Advanced Penetration Testing with Kali Linux
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments.
Fundamentals of Information Systems Interoperability
This book presents fundamental concepts and technologies to tackle interoperability between information systems. It details interoperability at the data, service, and process level, and combines theoretical foundations with hands-on presentation of technologies to enable the development of sound and practical integration. Chapter 1 details general interoperability challenges and describes the structure of the book. To start with, Chapter 2 presents technologies for the exchange of data between two selected and highly relevant data formats, i.e., relational databases and XML. Next, Chapter 3 explains concepts for schema matching and mapping and data integration as well as the technological basis for implementing them based on query and transformation languages like XPath and XSLT. Chapter 4 then turns to service interoperability and explains two related technologies - REST and GraphQL - in detail. In Chapter 5, fundamentals for designing process orchestrations at the conceptual level are presented, focusing on how to model process orchestrations and how to verify their correctness and soundness, and showing BPMN as the de facto modeling standard. Chapter 6 then details the concepts and languages for the implementation of process orchestrations, including the presentation of execution languages for process orchestrations that are equipped with a formal semantics, e.g., Workflow Nets, the Refined Process Structure Tree, and CPEE Trees. Subsequently, Chapter 7 focuses on the growing number of distributed, loosely coupled, and often non-interoperable applications through the concepts of enterprise application integration and explains these by an implementation in CPN Tools and by two case studies. Eventually, Chapter 8 is lifting the orchestration and integration concepts and technologies to the choreography level by dealing with the interoperability between different process orchestrations. Chapter 9 concludes the book by featuring success factors for interoperability projects. It also provides a range of open research directions for interoperability such as compliance, sensor fusion, and blockchain technologies. The book is mainly intended as a textbook to be used for developing and teaching courses on interoperability and integration. To this end, it is accompanied by a Web site with additional teaching materials. It also spans a bridge from researchers to graduate students and practitioners by providing a deep understanding on practical interoperability challenges and solutions. The focus here is put on de facto standards and open-source systems and tools to enable interoperability solutions at low cost.
Technoscientific Research
Unlike the bulk majority of publications on philosophy of science and research ethics, which are authored by professional philosophers and intended for philosophers, this book has been written by a research practitioner and intended for research practitioners. It is distinctive by its integrative approach to methodological and ethical issues related to research practice, with special emphasis of mathematical modelling and measurement, as well as by attempted application of engineering design methodology to moral decision making. It is also distinctive by more than 200 real-world examples drawn from various domains of science and technology. It is neither a philosophical treaty nor a quick-reference guide. It is intended to encourage young researchers, especially Ph.D. students, to deeper philosophical reflection over research practice. They are not expected to have any philosophical background, but encouraged to consult indicated sources of primary information and academic textbooks containing syntheses of information from primary sources. This book can be a teaching aid for students attending classes aimed at identification of methodological and ethical issues related to technoscientific research, followed by introduction to the methodology of analysing dilemmas arising in this context.
Advances in Fractional Differential Operators and Their Applications
The application of generalized and fractional derivatives, such as Caputo and Riemann-Liouville derivatives, has witnessed a dramatic increase in recent years. This reprint focuses on related theoretical and applied research in areas such as the stability of time series, Lotka-Volterra systems, distributed delays, Fornberg-Whitham equations, abstract evolution and fractional wave equations, cantilever beams, and fractional Riccati and Volterra equations, as well as fractional visco-elasto-plasticity, spectral theory for fractional Sturm-Liouville problems, generalized differential equations, Mittag-Leffler functions, and fractional Laplacians.
Video Based Machine Learning for Traffic Intersections
Video Based Machine Learning for Traffic Intersections describes the development of computer vision and machine learning-based applications for Intelligent Transportation Systems (ITS) and the challenges encountered during their deployment. This book presents several novel approaches.
