Browse Results

Showing 14,301 through 14,325 of 53,282 results

Democratizing Journalism through Mobile Media: The Mojo Revolution (Routledge Research in Journalism)

by Ivo Burum

Fuelled by a distrust of big media and the development of mobile technologies, the resulting convergence of journalism praxis (professional to alternative), workflows (analogue to multipoint digital) and platforms (PC to mobile), result in a 24-hour always-on content cycle. The information revolution is a paradigm shift in the way we develop and consume information, in particular the type we call news. While many see this cultural shift as ruinous, Burum sees it as an opportunity to utilize the converging information flow to create a galvanizing and common digital language across spheres of communication: community, education and mainstream media. Embracing the digital literacies researched in this book will create an information bridge with which to traverse journalism’s commercial precarity, the marginalization of some communities, and the journalism school curricula.

Democratizing RPA with Power Automate Desktop: Boost your productivity by implementing best practices for automating repetitive desktop processes

by Peter Krause

Discover how desktop flows can interact with your everyday tools and automate tasks, freeing up time to do more important thingsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how Office programs can assist with automating recurring tasksMaintain superior work quality by including daily desktop and web applications in your flowsEnrich your flows with additional AI-based information and integrate them with cloud systemsBook DescriptionWhether you want to organize simple files or perform more complex consolidations between different Office programs and remote-control applications that don't allow outside access, Power Automate Desktop helps meet these challenges. This book shows you how to leverage this workflow automation platform by explaining the underlying RPA concepts in a step-by-step way. You'll start with simple flows that can be easily recorded and further processed using the built-in recorder. Later, you'll learn how to use the more advanced actions to automate folder and file management and enable Office programs to interact with each other. You'll also get to grips with integrating desktop flows into other cloud environments and further enhance their value using AI. As you progress, you'll understand how flows can run unattended and how they are managed in the Power Platform, as well as key concepts such as creating, modifying, debugging, and error-handling UI flows. Finally, the book will guide you to use Process Automation Designer (PAD) in conjunction with your frequently used desktop systems to automate routine tasks. By the end of this book, you'll have become a Power Automate Desktop expert, automating both professional and personal tasks.What you will learnMaster RPA with Power Automate Desktop to commence your debut flowGrasp all essential product concepts such as UI flow creation and modification, debugging, and error handlingUse PAD to automate tasks in conjunction with the frequently used systems on your desktopAttain proficiency in configuring flows that run unattended to achieve seamless automationDiscover how to use AI to enrich your flows with insights from different AI modelsExplore how to integrate a flow in a broader cloud contextWho this book is forWhether you're a home user looking to automate simple tasks on your workstation or a business user or citizen developer seeking to automate more complex rule-based processes, this book will help you overcome the challenge. No knowledge of a programming language is required, but in the more advanced chapters, a general understanding of information technology, including basic programming language structures, protocols, and cloud concepts, will be helpful.

Demographic Change and Economic Growth: Simulations on Growth Models

by Lars Weber

In this book the author investigates the impact of demographic change on economic growth. As a result of the current financial crisis, a new view on economics has been demanded by various scientists. The author provides such a new view on economic growth, using a methodology of system dynamics. By applying this method, the author focuses on characteristics of complex systems and analyzes aging and shrinking processes, and not only positive growth. Delays and feedback processes are also considered. This leads to deeper and revealing insights into economic behavior. In doing so, a new semi-endogenous growth model is developed by introducing a specific and detailed population sector (demographic growth model). The book shows and analyzes the behavior of such a model and tests several policy scenarios in a transfer chapter to apply the new theoretical approach on real world problems. The major results are summarized in 15 principles of demographic growth.

Demystifying AI for the Enterprise: A Playbook for Business Value and Digital Transformation

by Prashant Natarajan Bob Rogers Edward Dixon Jonas Christensen Kirk Borne Leland Wilkinson Shantha Mohan

