Gene Expression Data Analysis
The book introduces phenomenal growth of data generated by increasing numbers of genome sequencing projects and other throughput technology-led experimental efforts. It provides information about various sources of gene expression data, and pre-processing, analysis, and validation of such data.
Mathematical Inequalities in Fractional Calculus and Applications
In recent years, fractional differential equations have been used frequently in modelling of real systems in numerous fields of applied sciences. To study the existence, uniqueness, and stability of solutions in a system of fractional differential equations, inequalities involving derivatives and integrals of arbitrary powers, also known as fractional inequalities, have been used. Additionally, fractional inequalities were used to find upper and lower bounds of solutions to a system of fractional differential equations. In addition, fractional inequalities were also used in the fields of probability, numerical quadrature, and many more. Over the years, many authors have extended several generalizations of the various classical inequalities to fractional calculus in the literature.This reprint is a compilation of fifteen original research articles on mathematical inequalities involving fractional derivatives and fractional integral operators and their many applications in various mathematical and related fields. The topics include: fractional integral inequalities; Inequalities of generalized functions in fractional calculus; Q-calculus; Inequalities in fractional calculus on time scales; fractional order derivatives; applications of fractional inequalities; fractals; non-local mathematical models; and fractional complicated systems.
Multidimensional Modulations in Optical Communication Systems
The book provides a very detailed analysis of the novel possibilities offered to the telecommunication engineer in designing tomorrow's network. Following this approach, the main emphasis is placed on novel technologies and innovative optical modulations.
Stochastic Optimization for Large-scale Machine Learning
Stochastic Optimization for Large-scale Machine Learning identifies different areas of improvement and recent research directions to tackle the challenge. Developed optimisation techniques are also explored to improve machine learning algorithms based on data access and on first and second order optimisation methods.
Digital Innovation for Pandemics
This book presents the potential of digital responses to pandemics including COVID-19. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis.
Enterprise Architects
Enterprise architects are specialized industry professionals responsible for leading joint business and IT planning in organizations, thereby enabling the success of their digital transformation efforts. Despite their immediate relevance to today's ubiquitous digitalization tendencies, the very presence of enterprise architects, as unique organizational characters, is largely unnoticed in the mainstream discourse and their role undeservingly remains in the shadow. Even though enterprise architects have existed, in some form, since the dawn of business computing, no comprehensive information sources devoted specifically to their profession have been created so far. Whereas the broader phenomenon of enterprise architecture enjoyed significant attention in the industry, the central actors of the respective practices themselves relatively rarely became the subject of discussion, as if their behavior and activities are self-evident.Based on an extensive study of the work of enterprise architects and the existing topical literature, this book provides the first detailed and systematic description of various aspects of their occupation integrated into a coherent logical picture. In particular, this book offers clear, research-based, conceptually sound and practically actionable answers to the key questions about enterprise architects: Who are enterprise architects as personalities and what do they do?What knowledge, skills and experience do enterprise architects possess?What kind of instruments do enterprise architects employ?What activities do enterprise architects perform and how do these activities compose their work in organizations?What types and specializations of architects exist and how do they differ?What challenges do enterprise architects face in their job and how can they be overcome?What should one do to become an enterprise architect in the future?This book is organized in a highly structured, sequential manner and does not require any prior acquaintance with the trade of enterprise architects. The book is intended for a broad audience of people interested in enterprise architects including aspiring and experienced practitioners, architecture managers, academic researchers, lecturers and students in universities.
Assistive Technology Intervention in Healthcare
Assistive Technology Intervention in Healthcare focuses on various applications of intelligent techniques in biomedical engineering and health informatics.
Cybersecurity Lessons from Covid-19
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and structured by the domains of information security, this book looks at what the crisis teaches us about security.
