Numerical Computations: Theory and Algorithms
The three-volume set LNCS 14476-14478 constitutes the post conference proceedings of the 4th International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2023, held in Pizzo Calabro, Italy, during June 14-20, 2023. The 45 full papers presented in this book together with 60 short papers were carefully reviewed and selected from 170 submissions. The papers focus on topics such as: continuous and discrete single- and multi-objective problems, local, global and large-scale optimization, classification in machine learning, optimal control, and applications; computational and applied mathematics (such as approximation theory, computational geometry, computational fluid dynamics, dynamical systems and differential equations, numerical algebra, etc.) and applications in engineering and science; numerical models, methods and software using traditional and emerging high-performance computational tools and paradigms (including the infinity and quantum computing) and their application in artificial intelligence and data science, bioinformatics, economics and management, engineering and technology, mathematical education, number theory and foundations of mathematics, etc.
Numerical Computations: Theory and Algorithms
The three-volume set LNCS 14476-14478 constitutes the post conference proceedings of the 4th International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2023, held in Pizzo Calabro, Italy, during June 14-20, 2023. The 45 full papers presented in this book together with 60 short papers were carefully reviewed and selected from 170 submissions. The papers focus on topics such as: continuous and discrete single- and multi-objective problems, local, global and large-scale optimization, classification in machine learning, optimal control, and applications; computational and applied mathematics (such as approximation theory, computational geometry, computational fluid dynamics, dynamical systems and differential equations, numerical algebra, etc.) and applications in engineering and science; numerical models, methods and software using traditional and emerging high-performance computational tools and paradigms (including the infinity and quantum computing) and their application in artificial intelligence and data science, bioinformatics, economics and management, engineering and technology, mathematical education, number theory and foundations of mathematics, etc.
Numerical Computations: Theory and Algorithms
The three-volume set LNCS 14476-14478 constitutes the post conference proceedings of the 4th International Conference on Numerical Computations: Theory and Algorithms, NUMTA 2023, held in Pizzo Calabro, Italy, during June 14-20, 2023. The 45 full papers presented in this book together with 60 short papers were carefully reviewed and selected from 170 submissions. The papers focus on topics such as: continuous and discrete single- and multi-objective problems, local, global and large-scale optimization, classification in machine learning, optimal control, and applications; computational and applied mathematics (such as approximation theory, computational geometry, computational fluid dynamics, dynamical systems and differential equations, numerical algebra, etc.) and applications in engineering and science; numerical models, methods and software using traditional and emerging high-performance computational tools and paradigms (including the infinity and quantum computing) and their application in artificial intelligence and data science, bioinformatics, economics and management, engineering and technology, mathematical education, number theory and foundations of mathematics, etc.
Artificial Intelligence and the Future of Work
Towards Autonomous Robotic Systems
This two-volume set, LNAI 15051-15052, constitutes the refereed proceedings from the 25th Annual Conference Towards Autonomous Robotic Systems, TAROS 2024, held in London, UK, during August 21-23, 2024. The 54 full papers and 11 short papers presented in these volumes were carefully reviewed and selected from 69 submissions. The papers presented in these two volumes are organized in the following topical sections: - Part I: Robotic Learning, Mapping and Planning; Robotic Modeling, Sensing and Control; Machine Vision. Part II: Human-Robot Interaction/Collaboration; Locomotion and Manipulation; Mechanism Design; Soft Robotics; Swarms and Multi-Agent Systems.
Cloud Computing
Cloud computing delivers IT services quickly via the Internet, offering various models like SaaS, PaaS, and IaaS. Among these, cloud storage is popular for securely storing user data. However, ensuring secure storage and retrieval while maintaining confidentiality, reliability, and availability (QoS parameters) is crucial. Different users prioritize these parameters differently, and they expect optimal costs. To address this, the author proposes a framework that optimizes the cost of dispersing data across multiple locations while fulfilling the user's QoS requirements. The need of maintaining the QoS parameters can be accomplished by dividing the data into pieces and storing them at different data centers using information dispersal algorithm. The strategy uses concepts from the knapsack problem to find an optimal tradeoff between cost and QoS. Performance analysis through different case studies shows that increasing the number of data centers significantly expands the range of dispersal options available to users, allowing them to choose the most cost-effective plan that meets their needs.
Frontiers of Algorithmics
This book constitutes the refereed proceedings of the 18th International Joint Conference on Theoretical Computer Science-Frontier of Algorithmic Wisdom (IJTCS-FAW 2024), consisting of the 18th International Conference on Frontier of Algorithmic Wisdom (FAW) and the 5th International Joint Conference on Theoretical Computer Science (IJTCS), held in Hong Kong, SAR, China, during July 29-31, 2024. FAW started as the Frontiers of Algorithmic Workshop in 2007 at Lanzhou, China, and was held annually from 2007 to 2021 and published archival proceedings. IJTCS, the International joint theoretical Computer Science Conference, started in 2020, aimed to bring in presentations covering active topics in selected tracks in theoretical computer science. To accommodate the diversified new research directions in theoretical computer science, FAW and IJTCS joined their forces together to organize an event for information exchange of new findings and work of enduring value in the field. The 20 full papers and 3 short papers included in this book were carefully reviewed and selected from 43 submissions. They focused tracks on algorithms, blockchain theory, computational economics and algorithmic game theory.
