Title search results
Showing 46281 - 46300 of 46415 items
Digital Transformation: Technology, Tools, and Studies (Intelligent Systems Reference Library #253)
By Lucian-Ionel Cioca, Larisa Ivascu, Florin Gheorghe Filip, Banciu Doina. 2024
This book presents a multidisciplinary approach to digital transformation process of organizational transformation, offering support throughout the implementation process to…
all those interested. The digital transformation (DT) is a priority for many companies in the context of technological evolution. The use of appropriate tools, methodologies, methods, approaches, and techniques for DT, depending on the organizational characteristics, can contribute to a complete approach to organizational processes and to their efficiency. Digital transformation involves the adoption and use of new digital technologies to develop new products and services, modify existing ones and develop new business models to increase efficiency, productivity, and competitiveness. Starting from marketing to culture and education to health, automotive, engineering, mobility and human resources and others, it is addressed to professionals, practitioners, researchers, students, and other interested parties.Digital Transformation in Higher Education Institutions (EAI/Springer Innovations in Communication and Computing)
By Andreia de Bem Machado, Maria José Sousa, Francesca Dal Mas, Silvana Secinaro, Davide Calandra. 2024
This book analyzes digital technologies being used in the teaching-learning process. The authors show how the use of AI in…
higher education can provide personalized education through the automation of administrative teaching tasks, software programs that favor the detection of topics that need reinforcement in the classroom, the guidance and support of students outside the classroom, and the use of data intelligently to teach and support students. In addition, the authors show how to further personalize education with the use of augmented reality, adaptive platforms, intelligent tutor systems, Chatbots, adaptive learning, computer aided instruction, MOOCs, and robotics. The authors answer questions such as: What sustainable educational technologies can be used in the teaching-learning process; How can Blockchain technology and AI be applied in higher education; How can the metaverse be applied in virtual learning environments? The book is relevant to researchers, professionals, andstudents interested in technology and education.Oracle Cloud Infrastructure (OCI) GoldenGate: Real-world Examples
By Y V Ravi Kumar, Raghavendra S, Ankur Goel. 2024
This book focuses on the utilization of GoldenGate Services (GGS) in conjunction with a microservices architecture on the Oracle cloud…
(OCI), primarily for data migration and integration across various data sources and targets.The book begins with a practical example of utilizing GGS on a Marketplace VM, progressively advancing to in-depth discussions on implementing GoldenGate as a Service on OCI. The book offers illustrative guides for data replication between RDBMSs (such as Oracle, Postgres, and big data targets such as Kafka). Additionally, it explores monitoring techniques using Enterprise Manager and Grafana dashboards. A comparative analysis is presented between traditional VM-based GoldenGate installations and the OCI service model. Special attention is given to Zero Downtime Migration (ZDM) and leveraging GGS for database migration from on-premises to OCI. Some chapters address multi-cloud replication using OCI GGS and include real-life case studies.By the end of this book you will have gained comprehensive insights into the architectural design of GoldenGate Services and will be adept at replicating data using GGS, enabling you to replicate setups in your own environments.What You Will LearnSet up GoldenGate Services for high availability (HA), disaster recovery (DR), migration of data to cloud, and moving data into the data lake or lakehousePerform logical migration of data to the cloud using the ZDM tool (ZDM uses GoldenGate internally).Replicate data to big data targetsMonitor GGS using Enterprise Manager and GrafanaReplicate data in a multi-cloud environment Who This Book Is ForOracle database administrators who want to replicate data or use Oracle GoldenGate Services for migration and setup of high availability (HA) and disaster recovery (DR); and data engineers who want tobuild the data warehouse, data lake, data lakehouse to push data in near real-timeRobot 2023: Advances in Robotics, Volume 2 (Lecture Notes in Networks and Systems #978)
By Lino Marques, Cristina Santos, José Luís Lima, Danilo Tardioli, Manuel Ferre. 2024
This book contains a selection of papers accepted for presentation and discussion at ROBOT2023, the Sixth Iberian Robotics Conference, held…
in the University of Coimbra, Coimbra, Portugal, during November 22nd-24th, 2023. ROBOT2023 is part of a series of conferences that are jointly organized by Sociedade Portuguesa de Robótica (SPR) / Portuguese Society for Robotics and by Sociedad Española para la Investigación y Desarrollo en Robótica (SEIDROB) / Spanish Society for Research and Development in Robotics. These conferences, now occurring with a yearly periodicity, provide a forum to roboticists mostly from Iberia, but also from other parts of the world, to present and discuss their research results, new developments, and applications in the field of Robotics. The volume 1 of this book contains 45 papers addressing fundamental aspects of mobile robotics and robot manipulation while volume 2 contains 45 papers covering the application of robotics in different domains and environments.Learning SAS by Example: A Programmer's Guide
By Ron Cody. 2018
Learn to program SAS by example! Learning SAS by Example: A Programmer’s Guide, Second Edition, teaches SAS programming from very…
