Human Factors in ISO 27001 Training Awareness Programs
This book explores the factors affecting employee engagement and knowledge retention in ISO 27001 training programs within IT SMEs. By examining information security culture, human factors, teaching strategies, and challenges faced by SMEs, the research aims to understand their impact on training effectiveness. Data from 288 participants in Lagos, Nigeria, collected via a mixed-methods approach, reveal that a strong information security culture positively influences engagement and retention. Positive human factors, such as motivation and clear communication, alongside well-designed teaching strategies, enhance these outcomes. However, SME-specific challenges like time constraints and resource limitations hinder engagement and retention. The findings provide valuable insights for developing effective training programs that boost employee empowerment and organizational success.
An Overview of Deep Learning in Medical Imaging Focusing on MRI images
Machine learning has seen some dramatic developments recently, leading to a lot of interest from industry, academia and popular culture. These are driven by breakthroughs in artificial neural networks, often termed deep learning, a set of techniques and algorithms that enable computers to discover complicated patterns in large data sets. Feeding the breakthroughs is the increased access to data ("big data"), user-friendly software frameworks, and an explosion of the available compute power, enabling the use of neural networks that are deeper than ever before. These models nowadays form the state-of-the-art approach to a wide variety of problems in computer vision, language modeling and robotics. Deep learning rose to its prominent position in computer vision when neural networks started outperforming other methods on several high-profile image analysis benchmarks. Most famously on the Image Net Large-Scale Visual Recognition Challenge (ILSVRC) in 2012 when a deep learning model (a convolutional neural network) halved the second-best error rate on the image classification task.
Design and production of a prize list management application
This book is an academic work that deals with the setting up of a school league table, with the aim of easily listing all the pupils who have studied at school x over the years. The major challenge facing today's organizations is data handling, especially data retrieval. The proposed application would solve this problem. This book therefore comprises two essential parts, one focusing on design and the other on programming. An architecture is proposed, enabling the application to be deployed and used effectively.
Handling unbalanced classes using assembly methods
The present work concerns decision optimization using ensemblistic methods for processing unbalanced databases. To achieve this, we used ensemblistic methods, which are based on the homogeneous combination of predictions or classifiers for better generalization.In our project, we used the Credit Card Fraud Detection database to generate and evaluate the proposed model. We also chose the random forest combination method, which combines several decision trees and applies the majority voting strategy to generate an optimal prediction.The aim of our study is to build a prediction model using assembly methods to improve the performance of an individual classifier in dealing with unbalanced datasets.To achieve our goal, apart from the random forest combination method used, we also used the subsampling and oversampling methods to achieve the same results and finally draw a conclusion on the three methods used and this we implemented with the phyton programming language.
Features of Teaching Computer Modeling in Informatics Lessons
In the modern world of technology and information, the ability to use a computer and its software has become an essential component of an educated individual. Computer modeling, as one of the branches of informatics, holds a special place in the educational process because it allows not only the theoretical assimilation of material but also the practical application of knowledge to solve real-world problems. Consequently, the teaching of computer modeling is gaining increasing popularity and requires a specific approach to the organization and conduct of informatics lessons. The purpose of this monograph is to study the features and effective methods of teaching computer modeling in informatics lessons. Thus, this monograph aims to deepen knowledge in the field of teaching computer modeling and to provide practical recommendations for improving the quality of informatics teaching in schools. The implementation of the proposed methods will prepare students for the modern challenges of the information society and contribute to the development of their professional competencies in the field of IT.
Verified Software. Theories, Tools and Experiments
This book constitutes the refereed proceedings of the 15th International Conference on Verified Software, VSTTE 2023, held in Ames, IA, USA, October 23-24, 2023. The 6 full papers presented in this volume were carefully reviewed and selected from 13 submissions. They focus on requirements modeling, specification languages, software design methods, automatic code generation, refinement methodologies, and more.
