Information Technology Ethics
This book explains moral dilemmas in the IT industry focussing on a different area of IT ethics. It starts by introducing theories, decision-making models, and the fundamental function of moral leadership in IT companies followed by ethical obligations related to intellectual property, privacy, professional ethics, and software development.
Exploring the Benefits of Numerical Simulation and Modelling
Scheduling Theory and Algorithms for Sustainable Manufacturing
This reprint of a Special Issue of Algorithms presents recent research on the applications of planning and scheduling models and algorithms to production systems and logistics, with the objective to increase production systems' sustainability. In the eleven research papers, several advanced models and algorithms for different sustainability issues are proposed to optimize energy consumption and achieve environmental benefits and resilience, as well as demonstrate how to reduce the cost of installing photovoltaic systems, organize sustainable inventory management, etc.
From Battlefields to Hospitals, The Role of Cryptocurrency in International Aid Networks
From Battlefields to Hospitals: The Role of Cryptocurrency in International Aid Networks explores the transformative potential of cryptocurrencies in the realm of humanitarian aid. This book delves into how digital currencies, like Bitcoin and Ethereum, are revolutionizing the distribution of aid across borders, from conflict zones to disaster-stricken regions. With 22 chapters, the book covers various aspects of this revolution, including the empowerment of grassroots organizations, the enhancement of healthcare aid, and the overcoming of political barriers.Readers will discover how cryptocurrencies offer a transparent, secure, and efficient alternative to traditional financial systems, ensuring that aid reaches its intended recipients promptly and without corruption. The book also examines the integration of cryptocurrencies with emerging technologies, such as blockchain, AI, and digital identities, to further enhance the effectiveness of international aid efforts. Through detailed analysis and real-world examples, From Battlefields to Hospitals provides a comprehensive understanding of how digital currencies are reshaping the future of humanitarian aid.
File System Forensics
Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systems File System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. It provides a step-by-step approach for file content and metadata recovery to allow the reader to manually recreate and validate results from file system forensic tools. The book includes a supporting website that shares all of the data (i.e. sample file systems) used for demonstration in the text and provides teaching resources such as instructor guides, extra material, and more. Written by a highly qualified associate professor and consultant in the field, File System Forensics includes information on: Preliminary concepts for necessary studying file system forensics for anyone with basic computing experience but without specific knowledge on digital forensics and file systems File systems specific to Windows, Linux, and macOS, with coverage of FAT, ExFAT, and NTFS Advanced topics such as deleted file recovery, fragmented file recovery, searching for particular files, links, checkpoints, snapshots, and RAID Issues facing file system forensics today and various issues that might evolve in the field in the coming years File System Forensics is an essential, up-to-date reference on the subject for graduate and senior undergraduate students in digital forensics, as well as digital forensic analysts and other law enforcement professionals.
Computational Algebra, Coding Theory and Cryptography
This Special Issue explores cutting-edge advancements in computational algebra, coding theory, and cryptography, emphasizing both theoretical foundations and practical applications. Topics covered in this Special Issue include algebraic structures in coding theory, cryptographic protocols, error-correcting codes, and their intersections with mathematical frameworks.
Acoustic and Linguistic Analysis in Neurological and Psychiatric Disorders
This book explores the use of speech and language analysis for evaluating and monitoring Major Depression Disorder (MDD), Alzheimer's Disease (AD), and Parkinson's Disease (PD). By combining acoustic and linguistic features with machine learning, it addresses challenges in diagnosis and symptom overlap while aiming to improve therapy outcomes and patient monitoring. For MDD, the study analyzes therapy effectiveness by evaluating speech descriptors' impact on therapy, changes in emotional and speech patterns, and neural embeddings' suitability for tracking depression levels using contrastive learning. In AD, it applies automatic speech analysis to classify the disease, predict cognitive states, and detect pre-clinical stages. This includes AD classification using acoustic, emotional, and linguistic features; cognitive state prediction aligned with clinical assessments; and detection of pre-clinical stages linked to the PSEN1 mutation. For PD, speech analysis focuses on classifying and predicting neurological and motor states, incorporating spectral-based representation learning for disease severity prediction and identifying depression through emotional speech analysis. The book also examines biases in data collection and emphasizes the need for robust, multilingual models to enable cross-language feature transferability. Findings demonstrate the potential of speech and language analysis to support diagnosis and monitor treatment across neurological and psychiatric disorders.
Research on Fuzzy Logic and Mathematics with Applications
The notion of the fuzzy set was introduced by Lotfi A. Zadeh in 1965. Zadeh was also the founder of fuzzy logic. Since the advent of the notion of the fuzzy set, Zadeh and other researchers have used this important and interesting set to conduct a great deal of significant and novel research in fuzzy logic, fuzzy topology, fuzzy arithmetics, etc. This Special Issue deals with fuzzy logic and mathematics with applications in decision making, fuzzy control systems, and other engineering applications.
Polynomial Approximation for Data-Driven System Analysis and Control of Nonlinear Systems
This thesis presents data-driven methods for nonlinear systems, enabling the verification of system-theoretical properties and the design of state feedbacks based on measured trajectories. Despite noisy data, the developed methods provide rigorous guarantees and leverage convex optimization. Classical control techniques require a mathematical model of the system dynamics, which derivation from first principles often demands expert knowledge or is time-consuming. In contrast, data-based control methods determine system properties and controllers from system trajectories. Whereas recent developments address linear systems, dynamical systems are generally nonlinear in practice. Therefore, this thesis first introduces a data-based system representation for unknown polynomial systems to determine dissipativity and integral quadratic constraints via sum-of-squares optimization. The second part of the thesis establishes a polynomial representation of nonlinear systems based on polynomial interpolation. Due to the unknown interpolation polynomial, a set of polynomials containing the actual interpolation polynomial is deduced from noisy data. This set, along with a polynomial bound on the approximation error, forms the basis for determining dissipativity properties and designing state feedbacks with stability guarantees utilizing robust control techniques and sum-of-squares relaxation.
