Browse Results

Showing 52,876 through 52,900 of 53,525 results

Coding for MIMO-OFDM in Future Wireless Systems (SpringerBriefs in Electrical and Computer Engineering)

by Bannour Ahmed Mohammad Abdul Matin

This book introduces the reader to the MIMO-OFDM system, in Rayleigh frequency selective-channels. Orthogonal frequency division multiplexing (OFDM) has been adopted in the wireless local-area network standards IEEE 802. 11a due to its high spectral efficiency and ability to deal with frequency selective fading. The combination of OFDM with spectral efficient multiple antenna techniques makes the OFDM a good candidate to overcome the frequency selective problems.

Foundations of Software Engineering

by Ashfaque Ahmed Bhanu Prasad

The best way to learn software engineering is by understanding its core and peripheral areas. Foundations of Software Engineering provides in-depth coverage of the areas of software engineering that are essential for becoming proficient in the field. The book devotes a complete chapter to each of the core areas. Several peripheral areas are also explained by assigning a separate chapter to each of them. Rather than using UML or other formal notations, the content in this book is explained in easy-to-understand language. Basic programming knowledge using an object-oriented language is helpful to understand the material in this book. The knowledge gained from this book can be readily used in other relevant courses or in real-world software development environments.This textbook educates students in software engineering principles. It covers almost all facets of software engineering, including requirement engineering, system specifications, system modeling, system architecture, system implementation, and system testing. Emphasizing practical issues, such as feasibility studies, this book explains how to add and develop software requirements to evolve software systems.This book was written after receiving feedback from several professors and software engineers. What resulted is a textbook on software engineering that not only covers the theory of software engineering but also presents real-world insights to aid students in proper implementation. Students learn key concepts through carefully explained and illustrated theories, as well as concrete examples and a complete case study using Java. Source code is also available on the book’s website. The examples and case studies increase in complexity as the book progresses to help students build a practical understanding of the required theories and applications.

The SAP Materials Management Handbook

by Ashfaque Ahmed

Although tens of thousands of global users have implemented Systems, Applications, and Products (SAP) for enterprise data processing for decades, there has been a need for a dependable reference on the subject, particularly for SAP materials management (SAP MM).Filling this need, The SAP Materials Management Handbook provides a complete understandi

Software Project Management: A Process-Driven Approach

by Ashfaque Ahmed

To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: A

Django Project Blueprints

by Asad Jibran Ahmed

Develop stunning web application projects with the Django framework About This Book * Build six exciting projects and use them as a blueprint for your own work * Extend Django's built-in models and forms to add common functionalities into your project, without reinventing the wheel * Gain insights into the inner workings of Django to better leverage it Who This Book Is For If you are a Django web developer able to build basic web applications with the framework, then this book is for you. This book will help you gain a deeper understanding of the Django web framework by guiding you through the development of six amazing web applications. What You Will Learn * Share code between a client-facing application and Django's admin * Combine client and server-side code for enhanced functionality * Geo-enable your models to provide common functionality based on geography * Add a REST API to your models to allow other applications to interact with your code * Future-proof your code with unit and functional tests * Add e-commerce capabilities to your site, build a shopping cart, and issue refunds * Process information asynchronously using Web Sockets to provide a real-time user interface In Detail Django is a high-level web framework that eases the creation of complex, database-driven websites. It emphasizes on the reusability and pluggability of components, rapid development, and the principle of don't repeat yourself. It lets you build high-performing, elegant web applications quickly. There are several Django tutorials available online, which take as many shortcuts as possible, but leave you wondering how you can adapt them to your own needs. This guide takes the opposite approach by demonstrating how to work around common problems and client requests, without skipping the important details. If you have built a few Django projects and are on the lookout for a guide to get you past the basics and get you solving modern development tasks, this is your book. Six unique projects will take you through the development process from scratch, leaving no stone unturned. In the first two projects, you will learn everything from adding ranking and voting capabilities to your App to building geospatial queries and APIs. In the third project, we will build an e-commerce platform, complete with a payment processor, basic cart, checkout features, and more! Next, we will get into caching data asynchronously and create a real-time app capable of consuming live updates. When you're done, you'll have consistent patterns and techniques that you can build on for many projects to come. Style and approach This easy-to-follow guide is full of examples that will take you through building six very different web applications with Django. The code is broken down into manageable bites and then thoroughly explained.