Quantum Computing Algorithms and Computational Complexity
This Special Issue is mainly concerned with quantum algorithms, their mathematics from behind and the complexity issues arising from them. It comprises seven papers: Two of them are focused on improving the performance by means of quantum algorithms over the best instances of classical ones: "A Fast Quantum Image Component Labeling Algorithm" [1] by Yan Li, Dapeng Hao, Yang Xu and Kinkeung Lai. "Quantum Algorithms for Some Strings Problems Based on Quantum String Comparator" [2] by Kamil Khadiev, Artem Ilikaev and Jevgenijs Vihrovs. Another four papers deal with enhanced quantum algorithms: "Progress towards Analytically Optimal Angles in Quantum Approximate Optimisation" [3] by Daniil Rabinovich, Richik Sengupta, Ernesto Campos, Vishwanathan Akshay and Jacob Biamonte. "Quantum Weighted Fractional Fourier Transform" [4] by Tieyu Zhao, Tianyu Yang and Yingying Chi. "On the Amplitude Amplification of Quantum States Corresponding to the Solutions of the Partition Problem" [5] by Mauro Mezzini, Jose J. Paulet, Fernando Cuartero, Hernan I. Cruz and Fernando L. Pelayo. "On the Complexity of Finding the Maximum Entropy Compatible Quantum State" [6] by Serena Di Giorgio and Paulo Mateus. Last, but not least, one paper researched a classical operational research problem by means of quantum annealing: "GPS: A New TSP Formulation for Its Generalizations Type QUBO" [7] by Saul Gonzalez-Bermejo, Guillermo Alonso-Linaje and Parfait Atchade-Adelomou. As Guest Editors of this Special Issue, we would like to thank the authors and reviewers who made this possible by promoting, spreading research on and supporting quantum computing.
Brain Stroke Prediction using Machine Learning Techniques. A Comparative Study
Scientific Study from the year 2023 in the subject Computer Science - Bioinformatics, grade: 10, VIT University (VIT), course: Computer Science, language: English, abstract: The use of machine learning for stroke prediction represents a powerful tool in enhancing patient care and reducing stroke-related mortality and disability. By focusing on key risk factors and leveraging extensive healthcare data, machine learning can substantially improve the accuracy and effectiveness of stroke prediction. This project aims to harness the potential of machine learning to better identify individuals at high risk of suffering a stroke and provide them with early, targeted interventions, ultimately saving lives and improving patient outcomes. The importance of predicting strokes cannot be overstated. Strokes are a leading cause of mortality and disability worldwide. Early detection and prevention can have a substantial impact on patient outcomes. Leveraging machine learning algorithms for stroke prediction can significantly improve the accuracy and efficacy of identifying high-risk patients. The primary objective of this project is to develop a precise stroke prediction system that can recognize high-risk patients based on a wide range of risk factors, including age, gender, medical history, lifestyle choices, and genetic factors. By creating a reliable model for stroke prediction, healthcare professionals can administer early interventions, potentially reducing stroke incidence and improving patient outcomes. The project's scope includes analyzing electronic health record (EHR) data to identify the key elements essential for stroke prediction. EHRs contain valuable information, including patient demographics, medical history, clinical findings, and other factors relevant to constructing a stroke prediction model. Machine learning for stroke prediction involves several stages. Initially, a dataset of relevant variables potentially influencing stroke occurrence is identified.
Zero-Trust - An Introduction
The book provides you with information on how to implement and manage a zero-trust architecture.
Practical Implementation of a Data Lake
This book explains how to implement a data lake strategy, covering the technical and business challenges architects commonly face. It also illustrates how and why client requirements should drive architectural decisions. Drawing upon a specific case from his own experience, author Nayanjyoti Paul begins with the consideration from which all subsequent decisions should flow: what does your customer need? He also describes the importance of identifying key stakeholders and the key points to focus on when starting a new project. Next, he takes you through the business and technical requirement-gathering process, and how to translate customer expectations into tangible technical goals. From there, you'll gain insight into the security model that will allow you to establish security and legal guardrails, as well as different aspects of security from the end user's perspective. You'll learn which organizational roles need to be onboarded into the data lake, their responsibilities, the services they need access to, and how the hierarchy of escalations should work. Subsequent chapters explore how to divide your data lakes into zones, organize data for security and access, manage data sensitivity, and techniques used for data obfuscation. Audit and logging capabilities in the data lake are also covered before a deep dive into designing data lakes to handle multiple kinds and file formats and access patterns. The book concludes by focusing on production operationalization and solutions to implement a production setup. After completing this book, you will understand how to implement a data lake, the best practices to employ while doing so, and will be armed with practical tips to solve business problems. What You Will Learn Understand the challenges associated with implementing a data lakeExplore the architectural patterns and processes used to design a new data lakeDesign and implement data lake capabilitiesAssociate business requirements with technical deliverables to drive success Who This Book Is For Data Scientists and Architects, Machine Learning Engineers, and Software Engineers.