Parallelization of Automotive Control Software
Automotive control software is developed according to the AUTomotive Open System ARchitecture (AUTOSAR) standard. High development costs require the re-use of existing software when the hardware platform changes from a single-core to a multicore electronic control unit (ECU). This Ph.D. thesis focuses on the migration of AUTOSAR legacy software to a multicore ECU. Different parallelization methods are proposed and evaluated; RunPar and Supertasks on runnable-level, timed implicit communication on task-level, and the parallel schedule quality metric for quantification of combinations. The methods respect data dependencies and still enable parallel execution, they exploit the energy-saving potential of the processor, they guarantee latency constraints, and they reproduce the reference data-flow.
Computer Courses Year Three Sa
This theoretical and practical work, which is easy to understand for students in 3癡me des humanit矇s, option Secr矇tariat-Administration, will also serve as a compendium for teachers wishing to learn computer science, as it conforms to the national curriculum for Primary, Secondary and Technical Education in the Democratic Republic of Congo.In this book, we have focused on concepts such as: carrying out file processing procedures using MS Word and hypertext links, analyzing information and writing reports using MS PowerPoint, analyzing documents and proposing solutions by creating graphics, prioritizing work to be done on a daily basis using MS Outlook, planning travel and vacations using MS Outlook, present work at a meeting using PowerPoint animations, good command of the operation and use of the scanner, good command of the basics of computer networks, teach students the types of data backups on a medium, good command of sorting data according to ascending order of set criteria.
Internet of Things
This book constitutes the refereed proceedings of the 7th IFIP WG 5.5 International Cross-Domain Conference on Internet of Things, IFIPIoT 2024, in Nice, France, in November 2024.737 The 13 full papers and 4 short papers presented were carefully reviewed and selected from a total of 28 submissions to the main conference. They were organized in topical sections as follows: Hardware/Software Solutions for IoT and CPS; Electronics and Signal Processing for IoT; Networking and Communications Technology for IoT; Artificial Intelligence and Machine Learning Technologies for IoT; Cyber Security/Privacy/Trust for IoT and CPS and IoT or CPS Applications and Use cases.
Computational Methods and Application in Machine Learning
The present reprint contains 17 in total articles that are accepted and published in the Special Issue "Computational Methods and Application in Machine Learning, 2023" of the MDPI Mathematics journal. The articles cover a wide range of topics with respect to the theory and applications of the computational method in machine learning. These keywords include artificial intelligence big data and analysis, machine learning, deep learning, natural language understanding, pattern recognition, computer vision, information retrieval, data mining, bioinformatics and biomedical applications, reinforcement learning, multimedia analysis and retrieval, multimodal representation learning, feature selection, clustering, etc.Machine learning is an interdisciplinary subject involving probability theory, statistics, approximation theory, convex analysis, optimization, algorithm complexity theory, etc. It focuses on how computers simulate or realize human learning behaviors in order to obtain new knowledge or skills. It is the core of artificial intelligence. In essence, the aim of machine learning is to enable computers to simulate human learning behaviors, automatically acquire knowledge and skills through learning, continuously improve performance, and realize artificial intelligence. We hope the reprint will be interesting and useful for those working in the area of computational methods, machine learning, and artificial intelligence, in addition to those who have a proper mathematical background and are willing to become familiar with recent advances in machine learning, which has entered almost all human life and activity sectors.
Computer Courses Second Year Sa
The second year of the Humanities Secretarial-Administration course is largely based on computer concepts, with a focus on the execution of procedures relating to file processing, information processing and report writing, prioritizing work to be carried out on a daily basis, planning meetings, staff travel and trips, mastery of basic computer concepts, use of the Internet and document preparation.The writing of a book is a vital necessity in order to remedy multiple problems and challenges such as the non-observance of the national program of the course of data processing for some and the partial respect of this national program for others, this book will nait waters Teachers of this course a spirit of professionalism because National education has for finalit矇 the harmonious formation of the Congolese man, responsible citizen, useful to himself and to the society able to promote the development of the country and the national culture.
Blockchain Based Certificate Validation
In the digital world everything is digitalized. Therefore the certificate of SSLC, HSC, and academic certificate are digitalized in the educational institution and are provided to students. It is difficult for students to maintain their degree certificates. For the organization and institution, verification and validation of certificates are tedious and cumbersome. This project will help to store the certificate in the blockchain system and provide security. First, the paper certificates are converted into digital certificates. The chaotic algorithm is used to generate the hash code value for the certificate. Then the certificates are store in blockchain. And these certificates are validated by using the mobile application. By using blockchain technology we can provide a more secure and efficient digital certificate validation.
