The evolution of cellular systems
The range of new possibilities built into mobile phones has only become possible thanks to the enormous technological advances that the sector has undergone in recent years. From the first analogue handsets, technology has evolved to the second generation, digital systems, and today it is reaching the 4.5G level, the fourth generation of mobile phones. In reality, the evolution of mobile telephony has unfolded in different technologies in terms of the technical quality of their operations and the possibility of services. The digital systems that first established themselves on the market are TDMA, CDMA and GSM. Finally, however, the big difference is the availability of new functions, which mean that mobile phones are no longer just a phone but an electronic support for the most diverse actions.
Shinobi Tactics
Shinobi Tactics: Ancient Secrets for Modern Cybersecurity By Adam Quattlebaum In an era where digital threats lurk in every corner of the internet, the wisdom of ancient warriors holds invaluable lessons for the modern world. "Shinobi Tactics: Ancient Secrets for Modern Cybersecurity" by Adam Quattlebaum masterfully intertwines the timeless strategies of the ninja with the cutting-edge techniques of cybersecurity, creating an essential guide for today's digital defenders. This book delves into the heart of ninja philosophy, revealing how their principles of stealth, strategy, and adaptability can be harnessed to fortify your cyber defenses. From the art of invisibility to the power of adaptability, each chapter provides actionable insights and practical techniques to outsmart and outmaneuver cyber adversaries. Key Highlights: The Art of Invisibility: Learn how to remain undetected in the digital world, safeguarding your privacy and protecting sensitive information. Espionage and Intelligence Gathering: Master the art of covert operations, gathering intelligence to stay one step ahead of cyber threats. Deception and Misdirection: Utilize the craft of creating illusions to confuse and mislead attackers, turning their strategies against them. Sabotage and Exploitation: Discover tactics for exploiting vulnerabilities and weakening your opponent's defenses. The Power of Adaptability: Embrace flexibility and resilience to adjust your tactics and overcome emerging threats. Building the Modern Cyber Ninja: Combine ancient wisdom with the latest in cybersecurity technology to become an adept defender against both traditional and contemporary threats. Adam Quattlebaum, a seasoned cybersecurity expert and martial arts enthusiast, brings a unique perspective to the field. His expertise in both IT and martial arts allows him to present innovative solutions that marry ancient wisdom with modern technology. Whether you're an IT professional, a cybersecurity enthusiast, or someone keen on the art of digital self-defense, "Shinobi Tactics" offers a fresh and profound approach to safeguarding the digital realm. Step into the shadows, embrace the ninja way, and become a guardian of cyberspace-unseen, yet ever vigilant.
Knowledge Discovery Using Data mining and Soft Computing Methodologies
Huge amount of data are collected nowadays from different application domains. It is not feasible to analyze all these data manually. Knowledge Discovery in Databases(KDD) is the nontrivial process of identifying valid, novel, potentially useful, and ultimately understandable patterns in data.Valid stands for the discovered patterns (information) should hold for new, previously unseen problem instances to a certain degree.Due to the advances in Computer Science and Information Technology currently it is easy to collect, store and analyze the date. Soft Computing is multidisciplinary field that was proposed by Dr. Lotfi Zadeh, whose goal was to construct new generation Artificial Intelligence, known as Computational Intelligence. The idea of soft computing was initiated in the year 1981 when Dr. Zadeh published his first paper on soft data analysis. This thesis is proposed to be performed for the analysis of data using soft computing models. Initially soft computing has been defined as the fusion of the fields of Fuzzy logic, Neuro computing, Evolutionary and Genetic computing into one multidisciplinary system. In this research work the use of soft computing and statistical models.
State-of-the-Art Mathematical Applications in Europe
Under one cover, this reprint collects twelve original research papers and one review paper submitted to the Special Issue "State-of-the-Art Mathematical Applications in Europe" and published in the MDPI journal Mathematics from December 2021 to January 2023. This Special Issue published original research papers from European researchers and their collaborators on popular topics in all fields of mathematics. The Editors received papers from Spain, Slovenia, Romania, Italy, Greece, Russia, Montenegro, and Turkey. Most of the contributions were related to various fields in applied mathematics, and several papers addressed problems in pure mathematics, particularly algebra.
