Information Technology Ethics
This book explains moral dilemmas in the IT industry focussing on a different area of IT ethics. It starts by introducing theories, decision-making models, and the fundamental function of moral leadership in IT companies followed by ethical obligations related to intellectual property, privacy, professional ethics, and software development. It looks at how IT affects society in terms of accessibility and well-being including cybersecurity tactics, privacy and data protection legislation, legal and regulatory frameworks, and the moral obligations of IT workers and companies.Features: Includes extensive examination of IT ethics encompassing fundamental theories. Covers foundational concepts, intricate ethical quandaries, and societal ramifications. Provides practical guidance with real-world illustrations, case studies, and optimal approaches. Integrates cultural perspectives, case studies, and discussions on worldwide legal frameworks, accessibility challenges, and environmental sustainability. Reviews Canadian perspective on IT ethics, exploring the specific legal and ethical landscape of the country. This book is aimed at senior undergraduate and graduate students in computer engineering, IT including professionals.
Optimization Algorithms
This reprint of a Special Issue of Mathematics presents recent research on the theory and applications of optimization. The subjects that are addressed in the ten research papers cover a broad spectrum of optimization algorithms, such as unconstrained optimization, non-convex optimization, multi-objective optimization, graph theory, or flow shop scheduling.
Static Analysis
This book constitutes the refereed proceedings of the 31st International Static Analysis Symposium, SAS 2024, held in Pasadena, CA, USA, in October 2024. Static analysis is widely recognized as a fundamental tool for program verification, bug detection, compiler optimization, program understanding, and software maintenance. The papers presented in this book deal with theoretical, practical and application advances in this area. The 18 papers included here were carefully reviewed and selected from 45 submissions.
Exploring the Benefits of Numerical Simulation and Modelling
Scheduling Theory and Algorithms for Sustainable Manufacturing
This reprint of a Special Issue of Algorithms presents recent research on the applications of planning and scheduling models and algorithms to production systems and logistics, with the objective to increase production systems' sustainability. In the eleven research papers, several advanced models and algorithms for different sustainability issues are proposed to optimize energy consumption and achieve environmental benefits and resilience, as well as demonstrate how to reduce the cost of installing photovoltaic systems, organize sustainable inventory management, etc.
The City of Sussex and Her Encounter with Jesus Christ
In the heart of Sussex, a city known for its order and loyalty to its rulers, an extraordinary event shakes the very foundation of its people-the encounter with Jesus Christ. What begins as whispers of a mysterious stranger soon turns into a movement that cannot be silenced, even by the most powerful forces in the city.The widow, the fruit vendor, the young soldier, and the elderly man each witness the life, death, and miraculous resurrection of the man who changes everything. As the truth spreads, they are faced with a choice: to stand firm in faith or succumb to fear under the governor's rule.Despite relentless persecution, the people of Sussex refuse to be silenced. Their courage turns their city into a beacon of faith, and their story spreads beyond its walls, igniting a movement that no power can suppress.The City of Sussex and Her Encounter with Jesus Christ is a gripping tale of faith, resilience, and the unstoppable power of truth. It is a story of transformation-of a city, of its people, and of the world
File System Forensics
Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. It provides a step-by-step approach for file content and metadata recovery to allow the reader to manually recreate and validate results from file system forensic tools. The book includes a supporting website that shares all of the data (i.e. sample file systems) used for demonstration in the text and provides teaching resources such as instructor guides, extra material, and more. Written by a highly qualified associate professor and consultant in the field, File System Forensics includes information on: Preliminary concepts for necessary studying file system forensics for anyone with basic computing experience but without specific knowledge on digital forensics and file systems File systems specific to Windows, Linux, and macOS, with coverage of FAT, ExFAT, and NTFS Advanced topics such as deleted file recovery, fragmented file recovery, searching for particular files, links, checkpoints, snapshots, and RAID Issues facing file system forensics today and various issues that might evolve in the field in the coming years File System Forensics is an essential, up-to-date reference on the subject for graduate and senior undergraduate students in digital forensics, as well as digital forensic analysts and other law enforcement professionals.
Usability test of the UniClinika RIS Service Module
Blockchain Technology-a Breakthrough Innovation for Modern Industries
This Reprint, titled "Blockchain Technology-A Breakthrough Innovation for Modern Industries", provides an insightful exploration of how blockchain is revolutionizing industries by enhancing transparency, security, and efficiency. This collection comprises cutting-edge research and comprehensive reviews that address the challenges and opportunities blockchain presents across diverse sectors. The articles delve into theoretical advancements, innovative methodologies, and real-world applications of blockchain technology. Key themes include enhancing supply chain traceability, integrating blockchain with other advanced technologies like IoT and AI, securing financial transactions, and addressing cybersecurity threats in critical infrastructures. These contributions demonstrate blockchain's potential to drive sustainable development and foster innovation while tackling pressing industry challenges, such as scalability, interoperability, and regulatory compliance. Curated by guest editors involved in the W.E. B.E.S.T. (blockchain and smart contracts for the enhancement of the made in Italy excellence supply chains) project, this Reprint bridges academic research with practical insights, offering value to researchers, industry professionals, and policymakers alike.
