Natural Language Processing in Action, Second Edition
Develop your NLP skills from scratch! This revised bestseller now includes coverage of the latest Python packages, Transformers, the HuggingFace packages, and chatbot frameworks. In Natural Language Processing in Action, Second Edition you will learn how to: Process, analyze, understand, and generate natural language text Build production-quality NLP pipelines with spaCy Build neural networks for NLP using Pytorch BERT and GPT transformers for English composition, writing code, and even organizing your thoughts Create chatbots and other conversational AI agents Natural Language Processing in Action has helped thousands of data scientists build machines that understand human language. In this new and revised edition, you'll discover state-of-the art NLP models like BERT and HuggingFace transformers, popular open-source frameworks for chatbots, and more. As you go, you'll create projects that can detect fake news, filter spam, and even answer your questions, all built with Python and its ecosystem of data tools. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Deep learning has been a giant leap forward for NLP applications. Developers can now build chatbots and other natural language tools that can imitate real people, diagnose illness, automatically summarize documents, and more. Accessible open source tools such as spaCy and PyTorch make production-level NLP easier and more impactful than ever before. About the book Natural Language Processing in Action, Second Edition is your guide to building software that can read and interpret human language. This new edition is updated to include the latest Python packages and comes with full coverage of cutting-edge models like BERT, GPT-J and HuggingFace transformers. In it, you'll learn to create fun and useful NLP applications such as semantic search engines that are even better than Google, chatbots that can help you write a book, and a multilingual translation program. Soon, you'll be ready to start tackling real-world problems with NLP. About the reader This book requires a basic understanding of deep learning and intermediate Python skills. About the author Hobson Lane is a data scientist and machine learning engineer. He has over twenty years experience building autonomous systems and NLP pipelines for both large corporations and startups. Currently, Hobson is an instructor at UCSD Extension and Springboard, and the CTO and cofounder of Tangible AI and ProAI.org. Maria Dyshel is a social entrepreneur and artificial intelligence expert. She held a variety of AI research, engineering, and management roles in diverse industries, from designing and improving algorithms for autonomous vehicles, to implementing company-wide Conversational AI program in one of the world's largest pharma companies. Maria is currently the CEO and cofounder of Tangible AI. Cole Howard and Hannes Max Hapke were authors of the first edition of Natural Language Processing in Action and their legacy lives on in the collective intelligence of the community around the book.
TypeScript 5 Design Patterns and Best Practices - Second Edition
Applied Natural Language Processing with PyTorch 2.0
Unlock the Power of PyTorch 2.0 for Next-Level Natural Language Processing. Discover how to bring applied natural language processing with PyTorch 2.0 to life and gain proficiency in advanced NLP techniques for scalable AI models. This comprehensive, easy-to-follow guide is packed with real-world text classification and sentiment analysis projects, step-by-step instructions for machine translation and text generation, and best practices for training and evaluating NLP models with PyTorch. Book Description Natural Language Processing (NLP) is revolutionizing industries, from chatbots to data insights. PyTorch 2.0 offers the tools to build powerful NLP models. Applied Natural Language Processing with PyTorch 2.0 provides a practical guide to mastering NLP with this advanced framework. This book starts with a strong foundation in NLP concepts and the essentials of PyTorch 2.0, ensuring that you are well-equipped to tackle advanced topics. It covers key techniques such as transformer models, pre-trained language models, sequence-to-sequence models, and more. Each chapter includes hands-on examples and code implementations for real-world application. With a focus on practical use cases, the book explores NLP tasks like sentiment analysis, text classification, named entity recognition, machine translation, and text generation. You'll learn how to preprocess text, design neural architectures, train models, and evaluate results. Whether you're a beginner or an