Mathematical Modelling and Optimization of Service Supply Chain
The present special issue Reprint contains a total of 14 articles accepted and published in the special issue "Mathematical Modelling and Optimization of Service Supply Chain" of the MDPI Mathematics journal. It covers a wide range of topics connected to the theory and applications of advanced analytical methods in the service supply chain. To be specific, these topics include the following: (1) the study of customer preferences and behaviors, e.g., environmental consciousness, traceability preferences, and optional demand, (2) the optimization of service supply chain members' decisions, e.g., operational strategies, revenue management, and sustainability practices, (3) the proposal of coordination mechanisms in service supply chains, e.g., sales reward contract and carbon trading mechanisms, (4) and the effects of the external environment, e.g., risks, government subsidies and innovative technology. In addition, these topics have been studied under some special service scenarios, including maritime logistics, food services, and green innovation. This reprint is intended for a diverse audience, including students, researchers, and practitioners in the fields of supply chain management, service science, operations research, industrial engineering, and business management. Our goal is to equip readers with both the theoretical foundations and practical tools necessary for optimizing service supply chains in various industries.
MySQL Cookbook
DESCRIPTION MySQL Cookbook - MySQL is a popular open-source database, and SQL is the top language for querying, creating, and managing data in databases. Developers and administrators widely use it for general and specific applications. MySQL powers business IT applications like CRM and ERP, APIs, web and e-commerce platforms, database management, data analytics, and increasingly, big data and data science projects.It starts with MySQL Workbench for beginners and moves to MySQL Shell for advanced scripting. Learn data redundancy, disaster recovery, and server connections in various languages. Core functions like SELECT, JOINs, INSERT, UPDATE, and DELETE are explained. Explore string, date, and time functions, sorting, stored procedures, triggers, and data manipulation. Finally, it covers user management, backups, performance, and security best practices.By the end of this book, you will be adept at interacting with MySQL databases, crafting efficient queries, and confidently managing your data for optimal performance and security. KEY FEATURES ● Gain confidence and skills to solve data problems with hands-on MySQL exercises.● Learn practical MySQL skills by solving common database issues.● Connect to servers, issue queries, retrieve data, and manage MySQL tasks.WHAT YOU WILL LEARN● Connect to a server, issue queries, and retrieve results from MySQL Server.● Store, retrieve, and manipulate strings and work with dates and times.● Sort query results and generate aggregations.● Perform basic MySQL administration tasks and monitoring fundamentals.WHO THIS BOOK IS FORWhether you are a developer, an administrator, a faculty member teaching databases, or a student aiming to enhance your skills, this book provides valuable insights and hands-on knowledge to tackle database-related questions and problems effectively.
Systems for ensuring national information security
The monograph is intended for specialists engaged in ensuring national and information security of the state, as well as employees of diplomatic relations.The basic concepts of ensuring national information security, models of security system provision, classification of information threats and characterization of their consequences, construction of information protection system, peculiarities of information security organization in the strategy of inter-state relations are considered.The book is recommended for researchers engaged in the study of modern international relations and world politics, specialists in the field of international and national information security, as well as for a wide range of readers interested in this issue.
Development of a web platform for bands and musicians
Music has always been present in human life. Since its inception, it has been associated with the state of mind of human beings as a way of expressing their feelings. With the development of professional activities, music began to be worked in the commercial sector and since then there have been many challenges for professionals in the field. As a result, some areas of work, such as the music of individual professionals and amateur bands, have not been properly publicised. However, the advance of technology has led to growth in different sectors, especially in terms of publicising personal and professional work. Everywhere there are undiscovered musicians and bands with potential who are not recognised. This tool should meet the needs of communication between client and service, since the site is only for communication and will not make any kind of financial contract. It is hoped that with this platform individual musicians and amateur bands will be able to publicise their work and gain space and relevance in the music market.