Computer Science Engineering and Emerging Technologies
School of Computer Science and Engineering, under the aegis of Lovely Professional University, pays homage to the great programmer of all times Kathleen Hylda Valerie Booth, by hosting "BOOTH100"-6th International Conference on Computing Sciences.
Computers Our Lifeline -B
""Computer Our Lifeline - B"" by Manoj, Publications is an insightful and comprehensive book that delves deeper into the world of computers and their impact on our lives. This book is a valuable resource for readers wanting to expand their knowledge and understanding of computer technology. ""Computer Our Lifeline - B"" covers advanced topics related to computers, including computer architecture, operating systems, database management, cybersecurity, artificial intelligence, and more. The book thoroughly explores these subjects, offering in-depth explanations and practical examples. The book highlights the latest advancements and trends in computer technology through its engaging content. It explores the growing influence of computers in various domains, such as healthcare, finance, communication, and entertainment. Readers will gain insights into the transformative power of computers and their role in shaping the future. With its clear explanations, illustrations, and hands-on exercises, ""Computer Our Lifeline - B"" helps readers develop a deeper understanding of complex computer concepts. It caters to the needs of students, professionals, and technology enthusiasts, equipping them with the knowledge and skills required to navigate the rapidly evolving digital landscape. Manoj Publications' commitment to educational excellence is evident in ""Computer Our Lifeline - B."" With its comprehensive coverage and in-depth exploration of advanced computer topics, this book is an invaluable reference for anyone seeking to expand their understanding of computer technology and its profound impact on our world.
Computers Our Lifeline -3
""Computer Our Lifeline Volume - 3"" by Manoj, Publications is an essential resource for readers seeking to delve deeper into the ever-evolving world of computer science. This comprehensive book builds upon the knowledge gained from the previous volumes and explores advanced topics and applications in the field. Covering a wide range of subjects, ""Computer Our Lifeline Volume - 3"" delves into artificial intelligence, machine learning, data analytics, cloud computing, and cybersecurity. Readers gain a deeper understanding of these complex concepts through detailed explanations, practical examples, and case studies. The book focuses on theoretical aspects and provides insights into real-world applications, industry trends, and emerging technologies. It equips readers with the knowledge and skills necessary to tackle the challenges of the digital age and stay ahead in the ever-changing field of computer science. With its accessible language, illustrative diagrams, and hands-on exercises, ""Computer Our Lifeline Volume - 3"" caters to many readers, including students, professionals, and technology enthusiasts. It serves as an invaluable reference for those looking to expand their knowledge and expertise in the dynamic field of computer science. Manoj Publications' commitment to educational excellence shines through ""Computer Our Lifeline Volume - 3,"" making it a must-have resource for anyone looking to deepen their understanding of advanced computer science concepts and stay abreast of the latest developments in the industry.
Artificial Intelligence Promise vs. Peril
Is generative AI really "approaching human levels of intelligence?" Did a computer program really tell somebody they should dump their partner so they can marry electrical pulses plying their way through silicon? Are these programs really collaborating to create their own secret language in a conspiracy to overthrow humanity? Or are these claims intentional misrepresentations of truth purposed to deceive the public into accepting government control of AI in collusion with a cartel of corporations? Or is it just an honest difference of perspective? This book explores the questions of whether artificial intelligence duplicates the functions of our minds, or only certain narrow sub-sentient aspects of our brains. And whether AI will replace humans in the many realms our intelligence enables.
Numerical Enigma
Life for Alex Gage, a 24 year old club football player, becomes a roller coaster ride as he stumbles upon a strange letter written by Albert Einstein in 1945. Laura, daughter of professor of physics Mr. John Gable seems like the only person who can help him but, the professor is dead and Laura is nowhere to be found. In his heart stopping chase for the truth, he comes across mysterious clues-- Letters dating back to 1940's, hidden propositions made by great scientists like Albert Einstein and Max Born, an absurd yet scientific theory and so on. He learns that one man who holds the key to everything, is someone named David. Soon he finds himself unraveling the greatest theory that mankind has ever known but, he is not the only one seeking it. Numerical Enigma merges the line between reality and belief. It does so by recounting facts and events in the history of scientific developments and theoretical physics which in the end leaves you with a question, "Is it really possible?"
