Mobile Communication in Asian Society and Culture
Xie and Chao present a collection of research on mobile communication in various Asian communities and countries. With chapters written by scholars from diverse cultural and institutional backgrounds, this book provides both localized and comparative perspectives on mobile communication research.
Glossary of Technical Words in the Field of Innovation
Innovationology is a burgeoning field, exploring in depth the processes, practices and concepts associated with innovation in all its forms. Based on the pioneering work of researcher Pitshou Moleka, this dynamic lexicon takes you to the heart of the main theories, methodologies and issues shaping contemporary innovation. A genuine reference tool for researchers and practitioners alike, this glossary contains over a hundred specialized terms, covering a broad spectrum from methodological approaches to innovative business models, organizational dynamics and societal issues. Definitions are in some cases accompanied by detailed explanations and concrete examples to help you grasp the richness and complexity of innovation.
Analyzing Opportunities for Developing an Information Systems
Integrating information systems (IS) into industrial operations is crucial for improving efficiency, accuracy, and decision-making within organizations. This case study investigates the opportunities for developing an information system at the Yemen Petroleum Company (YPC), with a particular focus on its Aden branch. Highlighting the importance of information technology in economic and social development, the study examines the potential long-term benefits of IS in alignment with financial support phases within a company.Drawing from an extensive literature review, the study explores YPC's origin, establishment, and strategic goals, while emphasizing the vital role of IS in modern organizational environments. Key functions of IS, such as data collection, analysis, storage, and transfer, are analyzed using theoretical frameworks from renowned researchers like Langefors and Symons. Additionally, the study explores the application of Six Sigma methodologies-particularly the DMAIC (Define, Measure, Analyze, Improve, Control) process-to enhance IS quality and performance at YPC.Data were collected through a questionnaire designed according to Six Sigma standards, targeting staff in YPC's IT department. The results provide insights into the demographics, educational backgrounds, job positions, and experience levels of the participants. Furthermore, the study identifies common IS challenges within YPC, including security weaknesses, integration issues, and difficulties in adapting to external changes.Performance measurements of the current IS systems were also evaluated, with responses varying on aspects such as system stability, data security, and the quality of technical support. The findings suggest a significant need for improvements in these areas. The study concludes with recommendations for enhancing IS performance, proposing mechanisms for continuous monitoring and improvement to ensure the long-term stability and efficiency of IS at YPC.Overall, this research underscores the critical need for developing robust IS frameworks at YPC, illustrating the profound impact of strategic IS implementation on organizational success and resilience in a rapidly evolving technological landscape.
Advances in Difference Equations
The aim of this reprint is to highlight the significance of difference equations and their applications in applied mathematics. Difference equations provide a robust and widely recognized framework for modeling complex dynamical systems. In recent years, non-integer order derivative operators have gained attention, particularly for understanding anomalous behaviors in social and physical sciences. The following Special Issue introduces several important developments, including new partial fractional derivatives, a novel nonlinear delayed integral inequality for studying integro-differential equations, and a neural network approach for solving nonlinear partial differential equations. The existence and uniqueness of solutions for nonlinear differential equations with impulses at variable times are discussed, as well as the oscillatory behavior of nonlinear second-order differential equations. Ultimately, this reprint bridges theory and application, offering novel insights with a focus on differential and difference equations.
Architecting EDI for SAP S/4hana
Juggling multiple partners and clients? Streamline your business communications with this guide to electronic data interchange (EDI) in SAP S/4HANA! Begin with an overview of EDI processing and how it works. Next, follow step-by-step instructions for configuring and managing EDIs in your SAP S/4HANA landscape. Customize IDocs, configure SAP Application Interface Framework and SAP Integration Suite, test your EDI solution, and more. This is your one-stop shop for comprehensive B2B integration in SAP S/4HANA!Highlights include: 1) Prerequisites2) Environment setup3) EDI standards4) Configuration5) SAP Application Interface Framework6) SAP Integration Suite7) SAP Business Technology Platform (SAP BTP)8) Test automation9) IDocs10) APIs
Computing
In this research we try to promote a model that takes into consideration geometry, logarithm calculation and probabilities, in order to understand all the aspects that can be evaluated in the world of computing from the geometric vision, as well as from the searches within variables and probabilistic calculations in order to understand the reality that is lived day by day and the different circumstances that occur in the world of computing from the vision of mathematics.