Exploring strategies related to usability of assistive technologies
This study focused on exploring strategies related to the Usability of Assistive technologies (ATs) in Implementing Inclusive Education among Visually Impaired Lecturers in Tanzania. The study employed a convergent research design under a mixed research approach guided by the Social Disability Model, Universal Design for Learning Model, and Technology Acceptance Model theories. The study also collected data and information from sixty-seven (67) participants using probability and non-probability sampling techniques. Descriptive and inferential statistical tests are employed for quantitative data, and thematic analysis procedures are used to analyze qualitative information. The study revealed the existence of ATs scarcity due to unclear policies for hiring, inadequate ATs infrastructure, and the expensiveness of ATs. Nevertheless, the study found that there is a lack of ATs at University A, which generalizes the same conditions to other universities in Tanzania. The tested hypothesis indicated there is a relationship between ATs applications for VILs and VIS for effective implementation of a university curriculum.
The Artificial Intelligence Papers
Modern artificial intelligence (AI) is built upon a relatively small number of foundational research papers, which have been collected and republished in this unique 350-page book. The first chapter provides a summary of the historical roots of AI, and subsequent chapters trace its development, from Rosenblatt's perceptron in 1958 to one of the early GPT models in 2019. Each paper is introduced with a commentary on its historical context and a tutorial-style technical summary. In several chapters, additional context is provided by the paper's original author(s). Written in an informal style, with a comprehensive glossary and tutorial appendices, this book is essential reading for students and researchers who wish to understand the fundamental building blocks of modern AI.
A Short Introduction to the Mathematics of Information Theory
Originally developed by Claude Shannon in the 1940s, information theory laid the foundations for the digital revolution, and is now an essential tool in telecommunications, genetics, linguistics, brain sciences, and deep space communication. In this richly illustrated book, accessible examples are used to introduce information theory in terms of everyday games like '20 questions' before more advanced topics are explored. Online MatLab and Python computer programs provide hands-on experience of information theory in action, and PowerPoint slides give support for teaching. Written in an informal style, with a comprehensive glossary and tutorial appendices, this text is an ideal primer for novices who wish to learn the essential principles and applications of information theory.
Load balancing of cloud resources for real-time tasks management
In the era of ubiquitous cloud computing, efficient resource management and load balancing are critical to ensuring optimal performance and reliability of services. The dynamic and unpredictable nature of real-time tasks presents significant challenges in cloud environments, necessitating advanced techniques to handle the complexity of resource allocation and task scheduling. This book, "Load Balancing of Cloud Resources for Real-Time Tasks Management using Deep Learning," explores the integration of deep learning methodologies to enhance load balancing mechanisms and effectively manage real-time tasks in the cloud.
Reachability Problems
This book constitutes the proceedings of the 18th International Conference on Reachability Problems, RP 2024, which took place in Vienna, Austria, during September 25-27, 2024. The 13 full papers included in these proceedings were carefully reviewed and selected from 37 submissions. The book also contains two invited talks in full paper length. The contributions in these proceedings cover topics from computability and reachability; automata and complexity; linear systems and recurrences; and games and abstractions.
Rules and Reasoning
This book constitutes the proceedings of the 8th International Joint Conference on Rules and Reasoning, RuleML+RR 2024, held in Bucharest, Romania, during September 16-18, 2024. The 12 full papers and 4 short papers included in this book were carefully reviewed and selected from 35 submissions. The RuleML+RR symposia were devoted to disseminating research, applications, languages, and standards for rule technologies, with attention to both theoretical and practical developments, to challenging new ideas and to industrial applications.
Computational Intelligence and Mathematical Applications
It is with great pleasure to present the proceedings of the International Conference on Computational Intelligence and Mathematical Applications (ICCIMA 2023)
Sustainability in Digital Transformation Era
In the dynamic realm of AI technologies, influential applications like ChatGPT.
Unravelling the Secrets of Cybersecurity
This monograph "Unravelling the Secrets of Cybersecurity: Hacking the Future" underscores the imperative of cybersecurity in safeguarding digital ecosystems and protecting against evolving threats. It reinforces the foundational principles of cyber defence while exploring advanced techniques and emerging trends that shape the future of cybersecurity. The book emphasizes the dual roles of technology and human vigilance in mitigating risks, highlighting the ongoing need for robust security measures and proactive strategies. As digital landscapes evolve and new challenges emerge, understanding the dynamics of cyber threats and defenses becomes increasingly vital. "Unravelling the Secrets of Cybersecurity: Hacking the Future" equips readers with essential knowledge and insights to navigate the complexities of cybersecurity with confidence and resilience.