Enterprise Architects
Enterprise architects are specialized industry professionals responsible for leading joint business and IT planning in organizations, thereby enabling the success of their digital transformation efforts. Despite their immediate relevance to today's ubiquitous digitalization tendencies, the very presence of enterprise architects, as unique organizational characters, is largely unnoticed in the mainstream discourse and their role undeservingly remains in the shadow. Even though enterprise architects have existed, in some form, since the dawn of business computing, no comprehensive information sources devoted specifically to their profession have been created so far. Whereas the broader phenomenon of enterprise architecture enjoyed significant attention in the industry, the central actors of the respective practices themselves relatively rarely became the subject of discussion, as if their behavior and activities are self-evident.Based on an extensive study of the work of enterprise architects and the existing topical literature, this book provides the first detailed and systematic description of various aspects of their occupation integrated into a coherent logical picture. In particular, this book offers clear, research-based, conceptually sound and practically actionable answers to the key questions about enterprise architects: Who are enterprise architects as personalities and what do they do?What knowledge, skills and experience do enterprise architects possess?What kind of instruments do enterprise architects employ?What activities do enterprise architects perform and how do these activities compose their work in organizations?What types and specializations of architects exist and how do they differ?What challenges do enterprise architects face in their job and how can they be overcome?What should one do to become an enterprise architect in the future?This book is organized in a highly structured, sequential manner and does not require any prior acquaintance with the trade of enterprise architects. The book is intended for a broad audience of people interested in enterprise architects including aspiring and experienced practitioners, architecture managers, academic researchers, lecturers and students in universities.
Imaging Methodologies for Lung Cancer Diagnosis
Computed Tomography (CT) is considered as the most sensitive imaging technique for early detection of lung cancer. On the other hand, there is a requirement for automated or semi-automated methodology in order to make use of large amount of data obtained from CT images and more accurately understanding of individual images. CAD can be used efficiently for early detection of lung cancer. Computer Aided Diagnosis (CAD) has been playing a significant role in cancer detection for the past two decades. Early detection of lung cancer is the only way by which the death rate can be reduced. But there is lot of difficulty in the early detection of lung cancer nodules. The usage of existing CAD systems for early detection of lung cancer with the help of CT images has been unsatisfactory because of its low sensitivity and high False Positive Rates (FPR).
AI and Education in China
This book explores the relationships between artificial intelligence (AI) and education in China.
Mathematical Modeling for Intelligent Systems
This book provides a reference for the applications of mathematical modeling using intelligent techniques in various unique industry problems in the era of Industry 4.0. Providing a thorough introduction to the field of soft computing techniques, the book covers every major technique in AI in a clear and practical style.
Reinvention of Health Applications with IoT
This book discusses IoT in healthcare and how it enables interoperability, machine-to-machine communication, information exchange, and data movement. It also covers how healthcare service delivery automates patient care with the help of mobility solutions, new technologies, and next-gen healthcare facilities with challenges faced.
Embedded systems design
VHDL (VHSIC Hardware Description Language) is a cornerstone of embedded system design. Using a hierarchical approach, this language enables detailed modeling of electronic circuits. Its keyword-based syntax facilitates the description of system behavior and structure. Support for a variety of data types enhances the accuracy of electronic component representation. Thanks to its powerful simulation capability, VHDL enables designers to verify system functionality before physical implementation. Combined with logic synthesis tools, it simplifies the transformation of high-level models into specific implementations for FPGAs, essential in embedded systems. IEEE standardization ensures compatibility between design tools. The integration of testbenches facilitates in-depth verification, ensuring the reliability of embedded systems designed with VHDL.
Financial Accounting in SAP S/4HANA Finance Simplified
DESCRIPTION SAP S/4HANA Finance is a revolutionary financial accounting solution that leverages the latest in-memory database technology to deliver unparalleled performance and efficiency. Financial Accounting in SAP S/4HANA Finance Simplified - Questions & Answers is the most updated book in SAP Financial Accounting, in an easy-to-learn format. This second edition builds on the first by going in-depth into SAP HANA, Fiori, and SAP S/4HANA Finance. It offers expanded coverage with clearer explanations, practical examples, and step-by-step guidance. You will learn about global settings, the document principle, and managing accounts receivable, payable, bank accounting, and asset accounting processes, making it easier to master these key concepts. The content is presented in a Q&A format with about 650 questions, enhanced with live system screenshots, examples, and illustrations for better understanding. It also includes menu paths and transaction codes for system customization and task execution, making it an effective learning resource.By the end of this book, you will have a solid understanding of financial accounting in SAP S/4HANA Finance. You will be equipped with the knowledge and skills to streamline your financial processes, improve efficiency, and make informed business decisions.WHAT YOU WILL LEARN● This new edition expands on SAP S/4HANA Finance by covering its integration with other SAP modules and cloud-based solutions.● Configure global settings like ledgers, fiscal years, document types, and tax settings to align with your organization's specific requirements.● Master accounts receivable and payable management, bank reconciliation, and asset accounting processes.● Leverage advanced features like in-memory computing, real-time analytics, and automation.● Create reports, comply with regulations, and manage financial risks.WHO THIS BOOK IS FORThis book is for all professionals, consultants, end-users, and business leaders involved with SAP, to gain expertise in financial accounting for better organizational performance with improved business efficiency, financial compliance, and effective reporting.