Configuring Plant Maintenance in SAP S/4hana
To successfully manage assets in SAP S/4HANA, you need to tailor plant maintenance to your exact specifications. This book is your step-by-step guide! Plan your plant maintenance project, and then dive into detailed configuration for the organizational structure, generic functions, and technical systems. Follow click-by-click instructions to set up key secondary processes, including refurbishment, subcontracting, and pool asset management. Get details on the SAP Fiori launchpad and usability to customize your system from end to end! In this book, you'll learn about: a. System Setup Configure the core organizational units for plant maintenance in SAP S/4HANA. Find the step-by-step instructions need you for system-wide functions such as permits and list variants and technical systems such as equipment and functional locations. b. Process Configuration Set up the processes that are relevant for your organization's unique asset management requirements: external processing, refurbishment, subcontracting, checklists, equipment calibration, the new phase model work order cycle, and more. c. UI and Usability Don't forget about your end users! Craft the best user experience by configuring the SAP Fiori launchpad and learn about key applications. Walk through usability options such as user parameters and table controls, and then implement helpful customer exits and workflows. Highlights include: 1) Organizational units2) Generic functions3) Technical systems4) Work order cycle5) Preventative maintenance 6) Refurbishment7) Subcontracting8) Checklists9) Phase model10) SAP Service and Asset Manager11) SAP Fiori launchpad 12) Usability
Mastering AI and Cloud Robotics
DESCRIPTION This book teaches theory and coding examples to help readers design AI-powered cloud robotics applications. AI and robotics engineers will learn to build scalable systems, apply various methods for monitoring and prediction, and optimize systems to reduce costs and increase performance using the architectural techniques described.This book offers a detailed look into cloud robotics, starting with cloud computing basics and moving into its applications in robotics. It highlights the role of AI, ML, and computer vision in advancing robotic capabilities. This book also covers cloud robotics infrastructure, focusing on communication protocols and the ROS2 framework. Further, you will learn about building cloud-enabled robots and using AWS for AI and robotics. It addresses data privacy and security, concluding with real-world applications across various industries and insights into the future of cloud robotics.This book equips you with the foundational knowledge and practical skills to leverage the power of cloud computing to enhance the capabilities of robotic systems. You will gain the ability to design, develop, deploy, and manage cloud-enabled robots, pushing the boundaries of automation and innovation across various industries. WHAT YOU WILL LEARN● Understand cloud computing concepts, including service models, deployment models, and security.● Explore cloud robotics history, benefits, and AI integration in robotic systems.● Learn AI algorithms, ML, and deep learning for robotics applications.● Gain skills in computer vision, object detection, and enhancing robot perception using AI.● Master Robot Operating System 2 (ROS2) architecture and build cloud-enabled robots with hands-on experience.WHO THIS BOOK IS FORThe primary audience of this book is robotics engineers, AI engineers, and software developers with a basic understanding of robotics and cloud computing or no prior experience of the subject. This book contains practical code samples in Python and assumes that the reader has a fundamental understanding of Python programming.
Cyber Pandemic
In our increasingly interconnected world, the looming threat of cyber pandemics demands our attention. Cyber Pandemic: A Proactive Look at Blockchain and AI to Prevent the Next Global Shutdown presents a compelling exploration of two cutting-edge technologies and their potential to safeguard our digital landscape. This book combines insightful analysis with practical strategies, empowering individuals and organizations to defend against the catastrophic consequences of cyber-attacks.As cyber threats continue to evolve, a proactive approach is essential. By harnessing the transformative power of blockchain and artificial intelligence (AI), we can fortify our defenses and prevent global shutdowns. This book provides a comprehensive overview of these technologies, highlighting their strengths and synergies in combating cyber threats.With a clear focus on prevention, Cyber Pandemic equips readers with the knowledge and tools needed to anticipate and counter emerging risks. Through real-world examples and expert insights, it explores the proactive measures that individuals, businesses, and policymakers can adopt to enhance cyber resilience.
Processing Ukrainian-language textual content methods
The monograph is dedicated to solving the important scientific and applied problem of analysis and synthesis of computer linguistic systems for solving various problems of processing Ukrainian-language textual content. This will make it possible to increase the resourcefulness of the natural Ukrainian language based on the development of new and improved known models, methods, and means of natural language processing based on machine learning. The research was carried out with the grant support of the National Research Fund of Ukraine "Information system development for automatic detection of misinformation sources and inauthentic behaviour of chat users", project registration number 187/0012 from 1/08/2024 (2023.04/0012). This monograph describes research based on the author's thesis Analysis and synthesis of computational linguistic systems for processing Ukrainian textual content for a Doctoral degree in Technical Science, speciality 10.02.21 - structural, applied and mathematical linguistics.
The Ultimate Cyber Security Guide for Tiktok Everyday Users, Influencers and Content Creators
This Book is for you. It's written specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We'll show you how you can make the most of TikTok - safely and securely! You'll find the knowledge and guidance you need to protect your TikTok account effectively. Think of it as your personal TikTok safety guide.You'll get to know the criminals, hackers, and trolls out there. What do they want with you and how do they attack TikTokers?We'll explain why you need to protect your TikTok account. Throughout the Book we'll show you how to stay safe by following the best practices experts recommend.This Book will help you understand the basic concepts of safety and security on TikTok. It's not for specialists, it's for TikTokers like you. We want you to have a better understanding of the importance of security. Most of all, we want you to have a better TikTok experience.