experienced professional, this book will empower you to develop advanced NLP models and solutions. Get started today and unlock the potential of NLP with PyTorch 2.0! What You'll Learn Inside: Implement sequence-to-sequence models in PyTorch 2.0 for neural network text solutionsStep-by-step lessons on sentiment analysis in Python and text classification with PyTorch to solve real business challengesComprehensive applied NLP guide covering preprocessing text data for neural architecturesActionable examples of named entity recognition, information extraction, and NLP case studiesMaster transformer models and pre-trained language models in NLP for state-of-the-art resultsInsights on building and tuning deep learning NLP pipelines for practical deploymentsSee future trends and innovations in Python NLP books for continued skill developmentWho Should Read This Book?Data scientists, engineers, and developers searching for an up-to-date PyTorch NLP book and applied NLP guidePython enthusiasts eager to apply sentiment analysis, machine translation NLP, and sequence models in real projectsProfessionals and students seeking to master neural network text understanding and deep learning solutions.Why This Guide?All information is authentic and policy-compliant-no unauthorized brands or characters are usedOptimized for Amazon search and human readability, using established keywords for higher ranking and conversionWritten in a clear, natural style suited for both advanced and beginning practitionersStart mastering applied NLP techniques with PyTorch 2.0-build scalable, production-ready AI models today! Table of Contents1. Introduction to Natural Language Processing2. Getting Started with PyTorch3. Text Preprocessing4. Building NLP Models with PyTorch5. Advanced NLP Techniques with PyTorch6. Model Training and Evaluation7. Improving NLP Models with PyTorch8. Deployment and Productionization9. Case Studies and Practical Examples10. Future Trends in Natural Language Processing and PyTorch Index
A Certificate Verification System for Institutions
Global Internet of Things and Edge Computing Summit
This Open Access book constitutes the proceedings from the First Global Internet of Things and Edge Computing Summit, GIECS 2024, held in September 24-25, 2024, in Brussels, Belgium. The 12 full papers presented here were carefully reviewed and selected from 21 submissions. These papers have been organized under the following topical sections: Industrial Internet of Things (IIoT) and Digital Twins; Data Management, Privacy, and Trust in Distributed Systems; Edge Computing and Cross-Domain Systems.
Security and Trust Management
This book constitutes the refereed proceedings of the 20th International Workshop on Security and Trust Management (ERCIM STM 2024), held in Bydgoszcz, Poland, during September 19-20, 2024 and co-located with ESORICS 2024 conference. The 6 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: Trust, Anonymity and Identity; Cryptography, Secure Computation and Formal Methods; Operating Systems and Application Security.
The Hundred-Page Language Models Book
Master language models through mathematics, illustrations, and code―and build your own from scratch!The Hundred-Page Language Models Book by Andriy Burkov, the follow-up to his bestselling The Hundred-Page Machine Learning Book (now in 12 languages), offers a concise yet thorough journey from language modeling fundamentals to the cutting edge of modern Large Language Models (LLMs). Within Andriy's famous "hundred-page" format, readers will master both theoretical concepts and practical implementations, making it an invaluable resource for developers, data scientists, and machine learning engineers.The Hundred-Page Language Models Book allows you to: - Master the mathematical foundations of modern machine learning and neural networks- Build and train three architectures of language models in Python- Understand and code a Transformer language model from scratch in PyTorch- Work with LLMs, including instruction finetuning and prompt engineeringWritten in a hands-on style with working Python code examples, this book progressively builds your understanding from basic machine learning concepts to advanced language model architectures. All code examples run on Google Colab, making it accessible to anyone with a modern laptop.EndorsementsVint Cerf, Internet pioneer and Turing Award recipient: "This book cleared up a lot of conceptual confusion for me about how Machine Learning actually works - it is a gem of clarity."Tom獺s Mikolov, the author of word2vec and FastText: "The book is a good start for anyone new to language modeling who aspires to improve on state of the art."