Nature-Inspired Optimization Algorithms and Soft Computing
We have witnessed an explosion of research activity around nature-inspired computing and bio-inspired optimization techniques, which can provide powerful tools for solving learning problems and data analysis in very large data sets. To design and implement optimization algorithms, several methods are used that bring superior performance. However, in some applications, the search space increases exponentially with the problem size. To overcome these limitations and to solve efficiently large scale combinatorial and highly nonlinear optimization problems, more flexible and adaptable algorithms are necessary. Nature-inspired computing is oriented towards the application of outstanding information-processing aptitudes of the natural realm to the computational domain. The discipline of nature-inspired optimization algorithms is a major field of computational intelligence, soft computing and optimization. Metaheuristic search algorithms with population-based frameworks are capable of handling optimization in high-dimensional real-world problems for several domains including imaging, IoT, smart manufacturing, and healthcare. The integration of intelligence with smart technology enhances accuracy and efficiency. Smart devices and systems are revolutionizing the world by linking innovative thinking with innovative action and innovative implementation. The aim of this edited book is to review the intertwining disciplines of nature-inspired computing and bio-inspired soft-computing (BISC) and their applications to real world challenges. The contributors cover the interaction between metaheuristics, such as evolutionary algorithms and swarm intelligence, with complex systems. They explain how to better handle different kinds of uncertainties in real-life problems using state-of-art of machine learning algorithms. They also explore future research perspectives to bridge the gap between theory and real-life day-to-day challenges for diverse domains of engineering. The book will offer valuable insights to researchers and scientists from academia and industry in ICTs, IT and computer science, data science, AI and machine learning, swarm intelligence and complex systems. It is also a useful resource for professionals in related fields, and for advanced students with an interest in optimization and IoT applications.
Empowering Educational Leaders:
We live in a rapidly changing world, called VUCA, with its unique challenges and opportunities for growth and innovation. To be able to adjust changes and navigate complexities, leaders need to be prepared for the crises and opportunities that await them. That is why this book provides current information on the new leadership skills and the ways for enhancing VUCA readiness of educational leaders. This book is thought to be a comprehensive guide to help today's educational leaders thrive in VUCA by addressing the topics such as managing change and complexity, authentic leadership, agility, resilience and digital transformation. Thus, the book addresses all practitioners, leaders and teachers who need a practical guide on how to expand their vision, enhance their skills to lead in constantly changing educational environments.
Big Data Analytics Using Artificial Intelligence
In this thought-provoking guide, readers will embark on a journey through the fascinating realm of big data analytics, discovering how vast volumes of data can be collected, processed, and analyzed with remarkable precision. Through the lens of artificial intelligence, the reprint delves into the realm of machine learning, neural networks, natural language processing, and computer vision, demonstrating how these AI techniques can be leveraged to extract valuable insights and patterns from massive datasets. Key features of "Big Data Analytics Using Artificial Intelligence" include Comprehensive Coverage. Real-World Applications, Practical Guidance, Ethical Considerations, and Future Trends. Whether you are a data scientist, business analyst, or simply curious about the transformative power of big data and AI, "Big Data Analytics Using Artificial Intelligence" is your comprehensive guide to unlocking the potential of these technologies. Dive into this illuminating reprint and discover how the synergy of big data and AI can propel your understanding, decision-making, and innovation to new heights.
Cloud technologies
This book compiles lecture materials on cloud technology in an accessible manner. The lectures cover almost all important aspects of cloud technology, such as, high performance computing, network and service models of cloud technology, cloud and file system architectures, virtualization, types and overview of virtualization platforms, overview of Amazon Web Services, Google, and Windows Azure platforms, and cloud security.The book is intended for undergraduate and graduate students studying ICT. It can also be useful for teachers and computer engineering specialists.
Online Capacity Provisioning for Energy-Efficient Datacenters
Analytical and Computational Methods in Differential Equations, Special Functions, Transmutations and Integral Transforms
This reprint MDPI edition comprises papers drawn from the Special Issue entitled "Analytical and Computational Methods in Differential Equations, Special Functions, Transmutations and Integral Transforms".This Special Issue includes research papers which cover a wide range of topics in classical, computational and applied mathematics: differential equations, especially concerning singular solutions and coefficients; transmutation theory with all kinds of its applications; integral transforms and special functions theory; classical and advanced inequalities; and numerical methods for all the abovementioned problems.