Designing VR Stressors for Occupational Simulation Training in the ICU Context
Dissertationsschrift auf Englisch 羹ber die Entwicklung und nachfolgende quantitative Evaluierung von VR - basierten Stresstrainings f羹r IntensivpflegerInnen
History of Cryptography and Cryptanalysis
This textbook presents a fascinating review of cryptography and cryptanalysis, from the earliest known cryptographic systems of 2,500 years ago up to modern computer-based systems. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the "unbreakable" Vigen癡re cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains the solution of the Vigen癡re ciphers used by the Confederates and the use of telegraph codes, before investigating the development of cipher machines throughout World War I and II, including development of the first digital computer, Colossus. The exposition then explores cryptology in the computer age, from public-key cryptography and web security to criminal cyber-attacks and cyber-warfare. The role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing. Topics and features: Presents a history of cryptology from ancient Rome to the present day, with a focus on cryptology in the 20th and 21st centuries Provides engaging examples illustrating use of cryptographic algorithms in different historical periods Reviews algorithms and devices used to create secret messages, and the various methods for breaking such messages Describes notable contributions to cryptology by Herbert Yardley, William and Elizebeth Smith Friedman, Lester Hill, Agnes Meyer Driscoll, and Claude Shannon Examines unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, the Kryptos sculpture, and the Zodiac killer ciphers This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on cryptology and computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.
Vehicle Traffic Simulation on Graphics Cards with CUDA
This work provides experimental data on the implementation of a Vehicle Traffic Simulator, based on the Cellular Automata model. The proposal was implemented on the SIMD(CUDA) architecture, available on NVIDIA video cards. The aim was to study the behavior of the application and the performance of the hardware used. The data can be used to guide new simulator implementations in generic areas, using the Cellular Automata model and parallel implementation on graphics cards. The basic algorithms and the results obtained are described, as well as a literature review on the topics.
Python Fundamentals for Data Analytics
DESCRIPTION Python is a simple, easy-to-learn, and one of the top programming languages across the globe. As a result of advancements in AI, data mining, and numerical computing fields, Python has become a popular programming language catering to various stakeholders. It is a powerful tool for working with a variety of data. This book provides the basics of Python and an introduction to data analytics.This book offers a complete introduction to Python programming, covering everything from the basics to the advanced topics. It starts by explaining core concepts like syntax and the Python interpreter, then dives into data structures, control flow, functions, and modules. You will also learn about data analysis and visualization with popular libraries like NumPy, Pandas, Matplotlib, and Seaborn. It wraps up with practical case studies, showing how to apply Python in real-world scenarios effectively.The book serves as a step-by-step guide to performing data analysis. Its content is designed so that even a novice can learn and perform data analysis and visualization simply by following the instructions in the book. KEY FEATURES ● The book covers a wide range of topics, from Python fundamentals to advanced data analysis techniques.● It includes practical exercises and real-world case studies to illustrate the applications of Python for data analysis.WHAT YOU WILL LEARN● Understand the basics of programming languages and the role of the Python interpreter.● Read about different data structures like lists, sets, tuples, and dictionaries, and understand their applications.● Learn how to work with files in Python, including reading, writing, and appending data.● Discover how to use NumPy and Pandas for efficient data manipulation and analysis.● Learn how to create informative visualizations using Matplotlib and Seaborn.WHO THIS BOOK IS FORThis book is designed for students studying UG or PG courses in the computer science and applications domain. Learning Python is a simple way to begin the journey of data analytics. One of the in-demand domains in the job market, and research is data analytics. This book will be helpful for students interested in this domain.
Decision Making in Machine Learning Process
In recent days, Soft Computing is attracting several researchers, academicians and Computer Scientists in developing various technical aspects. In particular, There are various research activities by hybridizing Rough Computing and Fuzzy Computing. The objective of this work is to hybridize the concepts of rough sets and fuzzy sets to improve the Decision making strategies in Learning Process of Artificial Neural Networks.
Analyzing Opportunities for Developing an Information Systems
Integrating information systems (IS) into industrial operations is vital for improving efficiency, accuracy, and decision-making. This case study examines the Yemen Petroleum Company (YPC), focusing on its Aden branch and the potential for developing an effective IS. It highlights the significance of information technology in economic and social development and discusses the long-term benefits of IS.The Book includes a literature review that outlines YPC's history and strategic goals. It explores key IS functions like data collection and analysis, applying theoretical frameworks from established researchers. Six Sigma methodologies, especially the DMAIC process, are utilized to enhance IS quality and performance.Data were gathered from a questionnaire targeting IT staff, revealing common challenges such as security issues and integration difficulties. Performance evaluations indicate a pressing need for improvements.The study concludes with recommendations for enhancing IS performance and emphasizes the importance of continuous monitoring to ensure stability and efficiency, underscoring the necessity of robust IS frameworks at YPC for organizational success.