Computer Courses First Year CG
It's no secret that information technology can improve productivity and organization. It enables employees to use efficient, time-saving tools to accomplish their daily tasks: word-processing tools, management software, information retrieval, task automation, and so on. For this reason, this manual, designed for first-year humanities students, enables them to master general computer concepts and create files and folders, create files and folders on a computer, draw up purchase orders and invoices using a computer, master the basics of word processing and use the Internet to make contact with third parties. Although some companies use Linux or IOS to save money, most of these computers use a Windows-type operating system. The latter is particularly vulnerable to viruses and other cyber-attacks.
Investigating E-Commerce Security, Cyber Crime Detection and Prevention with Digital Forensics. The Case of Ebay and Amazon
Master's Thesis from the year 2014 in the subject Computer Science - General, grade: B, University of Gloucestershire, course: MBA, language: English, abstract: E-commerce as have progressively become an essential and indispensable constituent of business strategy and operations, as a result of the growth of technology globally, thus the main medium for trade and industry development in any given country and the world at large (Grandon, 2004). Due to this rapid growth in the e-commerce industry, many computer programmers and Information Security experts have directed their abilities to the development of applications that enhances computer assisted transactions via the internet. Smith (2009) indicated that the incorporation of Information Communications and Technologies in business transactions and its operations has enabled many businesses experience massive revolution over the period .It has also facilitated a strong correlation between firms and their corresponding customers and clients. Particularly, the use of ICT in business has enhanced productivity, promoted customer involvement, also made faster and possible patronage of goods and services in larger quantities, as well as reducing charges and its associated benefits. E-commerce is defined as the performance of a business activity over the internet (online) for all kind of goods and services (Badger, 2013).Unlike the traditional way of doing business where there is physical contact between the buyer and the seller, its operations are carried out electronically over the internet. The individuals involved in the transactions do so via technology mediated platform. The buyer in this case the customer also makes payment either directly to the sellers account or through a third party, the customer is made to declare his/her confidential bank details to enable the other party get the money and then send whatever has been bought through a delivery service. There is virtually no physical encount
Towards Autonomous Robotic Systems
This two-volume set, LNAI 15051-15052, constitutes the refereed proceedings from the 25th Annual Conference Towards Autonomous Robotic Systems, TAROS 2024, held in London, UK, during August 21-23, 2024. The 54 full papers and 11 short papers presented in these volumes were carefully reviewed and selected from 69 submissions. The papers presented in these two volumes are organized in the following topical sections: - Part I: Robotic Learning, Mapping and Planning; Robotic Modeling, Sensing and Control; Machine Vision. Part II: Human-Robot Interaction/Collaboration; Locomotion and Manipulation; Mechanism Design; Soft Robotics; Swarms and Multi-Agent Systems.
Parallel Computational Technologies
This book constitutes the refereed post proceedings of the 18th International Conference on Parallel Computational Technologies, PCT 2024, held in Chelyabinsk, Russia, in April 2024. The 22 full papers included in this book were carefully reviewed and selected from 62 submissions. These papers have been organized under the following topical sections: High Performance Architectures, Tools and Technologies; Parallel Numerical Algorithms and Supercomputer Simulation.
Sequence Analysis Algorithms for Bioinformatics Application
Master's Thesis from the year 2014 in the subject Computer Science - Bioinformatics, grade: N, language: English, abstract: The data from next generation sequencing technologies has led to an explosion in genome sequence data available in public databases. This data provides unique opportunities to study the molecular mechanisms of gene evolution: how new genes and proteins originate and how they diversify. A major challenge is retracing origin of extant genes or proteins, by searching existing databases for related sequences and identifying evolutionary similarities. Therefore, enhanced and faster search algorithms are being developed, e.g. on accelerators such as GPU, in order to cope with the huge size of today's DNA or protein sequence databases. Gene-Tracer is a tool was developed to localize the common sub-sequences between two ancestors and its offspring. Besides, compute percentages of ancestors' contributions in offspring. Gene-Tracer was developed to find the origin of unknown shuffling/offspring sequence. A database is scanned and the similarity between offspring sequence and each one in the database is computed using pairwise local sequence alignment algorithm. Based on similarity score, 100 sequences that have the highest score is re-aligned with shuffling sequence to determine length of common sub-sequences between them using local alignment algorithm. The two sequences that have longest sub-sequences with shuffling are the nearest origin to offspring. Swiss-port database contains around 400,000 proteins is used in the test. The execution time around hours. So, GPU is to accelerate the tool. Speedup is 84x using single-GPU Tesla C2075 versus Intel(c) Core(TM)i3 multiprocessor. Finally, the main contribution of work is developing fast tool that re-trace origins of unknown gene/protein sequences.
Cybersecurity
Digital transformation is accelerating global connectivity, opening up countless opportunities for businesses and individuals alike. However, this evolution is accompanied by growing threats in cyberspace. Cyber attacks, once the domain of amateur hackers, are now orchestrated by sophisticated actors, from criminal organizations to nation-states.