Navigating the Cyber Maze
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity. Authored by Matthias Muhlert, a seasoned cybersecurity expert with over 20 years of experience, this book aims to provide readers with a comprehensive understanding of cybersecurity, extending far beyond traditional IT concerns. From safeguarding smart homes to securing agricultural supply chains, Muhlert's expertise shines through in this essential guide.What sets this book apart is its unique approach to making cybersecurity accessible and enjoyable. Muhlert not only breaks down intricate concepts with clarity but also infuses humor throughout, making the learning experience both informative and entertaining. Whether you are a seasoned professional or new to the field, this book ensures you will gain valuable knowledge while having a good laugh.Key Features: Comprehensive Coverage: Explore a wide array of topics, including Return on Security Investment (RoSI), cybersecurity in energy management, and the security of smart devices. Practical Strategies: Discover actionable steps to enhance your security posture, from basic hygiene practices to complex strategic implementations. Psychological Insights: Understand the human element in cybersecurity, with chapters on the security mindset, overcoming cognitive biases, and building a cyber-resilient culture. Advanced Technologies: Delve into cutting-edge topics like quantum computing, 5G security, and the latest in deception technologies. Real-World Case Studies: Learn from detailed case studies that illustrate the application of cybersecurity principles in various industries. Engaging Humor: Enjoy 'Cyber Chuckles' scattered throughout the book, ensuring that even the most complex topics are accessible and enjoyable. Designed for a diverse audience ranging from cybersecurity professionals and IT managers to business leaders and students, Navigating the Cyber Maze is your ultimate guide to the digital frontier. Whether you are looking to enhance your technical skills, understand the broader impact of cybersecurity, or simply enjoy a good read, this book is your essential companion in the ever-evolving cyber landscape. Dive in and equip yourself with the knowledge and strategies to navigate the cyber maze with confidence and a smile.
Understanding the Technology Behind Online Offending
Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it. The book begins by equipping the reader with a foundational understanding of how the internet works before exploring the various ways that people can exploit the Internet to commit crimes. The reader is then introduced to some of the sophisticated ways that individuals may evade detection before we explore the organisations fighting to prevent and capture those offending online. The book includes a contributory chapter from solicitors at Stone King LLP to help the reader understand how the law is evolving to prosecute offenders. There is a further contributory chapter from psychologist Dr Ruth J Tully who discusses psychological risk assessment with those who offend online. The book concludes with important chapters looking at how professionals can keep themselves safe online, and future directions of the internet. The book's intended audience includes all professionals who work with those who commit online offences, such as psychologists, solicitors, social workers, probation officers and police officers. The book is also suitable for those in training or graduate education.
Advances in Cryptology - Asiacrypt 2024
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
AI for Beginners
Are you ready for the truth about our rapidly changing workplace?AI for Beginners is your clear, practical roadmap designed for women who want to not only survive, but flourish in the AI-powered world.
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education
Healthcare organizations and institutions of higher education have become prime targets of increased cyberattacks. This book explores current cybersecurity trends and effective software applications, AI, and decision-making processes to combat cyberattacks. It emphasizes the importance of compliance, provides downloadable digital forensics software, and examines the psychology of organizational practice for effective cybersecurity leadership.Since the year 2000, research consistently reports devasting results of ransomware and malware attacks impacting healthcare and higher education. These attacks are crippling the ability for these organizations to effectively protect their information systems, information technology, and cloud-based environments. Despite the global dissemination of knowledge, healthcare and higher education organizations continue wrestling to define strategies and methods to secure their information assets, understand methods of assessing qualified practitioners to fill the alarming number of opened positions to help improve how cybersecurity leadership is deployed, as well as improve workplace usage of technology tools without exposing these organizations to more severe and catastrophic cyber incidents.This practical book supports the reader with downloadable digital forensics software, teaches how to utilize this software, as well as correctly securing this software as a key method to improve usage and deployment of these software applications for effective cybersecurity leadership. Furthermore, readers will understand the psychology of industrial organizational practice as it correlates with cybersecurity leadership. This is required to improve management of workplace conflict, which often impedes personnel's ability to comply with cybersecurity law and policy, domestically and internationally.