Artificial intelligence (AI) in its various forms –– machine learning, chatbots, robots, agents, etc. –– is increasingly being seen as a core component of enterprise business workflow and information management systems. The current promise and hype around AI are being driven by software vendors, academic research projects, and startups. However, we posit that the greatest promise and potential for AI lies in the enterprise with its applications touching all organizational facets. With increasing business process and workflow maturity, coupled with recent trends in cloud computing, datafication, IoT, cybersecurity, and advanced analytics, there is an understanding that the challenges of tomorrow cannot be solely addressed by today’s people, processes, and products. There is still considerable mystery, hype, and fear about AI in today’s world. A considerable amount of current discourse focuses on a dystopian future that could adversely affect humanity. Such opinions, with understandable fear of the unknown, don’t consider the history of human innovation, the current state of business and technology, or the primarily augmentative nature of tomorrow’s AI. This book demystifies AI for the enterprise. It takes readers from the basics (definitions, state-of-the-art, etc.) to a multi-industry journey, and concludes with expert advice on everything an organization must do to succeed. Along the way, we debunk myths, provide practical pointers, and include best practices with applicable vignettes. AI brings to enterprise the capabilities that promise new ways by which professionals can address both mundane and interesting challenges more efficiently, effectively, and collaboratively (with humans). The opportunity for tomorrow’s enterprise is to augment existing teams and resources with the power of AI in order to gain competitive advantage, discover new business models, establish or optimize new revenues, and achieve better customer and user satisfaction.

Demystifying Ansible Automation Platform: A definitive way to manage Ansible Automation Platform and Ansible Tower

by Sean Sullivan

Explore Ansible Automation Platform and understand how the different pieces interact to standardize and scale automationKey FeaturesCurated by a senior consultant at Red Hat with real-world examples to maximize use of Ansible Automation PlatformUse roles and modules to create interactive playbooks in Ansible Automation PlatformDiscover best practices for simplifying management of Ansible Automation PlatformBook DescriptionWhile you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management.The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You'll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You'll see how to maintain the created pieces with infrastructure as code. As you advance, you'll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub.By the end of this book, you'll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform.What you will learnGet the hang of different parts of Ansible Automation Platform and their maintenanceBack up and restore an installation of Ansible Automation PlatformLaunch and configure basic and advanced workflows and jobsCreate your own execution environment using CI/CD pipelinesInteract with Git, Red Hat Authentication Server, and logging servicesIntegrate the Automation controller with services catalogUse Automation Mesh to scale Automation ControllerWho this book is forThis book is for IT administrators, DevOps engineers, cloud engineers, and automation engineers seeking to understand and maintain the controller part of Ansible Automation Platform. If you have basic knowledge of Ansible, can set up a virtual machine, or have OpenShift experience, and want to know more about scaling Ansible, this book is for you.

Demystifying Azure AI: Implementing the Right AI Features for Your Business

by Kasam Shaikh

Explore artificial intelligence offerings by Microsoft Azure, along with its other services. This book will help you implement AI features in various Azure services to help build your organization and customers.The book starts by introducing you to the Azure Cognitive Search service to create and use an application. You then will learn the built-in automatic tuning intelligence mechanism in Azure SQL Database. This is an important feature you can use to enable Azure SQL Database to optimize the performance of your queries. Next, you will go through AI services with Azure Integration Platform service and Azure Logic Apps to build a modern intelligent workflow in your application. Azure functions are discussed as a part of its server-less feature. The book concludes by teaching you how to work with Power Automate to analyze your business workflow. After reading this book, you will be able to understand and work with different Azure Cognitive Services in AI.What You Will LearnGet started with Azure Cognitive Search serviceUse AI services with Low Code – Power AutomateUse AI services with Azure Integration servicesUse AI services with Azure Server-less offeringsUse automatic tuning in Azure SQL databaseWho This Book Is ForAspiring Azure and AI professionals

Demystifying Big Data Analytics for Industries and Smart Societies

by Keshav Kaushik Mamta Dahiya Ashutosh Dhar Dwivedi

This book aims to provide readers with a comprehensive guide to the fundamentals of big data analytics and its applications in various industries and smart societies. What sets this book apart is its in-depth coverage of different aspects of big data analytics, including machine learning algorithms, spatial data analytics, and IoT-based smart systems for precision agriculture. The book also delves into the use of big data analytics in healthcare, energy management, and agricultural development, among others. The authors have used clear and concise language, along with relevant examples and case studies, to help readers understand the complex concepts involved in big data analytics. Key Features: Comprehensive coverage of the fundamentals of big data analytics In-depth discussion of different aspects of big data analytics, including machine learning algorithms, spatial data analytics, and IoT-based smart systems. Practical examples and case studies to help readers understand complex concepts. Coverage of the use of big data analytics in various industries, including healthcare, energy management, and agriculture Discussion of challenges and legal frameworks involved in big data analytics. Clear and concise language that is easy to understand. This book is a valuable resource for business owners, data analysts, students, and anyone interested in the field of big data analytics. It provides readers with the tools they need to leverage the power of big data and make informed decisions that can help their organizations succeed. Whether you are new to the field or an experienced practitioner, "Demystifying Big Data Analytics for Industries and Smart Societies" is must-read.