GitHub for Next-Generation Coders
Build a powerful portfolio on GitHub that showcases your most impressive coding projects and technical skillsKey Features: - Explore GitHub's powerful features and make it the central hub for all your coding adventures- Learn how to use GitHub Copilot as your coding sidekick, suggesting lines of code to help you write faster and smarter- Learn how to optimize and personalize your GitHub profiles for maximum impact from a community leader- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Navigating the world of collaborative software development can be daunting, especially for young coders just starting their programming journey. This book is designed to take you on a coding adventure, transforming you from a curious beginner into a confident GitHub user.The book builds a solid foundation and explains the Git version control system in depth, helping you understand how to track changes, collaborate effectively, and manage your projects with ease. You'll master repositories, the building blocks of your coding projects, and learn branching strategies to experiment and work seamlessly with others. The chapters will teach you about GitHub Actions, guiding you through workflow syntax, exploring environments and secrets management, and providing hands-on exercises to solidify your understanding. You'll also discover how to craft a compelling GitHub profile that highlights your achievements and discover the exciting world of open-source projects where you can contribute and give back to the community. To get you started with AI, you'll also learn how to leverage Copilot and ChatGPT together to write faster, cleaner code.By the end of this book, you'll be well prepared to contribute to real-world projects on GitHub, equipped with the skills to thrive in the world of collaborative software development.What You Will Learn: - Travel back in code history and track different versions of your projects- Keep your code blocks neat and tidy within your repository, just like sorting puzzle pieces to create a masterpiece- Create branches to experiment with new ideas or features without messing up your main code- Use Git to share your suggestions and collaborate with other coders to make your code even more amazing- Automate and level up your coding game with GitHub Actions- Build your coder reputation by contributing to open source projectsWho this book is for: This book is for young, tech-curious individuals eager to find out more about the world of software development. If you are a student motivated to learn GitHub to better understand collaborative coding practices, manage projects effectively, and potentially pursue careers or hobbies in the technology field, then this book is for you.Table of Contents- Introduction to Version Control and GitHub- Mastering GitHub Essentials- GitHub Features for Collaborating on Projects- Branching in GitHub and Git- Collaborating on Code through Pull Requests- Resolving Merge Conflicts - on GitHub and Locally- Git History and Reverting Commits- Helpful Tools and Git Commands- Leveraging GitHub Actions for Automation- Enhancing GitHub Security Measures- Engaging with the Open Source Community- Crafting Your GitHub Profile- GitHub Copilot Aiding Code Creation
Use of VisuAlg by students in introductory programming courses
Classifying a programming learning support tool as educational software involves analysing technical criteria from the ISO/IEC 9126 standard and pedagogical criteria from the Thomas Reeves model. Analysing the criteria must take into account external factors that interfere with the teaching-learning process, especially for students enrolled in introductory programming courses. In this book, we empirically assess whether these criteria are sufficient to elect VisuAlg as educational software.
Crime Management System (CMS)
The book "Crime Management System (CMS)" presents a comprehensive solution for managing criminal investigations. It emphasizes the importance of the CMS as a critical tool in recording first information reports (FIRs) and initiating the investigative process. The system meticulously records essential details such as the crime's date, time, location, and information about the offenders. This project outlines the development and implementation of a user-friendly interface that addresses the limitations of manual record-keeping by providing a secure, efficient, and automated method for storing and retrieving crime-related data. The proposed system significantly improves the existing manual methods by enhancing data security, reducing the workforce, and ensuring accurate and timely information processing. The CMS aims to streamline operations within crime management departments through detailed modules covering registration, case management, searching, and reporting, facilitating better decision-making and faster response times in criminal investigations.
Distance training of teachers to use multimedia tools and technologies
The methodical manual consists of 5 sections, oriented to training teachers to the reasonable and effective use of multimedia tools and technologies in distance learning of teachers, students and graduate students. In the Law on Education of the Republic of Kazakhstan, 2007 it is noted that "taking into account the accumulated experience in the field of electronic and distance learning, the basic guidelines of the long-term program of education development up to 2020 in terms of informatization of education are defined. This program stipulates that by 2020 Kazakhstan's education system will function as part of a unified world information and education space. At the same time, the technologicalization of the educational process, its personalization with orientation on individual learning trajectory, openness and accessibility of education will be provided". Informatization of education on the basis of world achievements in the field of IT-technologies will be a means of innovative advanced development of Kazakhstani education.