Probability Theory and Stochastic Modeling with Applications
This reprint encompasses articles that were accepted and published in the Special Issue titled "Probability Theory and Stochastic Modeling with Applications." This Special Issue delves into the theory and application of stochastic models across various disciplines. We hope that these publications could inspire researchers in relevant communities. It is our aim that these papers not only stimulated future research in probability and stochastic modeling, but also encouraged the exploration of their potential applications.
Intelligent Approaches to Cyber Security
Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. Features: Role of Deep Learning and Machine Learning in the Field of Cyber Security Using ML to defend against cyber-attacks Using DL to defend against cyber-attacks Using blockchain to defend against cyber-attacks This reference text will be useful for students and researchers interested and working in future cyber security issues in the light of emerging technology in the cyber world.
Artificial Intelligence for Intrusion Detection Systems
This book is aligned with the cyber security issues and provides a wide view of the novel cyber-attacks and the defence mechanisms, especially AI-based IDS.
Theoretical Computer Science
This book constitutes the refereed proceedings of the 41st National Conference on Theoretical Computer Science, NCTCS 2023, held in Guangzhou, China, during July 21-23, 2023.The 16 full papers included in this book were carefully reviewed and selected from 70 submissions. They were organized in topical sections as follows: theoretical computer science, algorithm complexity, artificial intelligence, algorithm design, machine learning theory, computational model, formal methods, network security, software and application security.
Secrets from the Stacks
Do you have boxes of old letters, photographs, keepsakes, and family heirlooms that you'd love to save for future generations?Imagine how thrilled your descendants will be a hundred years from now to discover what their ancestors' lives were like and the challenges they overcame during the Depression, the Civil Rights Movement, the Gulf War, September 11, the worldwide pandemic, and other historical events. Today's technology gives you the opportunity to preserve priceless memorabilia and add your story to the mix. Archival best practices are vital to prevent decay and destruction of your family's treasures. In "Secrets from the Stacks," expert archivist Rhonda Chadwick guides you step-by-step on how to organize collections both small and large, properly store and archive photographs, preserve textiles and heirlooms crafted of metal and other materials, and digitize photos, emails, films, audio, and video. With warmth and humor, she reveals the methods archivists use to organize a family legacy, from preserving 19th-century daguerreotypes to 2!81-century photos on your cellphone. You'll learn how to store and ensure access to and retrieval of your social media accounts and digital assets, create memory books, audio and video oral histories with family members, and more. Finally, Chadwick teaches you how to prevent damage or loss of family heirlooms from natural disasters, fire, and theft. Your cherished family stories and memories are important and don't have to die when you do. Recording and preserving your family history is not just a gift for your relatives today; it gives future generations the opportunity to connect with the past and gain a deeper understanding of their own sense of self.
Iot, Machine Learning and Data Analytics for Smart Healthcare
Machine Learning, Internet of Things (IoT) and data analytics are new and fresh technologies that are being increasingly adopted in the field of medicine.
Next-Gen Computer Architecture
In the last decade, we have seen pathbreaking advances in processor design and specialized hardware for graphics applications and neural networks. This second-level textbook on computer architecture captures the latest developments in the field. It starts from basic undergraduate-level computer architecture concepts and takes the reader through an exciting journey of 14 chapters. The book is divided into three parts: out-of-order processor design and GPUs, multiprocessors and memory systems, and advanced topics. It specifically covers many state-of-the-art topics such as the design of high-performance GPUs and their graphics pipelines, architectures of the latest Intel, AMD and Qualcomm processors, methods to design secure chips, architectural simulation, nonvolatile memory technologies and contains a thorough treatment of hardware for all kinds of ML algorithms. It explains rigorous theoretical concepts in a very conversational style.About the Author: Prof. Smruti Ranjan Sarangi is the Usha Hasteer Chair Professor in the Computer Science and Engineering Department at IIT Delhi (joint appointment with the Department of Electrical Engineering). He has published roughly 120 papers in the areas of computer architecture and systems software in prestigious conferences and journals, has been granted 5 US patents, and has filed 7 Indian patents. He takes an avid interest in computer science teaching and has been very active in designing school-level CS curricula for one of the largest school boards in the world, and policies and curricula for undergraduate and postgraduate programs throughout India. He has authored a textbook on undergraduate level computer architecture, "Basic Computer Architecture". For many of his contributions, he received the ACM Outstanding Contributions to Computing Education Award (OCCE) in 2022.