Soft Computing Applications and Techniques in Healthcare
This book provides insights into contemporary issues and challenges in soft computing applications and techniques in healthcare.
Emerging Technologies in Computing
Emerging Technologies in Computing reviews the past, current, and future needs of emerging technologies in the computer science field, and discusses the importance of appropriate practices and advances, as well as their impact. It outlines principles, challenges and applications, as well as issues involved in the digital age.
The Usage and Impact of Icts During the Covid-19 Pandemic
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology.
Mitigating Flooding Attacks in Consumer IoT
This book begins by introducing the concept of embedded security, which involves protecting embedded systems from various threats and vulnerabilities. It highlights the importance of securing these systems, given their widespread usage and critical functions. The authors then delve into the emergence of IoT and its impact on the attack surface, making it challenging to maintain a consistent security posture. The book explores four common embedded system security challenges, including the lack of universally accepted standards or best practices, the use of wireless network connections, the incorporation of hardware and software components from various vendors, and the long life cycles of embedded systems. Target Audience: This book is intended for Cybersecurity professionals, embedded system designers, and IoT device manufacturers who want to learn about prevention techniques against IoT-based attacks and Cybersecurity strategies for embedded systems.
Signal Processing and Transceiver Programming for IoT Applications
Signal processing is a vital component in the Internet of Things (IoT) ecosystem, playing a pivotal role in extracting valuable insights from the vast amounts of data generated by IoT devices. The proliferation of IoT devices has led to an exponential increase in data, which, if not processed and analyzed efficiently, can result in information overload. Signal processing techniques are essential to convert this data into actionable intelligence, enabling IoT applications to make informed decisions in real-time. Signal processing is integral to the effective functioning of IoT systems, particularly in the context of RX/TX operations. By leveraging advanced signal processing techniques, IoT systems can efficiently manage and analyze the vast amounts of data generated, converting it into actionable intelligence. This capability not only helps in preventing information overload but also enhances the overall performance and decision-making processes of IoT applications.
Algorithms for Smart Cities
As time goes by, the concept of a "smart city" encompasses an increasing number of aspects. Essentially, when we think of a modern city, we would like it to offer a vibrant and safe living environment for its community of residents: healthy indoor living spaces, green outdoor spaces for leisure and sports, flowing traffic, efficient distribution of goods, various forms of safe transportation for people, public lighting and surveillance systems, emergency management, information and communication services, etc. A smart city offers much more: it represents a space that favors the development of people and their potential, in a sustainable and resilient manner, by means of the intelligent integration of ICT tools and technologies. The following reprint collects research and innovative approaches to smart city issues. The contributions cover a wide range of topics, from car and bike-sharing models to ways of improving quality of life through digitalization. Readers will get an insight into effective solutions offered by researchers and practitioners working in artificial intelligence, the Internet of Things, data analytics, etc. The synergy of these technologies is illustrated herein, providing a new, challenging view on the smart cities of today and of the future.
Recent Technological Advances in Engineering and Management
This significant event focused on the "Recent Technological Advances in Engineering and Management" with special sessions on Applied Sciences.