Harnessing Deep Learning for Speech Emotion Recognition
Human emotion recognition is a crucial component of Human-Computer Interaction (HCI), as emotions are often conveyed through facial expressions, body language, and speech. Among these, speech-based emotion recognition stands out due to its simplicity, low cost, and reduced privacy concerns. Speech Emotion Recognition (SER) involves categorizing emotions such as neutral, sadness, fear, anger, surprise, disgust, and happiness using speech signals. This book explores innovative Deep Learning algorithms designed to accurately identify and classify human emotional states based on speech patterns.
Management Systems
It is necessary to understand that, by developing a management system, taking into consideration a mathematical model, which integrates imaginary, irrational numbers and matrices, it is possible to address the relationships, effectiveness and efficiency of the departments, which make up the organization. Understanding clearly that by adding applications that can be installed on the smartphone, it is possible to evaluate and perform calculations at any time, as it becomes necessary to make decisions, and when observing the evolution of the graphs, it is possible to have a better understanding of what happens in the organization.
DevOps for beginners
DevOps a modern approach that merges development (Dev) and operations (Ops) teams to improve continuous software delivery. It explores the fundamental concepts of this method, such as automation, continuous integration (CI) and continuous deployment (CD), while offering an overview of essential tools such as Git, Github, Docker, Jenkins, and Maven. Through theoretical explanations and practical workshops, this book aims to guide professionals, IT students and technology enthusiasts in mastering DevOps, emphasizing the importance of cross-team collaboration and continuous improvement. It also offers advice on how to effectively integrate DevOps into complex, constantly evolving environments.
Mainframe to Cloud Mastery
Mainframe to Cloud Mastery: Best Practices is a comprehensive guide for IT professionals, system architects, and business leaders looking to modernize their legacy mainframe systems. In an era where agility, scalability, and innovation are key to staying competitive, transitioning mission-critical workloads to the cloud offers organizations an opportunity to revolutionize their infrastructure. This book provides step-by-step strategies for planning, executing, and optimizing mainframe-to-cloud migrations. From assessing cloud compatibility and understanding key services like AWS, Azure, and Google Cloud, to managing security, compliance, and performance post-migration, this guide covers all the essential aspects of the process. Through real-world examples and practical checklists, you'll gain insights into how leading organizations have successfully migrated their systems while maintaining data integrity and minimizing downtime. Key highlights include: Best practices for migrating transactional, batch, and data-intensive workloadsStrategic planning techniques to align IT goals with business objectivesTools and services from major cloud providers to facilitate the transitionProven methods for ensuring security, compliance, and cost efficiencyExpert tips on post-migration testing, performance optimization, and continuous improvementWhether you're at the early stages of exploring cloud options or ready to dive into a migration project, Mainframe to Cloud Mastery equips you with the knowledge and tools to drive success. Stay ahead of the curve by modernizing your mainframe infrastructure and unlocking the full potential of cloud computing.
Mundaneum
This is the true story of two men who meet only once. One is a pacifist, the other is a Nazi. Both men are visionaries, but their visions for the future of the world cannot be more different.One man's vision is to harness data for peace, and a century ago he builds a world-wide-web to deliver exactly that. The other man's vision is to harness information to control the masses, and in 1944 he achieves that too.This is the shocking truth about the man who invented the internet and the man who destroyed it.
Image Processing and AI Applications for Ripening of Fruits
In agricultural science, the quality identification of fruits and vegetables were categorized with differentiating colour, shape, dimension and texture. The proposed technique will enable to develop a smart phone App which uses intelligent image processing algorithms to scan the attributes of the fruits exhibited in a supermarket and assess its nutritional values like total carbohydrates including sugars like glucose, fructose, sucrose, potassium, magnesium and vitamins like vitamin A and vitamin C, antioxidants along with microbial contamination.
No-Reference Image Quality Assessment
No-reference image quality assessment plays an important role in various applications. This book provides a thorough exploration of NR-IQA, including an introduction to fundamental concepts and principles, representative traditional and DNN-based approaches, as well as some human-inspired NR-IQA models that draw on insights from human visual perception to further improve the performance of NR-IQA models. The main goal of this book is to offer a comprehensive resource for researchers interested in this field, to provide valuable insights and guidance in understanding and applying these innovative no-reference image quality assessment techniques.