Advanced Mathematical Methods in Intelligent Multimedia
The area of intelligent multimedia involves the real-time computer processing and understanding of perceptual input from speech, textual and visual sources. The present reprint contains the 13 articles accepted and published in the Special Issue "Advanced Mathematical Methods in Intelligent Multimedia: Security and Applications" of the MDPI journal "Mathematics", which cover a wide range of topics connected to the theory, security, and applications of these methods. These topics include, among others, elements from privacy computation, game theory-based models, cloud computing, big data, location privacy, artificial intelligence, reputation system, differential privacy, reversible data hiding, blockchain, etc.It is hoped that the reprint will be interesting and useful for those working in the area of intelligent multimedia, security systems and privacy methods, as well as for those with the proper mathematical background who are willing to become familiar with recent advances of secure mathematics, which has nowadays entered into almost all sectors of human life and activity.
Data Structure Using C
This book explains different concepts of data structures using C. The topics discuss the theoretical basis of data structures as well as their applied aspects.
Programming with Python
This book is an introduction to Python Programming and provides a practical approach to the subject. The basic concepts of Python are explained in detail.
Certified Kubernetes Application Developer (CKAD) Exam Success Guide
Learn all skills needed to be a Certified Kubernetes professionalDESCRIPTION Want to become a Certified Kubernetes Application Developer (CKAD)? If you're looking to take your Kubernetes skills to the next level, then you need this book.This comprehensive and easy-to-read guide is perfect for aspiring Kubernetes developers and seasoned professionals alike. It covers everything you need to know to confidently prepare for and pass the CKAD certification exam. It starts with the basics of Kubernetes, Docker, and Minikube, and then progresses to more advanced topics such as deployment strategies, pod design, networking, security, monitoring, volume, probes and more. It even includes two full scale mock exams to help you practice for the real CKAD exam. By the end of the book, you will have the knowledge and skills you need to excel in deploying and managing containerized applications in Kubernetes environments and should feel confident to appear for the CKAD exam.WHAT YOU WILL LEARN● Prepare you for Certified Kubernetes Application Developer CKAD exam.● Dive deep into Kubernetes and its core and advanced concepts.● Explore the various kubectl commands that are essential for passing the CKAD exam.● Learn Tips and tricks and best practices to pass the CKAD exam.● Learn how to deploy, manage, monitor and troubleshoot Kubernetes applications.● Lots of real CKAD exam-like questions including mock exam for you to practice and to assess your knowledge and identify areas where you need to improve.WHO THIS BOOK IS FORThis book is intended for anyone who is interested in taking the Certified Kubernetes application developer (CKAD) exam. The book covers core and advance Kubernetes concepts and thus is a valuable resource for developers, system administrators, and DevOps engineers who want to learn how to develop, deploy, and manage applications on Kubernetes.
Formal Methods and Software Engineering
This book constitutes the proceedings of the 24th International Conference on Formal Methods and Software Engineering, ICFEM 2023, held in Brisbane, QLD, Australia, during November 21-24, 2023.The 13 full papers presented together with 8 doctoral symposium papers in this volume were carefully reviewed and selected from 34 submissions, the volume also contains one invited paper. The conference focuses on applying formal methods to practical applications and presents papers for research in all areas related to formal engineering methods.
A Case Study for Computer Ethics in Context
Aimed at addressing the difficulties associated with teaching often abstract elements of technical ethics, this book is an extended fictional case study into the complexities of technology and social structures in complex organizations.