Demystifying Communications Risk: A Guide to Revenue Risk Management in the Communications Sector

by Mark Johnson

The rapid pace and increasing convergence of internet, phone and other communications technologies has created extraordinary opportunities for business but the complexity of these new service mixes creates parallel opportunities for fraud and revenue leakage. Companies seeking to use communications technology as a delivery or payment platform for digital services are particularly at risk. They need to understand both their strategic and operational risks as well as those affecting their stakeholders - partners and customers. Effective risk management is as much about awareness, culture, training and organization as it is about technology. Mark Johnson's practical guide, Demystifying Communications Risk, highlights cases from a wide range of geographies and cultures and is designed to raise awareness of the multi-faceted and often complex forms that operational revenue risks take in the communications sector. It provides managers with an understanding of the nature and implications of the risks they face and the human, organizational and technological approaches that can help avoid or mitigate them.

Demystifying Cryptography with OpenSSL 3.0: Discover the best techniques to enhance your network security with OpenSSL 3.0

by Alexei Khlebnikov Jarle Adolfsen

Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the latest version of OpenSSL, its new features, and advantagesLearn about PKI, cryptography, certificate authorities, and more using real-world examplesBook DescriptionSecurity and networking are essential features of software today. The modern internet is full of worms, Trojan horses, men-in-the-middle, and other threats. This is why maintaining security is more important than ever.OpenSSL is one of the most widely used and essential open source projects on the internet for this purpose. If you are a software developer, system administrator, network security engineer, or DevOps specialist, you've probably stumbled upon this toolset in the past – but how do you make the most out of it? With the help of this book, you will learn the most important features of OpenSSL, and gain insight into its full potential.This book contains step-by-step explanations of essential cryptography and network security concepts, as well as practical examples illustrating the usage of those concepts. You'll start by learning the basics, such as how to perform symmetric encryption and calculate message digests. Next, you will discover more about cryptography: MAC and HMAC, public and private keys, and digital signatures. As you progress, you will explore best practices for using X.509 certificates, public key infrastructure, and TLS connections.By the end of this book, you'll be able to use the most popular features of OpenSSL, allowing you to implement cryptography and TLS in your applications and network infrastructure.What you will learnUnderstand how to use symmetric cryptographyGet to grips with message digests, MAC, and HMACDiscover asymmetric cryptography and digital signaturesFocus on how to apply and use X.509 certificatesDive into TLS and its proper usageManage advanced and special usages of TLSFind out how to run a mini certificate authority for your organizationWho this book is forThis book is for software developers, system administrators, DevOps specialists, network security engineers, and analysts, or anyone who wants to keep their applications and infrastructure secure. Software developers will learn how to use the OpenSSL library to empower their software with cryptography and TLS. DevOps professionals and sysadmins will learn how to work with cryptographic keys and certificates on the command line, and how to set up a mini-CA for their organization. A basic understanding of security and networking is required.

Demystifying Deep Learning: An Introduction to the Mathematics of Neural Networks

by Douglas J. Santry

DEMYSTIFYING DEEP LEARNING Discover how to train Deep Learning models by learning how to build real Deep Learning software libraries and verification software! The study of Deep Learning and Artificial Neural Networks (ANN) is a significant subfield of artificial intelligence (AI) that can be found within numerous fields: medicine, law, financial services, and science, for example. Just as the robot revolution threatened blue-collar jobs in the 1970s, so now the AI revolution promises a new era of productivity for white collar jobs. Important tasks have begun being taken over by ANNs, from disease detection and prevention, to reading and supporting legal contracts, to understanding experimental data, model protein folding, and hurricane modeling. AI is everywhere—on the news, in think tanks, and occupies government policy makers all over the world —and ANNs often provide the backbone for AI. Relying on an informal and succinct approach, Demystifying Deep Learning is a useful tool to learn the necessary steps to implement ANN algorithms by using both a software library applying neural network training and verification software. The volume offers explanations of how real ANNs work, and includes 6 practical examples that demonstrate in real code how to build ANNs and the datasets they need in their implementation, available in open-source to ensure practical usage. This approachable book follows ANN techniques that are used every day as they adapt to natural language processing, image recognition, problem solving, and generative applications. This volume is an important introduction to the field, equipping the reader for more advanced study. Demystifying Deep Learning readers will also find: A volume that emphasizes the importance of classification Discussion of why ANN libraries, such as Tensor Flow and Pytorch, are written in C++ rather than Python Each chapter concludes with a “Projects” page to promote students experimenting with real code A supporting library of software to accompany the book at https://github.com/nom-de-guerre/RANT An approachable explanation of how generative AI, such as generative adversarial networks (GAN), really work. An accessible motivation and elucidation of how transformers, the basis of large language models (LLM) such as ChatGPT, work. Demystifying Deep Learning is ideal for engineers and professionals that need to learn and understand ANNs in their work. It is also a helpful text for advanced undergraduates to get a solid grounding on the topic.