Linear Systems Identification
Identification, presented in this document, is a tool for modeling systems when our knowledge is limited to the evolution of an output parameter as a function of an input parameter. We introduce two groups of methods: analog methods and numerical methods. After an introductory chapter, the second chapter is dedicated to the identification of continuous systems. Our knowledge of the characteristics of first and second-order systems, as well as the concept of dominant pole, will be utilized to develop identification models for systems governed by the evolution of an output as a function of an input. Other methods (Str癡jc, Broida, etc.) will also be developed and applied.In the third chapter, as a numerical approach to identification, the least squares method proves to be very promising. The principle of this method, its formalism, and applications will be presented.At the end of this document (Chapter four), an implementation of the various methods will be provided to deepen the introduced concepts.
Artificial Intelligence for Sustainable Industry 4.0 and 5.0
This book provides a comprehensive understanding of the transformative power of Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), and big data analytics in a critical way, ultimately for the advancement of Industry 4.0 and 5.0 and shaping Society 5.0. It has gone deep into how these technologies are revolutionizing industries, driving innovation, and fixing social problems-so readers have a roadmap to the moving technological world. The integration of AI with big data analytics in this book deals with the main subjects designed to improve industrial efficiency, optimize healthcare, transform retailing, transform construction industry, develop autonomous vehicles, and promote environmental sustainability. The chapters examine in detail each of these technologies applied to bring to detailed studies, methodologies, and real-world applications. The evolution from Industry 4.0 to Industry 5.0 is one of the book's central themes. This book also focuses on challenges and opportunities of implementing AI for intelligent and sustainable industries.
Computer Course Third Year CG
Every day, customer demands and expectations reach new heights, slowing demand for digital and real-time services. As a result, modern companies are investing in digital transformation and business automation, which involves integrating various software solutions (SaaS) and cloud applications. With these systems, companies can digitize and automate business processes in marketing, sales, customer service, human resources and all other departments. These integrated systems are part of the company's integrated IT ecosystem.However, with each new software solution a company integrates, managing these connections and the exchange of which data is ultimately more and more difficult. In the absence of an appropriate platform to integrate all these systems, the benefits of digital transformation and business automation are overshadowed by a major problem: a tangled IT environment.
Risk Management for Mobile Devices in It Department
The Bring of Your Own Device (BYOD) movement, which encourages employees to use their own smartphones and tablets for work, has grown in popularity in recent years. At this point, BYOD is being formally recognized, and techniques for embracing this phenomena in the workplace have been devised. This book seeks to identify the IT dangers that result from allowing workers to use their personal mobile devices for work. It also outlines the obstacles that the IT department must overcome . Then proposed some scenarios of solutions with the goal to guarantee a trouble-free rollout of BYOD.
Angular Reactive Forms
Welcome to the book "Angular Reactive Forms". In this book, I explain everything you need to know about reactive forms. With reactive forms, you define the form model directly in the component class. This is an elegant way to deal with form fields that gives you full control over all aspects of reading and updating values and performing all kinds of validations. This way you can easily create and edit dynamic forms from your component class. In this book, I will show you how to create forms, update values, perform validations, display error messages, work with hierarchical groups and form arrays, upload files, preview images, and much more. By the end of this book, you will be confident working with forms in your Angular application and be able to handle all kinds of scenarios. Let us get started.
Awareness Level of Security breaches for Remote Workers
This book examined remote employees' security breach awareness levels and provides a detailed insight of their practises, obstacles, and proactive efforts to maintain cybersecurity in the shifting context of remote work. The findings highlight a good trend in organisations' attempts to improve data security through training and remote work standards, with remote workers displaying a commitment to data integrity practises. While remote employees are confident in their security configurations, the incidence of security breaches, particularly phishing and unauthorised device access, underscores the ongoing danger landscape they face. This demands continual vigilance in order to successfully resolve these breaches and raise security knowledge in order to limit threats. Consistent security measures, such as the usage of Virtual Private Networks (VPNs) for secure connections and Two-factor Authentication (2FA) during logins, are evidently prioritised, contributing to improved data protection and account security. The variable frequency of security training among remote workers emphasises the significance of ongoing and comprehensive training efforts.
Security and Trust Issues in Internet of Things
The purpose of this edited book is to present and showcase the basic fundamentals, applications, and integration of both IoT and Blockchain. The trend of applying Blockchain to IoT is rapidly growing because it helps to overcome various challenges faced by IoT from smart manufacturing to unmanned aerial vehicles.
Deep Learning for Internet of Things Infrastructure
This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of deep learning (DL)-based data analytics of IoT (Internet of Things) infrastructures.