Bold & Easy Life in a Jar Coloring Book
Experience the joy of coloring with the Bold & Easy Life in a Jar Coloring Book, a delightful collection of large-print, simple designs that bring everyday charm to life. Perfect for adults who prefer easy-to-color illustrations, this unique book celebrates the beauty of jars filled with inspiration, memories, and creativity. Whether you're a beginner or an experienced colorist, this book offers a relaxing and satisfying way to unwind.Features: Large-Print Designs: Bold, easy-to-color illustrations with clear lines, perfect for those who enjoy simplicity and accessibility.Jar-Themed Art: Explore a variety of charming jar-inspired designs, including jars filled with flowers, fireflies, candies, and other whimsical surprises.Relaxing and Therapeutic: A stress-free activity to help you relax, unwind, and focus on the joy of creating.High-Quality Paper: Durable pages that resist bleed-through, making it ideal for colored pencils, markers, or crayons.Suitable for All Levels: Designed for adults seeking simple, fun, and rewarding coloring experiences.Rediscover the art of relaxation with the Bold & Easy Life in a Jar Coloring Book-a celebration of life's little treasures captured in jars. Perfect for yourself or as a thoughtful gift for friends and loved ones! ����️
Learning Php, MySQL & JavaScript
Build interactive, data-driven websites with the potent combination of open source technologies and web standards, even if you have only basic HTML knowledge. With the latest edition of this popular hands-on guide, you'll tackle dynamic web programming using the most recent versions of today's core technologies: PHP, MySQL, JavaScript, CSS, HTML5, jQuery, Node.js, and the powerful React library. Web designers will learn how to use these technologies together while picking up valuable web programming practices along the way, including how to optimize websites for mobile devices. You'll put everything together to build a fully functional social networking site suitable for both desktop and mobile browsers. Explore MySQL from database structure to complex queries Use the MySQL PDO extension, PHP's improved MySQL interface Create dynamic PHP web pages that tailor themselves to the user Manage cookies and sessions and maintain a high level of security Enhance JavaScript with the React library Use Ajax calls for background browser-server communication Style your web pages by acquiring CSS skills Implement HTML5 features including geolocation, audio, video, and the canvas element Reformat your websites into mobile web apps
Ghidra Software Reverse-Engineering for Beginners - Second Edition
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey Features: - Make the most of Ghidra on different platforms such as Linux, Windows, and macOS- Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting- Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Written by David ?lvarez P矇rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges.By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.What You Will Learn: - Develop and integrate your own Ghidra extensions- Discover how to use Ghidra in headless mode- Extend Ghidra for advanced reverse-engineering- Perform binary differencing for use cases such as patch and vulnerability analysis- Perform debugging locally and in a remote environment- Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware- Automate vulnerability detection in executable binaries using Ghidra scriptingWho this book is for: This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.Table of Contents- Getting Started with Ghidra- Automating RE Tasks with Ghidra Scripts- Ghidra Debug Mode- Using Ghidra Extensions- Reversing Malware Using Ghidra- Scripting Malware Analysis- Using Ghidra's Headless Analyzer- Binary Diffing- Auditing Program Binaries- Scripting Binary Audits- Developing Ghidra Plugins- Incorporating New Binary Formats- Analyzing Processor Modules- Contributing to the Ghidra Community- Extending Ghidra for Advanced Reverse-Engineering- Debugging- Unpacking in-the-Wild Malware- Reverse-Engineering Ransomware
Cybersecurity and Data Science Innovations for Sustainable Development of Heicc
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities. It delves into cybersecurity advancements and examines how innovations in cybersecurity are shaping the landscape of healthcare, education, industry, and urban environments. Data science advancements take center stage, showcasing the transformative power of data analytics in improving outcomes across HEICC sectors. Whether it's optimizing resource allocation in healthcare, protecting patient privacy, personalizing learning experiences in education, enhancing efficiency in industry, or fostering sustainable development in cities and communities, data science offers unprecedented opportunities for innovation and progress.Key points: Healthcare system security and privacy, protecting patient data, and enabling development of novel healthcare solutions Securing educational data, improving online learning security, and harnessing data analytics for tailored education approaches Manufacturing, finance, and transportation. Diving into critical infrastructure security, detecting and mitigating cyber threats, and using data-driven insights for better industrial operations Helping cities and communities develop sustainably, smart city security challenges, data privacy in urban environments, data analytics for urban planning, and community cybersecurity awareness This book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybersecurity and data science in the pursuit of sustainable development across HEICC domains.
Don't Be the Weakest Link
Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape.Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link!