Blockchain Technology-a Breakthrough Innovation for Modern Industries
This Reprint, titled "Blockchain Technology-A Breakthrough Innovation for Modern Industries", provides an insightful exploration of how blockchain is revolutionizing industries by enhancing transparency, security, and efficiency. This collection comprises cutting-edge research and comprehensive reviews that address the challenges and opportunities blockchain presents across diverse sectors. The articles delve into theoretical advancements, innovative methodologies, and real-world applications of blockchain technology. Key themes include enhancing supply chain traceability, integrating blockchain with other advanced technologies like IoT and AI, securing financial transactions, and addressing cybersecurity threats in critical infrastructures. These contributions demonstrate blockchain's potential to drive sustainable development and foster innovation while tackling pressing industry challenges, such as scalability, interoperability, and regulatory compliance. Curated by guest editors involved in the W.E. B.E.S.T. (blockchain and smart contracts for the enhancement of the made in Italy excellence supply chains) project, this Reprint bridges academic research with practical insights, offering value to researchers, industry professionals, and policymakers alike.
Structural, Syntactic, and Statistical Pattern Recognition
This book constitutes the proceedings of the Joint IAPR International Workshops on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2024, which took place in Venice, Italy, during September 9-11, 2024. The 19 full papers presented in this volume were carefully reviewed and selected from 27 submissions. The proceedings focus on pattern recognition, including classification and clustering, deep learning, structural matching and graph-theoretic methods, and multimedia analysis and understanding.
Supercomputing
The two-volume set LNCS 15406 and 15407 constitutes the refereed proceedings of the 10th Russian Supercomputing Days International Conference, RuSCDays 2024, held in Moscow, Russia, during September 2024. The 43 full papers presented in these two volumes were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Supercomputer Simulation; HPC, BigData, AI: Algorithms, Technologies, Evaluation Part II: Distributed Computing; HPC Education.
Supercomputing
The two-volume set LNCS 15406 and 15407 constitutes the refereed proceedings of the 10th Russian Supercomputing Days International Conference, RuSCDays 2024, held in Moscow, Russia, during September 2024. The 43 full papers presented in these two volumes were carefully reviewed and selected from 95 submissions. The papers are organized in the following topical sections: Part I: Supercomputer Simulation; HPC, BigData, AI: Algorithms, Technologies, Evaluation Part II: Distributed Computing; HPC Education.
Advances in Differential and Difference Equations and Their Applications
This Special Issue presents a collection of articles that highlight the significant progress in the study of differential and difference equations. These contributions cover a wide range of topics, from boundary value problems and the asymptotic behavior of solutions to complex mathematical models and the application of fractional and difference equations in various scientific and engineering fields.Differential equations are a core mathematical tool for modeling dynamic systems in a diverse range of areas, such as physics, biology, economics, and engineering. Likewise, difference equations provide discrete counterparts to continuous models, which are crucial in understanding phenomena occurring in digital systems and various computational models. The papers presented in this Special Issue reflect the latest theoretical advancements and applications in these important research areas.
Professional Penetration Testing
Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing--the act of testing a computer network to find security vulnerabilities before they are maliciously exploited--is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners. Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." -Network Security
A Framework for Secure Video Streaming in Mobile Ad-Hoc Networks
Application of Various Hydrological Modeling Techniques and Methods in River Basin Management
Hydrological models, ranging from conceptual to fully distributed frameworks, are essential for understanding and addressing water resource challenges. They offer innovative solutions to stabilize water balances and tackle pressing environmental issues such as droughts, floods, and water scarcity. Complementing these traditional methods, machine learning algorithms (MLAs) have proven highly effective in simulating complex hydrological processes, enabling improved predictions for flood forecasting, drought management, crop modeling, and freshwater allocation. This Special Issue of Water delves into cutting-edge advancements in hydrological modeling, highlighting the integration of remote sensing data and the application of MLAs to enhance the accuracy and efficiency of water resource management. From adapting novel machine learning techniques to assessing water balance components, the research in this collection addresses the critical challenges that are faced by watersheds worldwide. Featuring innovative approaches and practical applications, this Special Issue is an invaluable resource for researchers, practitioners, and policy-makers who are dedicated to advancing hydrological science and fostering sustainable water management solutions.
Human Power
The book challenges the view of technological determinism that portrays humans as powerless and flawed, and instead suggests that we need to reposition the different kinds of human power in technology politics and governance.
Embedded Computer Systems: Architectures, Modeling, and Simulation
The two-volume set LNCS 15226 and 15227 constitutes the refereed proceedings of the 24th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2024, held in Samos, Greece, during June 29-July 4, 2024. The 24 full papers, 10 full papers in 2 special sessions and 4 poster session included in this book were carefully reviewed and selected from 57 submissions. This SAMOS 2024 covers the topics systems themselves - through their applications; architectures; and underlying processors - or methods created to automate their design.
Embedded Computer Systems: Architectures, Modeling, and Simulation
The two-volume set LNCS 15226 and 15227 constitutes the refereed proceedings of the 24th International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2024, held in Samos, Greece, during June 29-July 4, 2024. The 24 full papers, 10 invited full papers and 4 poster papers included in the proceedings were carefully reviewed and selected from 57 submissions. They deal with embedded computer systems focusing on their applications; architectures; and underlying processors, as well as methods created to automate their design.