Systems, Software and Services Process Improvement
The two-volume set CCIS 2179 + 2180 constitutes the refereed proceedings of the 31st European Conference on Systems, Software and Services Process Improvement, EuroSPI 2024, held in Munich, Germany, during September 2024. The 55 papers included in these proceedings were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Part I: SPI and Emerging and Multidisciplinary Approaches to Software Engineering; SPI and Functional Safety and Cybersecurity; SPI and Standards and Safety and Security Norms; Part II: Sustainability and Life Cycle Challenges; SPI and Recent Innovations; Digitalisation of Industry, Infrastructure and E-Mobility; SPI and Agile; SPI and Good/Bad SPI Practices in Improvement.
Privacy Vulnerabilities and Data Security Challenges in the IoT
This book discusses the evolution of security and privacy issues in the Internet of things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in the industry can easily understand the IoT security and privacy issues.
Extended Reality
The four-volume proceedings set LNCS 15027, 15028, 15029 and 15030 constitutes the refereed proceedings of the International Conference on Extended Reality, XR Salento 2024, held in Lecce, Italy during September 4-7, 2024. The 63 full papers and 50 short papers included in these proceedings were carefully reviewed and selected from 147 submissions. They were organized in the following topical sections: Extended Reality; Artificial Intelligence & Extended Reality; Extended Reality and Serious Games in Medicine; Extended Reality in Medicine and Rehabilitation; Extended Reality in Industry; Extended Reality in Cultural Heritage; Extended Reality Tools for Virtual Restauration; Extended Reality and Artificial Intelligence in Digital Humanities; Extended Reality in Learning; and Extended Reality, Sense of Presence and Education of Behaviour.
IoT Applications, Security Threats, and Countermeasures
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture
Vehicular Communications for Smart Cars
This book covers the security, trust and privacy issues, the threats in various forms of vehicular networks, and the countermeasures available, using examples and easy-to-understand figures.
Business analytics technology based on NLP and ontologies
The monograph is intended for specialists in the design, development and implementation of business intelligence systems and technologies, information resources processing and analysis, global information systems, artificial intelligence systems, and Internet technologies in the fields of cybersecurity, electronic commerce, online marketing/advertising, complex Web-projects management, as well as for those obtaining an educational and scientific level of higher education in information technology knowledge. The business analytics methods and tools creation problem for various subject areas has been studied, as the tasks of developing mathematical models, solution methods and instrumental means for the information resources integration and the business analytics systems functioning with the effective intelligent models have been solved. The monograph is supported by the National Research Foundation of Ukraine, project number 187/0012 from 1/08/2024 (2023.04/0012) "Information system development for automatic detection of misinformation sources and inauthentic behaviour of chat users" from the contest "Science for strengthening the defence capability of Ukraine".
Digital Transformation Success Stories
The general objective of this book was to analyze the Digital Transformation Success Stories: Estonia and Singapore.The coronavirus pandemic has highlighted the need for a solid digital economy to avoid losing the competitiveness train and widening the region's inequality, gender and low productivity gaps (United Nations, 2020).Digital technology will be the main driver of change in this century, leading to the reconfiguration of economies, governments and civil society, and impacting all aspects of our work, sometimes in unexpected ways. With this in mind, in 2019 UNDP launched its first organization-wide digital strategy (Opp, 2021).