Anomaly Detection With Time Series Forecasting
Anomaly detection time series is a very large and complex field. In the past few years, many tech-niques based on data science were designed in order to improve the efficiency of methods developedfor this purpose. In this paper, we introduce Recurrent Neural Networks (RNNs) with LSTM units, ARIMA and Facebook Prophet library for anomaly detection with time series forcasting. Becauseof the difficulty in obtaining labeled anomaly datasets, an unsupervised technique will be experimented. Unsupervised anomaly detection is the process of detecting abnormal points in a given dataset without prior label for training. An anomaly could become normal during the data evolu-tion, therefore it is important to maintain a dynamic system to monitor the abnormality. While LSTMs and ARIMA are powerful methods for time series forecasting the future, the Prophet package works best with time series that have strong seasonal effects and several seasons of historical data. The Prophet is very powerful with missing data and shifts in the trend, and specially handles anomalies well.
Cloud Application Architecture Patterns
If you're developing or considering cloud application architectures for your company's projects, this practical guide is an ideal place to learn and understand best practices for developing in the cloud. Architects and lead developers will learn how cloud applications should be designed, how they fit into a larger architectural picture, and how to make them operate efficiently. Authors Kyle Brown, Bobby Woolf, and Joe Yoder take you through the process step by step. You'll learn: Proven architectural practices for developing applications for the cloud Why some architectural choices are better suited than others for applications intended to run on the cloud How different technical choices work together to make applications better suited for the cloud Design and Implementation techniques that work well for developing cloud applications Ways to select the most appropriate cloud adoption patterns for your organization How all potential choices in application design relate to each other through the connections of the patterns How to chart your own course in adopting the right strategies for developing application architectures for the cloud Kyle Brown is an IBM Fellow, vice president and CTO for the IBM CIO and author of The Cloud Adoption Playbook. Bobby Woolf is an Open Group Certified Distinguished Technical Specialist who works with IBM clients and partners and is coauthor of Enterprise Integration Patterns. Joe Yoder is a distinguished member of the Association for Computing Machinery and a founder and principal of The Refactory. He's coauthor of A Scrum Book: The Spirit of the Game.
Fuzzy Modeling and Fuzzy Control Systems
In recent years, with the rapid development of advanced machine learning, artificial intelligence, robot technology, networked control methods, deep space exploration, and other fields, successful applications in fuzzy control systems or even nonlinear dynamics systems (FCS/NDSs) have emerged. The modeling, analysis, and optimal control of FCS/NDSs have received considerable attention in the last two decades. As usual, the design and analysis of classic dynamics systems rely on deterministic mathematical models. However, dynamical systems are riddled with nonlinearity, complexity and time-delay properties, which make it difficult to obtain system optimization. Certain linearization assumptions are often employed to obtain the optimal theoretical closed-form solution in FCS/NDSs, which are inconsistent with the real engineering applications. Therefore, these advanced nonlinear sciences motivate us to explore new solutions to the problems abundant in FCS/NDSs. For this Special Issue, 10 papers have been peer-reviewed and accepted for publication. These papers can be categorized into nonlinear intelligent control, and the readers can read a brief description of each paper in the preface.
The Ultimate Cyber Security Guide for Tiktok Everyday Users, Influencers and Content Creators
This Book is for you. It's written specially for all TikTok Everyday Users, Influencers and Content Creators around the world. We'll show you how you can make the most of TikTok - safely and securely! You'll find the knowledge and guidance you need to protect your TikTok account effectively. Think of it as your personal TikTok safety guide.You'll get to know the criminals, hackers, and trolls out there. What do they want with you and how do they attack TikTokers?We'll explain why you need to protect your TikTok account. Throughout the Book we'll show you how to stay safe by following the best practices experts recommend.This Book will help you understand the basic concepts of safety and security on TikTok. It's not for specialists, it's for TikTokers like you. We want you to have a better understanding of the importance of security. Most of all, we want you to have a better TikTok experience.
Applied Artificial Intelligence and Machine Learning
The click-through rate on web ads measures the number of clicks they receive from all customers who view them from web browsers.This paper, with the aim of anticipating customer preferences, proposes an approach that uses AI and ML to design and implement hyper-personalized experiences to automate the complex tasks related to predicting customer behaviors to better understand them and offer them intelligent web advertising.The proposed approach is based on granular customer segmentation, dynamic content adaptation, precise product recommendations and predictive analysis. To implement cognitive functions, data comes from Chatbots processed with data analysis, multivariate testing, attribution modeling and predictive optimization.A case study is discussed and the solution proposed and programmed with the Python language and its machine learning libraries: Pandas, NumPy, Matplotlib and Scikit-learn.