Workflow Scheduling on Computing Systems
This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods.
Discrete Optimization
This Special Issue reprint from Mathematics presents, in addition to the Editorial, 18 research papers in the field of Discrete Optimization. The subjects addressed in this reprint cover a broad spectrum of subjects, e.g., graphs and networks, single- and two-machine scheduling, and goal programming.
Fuzzy Sets in Business Management, Finance, and Economics, 2nd Edition
Since the publication of Lotfi A. Zadeh's seminal paper "Fuzzy Sets" in 1965 within the journal Information and Control, there has been constant growth in the theoretical developments and practical applications of fuzzy set theory and related mathematical tools. These tools have been applied widely, both by industry and academic research, to decision-making and economics due to their versatility. On the one hand, they can efficiently represent and handle uncertain and vague information such as subjective judgements, non-precise observations on variables, or ill-defined relations between variables. On the other hand, they make implementing computations or identifying patterns in data much easier. To do so, fuzzy set theory provides a lot of mathematical techniques in fields such as fuzzy data analysis, fuzzy multiple criteria decision making, fuzzy set qualitative comparative analysis or fuzzy expert systems. Business management, decision-making, or the evaluation of public policies are some examples of practical applications in these fields. This Special Issue has provided a platform for researchers from academia and industry to present their novel works in the domain of applied developments of fuzzy sets and related methodologies for business, financial, and economic analysis. We hope that these results will help to foster future research in the fields of economics and social sciences.
ABCs of Cloud Computing
This Book titled "ABCs of Cloud Computing" is a handbook written for the purpose of introducing the new technology called Cloud Computing in the field of computing. Cloud computing is a kind of Internet-based service which provides configurable resources to users in a pay-as-you-go manner.With the rapid development of cloud computing technologies, a growing number of individuals and organizations are motivated to store and process their data on cloud computing platforms. In addition, many cloud service providers provide enormous computation resources at low prices, which attract users to outsource their heavy computation tasks.In this book, as a reader, you will learn about the need for cloud computing, cloud computing delivery and deployment models, Data Center and Virtualization technology and Cloud Economics.
Cybernetics and the Constructed Environment
Grounded in contemporary landscape architecture theory and practice, this book blends examples from art, design, and engineering with concepts from cybernetics and posthumanism, offering a transdisciplinary examination of the ramifications of cybernetics on the constructed environment.
Plant Leaf Disease Classification using Feature Extraction with SVM
The recognition of plants has become an active area as per the research many plants taxonomic group are at hazard of extermination. To preserve the endanger species new technique are been developed by the researchers. With the great advancement in the technology these days become the key factor for the identification the product and preserve that product with the help of mobile. The area of recognition of plants is trending nowadays because of the fact there are many more plant that need to be identify. More and more advancements are in progress to quickly and efficiently identify the plant. Today's world is all about speed and accuracy of the results. In this book, an efficient method of learning is used for the purpose of classification. In this thesis, we are using two approaches to identify the leaf and both approach consists of three phases such as pre-processing, extraction of classification and execution phase. And of them first approach is shape based and second approach is texture based. The pre-processing phase involves a representation of image processing steps such as grayscale transformation and limits improvement.
Data Mining for Beginers
This book provides a comprehensive introduction to data mining, covering fundamental concepts, essential techniques and practical applications across various domains. From exploring data preprocessing methods to diving into advanced algorithms like decision trees, neural networks and clustering, each chapter offers theoretical insights complemented by real-world examples and exercises. Whether you're a student or a professional, this book equips you with the tools to extract valuable insights from data, empowering you to make informed decisions and drive innovation in your field.