Demystifying Digital Transformation: Non-Technical Toolsets for Business Professionals Thriving in the Digital Age

by Attul Sehgal

Equip yourself with tools to approach digital transformation within your organization successfully. Today, over 80% of digital transformation engagements fail to reach their objectives (as reported through a survey by Couchbase). The challenge to overcome is that the pace of change in digital has left business users falling behind. Geared towards non-technical professionals, this book seeks to get executives on track to lead this innovation wave.Data as the prime lever in this innovation wave has accelerated the pace of change from earlier innovation waves by 25 years. Companies are finding it hard to adapt as their internal processes do not allow such rapid changes. Companies are stuck with outdated tools to manage DX projects. This leads to outsourcing the responsibility for DX to IT teams and outside system developers and causing great problems. Toolsets from data visualization, simulated prototyping, video editing and Whiteboarding will be introduced and simplified to show you can use simplify them to deliver on your business goals. Case studies that feature the digital transformation journeys of companies like Hertz, BBC, Domino's Pizza and more will be explored. What You'll LearnDerive business outcomes and KPIs to successfully direct digital transformation InitiativesWork with new toolsets that business owners can use to effectively collaborate with data scientists, data analysts and data engineersRecognize valuable data and align data monetization with business goalsWho This Book is ForNon-technical business owners and professionals

Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide

by Jody Booth Werner Metz Anahit Tarkhanyan Sunil Cheruvu

Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body.IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy.Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law.Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation.What You Will LearnReview the relevant technologies in a surveillance systemDefine and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocksOptimize the partition and future-proof it with security and manageabilityUnderstand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and softwareUnderstand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threatsSample applications illustrate how to design in security for several types of IMSS.—Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environmentWho This Book Is For Surveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisions

Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment

by Anil Kumar Sunil Cheruvu Ned Smith David M. Wheeler

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutionsWhat You'll LearnSecure devices, immunizing them against different threats originating from inside and outside the networkGather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platformsUnderstand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depthWho This Book Is ForStrategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Demystifying Object-Oriented Programming with C++: Implement Proven Object-oriented Design Principles To Write Better Code And Create Robust Software

by Dorothy R. Kirk

If you are a professional programmer or a college student looking to use C++ as an OOP language to create robust and easily maintainable code, this detailed guide is for you. Programmers who want to master the implementation of OO designs with language features or programming techniques will find the book useful. This OOP book will help you to enhance your skillset by showing you how to apply popular design patterns to solve recurring types of OO problems.

Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

by Anders Lisdorf

Cut through the hype surrounding Smart Cities. This book looks at the facts on the ground and realities, coming to a more adequate understanding of where technology can and cannot help in a city context, specifically pulling on insights gained from smart city initiatives in New York, Chicago, Amsterdam and Copenhagen.Currently, the concept of Smart Cities is rightfully touted as a transformative power in our lives. The use of Internet of Things, Artificial Intelligence, Big Data and Blockchain are some of the most hyped technologies that promise to bring about significant changes to how we live and manage our cities. While some isolated solutions have been implemented with great success and impact, the full potential of smart cities have so far not been realized. Practical realities often interfere, bringing initiatives to a screeching halt or stopping them before they even start. By better understanding the practical realities of a city we may be able to better make use of technology to make smarter cities.To that end end, this book provides a number of practical guidelines on how to make cities smarter with the aid of technology. You'll also dive into the practical understanding of managing and securing thousands, possibly millions, of devices and the accompanying data. Demystifying Smart Cities evaluates how technology can behave in a more intelligent way and how producing novel solutions can pose problems of their own.What You'll LearnPractical issues and challenges of managing thousands and millions of IoT devices in a cityThe different types of city data and how to manage and secure itThe possibilities of utilizing AI into a city (and how it differs from working with the private sector)Examples of how to make cities smarter with technologyWho This Book Is ForPrimarily for those already familiar with the hype of smart city technologies but not the details of its implementation, along with technologists interested in learning how city government works when integrating technology. Also, people working for smart city vendors, especially sales people and product managers who need to understand their target market.

