume is to provide a balanced treatment of the latest advances and developments in data mining; in particular, exploring synergies at the intersection with information systems. It will serve as a platform for academics and practitioners to highlight their recent achievements and reveal potential opportunities in the field. Thanks to its multidisciplinary nature, the volume is expected to become a vital resource for a broad readership ranging from students, throughout engineers and developers, to researchers and academics.

Advances in Machine Intelligence and Computer Science Applications: Proceedings of the International Conference ICMICSA’2022 (Lecture Notes in Networks and Systems #656)

by Noureddine Aboutabit Mohamed Lazaar Imad Hafidi

This book encloses latest and advanced researches on artificial intelligence and its applications in computer science. It is an interesting book that aims to help students, researchers, industrialists, and policymakers understand, promote, and synthesize innovative solutions and think of new ideas with the application of artificial intelligence concepts. It also allows to know the existing scientific works and contributions in the literature. This book identifies original research in new directions and advances focused on multidisciplinary areas and closely related to the use of artificial intelligence in applications of computer science, communication, and technology. The present book contains selected and extended high-quality papers of the 1st international conference on Machine Intelligence and Computer Science Applications (ICMICSA’2022). It is the result of a reviewed, evaluated, and presented work in ICMICSA’2022 held on November 28–29, 2022, in Khouribga, Morocco.

Computational Social Networks: Security and Privacy

by Ajith Abraham

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Computational Social Networks: Mining and Visualization

by Ajith Abraham

This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Emergent Web Intelligence: Advanced Information Retrieval

by Ajith Abraham Youakim Badr Aboul-Ella Hassanien Richard Chbeir

Web Intelligence explores the impact of artificial intelligence and advanced information technologies representing the next generation of Web-based systems, services, and environments, and designing hybrid web systems that serve wired and wireless users more efficiently. Multimedia and XML-based data are produced regularly and in increasing way in our daily digital activities, and their retrieval must be explored and studied in this emergent web-based era. 'Emergent Web Intelligence: Advanced information retrieval' provides reviews of the related cutting-edge technologies and insights. It is valuable companion and comprehensive reference for undergraduate and postgraduate students who are taking a course in Web intelligence and need to study current concepts of retrieval of multimedia and XML-based data, developers who need to implement advanced search engine and make benefit of web intelligence technologies, researchers who desire to understand exiting approaches, pin down their limits, and identify several future directions. The book is organized in self-contained chapters to provide greatest reading flexibility.

Emergent Web Intelligence: Advanced Semantic Technologies

by Ajith Abraham Youakim Badr Aboul-Ella Hassanien Richard Chbeir

The future of the World Wide Web depended on its ability to understand and automatically process content to enable computers and people to work in cooperation. New advanced techniques and intelligent approaches are required more than ever to transform the Web into a universal reasoning and semantic-driven computing machine. The Web intelligence discipline attempts to deal with this challenge by exploits information technologies and artificial intelligence approaches to design next generation of web-empowered systems and services. The 'Emergent Web Intelligence: Advanced Semantic Technologies" book provides valuable references and cutting-edge technologies for: undergraduate and postgraduate students who are studying Web Intelligence and Semantic Web courses, developers who need to design innovative approaches by applying different emergent semantic techniques to real-world problems, researchers who seek to understand the state of the art and foresee future research strategies in Web Intelligence and Semantic Web. The book is organized in self-contained chapters to provide greatest reading flexibility.

Innovations in Bio-Inspired Computing and Applications: Proceedings of the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2022) Held During December 15-17, 2022 (Lecture Notes in Networks and Systems #649)

by Ajith Abraham Anu Bajaj Niketa Gandhi Ana Maria Madureira Cengiz Kahraman

This book highlights recent research on bio-inspired computing and its various innovative applications in information and communication technologies. It presents 85 high-quality papers from the 13th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2022) and 12th World Congress on Information and Communication Technologies (WICT 2022), which was held online during 15–17 December 2022. As a premier conference, IBICA–WICT brings together researchers, engineers and practitioners whose work involves bio-inspired computing, computational intelligence and their applications in information security, real-world contexts, etc. Including contributions by authors from 25 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

Proceedings of 3rd International Conference on Computing Informatics and Networks: ICCIN 2020 (Lecture Notes in Networks and Systems #167)

by Ajith Abraham Oscar Castillo Deepali Virmani

This book is a collection of high-quality peer-reviewed research papers presented in the Third International Conference on Computing Informatics and Networks (ICCIN 2020) organized by the Department of Computer Science and Engineering (CSE), Bhagwan Parshuram Institute of Technology (BPIT), Delhi, India, during 29–30 July 2020. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of artificial intelligence, expert systems, software engineering, networking, machine learning, natural language processing and high-performance computing.

Refine Search

Showing 176 through 200 of 53,320 results