Waves of Trust
The title of this book accurately reflects the figure of Rino Falcone, a scientist whose contributions have provided important insights into several central themes of research, with particular reference to the fields of agent theory, multi-agent systems, and artificial intelligence. Alongside Cristiano Castelfranchi, Rino Falcone has made a fundamental contribution to understanding and systematizing the concept of trust in human interactions, in the relationship between humans and technology, and in interactions between humans and artificial intelligent agents. Throughout his work, Falcone has consistently prioritized a broad interdisciplinary theoretical analysis, focused especially on the search for regulatory principles that transcend mere application domains.His scientific production has always been accompanied by a passionate socio-political commitment, which has decisively marked the history of the Institute of Cognitive Sciences and Technologies (ISTC-CNR), of which he has been a part since its inception and which he directed for nearly 9 years, and more broadly of Italian research. In addition to leading the ISTC, Falcone has held numerous prominent institutional roles, successfully advocating for a vision of science as a driver of social progress.Through a series of contributions and testimonies from eminent Italian and international scientists, politicians, and public figures whose experiences have intersected with those of Rino Falcone, this volume seeks to explore the implications of his scientific activity and also aims to delve into profound reflection on the dynamic relationship between science, society, and politics. In an era of profound technological transformations like the one we are experiencing, Rino Falcone has positioned himself as a figure capable of uniting scientific rigor with the ability to promote deep and current reflection on the role of science as a paradigm in the construction of a more just, sustainable, and humane society.
Advances in Digital Forensics XX
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations, with practically every crime now involving some aspect of digital evidence. Digital forensics provides the techniques and tools to articulate such evidence in legal proceedings. Along with a myriad of intelligence applications, Digital forensics also plays a vital role in cyber security - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. This book, Advances in Digital Forensics XX, is the twentieth volume in the annual series produced by the IFIP Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in Digital forensics. This book presents original research results and innovative applications in digital forensics. It also highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This volume contains fifteen revised and edited chapters based on papers presented at the Twentieth IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, on January 4-5, 2024. A total of 32 full-length papers were submitted for presentation at the conference. The chapters present in this volume have been organized into seven thematic sections: Themes and Issues; Mobile Device Forensics; Image and Video Forensics; Internet of Things Forensics; Malware Forensics; Filesystem Forensics & Forensic Investigations.
Industrial Internet of Things
Industrial Internet of Things: An Introduction explores the convergence of IoT and machine learning technologies in transforming industries and advancing economic growth. This comprehensive guide examines foundational principles, innovative applications, and real-world case studies that showcase the power of IoT-enabled intelligent systems in enhancing efficiency, sustainability, and adaptability.The book is structured into five parts. The first part introduces industrial IoT concepts, including algorithms, deep learning prediction models, and smart production techniques. The second section addresses machine learning and collaborative technologies, focusing on artificial neural networks, and AI's role in healthcare and industrial IoT. Subsequent chapters explore real-world applications, such as IoT adoption in healthcare during COVID-19 and intelligent transportation systems. The final sections address advanced IIoT progressions and the role of IoT in energy production using byproducts. Key Features: - Foundational concepts and algorithms for industrial IoT.- Integration of machine learning in IoT systems.- Case studies on healthcare, transportation, and sustainability.- Insights into energy production using IoT.
Deconstructing Digital Capitalism and the Smart Society
Today's critics of big online platforms tend to consider privacy breaches, monopolistic practices, and the deployment of surveillance technologies as the main problems. Internet reformers suggest the answers to these issues reside in more--and better--regulations. While the questions of privacy, data, and size are indeed important, they are secondary however to a deeper set of concerns about platform ownership and control, and who benefits from the current status quo. This book examines these issues and offers an historical overview and in-depth analysis of digital capitalism and its prevailing practices as it has become increasingly intertwined with various forms of online surveillance, behavior modification, and the delegation of managerial functions to algorithmic and automated systems in platform economies. The approach taken extends to the wider array of data-driven, internet-connected and automated systems that involve digital devices and technologies centered on three "smart" spaces: the smart self, the smart home, and the smart city. Antitrust and other regulatory measures by the European Union and the United States that are aimed at restraining platform capitalism are also discussed. The focus in particular is on recent developments regarding artificial intelligence and their potentially harmful implications. This is followed by a critical look at proposals for more far-reaching institutional reforms revolving around the creation of forms of "platform socialism" that build partly on existing practices of platform cooperativism. The book concludes with a diagnosis of the global situation among the competing "digital empires" (the United States, the European Union, and China), and considers whether or not, under the present conditions, any form of democratic platform socialism could materialize on a wider scale in the near future.