Artificial Intelligence and Machine Learning
This book offers a detailed exploration of Artificial Intelligence (AI) and Machine Learning (ML), presenting the foundational principles that define these rapidly evolving fields. It covers essential AI concepts such as neural networks, natural language processing, robotics, and expert systems, while providing a deep dive into various machine learning techniques, including supervised, unsupervised, and reinforcement learning.Beginning with the history and development of AI, the book explains core techniques such as search algorithms, knowledge representation, and decision-making processes. Moving to ML, it introduces modern learning algorithms, classification techniques, and models like decision trees, support vector machines, and neural networks. Advanced topics such as deep learning, convolutional networks, and recurrent neural networks are also covered.Additionally, the book discusses the ethical implications of AI and ML, challenges in development, and their transformative impact across different sectors, from healthcare to finance.
Comparing Supervised & Unsupervised ML for Fake News Detection
This investigation aims to develop a robust framework for detecting false information by comparing supervised and unsupervised machine learning algorithms. Unsupervised algorithms identify patterns without pre-labeled data, while supervised algorithms use labeled datasets to guide detection. The evaluation focuses on accuracy, precision, recall, and F1 score to assess each algorithm's effectiveness. The study details dataset composition, preprocessing techniques, and the strengths and limitations of each method. It utilizes Kaggle's dataset, featuring various news stories classified through meticulous verification, including real, fraudulent, and mixed authenticity levels. This research emphasizes the importance of precise labeling and preprocessing, aiming to enhance the development of effective fake news detection systems using advanced machine learning and natural language processing techniques.
The Artificial Intelligence Papers
Modern artificial intelligence (AI) is built upon a relatively small number of foundational research papers, which have been collected and republished in this unique 350-page book. The first chapter provides a summary of the historical roots of AI, and subsequent chapters trace its development, from Rosenblatt's perceptron in 1958 to one of the early GPT models in 2019. Each paper is introduced with a commentary on its historical context and a tutorial-style technical summary. In several chapters, additional context is provided by the paper's original author(s). Written in an informal style, with a comprehensive glossary and tutorial appendices, this book is essential reading for students and researchers who wish to understand the fundamental building blocks of modern AI.
Introduction to Quantum Computing
This book offers a comprehensive exploration of quantum computing, a transformative field poised to revolutionize the landscape of computation. It introduces the fundamental concepts of quantum mechanics that underpin quantum computing, including qubits, superposition, and entanglement. The book covers core quantum algorithms and their potential applications, ranging from cryptography to optimization problems.Key topics include the principles of quantum gates and circuits, quantum error correction, and the current state of quantum hardware. The book also examines the practical challenges and limitations of building quantum computers, providing insights into the latest advancements and future directions in the field. Readers will gain a deep understanding of how quantum computing differs from classical computing and how it can be harnessed to solve complex problems that are currently intractable for classical machines.
Data Mining
The book describes a review of a new product recommender system that uses natural language processing (NLP) and text mining to analyze customer reviews. This system, designed to enhance product recommendations, processes reviews from platforms like Amazon and eBay to categorize and rank products based on user queries. It clusters products according to features mentioned in reviews and ranks them based on sentiment (positive or negative). The proposed system, PR-CT, was tested against existing systems using metrics such as Precision, Recall, F1 Score, and Average Response Time, and was found to perform better. However, the abstract notes that more data and development are needed to improve the system's efficiency.
Cloud Computing and Its Applications
Cloud computing (or cloud) has emerged as a breakthrough technology for sharing resources over the Internet. It is a newly emerging computing paradigm in which computing virtualized resources such as hardware, software, development, CPU, memory, network bandwidth, and data storage are provisioned as on demand services and released with minimal effort.Cloud computing refers to a setup of computing resources that can be shared anywhere, irrespective of the location of the users. It is the pay-as-you-go service for IT resources over the Internet, including applications, data storage, and data processing. Rather than building, owning, and maintaining their own IT infrastructure, businesses can use cloud to access technology resources such as computing capacity, storage, and databases on a pay-as-you-go basis. There is no doubt about the impact that cloud computing is having on businesses in all sectors.This is a comprehensive introductory text on the issues, ideas, theories, and problems on cloud computing. It is a must-read book for anyone who wants to learn about cloud computing, which is undoubtedly one of the most important technologies that has emerged in the last decade.
Fantasy Sports Meets Reality
In the dynamic and ever-evolving realm of cricket, the emergence of Fantasy Cricket platforms, exemplified by Dream11, has heralded a transformative era in sports engagement. The symbiotic relationship between the traditional sport of Cricket and the innovative world of Fantasy Cricket, with a particular focus on the pivotal role that data plays in team selection on the Dream11 platform, is explored. The significance of Head-to-Head Stats and Venue Records is underscored, employing a sophisticated approach by utilizing the K-Nearest Neighbors algorithm. This algorithm serves as a key tool in identifying promising players, thereby facilitating the creation of a data-driven winning eleven for the Dream11 platform.By navigating the intricate intersection of Cricket, Fantasy Cricket, and data analytics, valuable insights into the strategic aspects of team formation are contributed, shedding light on the evolving sports engagement landscape in the digital age. In this landscape, where the ability to make strategic, data-driven decisions stands as the cornerstone of success, a new paradigm is unveiled where technology and analytics redefine the dynamics of sports participation.
