Browse Results

Showing 26 through 50 of 35,187 results

Proceedings of the International Conference on Data Engineering 2015 (Lecture Notes in Electrical Engineering #520)

by Jemal H. Abawajy Tutut Herawan Rozaida Ghazali Mustafa Mat Deris Mohamed Othman Hairulnizam Mahdin

These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: • Data engineering • Big data • Data and knowledge visualization • Data management • Data mining and warehousing • Data privacy & security • Database theory • Heterogeneous databases • Knowledge discovery in databases • Mobile, grid and cloud computing • Knowledge management • Parallel and distributed data • Temporal data • Web data, services and information engineering • Decision support systems • E-Business engineering and management • E-commerce and e-learning • Geographical information systems • Information management • Information quality and strategy • Information retrieval, integration and visualization • Information security • Information systems and technologies

2020 International Conference on Applications and Techniques in Cyber Intelligence: Applications and Techniques in Cyber Intelligence (ATCI 2020) (Advances in Intelligent Systems and Computing #1244)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Mohammed Atiquzzaman Zheng Xu

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019: Applications and Techniques in Cyber Intelligence (Advances in Intelligent Systems and Computing #1017)

by Jemal H. Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Mohammed Atiquzzaman Zheng Xu

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to be able to secure our cyberfuture. The approaches and findings described in this book are of interest to businesses and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Applied Soft Computing and Communication Networks: Proceedings of ACN 2019 (Lecture Notes in Networks and Systems #125)

by Jemal H. Abawajy Jimson Mathew Sabu M. Thampi Jaime Lloret Mauri Soura Dasgupta Elizabeth Sherly Evgeny Khorov

This book constitutes best selected research papers presented at the International Applied Soft Computing and Communication Networks (ACN 2019) held in Trivandrum, Kerala, India during December 18 – 21, 2019. The papers are organized in topical sections on real time and multimedia communications, security and privacy, network management and software-defined networks, Internet of Things (IoT) and cyber-physical systems, intelligent distributed systems, mobile computing and vehicle communications, surveillance networks and visual intelligence, and emerging topics. The book is a reference for researchers and scientists engaged in various fields of intelligent systems.

Security in Computing and Communications

by Jemal H. Abawajy Sougata Mukherjea Sabu M. Thampi Antonio Ruiz-Martínez

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #839)

by Jemal Abawajy Shekhar Verma Ranjeet Singh Tomar Brijesh Kumar Chaurasia Vrijendra Singh

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Windows 10: Learn Tips And Tricks On Using Windows 10 Operating System

by Blerton Abazi

Windows 10 Learn tips and trick on using Windows 10 operating system

Next-Generation Ethics: Engineering a Better Society

by Ali E. Abbas

Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of online transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview.

Handbook of Digital CMOS Technology, Circuits, and Systems

by Karim Abbas

This book provides a comprehensive reference for everything that has to do with digital circuits. The author focuses equally on all levels of abstraction. He tells a bottom-up story from the physics level to the finished product level. The aim is to provide a full account of the experience of designing, fabricating, understanding, and testing a microchip. The content is structured to be very accessible and self-contained, allowing readers with diverse backgrounds to read as much or as little of the book as needed. Beyond a basic foundation of mathematics and physics, the book makes no assumptions about prior knowledge. This allows someone new to the field to read the book from the beginning. It also means that someone using the book as a reference will be able to answer their questions without referring to any external sources.

From Terrorism to Television: Dynamics of Media, State, and Society in Pakistan

by Qaisar Abbas

This book unpacks the media dynamics within the socio-cultural, political, and economic context of Pakistan. It provides an in-depth, critical, and scholarly discussion of contemporary issues such as media, state, and democracy in Pakistan; freedom of expression in Pakistani journalism; Balochistan as a blind spot in mainstream newspapers; media control by state institutions; women and media discourses; TV talk shows and coverage of Kashmir; feminist narrative and media images of Malala Yousufzai and Mukhtaran Mai; jihad on screen; and Osama bin Laden’s death on screen, to understand the relation between media and terrorism. The book covers diverse media types including TV, radio, newspapers, print media, films, documentary, stage performance, and social media. Detailed, interdisciplinary, analytical, and with original perspectives from journalists as well as academics, this volume will be useful to scholars and researchers of media studies, Pakistan studies, politics and international affairs, military and terrorism studies, journalism and communication studies, and South Asian studies. It will also interest general readers, policy makers, and those interested in global journalism, mass media, and freedom of expression.