AI Horizons
As we stand on the brink of a new era, this book offers a comprehensive exploration of AI's ethical, social, and technological implications. It explores privacy, fairness, accountability, and the digital divide. The book features real-world case studies across diverse industries to illustrate AI's transformative power and its potential to revolutionize healthcare, education, transportation, and more. Special attention is given to the adoption of AI in emerging markets and emphasizes the importance of human-AI collaboration, where AI augments human intelligence and creativity rather than replacing it. It examines the need for human-centric design while also exploring AI governance and the role of multi-stakeholder collaboration in shaping the future of this technology. By fostering a comprehensive understanding of AI and its myriad implications, the book inspires thoughtful dialogue and responsible action to ensure a brighter, more equitable future for all. It is intended for business leaders, policymakers, academics, and curious individuals eager to understand AI's role in shaping our world and how we can responsibly harness its power. FEATURES: Emphasizes human-AI symbiosis, highlighting human-centric design and responsible developmentProvides real-world examples across industries, showcasing AI's transformative impactExplores AI adoption in emerging economies, addressing unique challenges and opportunities
Snowflake SnowPro Core Certification Guide COF-C02
DESCRIPTION Snowflake, a revolutionary cloud data warehouse platform, has gained immense popularity due to its scalability, performance, and ease of use. This comprehensive guide is designed with the knowledge and skills necessary to pass the SnowPro Core Certification exam and excel in the world of Snowflake.Prepare for the SnowPro Core Certification with this all-inclusive guide. Understand Snowflake's architecture, data types, and security features while mastering virtual warehouse management. Learn essential data movement strategies and performance optimization techniques like caching and clustering, and explore the latest Snowflake features. This guide includes mock tests and expert advice to help you confidently tackle the certification exam. You will gain a solid understanding of Snowflake's unique strengths, including its ability to manage both structured and semi-structured data, secure information, and optimize performance for complex tasks.By the end of this book, you will be well-prepared to tackle the SnowPro Core Certification exam with confidence. You will have a solid grasp of Snowflake's fundamentals, be able to write efficient SQL queries, optimize performance, and implement best practices for data security and governance.WHAT YOU WILL LEARN● SnowPro Core Certification overview, including subject area/domain breakdown. ● Essential tips to prepare and pass the exam.● Snowflake's fundamentals to advanced key concepts outlined in the SnowPro Certification.● Industry best practices and recommendations on various key concepts.● SnowPro Core Certification sample practice questions to test the overall knowledge.WHO THIS BOOK IS FORThis book is for current and aspiring emerging data professionals, data/solution architects, data engineers, database administrators, data analysts, data scientists, and anyone who wants to explore and learn about the modern data cloud platform.
Basics of linear control systems
This basic book on automatic control consists of seven chapters. The first chapter introduces general concepts of systems, signals and control systems. The second chapter describes the different types of system representation as differential equations, transfer functions and transfer loci. It also includes the characteristics of first- and second-order systems. Chapter three covers methods for reducing function diagrams and calculating transfer functions, whatever their complexity. Chapter four presents the calculation of the accuracy of any control system, in the presence or absence of disturbances. Chapter five covers various methods, both analytical and graphical, for analyzing stability. Chapter six introduces some control methods, including phase lead compensation, integral action procedures, and standard PID controllers, with tuning techniques such as the reference model and pole-zero compensation method. The seventh and final chapter of this book is devoted to a number of implementation examples addressing various problems encountered in the context of continuous linear control systems. Additional exercises are included at the end of the book.
Essentials of digital control systems
To succinctly grasp the range of tools necessary for the analysis and design of digital control, this book is divided into five chapters. The first chapter is dedicated to introducing basic concepts such as sampling, the z-Transform of a sampled signal, signal reconstruction using holders, and the inverse z-Transform. In the second chapter, we define the transfer function of a sampled system and calculate this function for various block diagrams with different configurations. The third chapter is focused on the analysis of the stability and precision of a sampled control system. In the fourth chapter, we propose two types of digital controllers: discretization of an analog controller and deadbeat digital controller. The fifth chapter offers about ten examples of implementing digital controllers, using the various concepts introduced in the first chapters. Additionally, MATLAB scripts are used to validate the various results established therein. This book also includes additional exercises and appendices summarizing complementary concepts.
Digitizing the agricultural sector in Africa
Digitizing Africa's agricultural sector.This book explores how digitization can transform Africa's agricultural sector. It addresses the current challenges facing African farmers, such as limited access to finance, markets and information, as well as insufficient infrastructure. The book presents various innovative digital solutions, such as drones, mobile apps, and farm management platforms, highlighting their potential to improve yields, product quality, and reduce production costs. Case studies and farmer testimonials illustrate the positive impacts of these technologies. It also proposes strategies for the successful adoption of digitalization, recommending actions for governments, NGOs and the private sector, while stressing the importance of farmer education and training. Finally, the book offers an optimistic vision of the future of agriculture in Africa, showing how technology can solve the problems of food security and environmental sustainability.