basic concepts to more advanced topics. Because most programmers prefer examples rather than reference-type syntax, this book uses short examples to explain each topic. The second edition has brought this classic book on SAS programming up to the latest SAS version, with new chapters that cover topics such as PROC SGPLOT and Perl regular expressions. This book belongs on the shelf (or e-book reader) of anyone who programs in SAS, from those with little programming experience who want to learn SAS to intermediate and even advanced SAS programmers who want to learn new techniques or identify new ways to accomplish existing tasks. In an instructive and conversational tone, author Ron Cody clearly explains each programming technique and then illustrates it with one or more real-life examples, followed by a detailed description of how the program works. The text is divided into four major sections: Getting Started, DATA Step Processing, Presenting and Summarizing Your Data, and Advanced Topics. Subjects addressed includeBioinformatics and Computational Biology: Technological Advancements, Applications and Opportunities
By Tiratha Raj Singh, Hemraj Saini, Moacyr Comar Junior. 2024
Bioinformatics and Computational Biology: Technological Advancements, Applications and Opportunities is an invaluable resource for general and applied researchers who analyze…
biological data that is generated, at an unprecedented rate, at the global level. After careful evaluation of the requirements for current trends in bioinformatics and computational biology, it is anticipated that the book will provide an insightful resource to the academic and scientific community. Through a myriad of computational resources, algorithms, and methods, it equips readers with the confidence to both analyze biological data and estimate predictions.The book offers comprehensive coverage of the most essential and emerging topics: Cloud-based monitoring of bioinformatics multivariate data with cloud platforms Machine learning and deep learning in bioinformatics Quantum machine learning for biological applications Integrating machine learning strategies with multiomics to augment prognosis in chronic diseases Biomedical engineering Next generation sequencing techniques and applications Computational systems biology and molecular evolution While other books may touch on some of the same issues and nuances of biological data analysis, they neglect to feature bioinformatics and computational biology exclusively, and as exhaustively. This book's abundance of several subtopics related to almost all of the regulatory activities of biomolecules from where real data is being generated brings an added dimension.Algorithmic Thinking, 2nd Edition: Learn Algorithms to Level Up Your Coding Skills
By Daniel Zingaro. 2024
Get in the game and learn essential computer algorithms by solving competitive programming problems, in the fully revised second edition…
of the bestselling original. (Still no math required!)Are you hitting a wall with data structures and algorithms? Whether you&’re a student prepping for coding interviews or an independent learner, this book is your essential guide to efficient problem-solving in programming.UNLOCK THE POWER OF DATA STRUCTURES & ALGORITHMS:Learn the intricacies of hash tables, recursion, dynamic programming, trees, graphs, and heaps. Become proficient in choosing and implementing the best solutions for any coding challenge.REAL-WORLD, COMPETITION-PROVEN CODE EXAMPLES:The programs and challenges in this book aren&’t just theoretical—they&’re drawn from real programming competitions. Train with problems that have tested and honed the skills of coders around the world.GET INTERVIEW-READY:Prepare yourself for coding interviews with practice exercises that help you think algorithmically, weigh different solutions, and implement the best choices efficiently.WRITTEN IN C, USEFUL ACROSS LANGUAGES:The code examples are written in C and designed for clarity and accessibility to those familiar with languages like C++, Java, or Python. If you need help with the C code, no problem: We&’ve got recommended reading, too.Algorithmic Thinking is the complete package, providing the solid foundation you need to elevate your coding skills to the next level.AI-Assisted Programming
By Tom Taulli. 2024
Get practical advice on how to leverage AI development tools for all stages of code creation, including requirements, planning, design,…
coding, debugging, testing, and documentation. With this book, beginners and experienced developers alike will learn how to use a wide range of tools, from general-purpose LLMs (ChatGPT, Gemini, and Claude) to code-specific systems (GitHub Copilot, Tabnine, Cursor, and Amazon CodeWhisperer).You'll also learn about more specialized generative AI tools for tasks such as text-to-image creation.Author Tom Taulli provides a methodology for modular programming that aligns effectively with the way prompts create AI-generated code. This guide also describes the best ways of using general purpose LLMs to learn a programming language, explain code, or convert code from one language to another.This book examines:The core capabilities of AI-based development toolsPros, cons, and use cases of popular systems such as GitHub Copilot and Amazon CodeWhispererWays to use ChatGPT, Gemini, Claude, and other generic LLMs for codingUsing AI development tools for the software development lifecycle, including requirements, planning, coding, debugging, and testingPrompt engineering for developmentUsing AI-assisted programming for tedious tasks like creating regular expressions, starter code, object-oriented programming classes, and GitHub ActionsHow to use AI-based low-code and no-code tools, such as to create professional UIsDigital Technologies in Education: Selected Cases (Studies in Systems, Decision and Control #529)
By Rostyslav Shchokin, Anna Iatsyshyn, Valeriia Kovach, Artur Zaporozhets. 2024
Among the technologies that significantly change the modern world of human existence, it is worth mentioning, first of all, digital…