Computational Algebra, Coding Theory and Cryptography
This Special Issue explores cutting-edge advancements in computational algebra, coding theory, and cryptography, emphasizing both theoretical foundations and practical applications. Topics covered in this Special Issue include algebraic structures in coding theory, cryptographic protocols, error-correcting codes, and their intersections with mathematical frameworks.
Research on Fuzzy Logic and Mathematics with Applications
The notion of the fuzzy set was introduced by Lotfi A. Zadeh in 1965. Zadeh was also the founder of fuzzy logic. Since the advent of the notion of the fuzzy set, Zadeh and other researchers have used this important and interesting set to conduct a great deal of significant and novel research in fuzzy logic, fuzzy topology, fuzzy arithmetics, etc. This Special Issue deals with fuzzy logic and mathematics with applications in decision making, fuzzy control systems, and other engineering applications.
Polynomial Approximation for Data-Driven System Analysis and Control of Nonlinear Systems
This thesis presents data-driven methods for nonlinear systems, enabling the verification of system-theoretical properties and the design of state feedbacks based on measured trajectories. Despite noisy data, the developed methods provide rigorous guarantees and leverage convex optimization. Classical control techniques require a mathematical model of the system dynamics, which derivation from first principles often demands expert knowledge or is time-consuming. In contrast, data-based control methods determine system properties and controllers from system trajectories. Whereas recent developments address linear systems, dynamical systems are generally nonlinear in practice. Therefore, this thesis first introduces a data-based system representation for unknown polynomial systems to determine dissipativity and integral quadratic constraints via sum-of-squares optimization. The second part of the thesis establishes a polynomial representation of nonlinear systems based on polynomial interpolation. Due to the unknown interpolation polynomial, a set of polynomials containing the actual interpolation polynomial is deduced from noisy data. This set, along with a polynomial bound on the approximation error, forms the basis for determining dissipativity properties and designing state feedbacks with stability guarantees utilizing robust control techniques and sum-of-squares relaxation.
Acoustic and Linguistic Analysis in Neurological and Psychiatric Disorders
This book explores the use of speech and language analysis for evaluating and monitoring Major Depression Disorder (MDD), Alzheimer's Disease (AD), and Parkinson's Disease (PD). By combining acoustic and linguistic features with machine learning, it addresses challenges in diagnosis and symptom overlap while aiming to improve therapy outcomes and patient monitoring. For MDD, the study analyzes therapy effectiveness by evaluating speech descriptors' impact on therapy, changes in emotional and speech patterns, and neural embeddings' suitability for tracking depression levels using contrastive learning. In AD, it applies automatic speech analysis to classify the disease, predict cognitive states, and detect pre-clinical stages. This includes AD classification using acoustic, emotional, and linguistic features; cognitive state prediction aligned with clinical assessments; and detection of pre-clinical stages linked to the PSEN1 mutation. For PD, speech analysis focuses on classifying and predicting neurological and motor states, incorporating spectral-based representation learning for disease severity prediction and identifying depression through emotional speech analysis. The book also examines biases in data collection and emphasizes the need for robust, multilingual models to enable cross-language feature transferability. Findings demonstrate the potential of speech and language analysis to support diagnosis and monitor treatment across neurological and psychiatric disorders.
Exploring Wireless Computing Technologies
Impact of an IT Audit in a Microfinance Institution
Tutorial Questions for Networking and Operating Systems
A Deep Learning Based Fake News Detection Framework
Structural, Syntactic, and Statistical Pattern Recognition
This book constitutes the proceedings of the Joint IAPR International Workshops on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2024, which took place in Venice, Italy, during September 9-11, 2024. The 19 full papers presented in this volume were carefully reviewed and selected from 27 submissions. The proceedings focus on pattern recognition, including classification and clustering, deep learning, structural matching and graph-theoretic methods, and multimedia analysis and understanding.
Supercomputing
The two-volume set LNCS 15406 and 15407 constitutes the refereed proceedings of the 10th Russian Supercomputing Days International Conference, RuSCDays 2024, held in Moscow, Russia, during September 2024. The 43 full papers presented in these two volumes were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Supercomputer Simulation; HPC, BigData, AI: Algorithms, Technologies, Evaluation Part II: Distributed Computing; HPC Education.
Computer vision based on machine learning technology
Professional Penetration Testing
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing--the act of testing a computer network to find security vulnerabilities before they are maliciously exploited--is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners. Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." -Network Security
Supercomputing
The two-volume set LNCS 15406 and 15407 constitutes the refereed proceedings of the 10th Russian Supercomputing Days International Conference, RuSCDays 2024, held in Moscow, Russia, during September 2024. The 43 full papers presented in these two volumes were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Supercomputer Simulation; HPC, BigData, AI: Algorithms, Technologies, Evaluation Part II: Distributed Computing; HPC Education.
Advances in Differential and Difference Equations and Their Applications
This Special Issue presents a collection of articles that highlight the significant progress in the study of differential and difference equations. These contributions cover a wide range of topics, from boundary value problems and the asymptotic behavior of solutions to complex mathematical models and the application of fractional and difference equations in various scientific and engineering fields.Differential equations are a core mathematical tool for modeling dynamic systems in a diverse range of areas, such as physics, biology, economics, and engineering. Likewise, difference equations provide discrete counterparts to continuous models, which are crucial in understanding phenomena occurring in digital systems and various computational models. The papers presented in this Special Issue reflect the latest theoretical advancements and applications in these important research areas.