Learning Apache Spark 2

by Muhammad Asif Abbasi

Learn about the fastest-growing open source project in the world, and find out how it revolutionizes big data analytics About This Book • Exclusive guide that covers how to get up and running with fast data processing using Apache Spark • Explore and exploit various possibilities with Apache Spark using real-world use cases in this book • Want to perform efficient data processing at real time? This book will be your one-stop solution. Who This Book Is For This guide appeals to big data engineers, analysts, architects, software engineers, even technical managers who need to perform efficient data processing on Hadoop at real time. Basic familiarity with Java or Scala will be helpful. The assumption is that readers will be from a mixed background, but would be typically people with background in engineering/data science with no prior Spark experience and want to understand how Spark can help them on their analytics journey. What You Will Learn • Get an overview of big data analytics and its importance for organizations and data professionals • Delve into Spark to see how it is different from existing processing platforms • Understand the intricacies of various file formats, and how to process them with Apache Spark. • Realize how to deploy Spark with YARN, MESOS or a Stand-alone cluster manager. • Learn the concepts of Spark SQL, SchemaRDD, Caching and working with Hive and Parquet file formats • Understand the architecture of Spark MLLib while discussing some of the off-the-shelf algorithms that come with Spark. • Introduce yourself to the deployment and usage of SparkR. • Walk through the importance of Graph computation and the graph processing systems available in the market • Check the real world example of Spark by building a recommendation engine with Spark using ALS. • Use a Telco data set, to predict customer churn using Random Forests. In Detail Spark juggernaut keeps on rolling and getting more and more momentum each day. Spark provides key capabilities in the form of Spark SQL, Spark Streaming, Spark ML and Graph X all accessible via Java, Scala, Python and R. Deploying the key capabilities is crucial whether it is on a Standalone framework or as a part of existing Hadoop installation and configuring with Yarn and Mesos. The next part of the journey after installation is using key components, APIs, Clustering, machine learning APIs, data pipelines, parallel programming. It is important to understand why each framework component is key, how widely it is being used, its stability and pertinent use cases. Once we understand the individual components, we will take a couple of real life advanced analytics examples such as 'Building a Recommendation system', 'Predicting customer churn' and so on. The objective of these real life examples is to give the reader confidence of using Spark for real-world problems. Style and approach With the help of practical examples and real-world use cases, this guide will take you from scratch to building efficient data applications using Apache Spark. You will learn all about this excellent data processing engine in a step-by-step manner, taking one aspect of it at a time. This highly practical guide will include how to work with data pipelines, dataframes, clustering, SparkSQL, parallel programming, and such insightful topics with the help of real-world use cases.

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Recent Advances in Computational Intelligence in Defense and Security

by Hussein A. Abbass Rami Abielmona Rafael Falcon Nur Zincir-Heywood

This volume is an initiative undertaken by the IEEE ComputationalIntelligence Society's Task Force on Security, Surveillance and Defense to consolidateand disseminate the role of CI techniques in the design, development anddeployment of security and defense solutions. Applications range from thedetection of buried explosive hazards in a battlefield to the control ofunmanned underwater vehicles, the delivery of superior video analytics forprotecting critical infrastructures or the development of stronger intrusiondetection systems and the design of military surveillance networks. Defensescientists, industry experts, academicians and practitioners alike will allbenefit from the wide spectrum of successful applications compiled in thisvolume. Senior undergraduate or graduate students may also discover unchartedterritory for their own research endeavors.

Evolutionary Computation and Complex Networks

by Hussein A. Abbass Jing Liu Kay Chen Tan

This book introduces the linkage between evolutionary computation and complex networks and the advantages of cross-fertilising ideas from both fields. Instead of introducing each field individually, the authors focus on the research that sits at the interface of both fields. The book is structured to address two questions: (1) how complex networks are used to analyze and improve the performance of evolutionary computation methods? (2) how evolutionary computation methods are used to solve problems in complex networks? The authors interweave complex networks and evolutionary computing, using evolutionary computation to discover community structure, while also using network analysis techniques to analyze the performance of evolutionary algorithms. The book is suitable for both beginners and senior researchers in the fields of evolutionary computation and complex networks.

Inventing the Internet

by Janet Abbate

Since the late 1960s the Internet has grown from a single experimental network serving a dozen sites in the United States to a network of networks linking millions of computers worldwide. In Inventing the Internet, Janet Abbate recounts the key players and technologies that allowed the Internet to develop; but her main focus is always on the social and cultural factors that influenced the Internets design and use. The story she unfolds is an often twisting tale of collaboration and conflict among a remarkable variety of players, including government and military agencies, computer scientists in academia and industry, graduate students, telecommunications companies, standards organizations, and network users. The story starts with the early networking breakthroughs formulated in Cold War think tanks and realized in the Defense Department's creation of the ARPANET. It ends with the emergence of the Internet and its rapid and seemingly chaotic growth. Abbate looks at how academic and military influences and attitudes shaped both networks; how the usual lines between producer and user of a technology were crossed with interesting and unique results; and how later users invented their own very successful applications, such as electronic mail and the World Wide Web. She concludes that such applications continue the trend of decentralized, user-driven development that has characterized the Internet's entire history and that the key to the Internet's success has been a commitment to flexibility and diversity, both in technical design and in organizational culture.