Puzzles and Games
This book is a comprehensive guide to mathematical modeling. It uses about 100 puzzles as "case studies" and represents them as mathematical models. The models are coded in the computer language LPL and can be solved directly over the Internet. Game-lovers will discover new and original aspects of their favorite pastime and teachers in Mathematics will be amazed how playful and diverting mathematical modelling can be. The goal is to encourage the use of such puzzles in an educational context in order to improve and develop mathematical modelling skills. It can be used as a self-study or in classes.
First-Year Computer Course Sa
The IT sector attracts a large number of candidates who are in the process of choosing a career path or retraining, due to the wealth and diversity of career opportunities it offers. Constantly evolving, this sector leaves room for innovation and offers numerous career opportunities. However, students need to be aware of the various disadvantages associated with this sector. The aim of secondary education is to provide students with the general and specific knowledge they need to grasp the elements of national and international cultural heritage. It also aims to develop critical thinking, creativity and intellectual curiosity, and to prepare students for trades, professions, higher education and university studies. A student trained in secretarial administration is a professional capable of using IT tools to organize information, process texts using Microsoft Office programs, print and use the Internet. Writing a book is a vital necessity in order to remedy multiple problems and challenges.
Behind the technology, computer science
Among the general public, and even in relatively well-informed circles, computer science is still rarely perceived as a science beyond its technical aspects. Given the growing importance of IT and digital technology in the economy and society, this is a regrettable state of affairs, and the absence of computer science as a secondary school subject only reinforces this view. The virtual museum represents a significant advance in the way we interact with art, culture and history. Thanks to digital technologies, these exhibition spaces transcend geographical and temporal boundaries, offering unprecedented access to precious collections and immersive experiences. Contributions from experts in computer science, museology and interactive design enrich this analysis, offering varied perspectives on how virtual museums can not only preserve our heritage, but also make it accessible.
Algorithmics of Wireless Networks
This book constitutes the refereed proceedings of the 20th International Symposium on Algorithmics of Wireless Networks, ALGOWIN 2024, held in Egham, UK, in September 2024. The 14 full papers presented here were carefully reviewed and selected from 26 submissions. These papers focus on the Algorithmic aspects of Wireless networks, including the design and analysis of Algorithms, Models of computation and Experimental analysis, involved in various types of computational entities.
Cultivation Management via Heavenly Block Chain
Land is an asset, and transferring the ownership of a piece of property from one party to another is both a significant and time-consuming procedure. Not only there's a lot of documentation, but there are also numerous middlemen and several verifications at various stages of the process. This reduces the overall reliability of the procedure and increases the risks of forgery. It also takes a lot of work to learn about earlier transfers. This issue is readily solved by using blockchain for the land registration system. By eliminating agents from the process, this will reduce corruption. It will also boost speed and build trust in the system without any involvement of any central agency. Blockchain is a decentralized, unalterable database that tracks every valid transaction. To maintain the chain of transactions, it employs cryptographic methods, consensus procedures, and hashing algorithms. This maintains the system's transparency and immutability. The goal of this project is to develop a user-friendly, blockchain-based land registration system that will make the procedure easier while maintaining security and trust.
Go Lang in Depth
DESCRIPTION Go, a modern and efficient programming language, is rapidly gaining popularity for building robust and scalable applications. This book, Go Lang in Depth, instills you with the knowledge and skills to master Go, from its fundamental building blocks to advanced concepts.This Go programming book provides a detailed guide, starting from basic syntax and data structures to advanced concepts like concurrency and error handling. It teaches you how to build applications, including console apps, REST APIs, and web apps using popular frameworks like Gin and Beego. You will also explore creating real-world projects, such as a CRM system, and understand advanced topics like dependency injection, SOLID principles, and Docker containerization. The book covers performance optimization with profiling and benchmarking, ensures application security with authentication and cryptography, and explains design patterns and best practices for building scalable, secure web applications.By the end of this book, you will be equipped to write clean, concurrent, and performant Go code. You will understand how to design and implement complex functionalities, leverage Go's powerful features effectively, and tackle real-world programming challenges.KEY FEATURES ● From beginner to advanced, this book covers all aspects of Go programming.● Learn by implementing practical examples and real-world projects.WHAT YOU WILL LEARN● Practical approach with hands-on exercises, real-world examples, and practical projects.● Gain a thorough understanding of Go's core concepts, including concurrency, error handling, and testing.● Learn to containerize Go applications with Docker and deploy them to production environments.● Implement security measures and optimize the performance of your Go applications.WHO THIS BOOK IS FORWhether you are a software engineer, data scientist, or system administrator, this book will help you harness the power of Go to build efficient, scalable, and reliable applications. No prior knowledge of Go is required, but a basic understanding of programming concepts will be beneficial.