Algorithmic Aspects in Information and Management
This two-volume set LNCS 15179-15180 constitutes the refereed proceedings of the 18th International Conference on Algorithmic Aspects in Information and Management, AAIM 2024, which took place virtually during September 21-23, 2024. The 45 full papers presented in these two volumes were carefully reviewed and selected from 76 submissions. The papers are organized in the following topical sections: Part I: Optimization and applications; submodularity, management and others, Part II: Graphs and networks; quantum and others.
Extended Reality
The four-volume proceedings set LNCS 15027, 15028, 15029 and 15030 constitutes the refereed proceedings of the International Conference on Extended Reality, XR Salento 2024, held in Lecce, Italy during September 4-7, 2024. The 63 full papers and 50 short papers included in these proceedings were carefully reviewed and selected from 147 submissions. They were organized in the following topical sections: Extended Reality; Artificial Intelligence & Extended Reality; Extended Reality and Serious Games in Medicine; Extended Reality in Medicine and Rehabilitation; Extended Reality in Industry; Extended Reality in Cultural Heritage; Extended Reality Tools for Virtual Restauration; Extended Reality and Artificial Intelligence in Digital Humanities; Extended Reality in Learning; and Extended Reality, Sense of Presence and Education of Behaviour.
Extended Reality
The four-volume proceedings set LNCS 15027, 15028, 15029 and 15030 constitutes the refereed proceedings of the International Conference on Extended Reality, XR Salento 2024, held in Lecce, Italy during September 4-7, 2024. The 63 full papers and 50 short papers included in these proceedings were carefully reviewed and selected from 147 submissions. They were organized in the following topical sections: Extended Reality; Artificial Intelligence & Extended Reality; Extended Reality and Serious Games in Medicine; Extended Reality in Medicine and Rehabilitation; Extended Reality in Industry; Extended Reality in Cultural Heritage; Extended Reality Tools for Virtual Restauration; Extended Reality and Artificial Intelligence in Digital Humanities; Extended Reality in Learning; and Extended Reality, Sense of Presence and Education of Behaviour.
Extended Reality
The four-volume proceedings set LNCS 15027, 15028, 15029 and 15030 constitutes the refereed proceedings of the International Conference on Extended Reality, XR Salento 2024, held in Lecce, Italy during September 4-7, 2024. The 63 full papers and 50 short papers included in these proceedings were carefully reviewed and selected from 147 submissions. They were organized in the following topical sections: Extended Reality; Artificial Intelligence & Extended Reality; Extended Reality and Serious Games in Medicine; Extended Reality in Medicine and Rehabilitation; Extended Reality in Industry; Extended Reality in Cultural Heritage; Extended Reality Tools for Virtual Restauration; Extended Reality and Artificial Intelligence in Digital Humanities; Extended Reality in Learning; and Extended Reality, Sense of Presence and Education of Behaviour.
Information Retrieval
The book Information Retrieval provides an in-depth exploration of information retrieval systems. It starts with an introduction to information retrieval, discussing its components, architecture, and the various challenges and applications. It then delves into document indexing, storage, and compression, explaining concepts such as inverted indexes, compression techniques, document representation, and the storage and retrieval of indexed documents. The book also covers different retrieval models, including the Boolean retrieval model, vector space model, and probabilistic model. Additionally, it addresses spelling correction in information retrieval systems, introducing various forms and techniques for effective spelling correction.
Intelligent Machines as Racialized Other
Our narratives about intelligent machines reprise the same modes in which humans have historically dealt with "other" groups of humans, especially during the era of colonialism. Addressing unconscious assumptions involving race, gender, hierarchy, power, imperialism, and capitalism in the post-colonial world, this book argues that cultural narratives regarding intelligent machines have much to do with colonial attitudes and mindsets. Human attitudes toward intelligent machines, colored by such ideological and cultural biases, cumulatively manifest themselves as cultural narratives of a racialized Machine Other. This book explores how examining the emotions underlying our narratives about intelligent machines can provide insights into the human psyche and be a catalyst for authentic encounters with intelligent machines. It will beckon you to question long-held assumptions, confront the complexities of AI and racial dynamics, and embark on a quest for deeper understanding of yourself.