Information and communication techniques course 4th year
Our aim in writing this book for fourth-year Humanities Science students is to support the national curriculum for this option, which is rich in Information and Communication Technologies (ICT). In this book, we have developed related notions on computer networks, social networks, client-server systems, artificial intelligence and other notions oriented towards different algorithms. The book is based on the national curriculum for the year 2021.It should also be pointed out that this book has been written with a great deal of courage and love, in order to raise the level of knowledge of our science option students and bring up to date our ICT teachers who have not been able to tackle their computer studies up to degree level.
Machine Learning with PyTorch and Scikit-Learn
This book of the bestselling and widely acclaimed Python Machine Learning series is a comprehensive guide to machine and deep learning using PyTorch's simple to code framework.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesLearn applied machine learning with a solid foundation in theoryClear, intuitive explanations take you deep into the theory and practice of Python machine learningFully updated and expanded to cover PyTorch, transformers, XGBoost, graph neural networks, and best practicesBook DescriptionMachine Learning with PyTorch and Scikit-Learn is a comprehensive guide to machine learning and deep learning with PyTorch. It acts as both a step-by-step tutorial and a reference you'll keep coming back to as you build your machine learning systems.Packed with clear explanations, visualizations, and examples, the book covers all the essential machine learning techniques in depth. While some books teach you only to follow instructions, with this machine learning book, we teach the principles allowing you to build models and applications for yourself.Why PyTorch?PyTorch is the Pythonic way to learn machine learning, making it easier to learn and simpler to code with. This book explains the essential parts of PyTorch and how to create models using popular libraries, such as PyTorch Lightning and PyTorch Geometric.You will also learn about generative adversarial networks (GANs) for generating new data and training intelligent agents with reinforcement learning. Finally, this new edition is expanded to cover the latest trends in deep learning, including graph neural networks and large-scale transformers used for natural language processing (NLP).This PyTorch book is your companion to machine learning with Python, whether you're a Python developer new to machine learning or want to deepen your knowledge of the latest developments.What you will learnExplore frameworks, models, and techniques for machines to 'learn' from dataUse scikit-learn for machine learning and PyTorch for deep learningTrain machine learning classifiers on images, text, and moreBuild and train neural networks, transformers, and boosting algorithmsDiscover best practices for evaluating and tuning modelsPredict continuous target outcomes using regression analysisDig deeper into textual and social media data using sentiment analysisWho this book is forIf you have a good grasp of Python basics and want to start learning about machine learning and deep learning, then this is the book for you. This is an essential resource written for developers and data scientists who want to create practical machine learning and deep learning applications using scikit-learn and PyTorch.Before you get started with this book, you'll need a good understanding of calculus, as well as linear algebra.Table of ContentsGiving Computers the Ability to Learn from DataTraining Simple Machine Learning Algorithms for ClassificationA Tour of Machine Learning Classifiers Using Scikit-LearnBuilding Good Training Datasets - Data PreprocessingCompressing Data via Dimensionality ReductionLearning Best Practices for Model Evaluation and Hyperparameter TuningCombining Different Models for Ensemble LearningApplying Machine Learning to Sentiment AnalysisPredicting Continuous Target Variables with Regression AnalysisWorking with Unlabeled Data - Clustering AnalysisImplementing a Multilayer Artificial Neural Network from Scratch(N.B. Please use the Look Inside option to see further chapters)
Privacy in Vehicular Networks
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. This book delves into the complexities of protecting sensitive location data within the dynamic and decentralized environment of vehicular networks.