Machine Learning Unveiled
**Machine Learning Unveiled: A Beginner's Guide** Discover the world of machine learning with **Machine Learning Unveiled**, an accessible and engaging introduction to one of the most transformative fields of modern technology. Whether you're a student, professional, or curious enthusiast, this guide simplifies complex concepts, making it easier than ever to grasp the fundamentals of machine learning. Inside, you'll explore: Core Concepts: Understand the foundations of supervised, unsupervised, and reinforcement learning. Practical Applications: Learn how machine learning is shaping industries from healthcare to finance. Hands-On Learning: Dive into real-world examples and intuitive explanations that demystify algorithms and techniques.Written in a clear and approachable style, this book is designed to empower readers with little to no prior knowledge. Begin your journey into the fascinating world of machine learning today and discover the tools that are redefining our future! **Start learning. Start unveiling. Start transforming.**
Oracle Cloud Infrastructure (OCI) Security Handbook
DESCRIPTION Oracle Cloud Infrastructure (OCI) Security Handbook is the ultimate guide for safeguarding your mission-critical resources and data on OCI. In the world of a cloud-first approach, it is essential to understand the security risks and how to protect the sensitive data and resources in the cloud using different tools and technologies. The book covers all the aspects of security, considering all the layers of the Oracle Cloud. This book is a detailed guide to securing OCI environments, focusing on best practices and practical strategies. It covers key security areas like identity and access management (IAM) with role-based controls, multi-factor authentication, and identity federation. Network security is addressed through Virtual Cloud Networks (VCNs), firewalls, and load balancers. Compute, storage, and database security topics include encryption, SQL injection prevention, and advanced database protection tools. The book also explores web and API security, vulnerability scanning, monitoring, compliance, and automation using tools like Terraform. By the end of this journey, you will be well-equipped to confidently secure your OCI environment. This invaluable resource helps you become highly skilled in OCI Security, safeguarding your valuable cloud assets for years to come.KEY FEATURES ● Gain a clear understanding of OCI architecture, tools, and technologies.● Learn to implement robust security controls to protect cloud applications and resources from attacks.● Explore monitoring tools to detect, respond to incidents, and enhance security posture.WHAT YOU WILL LEARN● Learn to secure mission-critical data and resources effectively.● Explore extensively all security layers of OCI for robust protection.● Implement best practices for monitoring threats and detecting vulnerabilities.● Master OCI tools and strategies for risk mitigation and incident response.WHO THIS BOOK IS FORThe book is designed for IT professionals, security engineers, cloud architects, and anyone responsible for securing OCI environments. Whether you are a seasoned cloud professional or a newcomer to OCI, this book provides the knowledge and practical guidance to protect your cloud infrastructure.
Surface Waterbody Detection from Satellite Imagery Using U-Net
"Surface Waterbody Detection from Satellite Imagery Using U-Net: A Deep Learning Framework for Automated Analysis" is a definitive guide for leveraging advanced deep learning techniques to detect and monitor surface water bodies from satellite images. This book introduces the U-Net architecture, a powerful deep learning model, to automate the analysis of satellite imagery, enabling precise detection of waterbodies across diverse terrains and conditions.With a focus on practical applications, the book provides an in-depth walkthrough of the entire process, including data preprocessing, model training, validation, and performance evaluation using real-world datasets. It addresses key challenges such as handling noisy data, low-resolution imagery, and scalability for large-scale analyses.Whether you are a researcher, data scientist, or environmental analyst, this book equips you with the tools and insights needed to tackle real-world problems in environmental monitoring, disaster management, and resource planning. With detailed code examples, practical case studies, and a look into emerging trends, it empowers you to harness the potential of AI in satellite imagery analysis.
The Digital Era in Production
This book examines the impact of the Digital Age on Industry 4.0, exploring how technologies such as AI, IoT, big data, AR/VR and advanced robotics are transforming the production sector. Industry 4.0, a fourth industrial revolution, is characterized by the digitization and interconnection of processes, improving efficiency and enabling data-driven decisions.Through an incremental approach, the book suggests strategies for implementing these technologies, emphasizing the importance of a clear plan, continuous training and an innovative organizational culture. It also addresses challenges such as resistance to change and initial investment, proposing solutions such as grants and employee training.In addition to challenges, digitalization opens up opportunities such as sustainability, product customization and access to new markets. The future, the book suggests, will be marked by a collaboration between humans and technology, where both are empowered, positioning Industry 4.0 as an opportunity to drive organizational and societal progress.
Internet of Things, Embedded Solutions, and Edge Intelligence for Smart Health
The Internet of Things (IoT) is becoming increasingly popular in the healthcare domain due to the possibilities offered to monitor patients' health status remotely in real time. Moreover, the integration of IoT with edge intelligence solutions has started to bring further advantages in its use; in fact, by allowing the devices to locally process and analyze the data, it can make a difference in applications where real-time decision-making or low latency is required. By collecting and analyzing data from multiple sources, these solutions can provide a more complete picture of an individual's health and allow for more personalized and proactive healthcare.This Special Issue aimed at presenting interesting papers focused on the exploitation of the IoT and edge intelligence in the healthcare domain. The included papers cover various topics, such as innovative healthcare architectures to improve patients' conditions; innovations for personalized healthcare; solutions based on real-time decision-making for the healthcare domain; edge intelligent solutions for the early detection of potential health issues; solutions to improve communication and coordination among healthcare professionals in critical scenarios; and innovative healthcare systems for providing prompt reactions and interventions in cases of emergency.