MicroStrategy - A Business Intelligence Tool
MicroStrategy is basically a Business Intelligence Tool wherein we can visualize data and create meaningful insights from raw data according to business requirements. Combination of all visualizations is called a dashboard. Creation of dashboards requires many steps to be implemented. The sequence of steps that are to be implemented are data importing from datasets. Datasets can be excel file, data in SQL server management studio etc, Data testing, Data wrangling or cleaning, Creation of different objects in Microstrategy like schema objects, application objects and configuration objects, Creating derived attributes and metrics created from existing attributes and metrics, Importing of final data or objects into Micro Strategy Workstation or MicroStrategy Developer/Web, Creation of visualizations by adding particular attributes or metrics required for creating visualization, Placing of visualizations into dashboards, Doing formatting for proper neat and clean dashboard visibility.
Conjuring with Computation
The team behind Computer Science for Fun (CS4FN), brings you Conjuring with Computation: A Manual of Magic and Computing for Beginners. Develop your skills as a magician while also learning the basics of computer science by exploring its links to magic. Each chapter explains how to do a simple magic trick, step-by-step, then uses the trick to introduce linked fundamental ideas in computer science in a fun way.By reading the book you will learn to do self-working tricks, be able to hold magic shows, create your own versions of tricks, and with creativity even invent your own. We cover: The book includes profiles of computer scientists, alongside magicians with links to technology, through history.Master conjuring and thinking computationally.
Ethical Machines
"Ethical Machines: Balancing Progress and Responsibility" delves into the transformative potential of artificial intelligence (AI) and the ethical challenges it presents. The book explores the rise of ethical machines and the frameworks necessary for responsible AI development, emphasizing principles such as fairness, transparency, accountability, and privacy. It addresses the real-world implications of AI, including job displacement, algorithmic bias, and privacy concerns, through detailed case studies and practical examples. The book highlights the importance of balancing efficiency with ethical considerations and calls for a collective effort from technologists, policymakers, and society to ensure AI technologies benefit all stakeholders. By fostering a culture of ethical innovation and promoting global standards, the book envisions a future where AI serves as a force for good, driving progress while upholding human values and social justice.
The Hack Is Back
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks on computer systems and networks. This book will benefit the offensive minded hacker (red-teamers) as well as those who focus on defense (blue-teamers).
Quality Management Systems
"Intellectual Property Rights" offers a comprehensive exploration of the fundamental concepts and intricacies of intellectual property (IP) law. This book delves into the various forms of IP, including patents, trademarks, copyrights, and trade secrets, providing a thorough understanding of their legal frameworks and practical applications.Through detailed case studies, the book examines notable IP disputes and their implications on innovation, business, and society. It also addresses contemporary issues such as digital piracy, global IP enforcement, and the balance between protecting creators' rights and promoting public access to knowledge. With insights from legal experts and industry professionals, "Intellectual Property Rights" serves as an essential guide for students, practitioners, and anyone interested in the dynamic field of intellectual property.
The Making of a Doctor
Please see the contents for a brief resume of what the book is about It is left to the imagination of the reader to determine why and how this book is regarded as the Prequel to the earlier volumes of similar title, The Making of a Doctor, including the Sequel written by the same author.
Concept of Operating System
An operating system (OS) serves as a crucial intermediary between computer hardware and users, facilitating efficient resource management and providing a platform for running applications. It orchestrates key functions like process management, memory allocation, file system handling, device control, security enforcement, and user interface provision. These functions ensure that hardware resources are utilized effectively, processes are scheduled fairly, data integrity is maintained, and interactions with peripherals are seamless. The evolution of operating systems has been marked by significant milestones, from early batch processing systems and time-sharing environments to the modern graphical user interfaces and mobile OSs. Each phase has seen advancements in managing complexity, improving user interaction, and enhancing system reliability. Today's OSs support diverse computing environments, from personal computers to cloud infrastructures, emphasizing security, efficiency, and scalability.
The Making of a Doctor
Please see the contents for a brief resume of what the book is about It is left to the imagination of the reader to determine why and how this book is regarded as the Prequel to the earlier volumes of similar title, The Making of a Doctor, including the Sequel written by the same author.