Intelligent Machines as Racialized Other
Our narratives about intelligent machines reprise the same modes in which humans have historically dealt with "other" groups of humans, especially during the era of colonialism. Addressing unconscious assumptions involving race, gender, hierarchy, power, imperialism, and capitalism in the post-colonial world, this book argues that cultural narratives regarding intelligent machines have much to do with colonial attitudes and mindsets. Human attitudes toward intelligent machines, colored by such ideological and cultural biases, cumulatively manifest themselves as cultural narratives of a racialized Machine Other. This book explores how examining the emotions underlying our narratives about intelligent machines can provide insights into the human psyche and be a catalyst for authentic encounters with intelligent machines. It will beckon you to question long-held assumptions, confront the complexities of AI and racial dynamics, and embark on a quest for deeper understanding of yourself.
Security in Operating System
Security in operating systems is paramount for protecting data, ensuring privacy, and maintaining system integrity. Operating systems employ several key mechanisms to achieve these goals. Access control mechanisms, such as user authentication and authorization, restrict access to resources based on user privileges. Encryption techniques ensure that data remains confidential during storage and transmission. Secure boot processes and sandboxing isolate and protect system components and applications from unauthorized access or malicious software. Regular security updates and patches mitigate vulnerabilities, while intrusion detection systems monitor for unauthorized access attempts or suspicious activities. Additionally, audit logs provide a trail of system events for forensic analysis. By integrating these security measures, operating systems can effectively safeguard against a wide range of threats, ensuring a secure computing environment for users and organizations alike.
A tool for sharing learning objects
What is moodle? Moodle (Modular Object Oriented Distance Learning) is a management system for creating online courses. These systems are also called Virtual Learning Environments (VLE) or Learning Management Systems (LMS). Moodle is free learning support software and can be installed on various platforms that can run the php language, such as Unix, Linux, Windows. MAC OS. MySQL, PostgreSQL, Oracle, Access, Interbase or ODBC can be used as databases. It is developed collaboratively by a virtual community of programmers, designers, administrators, teachers and users from all over the world and is available in several languages. Moodle has been used to support face-to-face courses. Teachers end up replacing the need to leave material in the college's photocopier or send files to a large number of their students' emails, they just have to have a subject created in moodle to "hang" the text files there, which the students must read to follow the subject. Taken from www.moodlelivre.com.br
Advanced Data Structure
Advanced data structures provide powerful tools for efficient manipulation and retrieval of data, crucial in diverse computational tasks. Structures like segment trees excel in handling range queries and updates with logarithmic time complexity, making them invaluable for applications needing frequent computations over contiguous subarrays. Tries, or prefix trees, are optimal for managing and querying sets of strings based on prefixes, essential for autocomplete and dictionary implementations. Heaps, including binary heaps and priority queues, efficiently manage elements with priorities, ensuring quick access to the highest (or lowest) priority item. Hash tables provide average constant-time operations for insertion, deletion, and search, ideal for scenarios requiring fast key-based data retrieval. Each of these structures offers unique advantages, from space efficiency and rapid operations to specialized handling of specific data types and operations, making them essential tools for algorithm design and optimization in various domains.
Basic Concept of Data Structure
Data structures are essential components in computer science, serving as organized formats to store, manage, and manipulate data efficiently. They enable the effective implementation of algorithms and facilitate operations such as data retrieval, insertion, deletion, and modification. Common data structures include arrays, linked lists, stacks, queues, trees, and graphs, each with unique characteristics and use cases. Arrays provide indexed access to elements but have fixed sizes, while linked lists offer dynamic memory usage with efficient insertions and deletions. Stacks and queues operate on LIFO (Last-In-First-Out) and FIFO (First-In-First-Out) principles, respectively, and are used in various applications like expression evaluation and task scheduling. Trees, such as binary trees and heaps, represent hierarchical data and support fast search and sort operations. Graphs model complex relationships between data points and are essential in network analysis, pathfinding, and numerous other fields. Choosing the appropriate data structure is critical for optimizing performance and resource utilization in software development and problem-solving.