Demystifying the Azure Well-Architected Framework: Guiding Principles and Design Best Practices for Azure Workloads

by Shijimol Ambi Karthikeyan

Use the Azure well-architected framework to deploy your workloads in Azure and align them with Microsoft recommended best practices. This book takes a deep dive into the five architecture elements (cost optimization, performance efficiency, operational excellence, reliability, and security) and provides practical guidance on incorporating them into your architecture.The book starts with an introduction to the relevance of the well-architectured framework and why it should form the baseline of your design decisions when deploying applications in Azure. You will learn how customers can optimize the cost of deployment in Azure and understand all aspects of implementation. The book takes you through the practices and processes to be followed to run applications smoothly and you will understand the end-to-end process of design, deployment, and monitoring. You will go through paradigms for designing environments to meet different performance demands. The book covers how to build resilient and highly available applications in Azure with a sample configuration for monitoring. And you will learn how to enable security to ensure confidentiality and integrity of workloads in Azure.After reading this book, you will know the practical nuances of designing high-performing applications in the Microsoft cloud. What You Will LearnUnderstand the five pillars of the well-architected frameworkUse tools and services to optimize costDesign for performance efficiencyDeal with threat vectors in the cloudWho This Book Is ForSolution architects and cloud teams in Azure

Demystifying the Brain: A Computational Approach

by V. Srinivasa Chakravarthy

This book presents an emerging new vision of the brain, which is essentially expressed in computational terms, for non-experts. As such, it presents the fundamental concepts of neuroscience in simple language, without overwhelming non-biologists with excessive biological jargon. In addition, the book presents a novel computational perspective on the brain for biologists, without resorting to complex mathematical equations.It addresses a comprehensive range of topics, starting with the history of neuroscience, the function of the individual neuron, the various kinds of neural network models that can explain diverse neural phenomena, sensory-motor function, language, emotions, and concluding with the latest theories on consciousness. The book offers readers a panoramic introduction to the “new brain” and a valuable resource for interdisciplinary researchers looking to gatecrash the world of neuroscience.

Den Fehlerteufel ausgetrickst: Codierungstheorie verständlich erklärt (essentials)

by Olaf Manz

Die Codierungstheorie, die sich mit Verfahren zur Erkennung und Korrektur von Fehlern bei Datenübertragungen und beim Auslesen von Speichermedien beschäftigt, ist heute aus Technik, Wirtschaft und aus unserem Alltag nicht mehr wegzudenken. Das Buch stellt anschaulich und leicht verständlich die wichtigsten, auch in der Praxis verwendeten Methoden vor. Dazu gehören Prüfziffern und CRC-Verfahren zur Fehlererkennung. Eingegangen wird aber auch auf historisch und für den heutigen Alltag wichtige Codes zur Fehlerkorrektur. Hierzu zählen insbesondere die Hamming-, Reed-Muller-, Reed-Solomon-, Faltungs- und Turbo-Codes. Verfahren, die darauf basieren, sind unter anderem beim Digitalfernsehen, beim Internet, beim Mobilfunk, in der Satellitennavigation, in der Raumfahrt, bei CDs und DVDs und bei QR-Codes implementiert.

Den Tätern auf der Spur

by Alexander Dörsam

Aus dem Alltag eines digitalen Ersthelfers Der IT-Sicherheitsexperte Alexander Dörsam entführt Sie mit seinem Buch in die spannende Welt von Hacking, Unternehmenserpressung, Spionage und digitalem Vandalismus. Anhand von realen IT-Sicherheitsvorfällen erfahren Sie, wie Angreifer in Firmenstrukturen eindringen, welche Methoden dafür eingesetzt werden und welche Folgen das haben kann. Doch wie schütze ich mich oder mein Unternehmen? Was ist zu tun bei einem digitalen Notfall? Dörsam hilft Ihnen nicht selbst Opfer zu werden, zeigt das IT-Krisenmanagement und gibt Hinweise zur Ersthilfe bei IT-Sicherheitsvorfällen. Ein fesselndes Buch für alle, die mehr über aktuelle digitale Bedrohungen erfahren wollen.