Information and Communications Security
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
Cyber Enigma
The book analyzes the issues related to cyber technology. It presents the existing reality of cyber environment in India and delves into detailed analysis of issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of US and China.Taylor & Francis does not sell or distribute the Hardback in South
The Mirror of Artificial Intelligence
Did you know that artificial intelligence (AI) can already write books?Well, not entirely on its own. For the result to be compelling, it needs a human by its side to guide its output, lending it soul and depth. When we combine the expansive awareness of AI tools with the expertise and experience of a data scientist, the result can't be anything but unparalleled.In this work, AI serves as an excellent facilitator in fulfilling the author's intent to elucidate the reasons for the imperfect functioning of the human mind. At times, our rational thinking takes a backseat, succumbing to cognitive biases that distort our perception of reality.Although this phenomenon affects all of us, we often overlook its implications. That's a missed opportunity. If we knew the traps set for our thinking, we could recognize and avoid them more easily.It is AI that, through compelling stories and fascinating thought connections, gives us the extraordinary opportunity to see ourselves in a new light and understand the mysterious recesses of our minds.So whether you are a person who, as a matter of principle, can't meet any deadlines, you have a colleague who always knows better than everyone else; if you recognize yourself as the idealist who believes that after every bad experience, there must inevitably be something that will make up for it; or if you are simply a reader who not only enjoys relaxing with a book, but also learning something new - you will not regret the time you spend with this Mirror.
Embedded Computer Systems: Architectures, Modeling, and Simulation
This book constitutes the proceedings of the 22st International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2021, which took place in July 2022 in Samos, Greece. The 11 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 45 submissions. The conference covers a wide range of embedded systems design aspects, including machine learning accelerators, and power management and programmable dataflow systems.
Advances in Fractional Order Derivatives and Their Applications
This reprint is a series of articles devoted to advanced applications in fractional calculus, from both analytical and numerical perspectives. The topics covered include symmetry analysis, image enhancements, heat transfer mechanisms, and machine learning.
Fuzzy Sets, Fuzzy Logic and Their Applications 2021
The present reprint contains the 13 articles that were accepted and published in the Special Issue "Fuzzy Sets, Fuzzy Logic and Their Applications, 2021" of the MDPI "Mathematics" journal, which cover a wide range of topics connected to the theory and applications of fuzzy sets and systems, of fuzzy logic and of their extensions/generalizations. The reprint is the third volume of a successful series which started with the Special Issue "Fuzzy Sets, Fuzzy Logic and Their Applications" (2019, 20 papers) and was followed by "Fuzzy Sets, Fuzzy Logic and Their Applications, 2020" (24 papers).
Why Cisos Fail
In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. The book's goal is to entertain as much as to inform.
Graph Spectra for Complex Networks
This concise and self-contained introduction builds up the spectral theory of graphs from scratch, with linear algebra and the theory of polynomials developed in the later parts. The book focuses on properties and bounds for the eigenvalues of the adjacency, Laplacian and effective resistance matrices of a graph. The goal of the book is to collect spectral properties that may help to understand the behavior or main characteristics of real-world networks. The chapter on spectra of complex networks illustrates how the theory may be applied to deduce insights into real-world networks. The second edition contains new chapters on topics in linear algebra and on the effective resistance matrix, and treats the pseudoinverse of the Laplacian. The latter two matrices and the Laplacian describe linear processes, such as the flow of current, on a graph. The concepts of spectral sparsification and graph neural networks are included.
Introduction to Artificial Intelligence
Harry Katzan, Jr. is a professor who has written several books and peer-reviewed technical papers on computer science and service science. He is a computer consultant and has been a consultant to the executive board of a major bank. He and his wife have lived in Switzerland where he was a consultant and a visiting professor. He holds bachelors, masters, and doctorate degrees.
Introduction to Artificial Intelligence
Harry Katzan, Jr. is a professor who has written several books and peer-reviewed technical papers on computer science and service science. He is a computer consultant and has been a consultant to the executive board of a major bank. He and his wife have lived in Switzerland where he was a consultant and a visiting professor. He holds bachelors, masters, and doctorate degrees.