How SMEs Can Innovate and Accelerate Growth
In a world where artificial intelligence is redefining innovation, this book speaks directly to small and medium-sized enterprises (SMEs) to show them how they can integrate AI and machine learning to transform their operations and competitiveness. Dr. Omar BENCHAREF and Dr. Soulaimane KALOUN demystify AI by explaining, with concrete examples and case studies, how SMEs can leverage these technologies to automate tasks, personalize services, and anticipate market trends.Through well-structured chapters, you'll discover how generative AI simplifies content creation, how machine learning predicts financial flows, and how automation optimizes human and operational resources. Designed to be accessible to non-experts, this guide provides practical advice and adaptable strategies for SMEs in any sector, enabling them to equip themselves with advanced tools without massive investments.Whether you're an entrepreneur, operational manager or director, this book is your roadmap to successful AI integration
Emerging Technologies, Novel Crimes, and Security
This book provides a holistic overview of the complexities of modern technological advances and their implications for crime and security.
Concepts of Artificial Intelligence and its Application in Modern Healthcare Systems
This reference text presents the usage of artificial intelligence in healthcare and discusses the challenges and solutions of using advance techniques like wearable technologies, image processing in the sector. It focuses on the use of artificial intelligence (AI) in healthcare with issues, applications, and prospects.
Software Architecture with Kotlin
Develop innovative architectural styles by analyzing and merging various approaches, focusing on making trade-offs and mitigating risks to solve real-world problemsKey Features: - Learn how to analyze and dissect various architectural styles into building blocks- Combine existing ideas with your own to create custom solutions- Make informed decisions by navigating trade-offs and compromises- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Software Architecture with Kotlin explores the various styles of software architecture with a focus on using the Kotlin programming language. The author draws on their 20+ years of industry experience in developing large-scale enterprise distributed systems to help you grasp the principles, practices, and patterns that shape the architectural landscape of modern software systems.The book establishes a strong foundation in software architecture, explaining key concepts such as architectural qualities and principles, before teaching you how architectural decisions impact the quality of a system, such as scalability, reliability, and extendability. The chapters address modern architecture topics such as microservices, serverless, and event-driven architectures, providing insights into the challenges and trade-offs involved in adopting these architectural styles. You'll also discover practical tools that'll help you make informed decisions and mitigate risks. All architectural patterns in this book are demonstrated using Kotlin.By the end of this book, you'll have gained practical expertise by using real-world examples, along with a solid understanding of Kotlin, to become a more proficient and impactful software architect.What You Will Learn: - Master the fundamental principles of architecture and design- Explore common architectural styles and their applicable scenarios- Analyze, break down, compare, and design architectural styles to solve practical problems- Reason, negotiate, and make difficult choices in the absence of ideal solutions- Mitigate risks when making compromises and trade-offs- Create scalable, sustainable, maintainable, and extendable software systems- Use the Kotlin programming language to achieve your architectural goalsWho this book is for: This book is for developers with basic Kotlin knowledge seeking a deeper understanding of architecture, Kotlin Android developers who are starting to get involved in backend development, and Java developers transitioning to Kotlin. It's also ideal for software architects who are less experienced in Kotlin and want to enhance their skills, as well as those who enjoy discussing and exploring unique architectural concepts.Table of Contents- The Essence of Software Architecture- Principles of Software Architecture- Polymorphism and Alternatives- Peer-to-Peer and Client-Server Architecture- Exploring MVC, MVP, and MVVM- Microservices, Serverless, and Microfrontends- Modular and Layered Architectures- Domain-Driven Design (DDD)- Event Sourcing and CQRS- Idempotency, Replication, and Recovery Models- Auditing and Monitoring Models- Performance and Scalability- Testing- Security- Beyond Architecture
A framework for adaptive and efficient requirement change management
In today's evolving software development landscape, managing requirement changes efficiently is essential for success. "A Framework for Adaptive and Efficient Requirement Change Management" delves into the root causes and attributes of requirement changes, offering readers a thorough understanding of how these changes impact project dependencies.This book presents a structured framework for handling requirement changes early in the development process, ensuring adaptability while minimizing disruption. It's an indispensable guide for developers, project managers, and software engineers looking to navigate the complexities of requirement change management effectively.
Performance Analysis of Association Rule Mining Algorithms
Association rule mining techniques are important part of data mining to derive relationship between attributes of large databases. Association related rule mining have evolved huge interest among researchers as many challenging problems can be solved using them. Numerous algorithms have been discovered for deriving association rules effectively. It has been evaluated that not all algorithms can give similar results in all scenarios, so decoding these merits becomes important. In thisassociation rule mining algorithms were analyzed, Comparison of these algorithms were experimentally performed based on different datasets and different parameters.