Definition of profiles and roles
This research presents definitions of possible guidelines for human resources in project management, demonstrating the possible profiles and roles within an Information Technology organisation. Organisations that aim to improve their processes by taking project management into account need to align tasks within these processes with a team that has the skills and profile for this activity. The main objective of this research was to present the results of defining roles by competences for employees to take on certain activities in projects, which contributes to people management by identifying the types of profiles that leaders need to have for each type of role. What's more, once you know what each employee's position and competencies are, it's even easier to remunerate these members of organisations. The methodology used is a case study that followed the definition of the roles and competences required for positions within software development projects. The research aimed to cover a little-researched area that is a very important role for people management within any organisation.
The Quantum Leap
The Quantum Leap: AI in the Next Century" explores the revolutionary potential of combining quantum computing and artificial intelligence. It covers the basics of both fields, showing how quantum properties like qubits can boost AI capabilities. The book discusses the current state of quantum computing, its future prospects, and the advancements in quantum machine learning and optimization.It highlights the ethical, societal, and regulatory challenges of quantum AI and underscores the importance of responsible innovation and global collaboration. Future applications in finance, healthcare, logistics, and energy are explored, emphasizing their transformative impact. The book concludes by stressing the need for education, strategic investments, and international cooperation to prepare for this technological leap and ensure its benefits are widely shared.
AI Odyssey
AI Odyssey: Navigating the Future of Intelligence" explores the transformative impact of artificial intelligence (AI) across industries, societies, and human interactions. Beginning with AI's historical evolution and foundational concepts, the book delves into its current applications in healthcare, education, finance, and beyond. It examines key technologies such as machine learning, natural language processing, and robotics, highlighting their roles in revolutionizing how we work, learn, and live.The book addresses ethical considerations and societal implications, discussing issues of bias, privacy, job displacement, and the need for robust governance frameworks. It emphasizes the importance of global collaboration in shaping AI's future, advocating for harmonized regulations, international standards, and ethical guidelines to ensure responsible AI development and deployment worldwide.
Potato Leaf Disease Classification
Potatoes are a well-known vegetable to all of us. Potato cultivation has been very popular in India form the last few decades. But potato production is being hampered due to diseases like early blight and late blight which are increasing the cost of production. The aim here is to build an automated and rapid disease detection process to increase potato production and digitize the system. Our main goal is to diagnose potato disease using leaf pictures that we are going to do through CNN algorithm. This paper offers a picture that is processing, and machine learning based automated systems potato leaf diseases will be detected and classified. Image processing is the best option for detecting and analysing these diseases. In this analysis, picture division is done; more than 2000 pictures of healthy and unhealthy potato's leaf, which are collected from Kaggle, and a few pre-prepared models are utilized for acknowledgment and characterization of healthy and diseased leaves.
Deep Fabric
"Deep Fabric: Weaving AI into the Fabric of Life" explores the transformative impact of Artificial Intelligence (AI) across key sectors of society. From healthcare to education, finance, and entertainment, the book delves into how AI enhances diagnostics, personalizes learning, revolutionizes trading, and creates immersive experiences. It emphasizes ethical and regulatory considerations essential for responsible AI deployment. By examining AI's integration into daily life, the book illuminates both the potential benefits and challenges of this rapidly advancing technology, offering insights into how society can navigate and leverage AI for a more equitable and innovative future.
Beyond Algorithms
Beyond Algorithms: The Human Touch in AI" explores the transformative potential of artificial intelligence (AI) through a human-centered lens. It delves into AI's current capabilities, ethical considerations, and collaborative opportunities across various sectors. The book emphasizes AI's role in augmenting human abilities, fostering creativity, and addressing societal challenges while advocating for transparency, inclusivity, and ethical AI practices. Ultimately, it envisions a future where AI enhances human potential and contributes positively to global well-being.
AI and THE JUSTICE SYSTEM
In recent years, the legal industry has begun to explore the potential of AI to streamline processes, enhance decision-making, and improve access to justice. As legal professionals grapple with increasing volumes of data and the need for more efficient solutions, AI offers tools that can significantly augment traditional practices. These tools range from legal research platforms powered by AI to predictive analytics that forecast case outcomes, and even automated contract analysis.However, the integration of AI into the legal system also raises several important questions. How do we ensure that AI tools adhere to ethical standards and legal regulations? What are the implications of AI-driven decisions in a system that values human judgment and discretion? How can the legal profession balance the benefits of AI with the potential risks and challenges it presents?This story delves into the multifaceted relationship between artificial intelligence and the legal system. We will explore the historical development of AI, its current applications in the legal field, and the potential future directions of this technology. Through detailed case studies, ethical discussions, and analysis of legal frameworks, we aim to provide a comprehensive understanding of how AI is reshaping the legal landscape.