The Chief AI Officer’s Handbook
Empower your leadership with this detailed guide for CAIOs and business leaders to drive innovation, address complex challenges, and implement ethical AI strategiesKey Features: - Explore practical frameworks for effective AI team building and team management- Learn from case studies illustrating successful AI implementations- Gain actionable advice for leveraging AI to drive innovation and strategic growth- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Chief Artificial Intelligence Officers (CAIOs) are now imperative for businesses, enabling organizations to achieve strategic goals and unlock transformative opportunities through the power of AI. By building intelligent systems, training models to drive impactful decisions, and creating innovative applications, they empower organizations to thrive in an AI-driven world. Written by Jarrod Anderson, Chief AI Officer at SYRV.AI, this book bridges the gap between visionary leadership and practical execution.This handbook reimagines AI leadership for today's fast-paced environment, leveraging predictive, deterministic, generative, and agentic AI to address complex challenges and foster innovation. It provides CAIOs with the strategies to develop transformative AI initiatives, build and lead elite teams, and adopt AI responsibly while maintaining compliance. From shaping impactful solutions to achieving measurable business outcomes, this guide offers a roadmap for making AI your organization's competitive edge.By the end of this book, you'll have the knowledge and tools to excel as a Chief AI Officer, driving innovation, strategic growth, and lasting success for your organization.What You Will Learn: - Develop effective AI strategies for business growth- Build and manage high-performing AI teams- Implement advanced AI systems successfully- Navigate ethical and compliance challenges in AI- Apply practical frameworks to real-world AI problems- Drive innovation through AI-driven solutions- Align AI initiatives with strategic business goalsWho this book is for: This book is for chief AI officers, business leaders, AI and data science professionals, IT managers, entrepreneurs, consultants, academic leaders, policymakers, and general business professionals. This diverse audience seeks to understand not only the technical intricacies of AI, but also how to leverage AI to solve real-world business problems, drive innovation, and achieve strategic goals.Table of Contents- Why Every Company Needs a Chief AI Officer- Key Responsibilities of a Chief AI Officer- Crafting a Winning AI Strategy- Building High-Performing AI Teams- Data - the Lifeblood of AI- AI Project Management- Understanding Deterministic, Probabilistic, and Generative AI- AI Agents and Agentic Systems- Designing AI Systems- Training AI Models- Deploying AI Solutions- AI Governance and Ethics- Security in AI Systems- Privacy in the Age of AI- AI Compliance- Conclusion- Appendix
Data Management and Security in Blockchain Systems
Data Management and Security in Blockchain Systems offers a comprehensive exploration of how blockchain technology is reshaping the landscape of data management and security. This book addresses key aspects of blockchain-based systems, including data integrity, transparency, and tamper resistance, making it an essential resource for students, researchers, and professionals. Covering topics from blockchain-enabled IoT traffic management to the integration of AI for enhanced security, this book presents solutions to current challenges such as cyberattacks, smart grid security, and scalable network designs. Each chapter is thoughtfully structured to provide readers with a solid understanding of blockchain applications in diverse domains. Perfect for those seeking to understand blockchain's potential to secure and manage data in an increasingly interconnected world. Key Features: - Comprehensive overview of data management and security in blockchain networks.- Practical insights into IoT, smart grids, and AI integration.- In-depth analysis of cybersecurity challenges and solutions.
Current and Future Cellular Systems
Comprehensive reference on the latest trends, solutions, challenges, and future directions of 5G communications and beyond 5G for Future Generation Communication Systems covers the state of the art in architectures and solutions for 5G wireless communication and beyond. This book is unique because instead of focusing on singular topics, it considers various technologies being used in conjunction with 5G and beyond 5G technologies. All new and emerging technologies are covered, along with their problems and how quality of service (QoS) can be improved with respect to future requirements. This book highlights the latest trends in resource allocation techniques due to different device (or user) characteristics, provides a special focus on wide bandwidth millimeter wave communications including circuitry, antennas, and propagation, and discusses the involvement of decision-making processes assisted by artificial intelligence/machine learning (AI/ML) in applications such as resource allocation, power allocation, QoS improvement, and autonomous vehicles. Readers will also learn to develop mathematical modeling, perform simulation setup, and configure parameters related to simulations. 5G for Future Generation Communication Systems includes information on: The Internet of Vehicles (IoV), covering requirements, challenges, and limitations of Cellular Vehicle-to-Everything (C-V2X) with Resource Allocation (RA) techniques Intelligent reflecting surfaces, unmanned aerial vehicles, power optimized frameworks, challenges in a sub-6 GHz band, and communication in a THz band The role of IoT in healthcare, agriculture, smart home applications, networking requirements, and the metaverse Quantum computing, cloud computing, spectrum sharing methods, and performance analysis of WiFi 6/7 for indoor and outdoor environments Providing expansive yet accessible coverage of the subject by exploring both basic and advanced topics, 5G for Future Generation Communication Systems serves as an excellent introduction to the fundamentals of 5G and its applications for graduate students, researchers, and industry professionals in the field of wireless communication technologies.
Security and Privacy in New Computing Environments
This book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.