Study of the impact of DDoS attacks on 4G/LTE mobile networks
4G/LTE mobile networks are essential pillars of modern digital infrastructures, offering speed and reliability. However, these networks are facing increasing threats, notably distributed denial of service (DDoS) attacks, which compromise their availability and performance.In this book, Abdoul Aziz Belemvire explores in detail the impact of these attacks on 4G/LTE mobile networks, and proposes innovative solutions to strengthen their resilience. Drawing on real data from the CIC-DDoS2019 dataset, he analyzes specific network vulnerabilities, assesses the effectiveness of traditional and modern techniques, and highlights the use of machine learning and deep learning to detect and mitigate these attacks.This book is a valuable resource for cybersecurity professionals, researchers and students, offering concrete perspectives for anticipating and countering future threats. It combines scientific rigor and pragmatism, paving the way for more robust network infrastructures in a hyperconnected world.
Adventure
The sprawl of Adventure. The addictiveness of Breakout. The intensity of Space Invaders.Once upon a time, you could only experience this kind of excitement at the arcade. But in 1977 that changed forever. You, and maybe a friend or a sibling, could instantly teleport from your own living room to a dazzling new world-with nothing more than a small plastic cartridge.This was the promise of the Atari 2600-and it was delivered in ways no one ever expected. No, the games it put on your TV weren't what you saw when you plunked in your quarters at the convenience store or in the noisy, smoky business on the other side of town. But they brought the arcade home-and it hasn't left since.With Adventure: The Atari 2600 at the Dawn of Console Gaming, Jamie Lendino takes you to the front lines of the home gaming revolution, exploring the history of the world-changing console and delves into the coin-op ports and original titles that still influence gaming today.Before your next trip to a magical universe with your Xbox, PlayStation, or Nintendo console, see how the home gaming industry truly began.This fully revised second edition contains three new chapters, including an expanded treatment of the "red label" era, one on collecting, emulation, mods, add-ons, and reviews of some of the best homebrew games created in recent years.
The Physical Nature of Information
A unified introduction to information theory for scientists Applications of information theory span a broad range of disciplines today. This book presents a unified treatment of the subject for students and practitioners in the sciences. It teaches the tools universally used by physicists working on quantum computers and black holes, engineers designing self-driving cars, traders perfecting market strategies, chemists playing with molecules, biologists studying cells and living beings, linguists analyzing languages, and neuroscientists figuring out how the brain works. No matter what area of science you specialize in, The Physical Nature of Information unlocks the power of information theory to test the limits imposed by uncertainty.Provides a panoramic approach to information theoryDraws on examples from physics, engineering, biology, economics, and linguisticsApplications range from thermodynamics and statistical mechanics to dynamical chaos, information and communication theories, and quantum informationIncludes materials for lectures and tutorials along with exercises with detailed solutionsCan be used to design a one-semester introductory courseIdeal for self-study by graduate students and advanced undergraduatesInvaluable for scholars seeking new research opportunities
Learning Theory from First Principles
A comprehensive and cutting-edge introduction to the foundations and modern applications of learning theory. Research has exploded in the field of machine learning resulting in complex mathematical arguments that are hard to grasp for new comers. . In this accessible textbook, Francis Bach presents the foundations and latest advances of learning theory for graduate students as well as researchers who want to acquire a basic mathematical understanding of the most widely used machine learning architectures. Taking the position that learning theory does not exist outside of algorithms that can be run in practice, this book focuses on the theoretical analysis of learning algorithms as it relates to their practical performance. Bach provides the simplest formulations that can be derived from first principles, constructing mathematically rigorous results and proofs without overwhelming students. Provides a balanced and unified treatment of most prevalent machine learning methods Emphasizes practical application and features only commonly used algorithmic frameworks Covers modern topics not found in existing texts, such as overparameterized models and structured prediction Integrates coverage of statistical theory, optimization theory, and approximation theoryFocuses on adaptivity, allowing distinctions between various learning techniquesHands-on experiments, illustrative examples, and accompanying code link theoretical guarantees to practical behaviors
Non-verbal language on WhatsApp(R)
The use of applications that connect to the internet has grown considerably. Among them is the WhatsApp(R) application, which in addition to various features that facilitate communication, has a keyboard on its platform that has digital signs called Emojis. The centrepiece of this work is the non-verbal language used in the application in question, through the use of Emojis. The aim was to understand how users utilise this communication tool in order to make digital text more expressive. To this end, questionnaires were administered within the Google Drive Virtual Environment, with links sent via the WhatsApp(R) application itself and distributed throughout the virtual network. The results of the survey showed the identification of the main meanings attributed to these Emojis in the digital discourse used by users. It's worth a look!