Creation of a regulator for CPU power management
With the huge increase in the use of mobile devices, there is growing interest in developing new, more efficient technologies that use fewer resources and offer their users more time to use them. In this work, we show how we developed an algorithm to build a new frequency regulator to manage the energy used by a computer's central processing unit. A comparison was also made with the regulator currently used in Linux distributions on the market, and the new regulator proved to be just as efficient as those already used in current versions of the Linux kernel.
Object Oriented Software Engineering
This book is full of practical, hands-on re-engineering knowledge and expertise presented in a form that makes it easy to understand and use. This book documents a catalogue of patterns for reverse engineering and reengineering legacy systems. The subject matter is presented in a lucid and succinct style so that even those who do not have a prerequisite knowledge of the subject can easily understand it. This book is addressed mainly to practitioners who need to reengineer. The patterns in this book help everyone who is concerned with using reengineering to guide their work.
Digital processing of cytogenetic images for their classification
The development of a bioinformatics tool to detect DNA nucleoids (with heads and tails) in fluorescence through image recognition, for their subsequent classification according to the comet assay technique, is presented. The aim is to automate and manage their storage, and to optimize the processes in the cytogenetics laboratory. For this purpose, possible methods to be applied are evaluated and those that combine mathematical and computational algorithms, neural networks and neuro-fuzzy system are selected. The developed method performs the detection and segmentation in the following steps: Pre-processing and initial segmentation of the raw image is carried out. The obtained fragments are classified by neural networks into three groups: head, tail and background. Finally the heads or kernels and tails are measured and re-analyzed, classifying them according to their ratio relationship. This process of detection, segmentation and classification was tested using the case study with cytogenetic images in comet assay of the Laboratory of General Cytogenetics and Environmental Monitoring of the Institute of Subtropical Biology UNaM-IBS-CONICET.
Modern Antenna Systems
Fundamentals of Antenna Theory: Provide a comprehensive overview of the fundamental principles of antenna theory, including antenna types, radiation patterns, antenna parameters (such as gain, directivity, impedance), and electromagnetic wave propagation. Antenna Design and Optimization: Discuss the design and optimization techniques used in modern antenna systems, including computer-aided design (CAD) tools, numerical electromagnetic simulation methods (such as finite element method and method of moments), and optimization algorithms (such as genetic algorithms and particle swarm optimization). Antenna Integration and System-Level Considerations: Address the integration of antennas into complex communication and radar systems, including system-level considerations such as impedance matching, RF front-end design, antenna arrays, beamforming techniques, and antenna diversity schemes. Emerging Trends and Future Directions: Discuss emerging trends and future directions in antenna systems research and development, such as millimeter-wave and terahertz antennas, massive MIMO (Multiple-Input Multiple-Output) systems, antenna-in-package (AiP) integration, and antenna technologies for next-generation wireless communication and sensing applications.
Information Systems
It is written in a lucid style with theoretical discussions being supplemented with tables for easy understanding of the subject. This book provides technological and research advances in information system development with extensive coverage of methodologies, techniques and tools. The text explains the fundamental principles and practices required to use and manage information, and illustrates how information systems can create, or obstruct, opportunities within various organizations. This book is highly useful for academics, researchers, and advanced students of information technology, cyber law and also to the practitioners in the related field.
An Android based Food Wastage Reduction Application - FoodSarv
The challenge of food wastage in society needs effective management to reduce both environmental and economic issues. The need to reduce food waste can reduce poverty through efficient resource utilization. This app aims for the collection, distribution, and delivery of donated food. This app helps donors and receivers to easily register their details and indicate their food availability or requirements. Donors can upload pictures of their available food with descriptions. A food waste management system comprising donor, receiver, and transport modules presents a comprehensive solution to solve the current issue of food waste. The donor module allows individuals, restaurants, and businesses to contribute excess food, thereby reducing waste at the source. The receiver module, often including food banks and charitable organizations, ensures equitable distribution to those in need, addressing food insecurity. Meanwhile, the transport module acts as the logistical backbone, facilitating the seamless transfer of surplus food from donors to receivers while considering safety and efficiency. This approach not only minimizes food waste and its associated environmental impacts but also plays