Cyber Shadows
In the bustling metropolis of Mumbai, where the physical and digital realms intertwine, a group of extraordinary individuals stands as the last line of defense against the rising tide of cyber threats. TechSpySecure, a team of dedicated cybersecurity experts, embarks on a thrilling journey to protect their city from unseen adversaries lurking in the shadows of the internet.Led by the fearless Arjun and the brilliant Kavya, TechSpySecure faces formidable challenges that test their skills, their resolve, and their relationships. From battling rogue hackers and unmasking cybercriminals to thwarting state-sponsored attacks, their story is a high-stakes game of cat and mouse in the ever-evolving digital landscape.But their greatest challenge comes when they uncover a shocking truth: Phantom, their most cunning adversary, was merely a pawn in a larger scheme orchestrated by an even more elusive mastermind known as "The Architect." As the true scale of The Architect's plan begins to unfold, Arjun, Kavya, and their team must confront a threat that spans continents and threatens to plunge the world into chaos."Cyber Shadows Heist" is a riveting tale of courage, resilience, and the unbreakable bonds of friendship and love. As TechSpySecure races against time to uncover The Architect's ultimate plan, they must navigate a treacherous web of deceit and manipulation, where every move could mean the difference between victory and disaster.With pulse-pounding action, heart-stopping suspense, and a cast of unforgettable characters, this book is a testament to the power of teamwork, the importance of trust, and the enduring spirit of those who stand as guardians of the digital age. Join TechSpySecure on their journey as they face the unknown with unwavering determination, their story a reflection of the challenges and opportunities that define our interconnected world.Prepare to be captivated by a narrative that weaves together the intrigue of cyber warfare, the complexities of modern relationships, and the relentless pursuit of justice. "Cyber Shadows Heist" is not just a story of battles fought and won-it is a celebration of the human spirit and the indomitable will to protect and defend against the ever-present threats of the digital frontier.Pages: 107Easy to read.
Competitive Coding Interview Questions
DESCRIPTION In today's rapidly evolving technological landscape, staying competitive in the field of software development requires a deep understanding of fundamental programming concepts and the ability to solve complex problems efficiently. This book aims to be your comprehensive guide to acing technical interviews in C, C++, data structures, and database management systems (DBMS).The journey to becoming a proficient software engineer is often paved with rigorous technical interviews that test your knowledge, problem-solving abilities, and coding skills. This book compiles a wide range of interview questions and answers, providing you with the insights and practice needed to excel in any technical interview.Each chapter includes a series of questions that range from basic to advanced levels. The questions are designed to test various aspects of your knowledge and problem-solving skills. Detailed solutions and explanations are provided to help you understand the reasoning behind each answer.KEY FEATURES ● Understand arrays, linked lists, stacks, queues, trees, and graphs for problem-solving.● Learn time and space complexity for solution optimization.● Learn advanced concepts of C, C++, data structures, and DBMS.WHAT YOU WILL LEARN● Advanced topics about C, C++, DBMS, and data structures.● Understand pointers, including pointer arithmetic and multi-level pointers.● Utilize templates and the Standard Template Library for generic and efficient code.● Algorithmic thinking and problem-solving techniques specific to data structures and algorithms.WHO THIS BOOK IS FORThis book is ideal for students and graduates preparing for campus placements or entry-level positions, professionals seeking job transitions, and self-learners aiming to enhance their programming and problem-solving skills.