Advanced Operating System
Advanced operating systems represent a sophisticated evolution beyond basic functionalities, tailored to manage complex computing environments with efficiency and flexibility. These OSs excel in handling concurrent tasks and utilizing multi-core processors effectively, supporting seamless multitasking and parallel computing. They incorporate virtualization technologies like virtual machines and memory management, enabling efficient resource allocation and isolation of applications for enhanced security and scalability. Advanced OSs also embrace distributed systems, facilitating robust communication across networks through reliable IPC mechanisms such as RPC and message-oriented middleware. They prioritize fault tolerance and reliability with features like RAID and journaling file systems, ensuring data integrity and system availability. Security is paramount, encompassing comprehensive measures for authentication, encryption, and access control to safeguard against cyber threats. These OSs are adept at managing diverse hardware resources through optimized scheduling algorithms and memory management techniques while offering intuitive user interfaces and accessibility features.
Decision-Making Models
Decision Making Models: A Perspective of Fuzzy Logic and Machine Learning presents the latest developments in the field of uncertain mathematics and decision science. The book aims to deliver a systematic exposure to soft computing techniques in fuzzy mathematics as well as artificial intelligence in the context of real-life problems and is designed to address recent techniques to solving uncertain problems encountered specifically in decision sciences. Researchers, professors, software engineers, and graduate students working in the fields of applied mathematics, software engineering, and artificial intelligence will find this book useful to acquire a solid foundation in fuzzy logic and fuzzy systems. Other areas of note include optimization problems and artificial intelligence practices, as well as how to analyze IoT solutions with applications and develop decision-making mechanisms realized under uncertainty.
Philosophical Analysis of Personal Information Security
The monograph is devoted to the study of philosophical aspects of personal protection in the global information space. The author considers the key concepts of information security through the prism of philosophy, analyzing the impact of information technologies on human consciousness and identity. The work reveals the problems of privacy, digital identity and ethical dilemmas arising as a result of technological progress. Particular attention is paid to the formation of information culture and the development of normative frameworks that promote the protection of personal data and ensure sustainable development of the information society. The monograph is of interest to specialists in philosophy, sociology, information technology, as well as to all those interested in the problems of information security in the modern world.
Systems, Software and Services Process Improvement
The two-volume set CCIS 2179 + 2180 constitutes the refereed proceedings of the 31st European Conference on Systems, Software and Services Process Improvement, EuroSPI 2024, held in Munich, Germany, during September 2024. The 55 papers included in these proceedings were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Part I: SPI and Emerging and Multidisciplinary Approaches to Software Engineering; SPI and Functional Safety and Cybersecurity; SPI and Standards and Safety and Security Norms; Part II: Sustainability and Life Cycle Challenges; SPI and Recent Innovations; Digitalisation of Industry, Infrastructure and E-Mobility; SPI and Agile; SPI and Good/Bad SPI Practices in Improvement.
Implementation and Application of Automata
This book constitutes the proceedings of the 28th International Conference on Implementation and Application of Automata, CIAA 2024, held in Akita, Japan, during September 3-6, 2024. The 24 full papers and one invited paper presented here were carefully reviewed and selected from 38 submissions. These papers have been covering various fields in the application, implementation, and theory of automata and related structures.
Cellular Automata
This book constitutes the refereed proceedings of the 16th International Conference on Cellular Automata for Research and Industry, Cellular Automata, ACRI 2024, held in Florence, Italy, in September 9-11, 2024. The 20 full papers presented were carefully reviewed and selected from 33 submissions. They were organized in the following topical sections: theory, mathematical and physical models; computational aspects and applications; social and biological models.
Formal Aspects of Component Software
This book constitutes the refereed proceedings of the 20th International Conference on Formal Aspects of Component Software, FACS 2024, held in Milan, Italy, during September 9-10, 2024. The 7 full papers and 1 short paper included in this book were carefully reviewed and selected from 16 submissions. They are organized in topical sections as follows: verification and testing, formal models, and security and blockchain.