Exploring Silences in the Field of Computer Assisted Language Learning

by Anwar Ahmed

This book is an attempt to pay deliberate attention to some silences on issues of social, cultural, and political importance that have remained unattended in the field of Computer Assisted Language Learning (CALL). Using an analytical framework developed by the French philosopher and cultural theorist Michel de Certeau, the author demonstrates how silences can actively shape the boundaries of a scholarly field. He argues that a “geography of the forgotten” in the field of CALL undermines the transformative and social justice potential of language teaching by using digital technologies. The book will appeal to graduate students, teacher educators, and academic researchers who are looking for fresh perspectives and innovative ideas for integrating technologies into the curriculum and pedagogy of language education.

Machine Learning Applications in Medicine and Biology

by Ammar Ahmed Joseph Picone

This book combines selected papers from the 2022 IEEE Signal Processing in Medicine and Biology Symposium (IEEE SPMB) held at Temple University. The symposium presents multidisciplinary research in the life sciences. Topics covered include:Signal and image analysis (EEG, ECG, MRI)Machine learningData mining and classificationBig data resourcesApplications of particular interest at the 2022 symposium included digital pathology, computational biology, and quantum computing. The book features tutorials and examples of successful applications that will appeal to a wide range of professionals and researchers in signal processing, medicine, and biology.

Programming Languages and Systems: 27th European Symposium On Programming, Esop 2018, Held As Part Of The European Joint Conferences On Theory And Practice Of Software, Etaps 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings (Lecture Notes in Computer Science #10801)

by Amal Ahmed

This open access book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The papers are organized in topical sections named: language design; probabilistic programming; types and effects; concurrency; security; program verification; program analysis and automated verification; session types and concurrency; concurrency and distribution; and compiler verification.

Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems

by Alexis Ahmed

Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey FeaturesDiscover a range of techniques to escalate privileges on Windows and Linux systemsUnderstand the key differences between Windows and Linux privilege escalationExplore unique exploitation challenges in each chapter provided in the form of pre-built VMsBook DescriptionPrivilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one of a kind, covering a range of privilege escalation techniques and tools for both Windows and Linux systems. The book uses virtual environments that you can download to test and run tools and techniques. Each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. This privilege escalation book then demonstrates how you can escalate your privileges to the highest level. By the end of this book, you will have gained the skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes.What you will learnUnderstand the privilege escalation process and set up a pentesting labGain an initial foothold on the systemPerform local enumeration on target systemsExploit kernel vulnerabilities on Windows and Linux systemsPerform privilege escalation through password looting and finding stored credentialsGet to grips with performing impersonation attacksExploit Windows services such as the secondary logon handle service to escalate Windows privilegesEscalate Linux privileges by exploiting scheduled tasks and SUID binariesWho this book is forThis Windows and Linux privilege escalation book is for intermediate-level cybersecurity students and pentesters who are interested in learning how to perform various privilege escalation techniques on Windows and Linux systems, which includes exploiting bugs, design flaws, and more. An intermediate-level understanding of Windows and Linux systems along with fundamental cybersecurity knowledge is expected.

Velocity: The Seven New Laws for a World Gone Digital

by Ajaz Ahmed Stefan Olander

How can you win when the only certainty is change? Highly accessible, lively and inspiring, Velocity draws upon the authors’ unique perspectives and experiences to present seven timeless new laws for businesses and individuals in a world that is dominated by rapid change and digital technology. Written as a fascinating and enjoyable conversation between the authors – Stefan Olander, Vice President of Digital Sport from Nike and Ajaz Ahmed founder and Chairman AKQA – Velocity's up-to-date examples illustrate key lessons, together with insights, ideas and inspiration that individuals and businesses should adopt to thrive in the digital age. Velocity shares the vision and values required to succeed with the untold backstories to influential and iconic innovation. Fast paced, useful, provocative and highly motivating, Velocity is a management book that will arm you with actionable ideas to define your future. Features: - 4 Velocity principles: Speed, Direction, Acceleration, Discipline. - 7 Laws, including 'A Smith & Wesson beats four aces', 'It’s easier done than said', 'Convenient is the enemy of right' and 'No good joke survives a committee of six'.

Cybersecurity: A New Approach Using Chaotic Systems (Studies in Big Data #102)

by Ahmed A. Abd El-Latif Christos Volos

This book presents techniques and security challenges of chaotic systems and their use in cybersecurity. It presents the state-of-the-art and the latest discoveries in the field of chaotic systems and methods and proposes new models, practical solutions, and technological advances related to new chaotic dynamical systems. The book can be used as part of the bibliography of the following courses: - Cybersecurity - Cryptography - Networks and Communications Security - Nonlinear Circuits - Nonlinear Systems and Applications

Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)

by Ahmed A. Abd El-Latif Lo’ai Tawalbeh Yassine Maleh Brij B. Gupta

This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).

Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies (Engineering Cyber-Physical Systems and Critical Infrastructures #4)

by Ahmed A. Abd El-Latif Yassine Maleh Wojciech Mazurczyk Mohammed ELAffendi Mohamed I. Alkanhal

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.

Distributed Real-Time Architecture for Mixed-Criticality Systems

by Hamidreza Ahmadian Roman Obermaisser Jon Perez

This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.

Soft Computing Approach for Mathematical Modeling of Engineering Problems

by Ali Ahmadian

This book describes different mathematical modeling and soft computing techniques used to solve practical engineering problems. It gives an overview of the current state of soft computing techniques and describes the advantages and disadvantages of soft computing compared to traditional hard computing techniques. Through examples and case studies the editors demonstrate and describe how problems with inherent uncertainty can be addressed and eventually solved through the aid of numerical models and methods. The chapters address several applications and examples in bioengineering science, drug delivery, solving inventory issues, Industry 4.0, augmented reality and weather forecasting. Other examples include solving fuzzy-shortest-path problems by introducing a new distance and ranking functions. Because, in practice, problems arise with uncertain data and most of them cannot be solved exactly and easily, the main objective is to develop models that deliver solutions with the aid of numerical methods. This is the reason behind investigating soft numerical computing in dynamic systems. Having this in mind, the authors and editors have considered error of approximation and have discussed several common types of errors and their propagations. Moreover, they have explained the numerical methods, along with convergence and consistence properties and characteristics, as the main objectives behind this book involve considering, discussing and proving related theorems within the setting of soft computing. This book examines dynamic models, and how time is fundamental to the structure of the model and data as well as the understanding of how a process unfolds • Discusses mathematical modeling with soft computing and the implementations of uncertain mathematical models • Examines how uncertain dynamic systems models include uncertain state, uncertain state space and uncertain state’s transition functions • Assists readers to become familiar with many soft numerical methods to simulate the solution function’s behaviorThis book is intended for system specialists who are interested in dynamic systems that operate at different time scales. The book can be used by engineering students, researchers and professionals in control and finite element fields as well as all engineering, applied mathematics, economics and computer science interested in dynamic and uncertain systems. Ali Ahmadian is a Senior Lecturer at the Institute of IR 4.0, The National University of Malaysia.Soheil Salahshour is an associate professor at Bahcesehir University.

Graphs in Biomedical Image Analysis, and Overlapped Cell on Tissue Dataset for Histopathology: 5th MICCAI Workshop, GRAIL 2023 and 1st MICCAI Challenge, OCELOT 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, September 23, and October 4, 2023, Proceedings (Lecture Notes in Computer Science #14373)

by Seyed-Ahmad Ahmadi Sérgio Pereira

This LNCS conference volume constitutes the proceedings of the MICCAI Workshop GRAIL 2023 and MICCAI Challenge OCELOT 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, September 23, and October 4, 2023. The 9 full papers (GRAIL 2023) and 6 full papers (OCELOT 2023) included in this volume were carefully reviewed and selected from GRAIL 14 (GRAIL 2023) and 6 (OCELOT 2023) submissions. The conference GRAIL 2023 a wide set of methods and application and OCELOT 2023 focuses on the cover a wide range of methods utilizing tissue information for better cell detection, in the sense of training strategy, model architecture, and especially how to model cell-tissue relationships.

Girl Gone Viral

by Arvin Ahmadi

Perfect for fans of Warcross and Black Mirror, Girl Gone Viral is the inventive and timely story of a seventeen-year-old coder's catapult to stardom.For seventeen-year-old Opal Hopper, code is magic. She builds entire worlds from scratch: Mars craters, shimmering lakes, any virtual experience her heart desires. But she can't code her dad back into her life. When he disappeared after her tenth birthday, leaving only a cryptic note, Opal tried desperately to find him. And when he never turned up, she enrolled at a boarding school for technical prodigies and tried to forget.Until now. Because WAVE, the world's biggest virtual reality platform, has announced a contest where the winner gets to meet its billionaire founder. The same billionaire who worked closely with Opal's dad. The one she always believed might know where he went. The one who maybe even murdered him.What begins as a small data hack to win the contest spirals out of control when Opal goes viral, digging her deeper into a hole of lies, hacks, and manipulation. How far will Opal go for the answers--or is it the attention--she's wanted for years?