technologies. These technologies are actively and relentlessly implemented and integrated into all spheres of human activity and society, becoming a powerful catalyst and a determining source of social development. According to such a scenario of development, society acquires the features of digital, thus defining digital technologies as its leading technology. This process is called the digital transformation of society. The wide use of digital technologies to provide free access to information and knowledge is a basic principle of the digital society. Digital society significantly changes traditional ideas about work, education, culture, communication, social and political life. The development of citizens' digital culture is the main condition for the successful construction of a digital society. Therefore, it is important to carry out scientific research and targeted training to improve the qualifications of specialists in various branches of the economy, in particular, educators and scientists to acquire digital competence. After all, these specialists are key figures in ensuring the process of digitalization of education and science. The book presents various aspects of the digital transformation of education and science. A comprehensive view of the current state and prospects of the use of digital technologies for education and science is provided. The experience of using digital technologies and tools for training and improving the qualifications of specialists of various specialties, as well as for the preparation of future PhDs, is described. The book is addressed to education workers, managers, scientists, graduate students, librarians, and all those who are interested in the process of digital transformation of education and science.Linkerd: Up and Running
By Jason Morgan, Flynn. 2024
With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can…
help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how the Linkerd service mesh enables cloud-native developers—including platform and site reliability engineers—to solve the thorny issue of running distributed applications in Kubernetes.Jason Morgan and Flynn draw on their years of experience at Buoyant—the creators of Linkerd—to demonstrate how this service mesh can help ensure that your applications are secure, observable, and reliable. You'll understand why Linkerd, the original service mesh, can still claim the lowest time to value of any mesh option available today.Learn how Linkerd works and which tasks it can help you accomplishInstall and configure Linkerd in an imperative and declarative mannerSecure interservice traffic and set up secure multicluster linksLaunch a zero trust authorization strategy in Kubernetes clustersOrganize services in Linkerd to override error codes, set custom retries, and create timeoutsUse Linkerd to manage progressive delivery and pair this service mesh with the ingress of your choiceBlockchain-based Cyber Security: Applications and Paradigms
By Kaushal Shah. 2024
The book focuses on a paradigm of blockchain technology that addresses cyber security. The challenges related to cyber security and…
the solutions based on Software Defined Networks are discussed. The book presents solutions to deal with cyber security attacks by considering real-time applications based on IoT, Wireless Sensor Networks, Cyber-Physical Systems, and Smart Grids. The book is useful for academicians and research scholars worldwide working in cyber security. It is also useful for industry experts working in cyber security.Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on relevant activities in three main subject areas: Healthcare and Emotion, Mental Health, and Nurse Care Records.The editors are experts in these arenas and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 2 (Ubiquitous Computing, Healthcare and Well-being)
By Md Atiqur Rahman Ahad, Sozo Inoue, Guillaume Lopez, Tahera Hossain. 2024
Human Activity and Behavior Analysis relates to the field of vision and sensor-based human action or activity and behavior analysis…
and recognition. The book includes a series of methodologies, surveys, relevant datasets, challenging applications, ideas, and future prospects.The book discusses topics such as action recognition, action understanding, gait analysis, gesture recognition, behavior analysis, emotion and affective computing, and related areas. This volume focuses on two main subject areas: Movement and Sensors, and Sports Activity Analysis.The editors are experts in these arenas, and the contributing authors are drawn from high-impact research groups around the world. This book will be of great interest to academics, students, and professionals working and researching in the field of human activity and behavior analysis.Software Quality as a Foundation for Security: 16th International Conference on Software Quality, SWQD 2024, Vienna, Austria, April 23–25, 2024, Proceedings (Lecture Notes in Business Information Processing #505)
By Peter Bludau, Rudolf Ramler, Dietmar Winkler, Johannes Bergsmann. 2024
This book constitutes the refereed proceedings of the 16th Software Quality Days Conference, SWQD 2024, held in Vienna, Austria, during…
April 23-25, 2024. The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conference on software quality in Europe. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2024 is “Software Quality as a Foundation for Security”. The 7 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 16 submissions. The papers were organized in topical sections as follows: Requirements engineering; software quality; continuous integration and deployment; communication and collaboration; artificial intelligence; and security and compliance.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they…
evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingModern Fortran in Practice
By Arjen Markus. 2012
From its earliest days, the Fortran programming language has been designed with computing efficiency in mind. The latest standard, Fortran…
2008, incorporates a host of modern features, including object-orientation, array operations, user-defined types, and provisions for parallel computing. This tutorial guide shows Fortran programmers how to apply these features in twenty-first-century style: modular, concise, object-oriented, and resource-efficient, using multiple processors. It offers practical real-world examples of interfacing to C, memory management, graphics and GUIs, and parallel computing using MPI, OpenMP, and coarrays. The author also analyzes several numerical algorithms and their implementations and illustrates the use of several open source libraries. Full source code for the examples is available on the book's Web site.