Advance in Topology and Functional Analysis
The interaction between topology and functional analysis has been a wellspring of powerful mathematical ideas and developments since the early stages of both disciplines. It is obvious that many classical theorems from functional analysis have a strong topological flavour. In the other direction, probably the best-known example is the way abstract harmonic analysis informs many essential features of locally compact groups and Pontryagin duality. This influence is also exerted through many tools and concepts from the theory of topological vector spaces that have been either generalized to topological abelian groups or adopted as templates to study their structure and duality properties beyond the locally compact case. Besides topological groups, this Special Issue also contains papers on fuzzy groups, semigroups, topological vector spaces and real analysis. Their authors are well-known specialists and the different viewpoints provided by them will surely inspire future research on these exciting topics. This Special Issue pays tribute to Mar穩a Jes繳s Chasco's mathematical career on the occasion of her 65th birthday.
Mathematical Methods in the Applied Sciences
This Special Issue of Axioms entitled "Mathematical Methods in Applied Sciences" includes 17 articles and an editorial. These articles explore a wide range of topics in applied mathematics, from pure mathematical methods to applied methods in various scientific fields. This Special Issue emphasizes several fields, such as mathematical methods and analysis, statistical methods, natural language processing, neural networks, numerical methods, and fuzzy systems. The objective of this Special Issue is to provide a platform for scholars to publish their recent work, delve deeper into various problems, and solve them mathematically.
Special Topics in Differential Equations with Applications
In science and engineering, differential equations play an important role in all models and systems. This topic is very special due to the variety of classes for differential equations, and the fact that each class is essential while studying applied sciences and engineering. The main aim of this Special Issue is to create a collection of state-of-the-art research studies on Special Issues in differential equations with applications in science and engineering to provide researchers with the most recent advances in these topics, which are very important in modeling various scientific phenomena. This Special Issue, entitled "Special Topics in Differential Equations with Applications", has published important research articles in the field of differential equations, authored by several well-known mathematicians and scientists from diverse countries worldwide, such as the USA, Ireland, Italy, France, Slovakia, Greece, Austria, Romania, Bulgaria, Malaysia, T羹rkiye, Tunisia, Pakistan, India, China, Jordan, Sudan, Morocco, Egypt, Algeria, China, Russia, and Saudi Arabia.
Intelligent Information and Database Systems
This two-volume set constitutes the refereed proceedings of the 16th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2024, held in Ras Al Khaimah, UAE, during April 15-18, 2024. The 57 full papers presented in these proceedings were carefully reviewed and selected from 251 submissions. The papers of the 2 volume-set are organized in the following topical sections: Part I: advanced data analysis methods; AI-driven cybersecurity and medical solutions; application of generative models; computational intelligence. Part II: data modelling and smart information systems; image and video processing; machine learning algorithms in theory and practice; prediction and recommendation systems; text, speech and natural language processing.
Frontiers in Magnetic Materials
The book aims to provide comprehensive and practical guidance on magnetism and magnetic materials. It involves four parts, focusing on fundamental magnetism, hard magnetic materials, soft magnetic materials and other functional magnetic materials.
Advances in Swarm Intelligence
This two-volume set LNCS 14788 and 14789 constitutes the refereed post-conference proceedings of the 15th International Conference on Advances in Swarm Intelligence, ICSI 2024, held in Xining, China, during August 23-26, 2024. The 74 revised full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers are organized in the following topical sections: Part I - Particle swarm optimization; Swarm intelligence computing; Differential evolution; Evolutionary algorithms; Multi-agent reinforcement learning & Multi-objective optimization. Part II - Route planning problem; Machine learning; Detection and prediction; Classification; Edge computing; Modeling and optimization & Analysis of review.
Advances in Swarm Intelligence
This two-volume set LNCS 14788 and 14789 constitutes the refereed post-conference proceedings of the 15th International Conference on Advances in Swarm Intelligence, ICSI 2024, held in Xining, China, during August 23-26, 2024. The 74 revised full papers presented in these proceedings were carefully reviewed and selected from 156 submissions. The papers are organized in the following topical sections: Part I - Particle swarm optimization; Swarm intelligence computing; Differential evolution; Evolutionary algorithms; Multi-agent reinforcement learning & Multi-objective optimization. Part II - Route planning problem; Machine learning; Detection and prediction; Classification; Edge computing; Modeling and optimization & Analysis of review.