International Congress and Workshop on Industrial AI 2021 (Lecture Notes in Mechanical Engineering)

by Alireza Ahmadi Ramin Karim Iman Soleimanmeigouni Ravdeep Kour Raj Rao

This proceedings of the International Congress and Workshop on Industrial AI 2021 encompasses and integrates the themes and topics of three conferences, eMaintenance, Condition Monitoring and Diagnostic Engineering management (COMADEM), and Advances in Reliability, Maintainability and Supportability (ARMS) into a single resource. The 21st century is witnessing the emerging extensive applications of Artificial Intelligence (AI) and Information Technologies (IT) in industry. Industrial Artificial Intelligence (IAI) integrates IT with Operational Technologies (OT) and Engineering Technologies (ET) to achieve operational excellence through enhanced analytics in operation and maintenance of industrial assets. This volume provides insight into opportunities and challenges caused by the implementation of AI in industries apart from future developments with special reference to operation and maintenance of industrial assets. Industry practitioners in the maintenance field as well as academics seeking applied research in maintenance will find this text useful.

Proceedings of the 12th International Conference on Robotics, Vision, Signal Processing and Power Applications (Lecture Notes in Electrical Engineering #1123)

by Nur Syazreen Ahmad Junita Mohamad-Saleh Jiashen Teh

This book presents selected papers from the Proceedings of the International Conference 12th International Conference on Robotics, Vision, Signal Processing, and Power Applications ROVISP 2023, held in Penang, Malaysia, covering topic areas divided into the following tracks: (1) Robotics, Control, Mechatronics, and Automation; (2) Vision, Image and Signal Processing; (3) Telecommunication Systems and Applications; (4) Electronic Design and Applications; (5) Electrical Power, Energy, and Industrial Applications. Its content highlights state-of-the-art technologies adopted by the relevant industries which appeal to researchers and industrial practitioners working in the field.

Predicting Real World Behaviors from Virtual World Data

by Muhammad Aurangzeb Ahmad Cuihua Shen Jaideep Srivastava Noshir Contractor

There is a growing body of literature that focuses on the similarities and differences between how people behave in the offline world vs. how they behave in these virtual environments. Data mining has aided in discovering interesting insights with respect to how people behave in these virtual environments. The book addresses prediction, mining and analysis of offline characteristics and behaviors from online data and vice versa. Each chapter will focus on a different aspect of virtual worlds to real world prediction e. g. , demographics, personality, location, etc.

Proceedings of International Conference on Information and Communication Technology for Development: ICICTD 2022 (Studies in Autonomic, Data-driven and Industrial Computing)

by Mohiuddin Ahmad Mohammad Shorif Uddin Yeong Min Jang

This book gathers outstanding research papers presented at the International Conference on Information and Communication Technology for Development (ICICTD 2022), held on July 29–30, 2022, at the Institute of Information and Communication Technology (IICT), Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh. The topics covered are ICT in health care, ICT in e-commerce, e-governance, collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics and IoT, information systems, computer network, algorithms, and natural language processing.

Affective Computing and Sentiment Analysis: Emotion, Metaphor and Terminology (Text, Speech and Language Technology #45)

by Khurshid Ahmad

This volume maps the watershed areas between two 'holy grails' of computer science: the identification and interpretation of affect - including sentiment and mood. The expression of sentiment and mood involves the use of metaphors, especially in emotive situations. Affect computing is rooted in hermeneutics, philosophy, political science and sociology, and is now a key area of research in computer science. The 24/7 news sites and blogs facilitate the expression and shaping of opinion locally and globally. Sentiment analysis, based on text and data mining, is being used in the looking at news and blogs for purposes as diverse as: brand management, film reviews, financial market analysis and prediction, homeland security. There are systems that learn how sentiments are articulated. This work draws on, and informs, research in fields as varied as artificial intelligence, especially reasoning and machine learning, corpus-based information extraction, linguistics, and psychology.

Software Security: Concepts & Practices

by Suhel Ahmad Khan Rajeev Kumar Raees Ahmad Khan

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Opportunistic Networks: Mobility Models, Protocols, Security, and Privacy

by Khaleel Ahmad Nur Izura Udzir Ganesh Chandra Deka

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Emerging Security Algorithms and Techniques

by Khaleel Ahmad M. N. Doja Nur Izura Udzir Manu Pratap Singh

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Refine Search

Showing 52,876 through 52,900 of 53,525 results