Dense and Green Building Typologies: Research, Policy and Practice Perspectives (SpringerBriefs in Architectural Design and Technology)

by Thomas Schröpfer Sacha Menz

In this book, academics, policy makers, developers, architects and landscape architects provide a systematic review of the environmental, social, economic and design benefits of dense and green building types in high-density urban contexts and discuss how these can support higher population densities, higher standards of environmental sustainability and enhanced live ability in future cities.

Dense and Green Building Typologies: Design Perspectives (SpringerBriefs in Architectural Design and Technology)

by Thomas Schröpfer Sacha Menz

In this book, leading architects and landscape architects provide their perspectives on the design of dense and green building types in high-density urban contexts that can support higher population densities, higher standards of environmental sustainability and enhanced liveability in future cities.

Dense Image Correspondences for Computer Vision

by Tal Hassner Ce Liu

This book describes the fundamental building-block of many new computer vision systems: dense and robust correspondence estimation. Dense correspondence estimation techniques are now successfully being used to solve a wide range of computer vision problems, very different from the traditional applications such techniques were originally developed to solve. This book introduces the techniques used for establishing correspondences between challenging image pairs, the novel features used to make these techniques robust, and the many problems dense correspondences are now being used to solve. The book provides information to anyone attempting to utilize dense correspondences in order to solve new or existing computer vision problems. The editors describe how to solve many computer vision problems by using dense correspondence estimation. Finally, it surveys resources, code and data, necessary for expediting the development of effective correspondence-based computer vision systems.

Dental Image Analysis for Disease Diagnosis

by Kavindra R. Jain N. C. Chauhan

This book provides an overview of computational approaches to medical image examination and analysis in oral radiology, utilizing dental radiograph to detect and diagnose dental caries in cases of decayed teeth. Coverage includes basic image processing techniques; approaches for Region of Interest extraction and analysis; and the role of computational clustering techniques for segmentation of teeth and dental caries. The book also presents a novel multiphase level set method for automatic segmentation of dental radiographs.

Dependability Engineering and Complex Systems

by Wojciech Zamojski Jacek Mazurkiewicz Jarosław Sugier Tomasz Walkowiak Janusz Kacprzyk

These proceedings present the results of the Eleventh International Conference on Dependability and Complex Systems DepCoS-RELCOMEX which took place in a picturesque Brunów Palace in Poland from 27th June to 1st July, 2016. DepCoS-RELCOMEX is a series of international conferences organized annually by Department of Computer Engineering of WrocÅ,aw University of Science and Technology since 2006. The roots of the series go as far back as to the seventies of the previous century - the first RELCOMEX conference took place in 1977 - and now its main aim is to promote a multi-disciplinary approach to dependability problems in theory and engineering practice of complex systems. Complex systems, nowadays most often computer-based and distributed, are built upon a variety of technical, information, software and human resources. The challenges in their design, analysis and maintenance not only originate from the involved technical and organizational structures but also from the complexity of the information processes that must be efficiently executed in a diverse, often hostile operational environment. Traditional methods of reliability evaluation focused only on technical resources are usually insufficient in this context and more innovative, multidisciplinary methods of dependability analysis must be applied. The diversity of the topics which need to be considered is well illustrated by the selection of the submissions in these proceedings with their subjects ranging from mathematical models and design methodologies through software engineering and data security issues up to practical problems in technical, e. g. transportation, systems.

Dependability in Electronic Systems

by Yutaka Uematsu Nobuyasu Kanekawa Eishi H. Ibe Takashi Suga

This book covers the practical application of dependable electronic systems in real industry, such as space, train control and automotive control systems, and network servers/routers. The impact from intermittent errors caused by environmental radiation (neutrons and alpha particles) and EMI (Electro-Magnetic Interference) are introduced together with their most advanced countermeasures. Power Integration is included as one of the most important bases of dependability in electronic systems. Fundamental technical background is provided, along with practical design examples. Readers will obtain an overall picture of dependability from failure causes to countermeasures for their relevant systems or products, and therefore, will be able to select the best choice for maximum dependability.

Refine Search

Showing 14,301 through 14,325 of 53,282 results