Information Security - Risk Management Framework
In today's digital age, where data preservation is the cornerstone of security and communications, safeguarding this invaluable asset has never been more critical. In Information Security, Dr. Shekh Abdullah-Al-Musa Ahmed offers a dedicated framework for prevention techniques and will help readers navigate the complex and ever evolving landscape of digital data protection from social engineering attacks. It is imperative to recognize the fundamental necessity of information security risk management and to develop framework. Every bit and byte of Digital information holds immense value, whether it pertains to personal identities, corporate secrets, or the intellectual property of nations.
Centralized Grievance System Portal
Centralized Grievance System Portal" is a comprehensive guide designed to provide readers with an in-depth understanding of the principles, practices, and technologies that underpin modern grievance management systems. This book is the culmination of extensive research, practical experience, and a deep commitment to improving how grievances are handled across various sectors. Our motivation for writing this book stems from a shared vision of creating more equitable and responsive systems for addressing concerns and complaints. We have witnessed firsthand the positive impact that a well-implemented grievance system can have on an organization's culture and productivity. This inspired us to compile our knowledge and insights into a resource that can assist others in implementing or refining their own grievance management processes.
GBBS Pro Bulletin Board System
GBBS Pro 2.3 is a user-friendly, highly-modifiable Bulletin Board System (BBS) for communications and entertainment. It has advanced features that can be configured by a novice, yet challenge advanced programmers. Originally released between 1980 and 1993 for Apple II computers, this new 2.3 version has many refinements, including an updated Mail and File Transfer system. Experience the world of BBS's from days gone by and start your own BBS!. Features: - Multiple Bulletin Boards, Private Electronic Mail, Full Editor. - Downloads/Uploads, Voting/Survey, Expandable Features. - 300 to 38400 Baud Modem Support and Internet-capable. - Over 380 pages of documentation, tutorials, development history, and forewords from experienced BBS sysops.
Building Education Platform
Study Stash, a dynamic online platform meticulously crafted to cater to the academic needs of students enrolled in the University, emerges as a dedicated resource hub designed to elevate the learning experiences of college students. Our platform stands out by offering a diverse range of study materials that cater to the unique requirements of engineering and technology disciplines.Emphasizing accessibility and versatility, Study Stash serves as a centralized repository where students can seamlessly access a wealth of subject-specific resources. These resources include meticulously curated lecture notes, comprehensive practice exams, and engaging multimedia content.
State-Space Control Systems
These lecture notes present the mathematical tools and techniques necessary for the analysis and representation of linear multi-variable dynamic systems (or MIMO: Multi-Input Multi-Output) in the state space.The first chapter introduces the fundamental concepts of state representation and its main properties. This approach generally involves the use of canonical representations and the solution of state equations. The second chapter is dedicated to the correction of linear multi-variable systems through state feedback, as well as techniques for pole or eigenvalue placement for its implementation.Implementing state feedback control often requires access to the components of the state vector, a condition that is not always met. In such cases, the use of an observer becomes essential to estimate the temporal evolution of unmeasured components. The concept of an observer is detailed in the third chapter.At the end of this document (Chapter four), we propose a series of examples of state-space system processing and analysis, to put into practice the various methods discussed throughout the first three chapters. The book closes with a set of additional exercises and typical problems.
Human Factors in ISO 27001 Training Awareness Programs
This book explores the factors affecting employee engagement and knowledge retention in ISO 27001 training programs within IT SMEs. By examining information security culture, human factors, teaching strategies, and challenges faced by SMEs, the research aims to understand their impact on training effectiveness. Data from 288 participants in Lagos, Nigeria, collected via a mixed-methods approach, reveal that a strong information security culture positively influences engagement and retention. Positive human factors, such as motivation and clear communication, alongside well-designed teaching strategies, enhance these outcomes. However, SME-specific challenges like time constraints and resource limitations hinder engagement and retention. The findings provide valuable insights for developing effective training programs that boost employee empowerment and organizational success.
Use of VisuAlg by students in introductory programming courses
Classifying a programming learning support tool as educational software involves analysing technical criteria from the ISO/IEC 9126 standard and pedagogical criteria from the Thomas Reeves model. Analysing the criteria must take into account external factors that interfere with the teaching-learning process, especially for students enrolled in introductory programming courses. In this book, we empirically assess whether these criteria are sufficient to elect VisuAlg as educational software.