Learning Systems Thinking
Welcome to the systems age, where software professionals are no longer building software; we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need to think differently. Many of our challenges are systemic. This book shows you how systems thinking can guide you through the complexity of modern systems. Rather than relying on traditional reductionistic approaches, author Diana Montalion shows you how to expand your skill set so we can think, communicate, and act as healthy systems. Systems thinking is a practice that improves your effectiveness and enables you to lead impactful change. Through a series of practices and real-world scenarios, you'll learn to shift your perspective in order to design, develop, and deliver better outcomes. You'll learn: How linear thinking limits your ability to solve system challenges Common obstacles to systems thinking and how to move past them New skills and practices that will transform how you think, learn, and lead Methods for thinking well with others and creating sound recommendations How to measure success in the midst of complexity and uncertainty
Basics of Computer Science and Digital Electronics
"Basics of Computer Science and Digital Electronics" is a comprehensive guide designed to provide a solid understanding of information technology. This book covers a wide array of topics starting with the fundamentals of computers, their characteristics, and historical evolution. It delves into the architecture of computers, the Von Neumann machine, and the diverse applications of information technology.Readers will find detailed sections on input and output devices, various storage solutions, and the intricacies of operating systems. The book also explores e-governance, e-commerce, and computer networks, shedding light on modern IT infrastructure and services like the Internet and cloud computing. Emerging technologies such as Geographic Information Systems (GIS) and Artificial Intelligence (AI) are also thoroughly examined.Additionally, practical guides on Microsoft Word and Excel, along with insights into number systems, logic gates, and Boolean algebra, make this book an invaluable resource for students, educators, and IT professionals aiming to enhance their knowledge and skills in the field.For Students: This book serves as a comprehensive guide to mastering the fundamentals and advanced topics in information technology. Whether you are new to the field or looking to deepen your knowledge, the clear explanations, practical examples, and structured content will help you build a strong foundation. Dive into the chapters on computer basics, explore the evolution of technology, and gain hands-on skills with Microsoft Word and Excel. Embrace the opportunity to understand emerging technologies like AI and GIS, preparing you for future advancements in the IT world.For Tutors: This book is an excellent teaching aid that provides a structured approach to covering essential IT topics. The detailed sections and logical progression of concepts make it easy to design lesson plans and provide students with a holistic understanding of information technology. Use this book to guide your students through complex subjects, from basic computer operations to sophisticated technologies, ensuring they gain both theoretical knowledge and practical skills.
Teaching Neural Network Programming
In this book we briefly address the theoretical foundation of neural networks, from the basic principles of how a neuron works and its similarity with the biological part, in which we explain its axons (inputs), the weights of the inputs, the bias, the neuron body, the activation function and the axon output function. Subsequently, the architecture of a multilayer neural network, the learning process of the neural network through the functions of backpropagation and feedforward propagation are described. Finally, the book proceeds to train a neural network from scratch, with the aim of teaching the reader in a simple way how to design a neural network and the processes involved in learning it. Subsequently, a problem is defined for the detection of late blight in potato crops. The theoretical foundation of a convolutional network and definitions related to potato blight are presented. The reader is then presented with a step-by-step guide on how to create a project in Jupyter-lab for the detection of potato leaf blight.
Data Mining
It is a discipline that combines techniques of Artificial Intelligence, Computational Learning, Probability, Statistics, and Databases to extract useful information and knowledge from large amounts of data, it is a constantly evolving technique, which adapts to new needs and new challenges. It can be defined as an analytical process, designed to explore large amounts of data, with the objective of finding relationships between different variables, in order to apply them to new data sets.
Sustainability in Green Cloud Computing
In the contemporary era of rapid technological advancements and ever-growing digital ecosystems, the intersection of cloud computing and sustainability has emerged as a pivotal concern for businesses, governments, and societies worldwide. "Sustainability in Green Cloud Computing- Theory and Techniques" aims to explore this critical nexus, providing a comprehensive guide to understanding and implementing sustainable practices within cloud environments. This book serves as an introduction to the themes, objectives, and structure of the book, setting the stage for an in-depth exploration of green cloud computing and its significance in promoting a sustainable future.