Recoding Gender: Women's Changing Participation in Computing (History of Computing)

by Janet Abbate

The untold history of women and computing: how pioneering women succeeded in a field shaped by gender biases.Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male “computer geek” seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field.Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine “software engineering.” She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science.Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Recoding Gender

by Janet Abbate

Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male "computer geek" seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field. Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine "software engineering." She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science. Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Text und Konzeption im Content Marketing: Alle wichtigen Grundlagen für Print, Web, Corporate Blogs und Social Media (essentials)

by Sandro Abbate

In diesem essential erfahren Sie alle wichtigen Grundlagen der Text- und Konzeptentwicklung f#65533;r eine Content-Marketing-Strategie. Der Autor beschreibt die erfolgsentscheidenden Stellschrauben, die Sie beachten m#65533;ssen und in die Sie ausreichend Zeit investieren sollten: von der vorab zu leistenden Denkarbeit, #65533;ber die strukturierte Konzeptentwicklung, bis hin zur optimalen Textarbeit f#65533;r Webtexte. Abgerundet wird dieser Band durch Interviews mit renommierten Experten und Erfolgsbeispielen aus der Praxis.

Special Educational Needs and the Internet: Issues for the Inclusive Classroom

by Chris Abbott

With Internet access for every school now a reality, teachers are beginning to explore the use of the Internet in the education of children with special needs. This book describes its benefits for children across the spectrum of special educational needs, from those with physical disabilities or sensory impairment to those with learning or social difficulties.With contributions from leading practitioners in the field, this book addresses the huge range of possibilities the Internet and associated technology offer for these pupils. Combining current theory and debate with practical guidance and inspiring case studies, this book considers:* how the Internet can be used to gather and publish information* how to communicate effectively through technology* policy and management issues for schools* the continuing challenges for access and inclusion.This book will be of interest to all teachers involved in special education needs, in both mainstream and special schools.

Applied Predictive Analytics

by Dean Abbott

Learn the art and science of predictive analytics -- techniques that get resultsPredictive analytics is what translates big data into meaningful, usable business information. Written by a leading expert in the field, this guide examines the science of the underlying algorithms as well as the principles and best practices that govern the art of predictive analytics. It clearly explains the theory behind predictive analytics, teaches the methods, principles, and techniques for conducting predictive analytics projects, and offers tips and tricks that are essential for successful predictive modeling. Hands-on examples and case studies are included.The ability to successfully apply predictive analytics enables businesses to effectively interpret big data; essential for competition todayThis guide teaches not only the principles of predictive analytics, but also how to apply them to achieve real, pragmatic solutionsExplains methods, principles, and techniques for conducting predictive analytics projects from start to finishIllustrates each technique with hands-on examples and includes as series of in-depth case studies that apply predictive analytics to common business scenariosA companion website provides all the data sets used to generate the examples as well as a free trial version of softwareApplied Predictive Analytics arms data and business analysts and business managers with the tools they need to interpret and capitalize on big data.

Guía No-Oficial de Dragon City

by Josh Abbott Hugo González Bruno

¡Vence a tus oponentes! Con mi guía de juego aprenderás exactamente lo que hay que saber para convertirse en un jugador experto y vencer a tus oponentes. Esta es una guía completa con todo lo que necesitas saber sobre el juego, además de una copia gratuita del juego con esta compra. - ¡Como descargarlo de forma gratuita! - Compatible con iPhone, Android, y PC. - Información general e información básica - Consejos y estrategias profesionales. - Conseguir gemas. - Obtener comida. - Todo sobre torneos. - Todo sobre tipos de edificios. - Cómo hacer toneladas de oro. - Información de crianza de dragones. - Hábitats de dragones. - Instrucciones detalladas fáciles de seguir. - ¡Secretos, Consejos, Trucos, Desbloqueables, además de trucos usados por los jugadores profesionales! - ¡Y mucho más! ¡Comprala ahora y aplasta a tus oponentes! ¡Conviértete en un jugador profesional ahora! Por favor, ten en cuenta: Este producto no está asociado, afiliado, respaldado o patrocinado por Social Point, ni tampoco ha sido revisado, probado o certificado por ellos. Esta guía está para ser utilizada como una referencia y, como tal, no modifica el juego de ninguna manera. Esta es una guía completa y no un programa de Software.