Short-Term Load Forecasting Using Machine Learning Methods
Maintaining the balance between generation and consumption is at the heart of electricity grid operation. A disruption to this balance can lead to grid overloads, outages, system damage, rising electricity costs or wasted electricity. For this reason, accurate forecasting of load behavior is crucial. In this work, two classes of ML-based algorithms were used for load forecasting: the Hidden Markov Models (HMMs) and the Deep Neural Networks (DNNs), both of which provide stable and more accurate results than the considered benchmark methods. HMMs could be successfully used as a stand-alone predictor with a training based on Maximum Likelihood Estimation (MLE) in combination with a clustering of the training data and an optimized Viterbi algorithm, which are the main differences to other HMM-related load forecasting approaches in the literature. Adaptive online training was developed for DNNs to minimize training times and create forecasting models that can be deployed faster and updated as often as necessary to account for the increasing dynamics in power grids related to the growing share of installed renewables. In addition, the flexible and powerful encoder-decoder architecture was used, which helped to minimize the forecast error compared to simpler DNN architectures such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Long Short-Term Memory networks (LSTMs) and others.
Data Science and Reliable Machine Learning
In October 2024, researchers, students, and practitioners from Armenia, Chile, Germany, and Japan met at the American University of Armenia for the fourth edition of the Cadassca Workshop on Collaborative Technologies and Data Science in Smart City Applications. This book presents their contributions to emerging methodologies in data science, machine learning, applied and human-centered computing.
Hands-On Machine Learning with C++ - Second Edition
Apply supervised and unsupervised machine learning algorithms using C++ libraries, such as PyTorch C++ API, Flashlight, Blaze, mlpack, and dlib using real-world examples and datasetsKey Features: - Familiarize yourself with data processing, performance measuring, and model selection using various C++ libraries- Implement practical machine learning and deep learning techniques to build smart models- Deploy machine learning models to work on mobile and embedded devices- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Written by a seasoned software engineer with several years of industry experience, this book will teach you the basics of machine learning (ML) and show you how to use C++ libraries, along with helping you create supervised and unsupervised ML models.You'll gain hands-on experience in tuning and optimizing a model for various use cases, enabling you to efficiently select models and measure performance. The chapters cover techniques such as product recommendations, ensemble learning, anomaly detection, sentiment analysis, and object recognition using modern C++ libraries. You'll also learn how to overcome production and deployment challenges on mobile platforms, and see how the ONNX model format can help you accomplish these tasks.This new edition has been updated with key topics such as sentiment analysis implementation using transfer learning and transformer-based models, as well as tracking and visualizing ML experiments with MLflow. An additional section shows you how to use Optuna for hyperparameter selection. The section on model deployment into mobile platform now includes a detailed explanation of real-time object detection for Android with C++.By the end of this C++ book, you'll have real-world machine learning and C++ knowledge, as well as the skills to use C++ to build powerful ML systems.What You Will Learn: - Employ key machine learning algorithms using various C++ libraries- Load and pre-process different data types to suitable C++ data structures- Find out how to identify the best parameters for a machine learning model- Use anomaly detection for filtering user data- Apply collaborative filtering to manage dynamic user preferences- Utilize C++ libraries and APIs to manage model structures and parameters- Implement C++ code for object detection using a modern neural networkWho this book is for: This book is for beginners looking to explore machine learning algorithms and techniques using C++. This book is also valuable for data analysts, scientists, and developers who want to implement machine learning models in production. Working knowledge of C++ is needed to make the most of this book.Table of Contents- Introduction to Machine Learning with C++- Data Processing- Measuring Performance and Selecting Models- Clustering- Anomaly Detection- Dimensionality Reduction- Classification- Recommender Systems- Ensemble Learning- Neural Networks for Image Classification- Sentiment Analysis with BERT and Transfer Learning- Exporting and Importing Models- Tracking and Visualizing ML Experiments- Deploying Models on a Mobile Platform
The Future of Creativity
Artificial intelligence is revolutionizing creativity, unlocking unprecedented opportunities for artists, designers, musicians, and filmmakers. In Future of Creativity, Sanem Avcil, a visionary entrepreneur and global AR/VR leader, delves into the ways AI is reshaping creative industries. Discover transformative projects like: Emotionally Personalized Music that reflects unique moods. AI-Powered Storytelling that personalizes narratives. Dynamic AI Art Creations responding to emotions and environments. This book provides practical ideas, inspiring examples, and essential strategies for anyone ready to explore the limitless possibilities of AI. Whether you're an artist seeking tools to enhance your craft, a tech innovator, or a curious reader, Future of Creativity is your guide to thriving in this new era.
High Performance Computing
Performance Computing: Modern Systems and Practices is a fully comprehensive and easily accessible treatment of high performance computing, covering fundamental concepts and essential knowledge while also providing key skills training. With this book, students will begin their careers with an understanding of possible directions for future research and development in HPC, domain scientists will learn how to use supercomputers as a key tool in their quest for new knowledge, and practicing engineers will discover how supercomputers can employ HPC systems and methods to the design and simulation of innovative products. This new edition has been fully updated, and has been reorganized and restructured to improve accessibility for undergraduate students while also adding trending content such as machine learning and a new chapter on CUDA.