Internet of Things
About this Book The Internet of Things (IoT) paradigm promises to make "things" including consumer's electronic devices or home appliances, such as medical devices, fridge, cameras, and sensors, to be the part of Internet environment. This exemplar opens the way to new innovations that will build fresh type of communications among things and humans, and enables the understanding of smart cities, environments, farming, infrastructures, and services for enhancing the quality of life and utilization of resources. IoT as an emerging paradigm supports integration, transfer, and analytics of data generated by smart devices. This book is written as a textbook on Internet of Things for educational programs at colleges and universities. The book goes over protocols and communications between devices. The book is organized into 5 chapters focusing on Physical and Logical Designs of IoT with its enabling technologies. Also introduces the reader about a generic design methodology for IoT and IoT system management approach using NETCONF-YANG. with IoT models along with various IoT Protocols and how to build IoT with Raspberry Pi and Arduino.
Home Computer Security On the Cheap
Keep your family safe from pornography, malware and other online threats. Every day we browse hundreds of websites hoping to make a purchase, interact with friends, read the news, watch movies or explore the next big thing. Unfortunately the Internet is ripe with information, movies, and pictures that we should avoid in order to keep our identities, children and our computers safe. Armed with the knowledge of how to implement the free tools mentioned in this book you will be able to take back your Internet freedom and remove the possibility of stumbling across one of "those" sites.
Bridging the Digital Divide
In the not-too-distant future, in the heart of the entertainment industry, Samantha Sands is the visionary force behind her family's production empire. But when a revolutionary AI writing bot named IRIS is introduced by her budget-wary Board of Directors, her creative world is turned upside down.Initially resistant, Sam embarks on a transformative journey with IRIS, uncovering hidden energetic abilities and exploring the intricate intersections of technology, spirituality, and human consciousness.Then tragedy strikes, and Sam is pushed toward a radical decision-using advanced AI tech to bridge the gap between life and death.Guided by Professor Brad Falls, the brilliant creator of IRIS, Sam delves into a digital-spiritual nexus that blends science with the divine. As their bond deepens, they navigate the complexities of sexuality, addiction, and evolution, uncovering profound truths about themselves and each other.Bridging the Digital Divide, written by best-selling author Stephanie Brandolini, is a compelling tale of self-discovery. Follow Samantha Sands as she unearths her deepest wounds and embraces the power within to heal and transcend the boundaries of our 3D reality.This novel touches on the raw and real aspects of our human experience and is a must-read for fans of science, fantasy, spirituality, and faith. It's a testament to the courage it takes to express our true selves and the breakthroughs that come from pushing through fear and letting go of what no longer serves us.Prepare to be captivated by a story that expands the dimensions of imagination and explores the timeless quest for connection and authenticity. Bridging the Digital Divide promises to be the page-turner you've been waiting for.
Human Hacked
Discover the future of cybersecurity through the eyes of the world's first augmented ethical hacker In Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microchips implanted in his body, you'll find a startlingly insightful take on the fusion of biology and technology. The author provides a groundbreaking discussion of bio-implants, cybersecurity threats, and defenses. Human Hacked offers a comprehensive guide to understanding an existing threat that is virtually unknown. How to implement personal and enterprise cybersecurity measures in an age where technology transcends human limits and any person you meet might be augmented. The book provides: Exposure of a subculture of augmented humans hiding in plain sight Explorations of the frontier of bio-Implants, showing you the latest advancements in the tech and how it paves the way for access to highly restricted technology areas Discussions of cybersecurity tactics, allowing you to gain in-depth knowledge of phishing, social engineering, MDM restrictions, endpoint management, and more to shield yourself and your organization from unseen threats A deep understanding of the legal and ethical landscape of bio-implants as it dives into the complexities of protections for augmented humans and the ethics of employing such technologies in the corporate and government sectors Whether you're a security professional in the private or government sector, or simply fascinated by the intertwining of biology and technology, Human Hacked is an indispensable resource. This book stands alone in its category, providing not just a glimpse into the life of the world's first augmented ethical hacker, but also offering actionable insights and lessons on navigating the evolving landscape of cybersecurity. Don't miss this essential read on the cutting edge of technology and security.