Asphalt 8 Airborne Wiki, Trucos, Armería, Descarga de la Guía No Oficial

by Josh Abbott Emmanuel Castro Hernández

* * Versión guía no oficial Consejos avanzada y Guía de Estrategia . Esta es la guía más completa y detallada sólo se encontrará en línea . Disponible para descarga instantánea en su teléfono móvil, dispositivo de libros electrónicos , o con tapas de cartulina . Esto es lo que va a obtener con la compra de esta guía de juego avanzado y detallado profesional. - Consejos y estrategias profesionales . - Trucos y Hacks . - Secretos, Consejos, Trucos , desbloqueables , y trucos usados por los jugadores profesionales ! - ¿Cómo obtener toneladas de dinero en efectivo / Monedas . - Y mucho más ! Renuncia: Este producto no está asociada , afiliada , aprobación , certificado o patrocinado por el propietario del copyright original . Todas las marcas comerciales y marcas registradas que aparecen en este libro electrónico son propiedad de sus respectivos dueños.

Guia Não Oficial do Jogo Halo 5 Guardians

by Joshua Abbott André de Oliveira Garcia

Descrição: *Versão do Guia Não Oficial* Guia com dicas e estratégias avançadas. Este é o guia mais abrangente e o mais detalhado que você encontrará online. Disponível para download instantâneo no seu celular, em leitores de livros digitais ou em edição de bolso. Abaixo está alistado o que você vai conseguir quando comprar este guia profissional, avançado e detalhado. -Dicas e Estratégias Profissionais -Cheats e Hacks -Segredos, Dicas, Truques, Desbloqueios e Técnicas Usadas por Jogadores Profissionais! -Como Conseguir Muito Dinheiro/Coins -E MUITO MAIS! Isenção de Responsabilidade: Este produto não está associado, afiliado, endossado, certificado ou patrocinado pelo Proprietário Original dos Direitos Autorais. Todas as marcas registradas que aparecem neste e-book são de propriedade de seus respectivos proprietários.

8 Ball Pool: guía no oficial

by Joshua Abbott Mario Antuña

GUÍA NO OFICIAL Guía de consejos y estrategias. Este título contiene la guía más detallada de internet, todo explicado de manera sencilla y entendible. Disponible para descarga instantánea a tu teléfono móvil, dispositivo eBook o en papel. Con el éxito de mis cientos de otras guías, he escrito una nueva incluyendo consejos profesionales, excelentes tanto para jugadores principiantes como para avanzados. Esta guía incluye consejos, estrategias y tácticas específicas para ayudarte a progresar más rápidamente, vencer a tus oponentes, ganar más dinero ¡y mucho más! *- Consejos y estrategias profesionales *- Trampas *- ¡Secretos, trucos y estrategias usadas por jugadores profesionales! *- Cómo obtener millones de billetes y monedas *- Y MUCHO MÁS Todas las versiones de esta guía incluyen capturas que te ayudarán a entender mejor cada parte de la misma. No hay ninguna otra guía más comprensible y completa que esta en internet. Renuncia a derechos Este producto no está relacionado, afiliado, patrocinado o certificado de ninguna forma por el poseedor de los derechos de autor.

Guide non-officiel du jeu Pokémon Go Trucs, Astuces et Secrets

by Joshua Abbott Anne B

Astuces avancées et guide stratégique. Voici le guide le plus complet et l'unique guide détaillé que vous trouverez en ligne. Disponible en téléchargement immédiat sur votre smartphone, votre liseuse ou en version papier. Après le succès de la centaine de guides et de manuels sratégiques que j'ai écrit, voici un nouveau guide professionnel avancé pour les nouveaux joueurs ainsi que pour les plus avertis. Vous y trouverez des stratégies spéciales et des astuces pour vous aider à progresser dans le jeu, battre vos adversaires, obtenir plus d'argent et de pièces, et bien plus ! Astuces de professionnels et stratégies Codes et astuces Secrets, Astuces, Codes, Déblocage, et stratagèmes utilisés par les joueurs pros ! Comment avoir une tonne d'argent/de pièces. ET BIEN PLUS ENCORE ! Toutes les versions de ce guide sont accompagnées de captures d'écran pour vous aider à mieux comprendre le jeu. Vous ne trouverez pas d'autre guide aussi complet et avancé que celui-ci. Clause de non-responsabilité : Ce produit n'est pas associé, ni affilié, ni soutenu, ni certifié, ni sponsorisé par le détenteur original du droit d'auteur.

Refine Search

Showing 26 through 50 of 35,187 results