Design and production of a prize list management application
This book is an academic work that deals with the setting up of a school league table, with the aim of easily listing all the pupils who have studied at school x over the years. The major challenge facing today's organizations is data handling, especially data retrieval. The proposed application would solve this problem. This book therefore comprises two essential parts, one focusing on design and the other on programming. An architecture is proposed, enabling the application to be deployed and used effectively.
Distance training of teachers to use multimedia tools and technologies
The methodical manual consists of 5 sections, oriented to training teachers to the reasonable and effective use of multimedia tools and technologies in distance learning of teachers, students and graduate students. In the Law on Education of the Republic of Kazakhstan, 2007 it is noted that "taking into account the accumulated experience in the field of electronic and distance learning, the basic guidelines of the long-term program of education development up to 2020 in terms of informatization of education are defined. This program stipulates that by 2020 Kazakhstan's education system will function as part of a unified world information and education space. At the same time, the technologicalization of the educational process, its personalization with orientation on individual learning trajectory, openness and accessibility of education will be provided". Informatization of education on the basis of world achievements in the field of IT-technologies will be a means of innovative advanced development of Kazakhstani education.
Crime Management System (CMS)
The book "Crime Management System (CMS)" presents a comprehensive solution for managing criminal investigations. It emphasizes the importance of the CMS as a critical tool in recording first information reports (FIRs) and initiating the investigative process. The system meticulously records essential details such as the crime's date, time, location, and information about the offenders. This project outlines the development and implementation of a user-friendly interface that addresses the limitations of manual record-keeping by providing a secure, efficient, and automated method for storing and retrieving crime-related data. The proposed system significantly improves the existing manual methods by enhancing data security, reducing the workforce, and ensuring accurate and timely information processing. The CMS aims to streamline operations within crime management departments through detailed modules covering registration, case management, searching, and reporting, facilitating better decision-making and faster response times in criminal investigations.
Handling unbalanced classes using assembly methods
The present work concerns decision optimization using ensemblistic methods for processing unbalanced databases. To achieve this, we used ensemblistic methods, which are based on the homogeneous combination of predictions or classifiers for better generalization.In our project, we used the Credit Card Fraud Detection database to generate and evaluate the proposed model. We also chose the random forest combination method, which combines several decision trees and applies the majority voting strategy to generate an optimal prediction.The aim of our study is to build a prediction model using assembly methods to improve the performance of an individual classifier in dealing with unbalanced datasets.To achieve our goal, apart from the random forest combination method used, we also used the subsampling and oversampling methods to achieve the same results and finally draw a conclusion on the three methods used and this we implemented with the phyton programming language.
An Overview of Deep Learning in Medical Imaging Focusing on MRI images
Machine learning has seen some dramatic developments recently, leading to a lot of interest from industry, academia and popular culture. These are driven by breakthroughs in artificial neural networks, often termed deep learning, a set of techniques and algorithms that enable computers to discover complicated patterns in large data sets. Feeding the breakthroughs is the increased access to data ("big data"), user-friendly software frameworks, and an explosion of the available compute power, enabling the use of neural networks that are deeper than ever before. These models nowadays form the state-of-the-art approach to a wide variety of problems in computer vision, language modeling and robotics. Deep learning rose to its prominent position in computer vision when neural networks started outperforming other methods on several high-profile image analysis benchmarks. Most famously on the Image Net Large-Scale Visual Recognition Challenge (ILSVRC) in 2012 when a deep learning model (a convolutional neural network) halved the second-best error rate on the image classification task.
Analysing Wireless Networks with different IEEE 802.11 protocols
Wireless computer networks are changing the way people work or relate to each other, in other words, they are present in our lives and, it seems, increasingly so. This paper analyses wireless computer networks by comparing the performance of the IEEE 802.11 protocols currently on the market. To this end, a theoretical foundation was created, covering concepts from authors in the areas of computer networks and wireless networks. The method used for this study will be exploratory, where the information needed to analyse the data was collected through a bibliographical survey and a case study. It was concluded that protocols have evolved over the years, providing more capacity for wireless networks. It is believed that the results of this study can serve as a basis for domestic or organisational users when choosing to use a particular piece of wireless network equipment.