Significance of Mathematical Modelling and Control in Real-World Problems
Mathematical modeling and system control are employed in many research problems, ranging from physical and chemical processes to biomathematics and life sciences. Their theoretical description is closely connected with various areas of pure and applied mathematics, including nonlinear modeling, integro-differential equations, nonlinear dynamics, pattern formation, non-Markovian processes, nonlinear and anomalous transport, time-delay equations, and so on. Thus, the further research and development of modeling in different research areas is still a hot research topic.
Applied and Computational Mathematics for Digital Environments, 2nd Edition
The present reprint contains a total of 10 articles accepted and published in the Special Issue "Applied and Computational Mathematics for Digital Environments, 2nd Edition". The topics of interest include, among others, scientific research, applied tasks, and problems in the following areas: 1. Building mathematical, structural, and information models of intelligent computer systems for monitoring and managing the parameters of digital environments;2. Software and mathematical technologies in the implementation of the intelligent monitoring and computer control of digital environments' parameters; 3. The application of mathematical models, Internet of Things technologies, machine learning, and artificial intelligence for big data analysis of digital environments; 4. Mathematical models and algorithms for identifying stable patterns between the parameters of digital environments and their complex and separate influence; 5. Mathematical modeling, machine learning, and their implementation within the concept of "smart" digital environments. I hope that this reprint will be useful to those who are interested in different aspects of applied and computational mathematics for digital environments in solving actual practical problems in all spheres of human life and activity.
Technology and Education
The object of this study is the understanding of students in public schools in the Mamanguape Valley about the mediation of mobile devices - educational tablets - of new technologies in the teaching-learning process. The objectives were to: a) gather elements to characterize the students' view of new technologies in education, especially the use of the educational tablet tool in public schools; b) trace the use of mobile devices, educational tablets; c) analyze the relationship between the technologies allocated in schools to enable the use of educational tablets by students. Primary data was collected through questionnaires and interviews. All the information collected and systematized is incorporated into the database coordinated by GEPeeeS, where we record and analyse the presence of the Information Age and new technologies in education in the Mamanguape Valley. It is understood that the CCAE, through its courses, plays a fundamental role in the formation of cultural capital, involving new educational technologies through teaching, research and extension.
Advances in Distance Learning in Times of Pandemic
The book Advances in Distance Learning in Times of Pandemic is devoted to the issues and challenges faced by universities in the field of distance learning in COVID-19 times. It covers both the theoretical and practical aspects connected to distance education. It elaborates on issues regarding distance learning, its challenges, assessment by students and their expectations, the use of tools to improve distance learning, and the functioning of e-learning in the industry 4.0 and society 5.0 eras. The book also devotes a lot of space to the issues of Web 3.0 in university e-learning, quality assurance, and knowledge management. The aim and scope of this book is to draw a holistic picture of ongoing online teaching-activities before and during the lockdown period and present the meaning and future of e-learning from students' points of view, taking into consideration their attitudes and expectations as well as industry 4.0 and society 5.0 aspects. The book presents the approach to distance learning and how it has changed, especially during a pandemic that revolutionized education. It highlights - the function of online education and how that has changed before and during the pandemic. - how e-learning is beneficial in promoting digital citizenship. - distance learning characteristic in the era of industry 4.0 and society 5.0. - how the era of industry 4.0 treats distance learning as a desirable form of education. The book covers both scientific and educational aspects and can be useful for university-level undergraduate, postgraduate and research-grade courses and can be referred to by anyone interested in exploring the diverse aspects of distance learning.
Intelligent Computation and Analytics on Sustainable Energy and Environment
The 1st International Conference on Intelligent Computation and Analytics on Sustainable Energy (ICICASEE 2023) was held at Ghani Khan Choudhury Institute of Engineering & Technology (GKCIET), Malda, West Bengal, India.
Performance, Reliability, and Availability Evaluation of Computational Systems, Volume I
This textbook intends to be a comprehensive and substantially self-contained two-volume book covering performance, reliability, and availability evaluation subjects. The first volume covers Chapter 1 to Chapter 14, whose subtitle is ``Performance Modeling and Background".
Platform Engineering
Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of agile custom-centricity to their own developers. Adding product management to infrastructure organizations is now all the rage. But how's that possible when infrastructure is still the operational layer of the company? This practical book guides engineers, managers, product managers, and leaders through the shifts that modern platform-led organizations require. You'll learn what platform engineering is--and isn't--and what benefits and value it brings to developers and teams. You'll understand what it means to approach a platform as a product and learn some of the most common technical and managerial barriers to success. With this book, you'll: Cultivate a platform-as-product, developer-centric mindset Learn what platform engineering teams are and are not Start the process of adopting platform engineering within your organization Discover what it takes to become a product manager for a platform team Understand the challenges that emerge when you scale platforms Automate processes and self-service infrastructure to speed development and improve developer experience Build out, hire, manage, and advocate for a platform team