Building Statistical Models in Python
Make data-driven, informed decisions and enhance your statistical expertise in Python by turning raw data into meaningful insightsPurchase of the print or Kindle book includes a free PDF eBookKey Features: Gain expertise in identifying and modeling patterns that generate successExplore the concepts with Python using important libraries such as stats modelsLearn how to build models on real-world data sets and find solutions to practical challengesBook Description: The ability to proficiently perform statistical modeling is a fundamental skill for data scientists and essential for businesses reliant on data insights. Building Statistical Models with Python is a comprehensive guide that will empower you to leverage mathematical and statistical principles in data assessment, understanding, and inference generation.This book not only equips you with skills to navigate the complexities of statistical modeling, but also provides practical guidance for immediate implementation through illustrative examples. Through emphasis on application and code examples, you'll understand the concepts while gaining hands-on experience. With the help of Python and its essential libraries, you'll explore key statistical models, including hypothesis testing, regression, time series analysis, classification, and more.By the end of this book, you'll gain fluency in statistical modeling while harnessing the full potential of Python's rich ecosystem for data analysis.What You Will Learn: Explore the use of statistics to make decisions under uncertaintyAnswer questions about data using hypothesis testsUnderstand the difference between regression and classification modelsBuild models with stats models in PythonAnalyze time series data and provide forecastsDiscover Survival Analysis and the problems it can solveWho this book is for: If you are looking to get started with building statistical models for your data sets, this book is for you! Building Statistical Models in Python bridges the gap between statistical theory and practical application of Python. Since you'll take a comprehensive journey through theory and application, no previous knowledge of statistics is required, but some experience with Python will be useful.
Transactions on Petri Nets and Other Models of Concurrency XVII
Transactions on Petri Nets and Other Models of Concurrency (ToPNoC) XVII. These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a rigorous two-stage refereeing process. ToPNoC contains: - Revised versions of a selection of the best papers from workshops and tutorials at the annual Petri net conferences - Special sections/issues within particular subareas (similar to those published in the Advances in Petri Nets series) - Other papers invited for publication in ToPNoC - Papers submitted directly to ToPNoC by their authors The 17th volume of ToPNoC contains revised and extended versions of a selection of the best workshop and tutorial papers presented at the 43rd International Conference on Application and Theory of Petri Nets and Concurrency, Petri Nets 2022. The papers cover a diverse range of topics including model checking and system verification, refinement and synthesis, foundational work on specific classes of Petri nets, and innovative applications of Petri nets and other models of concurrency. Application areas covered in this volume are: process mining, verification, formal semantics, distributed simulations, business processes, distributed systems, and net synthesis. Thus, this volume gives a good overview of ongoing research on concurrent systems and Petri nets.
Numerical Machine Learning
Numerical Machine Learning is a simple textbook on machine learning that bridges the gap between mathematics theory and practice. The book uses numerical examples with small datasets and simple Python codes to provide a complete walkthrough of the underlying mathematical steps of seven commonly used machine learning algorithms and techniques, including linear regression, regularization, logistic regression, decision trees, gradient boosting, Support Vector Machine, and K-means Clustering. Through a step-by-step exploration of concrete numerical examples, the students (primarily undergraduate and graduate students studying machine learning) can develop a well-rounded understanding of these algorithms, gain an in-depth knowledge of how the mathematics relates to the implementation and performance of the algorithms, and be better equipped to apply them to practical problems. Key features -Provides a concise introduction to numerical concepts in machine learning in simple terms -Explains the 7 basic mathematical techniques used in machine learning problems, with over 60 illustrations and tables -Focuses on numerical examples while using small datasets for easy learning -Includes simple Python codes -Includes bibliographic references for advanced reading The text is essential for college and university-level students who are required to understand the fundamentals of machine learning in their courses.
Blockchain for Big Data
In this work, the author investigates the researches and applications of blockchain technology in the field of Big Data and assesses the advantages and challenges that blockchain technology may bring to big data. The author also analyses possible future directions of the convergence of blockchain and big data.
Solutions Architecture
Explore the complex world of digital solutions architecture and its pivotal role in the modern, technology-driven organization. The book provides a detailed roadmap, charting the intricate processes that solutions architects undertake to transform high-level business propositions into practical, actionable digital solutions. Offering a number of real-world examples, you'll work through examples of various digital projects encompassing cutting-edge technologies such as AI/ML, IoT, Cloud, and the integration with legacy systems. The book also explains how various elements coalesce to form a resilient solutions architecture, shedding light on the need for collaborative synergy between different organizational stakeholders, teams and disciplines. Solutions Architecture underscores the significance of aligning business and technology, demonstrating how this strategic collaboration maximizes the success of digital projects, setting you on the pathto a more robust and successful digital future for your organization.What You Will LearnUnderstand the solutions architecture process, including key concepts and best practicesIdentify business needs and requirements and translate them into actionable steps that result in effective digital solutionsSelect appropriate technologies, build prototypes, and conduct testing and validationDesign, implement, and maintain solutions Who This Book Is ForDigital Transformation Program Management, Program Managers, Solutions Architects, IT/Digital Project Managers