Title search results
Showing 25181 - 25200 of 54893 items
Environmental Modeling Using Satellite Imaging and Dataset Re-processing (Studies in Big Data #54)
By Moses Eterigho Emetere. 2019
This book introduces methods of re-processing images to extract numerical information that can be used to quantify the observables in…
environmental modelling. Experiments or procedures that yield large images can be statistically or parametrically examined. Through the use of open source libraries, the book shows how ‘big data’ in the form of images or datasets can be comparatively analysed along same defined procedures or standards. This book helps to solve the challenges of discarding datasets that are relevant directly or indirectly to the research. The habit of screening datasets leads to the discard of over 90% of the original dataset or images generated in the experiments or procedure. If the images or datasets are generated under the same principles or conditions, then each measurement may be the narrative of unique events. The focus of this book is to enlighten researchers on how to analyse measurements with the aim of ensuring 100% utilization.Modern Music-Inspired Optimization Algorithms for Electric Power Systems: Modeling, Analysis and Practice (Power Systems)
By Mohammad Kiani-Moghaddam, Mojtaba Shivaie, Philip D. Weinsier. 2019
In today’s world, with an increase in the breadth and scope of real-world engineering optimization problems as well as with…
the advent of big data, improving the performance and efficiency of algorithms for solving such problems has become an indispensable need for specialists and researchers. In contrast to conventional books in the field that employ traditional single-stage computational, single-dimensional, and single-homogeneous optimization algorithms, this book addresses multiple newfound architectures for meta-heuristic music-inspired optimization algorithms. These proposed algorithms, with multi-stage computational, multi-dimensional, and multi-inhomogeneous structures, bring about a new direction in the architecture of meta-heuristic algorithms for solving complicated, real-world, large-scale, non-convex, non-smooth engineering optimization problems having a non-linear, mixed-integer nature with big data. The architectures of these new algorithms may also be appropriate for finding an optimal solution or a Pareto-optimal solution set with higher accuracy and speed in comparison to other optimization algorithms, when feasible regions of the solution space and/or dimensions of the optimization problem increase. This book, unlike conventional books on power systems problems that only consider simple and impractical models, deals with complicated, techno-economic, real-world, large-scale models of power systems operation and planning. Innovative applicable ideas in these models make this book a precious resource for specialists and researchers with a background in power systems operation and planning.Provides an understanding of the optimization problems and algorithms, particularly meta-heuristic optimization algorithms, found in fields such as engineering, economics, management, and operations research;Enhances existing architectures and develops innovative architectures for meta-heuristic music-inspired optimization algorithms in order to deal with complicated, real-world, large-scale, non-convex, non-smooth engineering optimization problems having a non-linear, mixed-integer nature with big data;Addresses innovative multi-level, techno-economic, real-world, large-scale, computational-logical frameworks for power systems operation and planning, and illustrates practical training on implementation of the frameworks using the meta-heuristic music-inspired optimization algorithms.A definitive guide covering all the core concepts necessary to pass the Salesforce Administrator Certification examKey FeaturesUnderstand critical design considerations…
for setting up Salesforce CRMFacilitate and manage the transition from Salesforce Classic to Lightning ExperienceLearn key functions of application security to manage user profiles and dataBook DescriptionSalesforce’s winter ’19 release offers a host of new features for CRM designed to meet your sales and marketing requirements. With this comprehensive guide to implementing Salesforce CRM, administrators of all levels can easily get a thorough understanding of the platform.This Salesforce handbook begins by guiding you in setting up users and security and then progresses to configuration, data management, and data analytics. You’ll discover process automation and approval mechanisms, while also exploring the functional areas of Sales Cloud, Service Cloud, Marketing Cloud, and Salesforce Chatter. This book covers Salesforce CRM system administration in a practical way, and it’ll serve as an invaluable reference for both new administrators and experienced professionals. Furthermore, you’ll also delve into Salesforce mobile apps and mobile administration, along with Salesforce Adoption Manager. You’ll gain insights into Lightning Experience, Salesforce's new app, and learn how its modern design and sleek interface helps you to build customizable components. Finally, we'll see how the two versions compare and help manage the transition from Salesforce Classic to Lightning Experience. By the end of the book, you will have mastered the techniques to configure and control various user interface features in Salesforce CRM.What you will learnConfigure a variety of user interface features in Salesforce CRMUnderstand the capabilities of the Salesforce CRM sharing modelExplore Einstein Analytics - Salesforce's new wave of advanced reporting Get to grips with the Lightning Process Builder workflowSet up user profiles, security, and login access mechanismsFind out how Apex and Visualforce coding can be used in Salesforce CRMManage the transition from Salesforce Classic to Lightning ExperienceImplement data manipulation features to apply best practices in data managementWho this book is forThis book is for administrators who want to develop and strengthen their Salesforce CRM skills in the areas of configuration and system management. Whether you are a new or experienced professional, this book will enhance your knowledge and understanding of Salesforce CRM features.The Power Of Off: The Mindful Way To Stay Sane In A Virtual World
By Nancy Colier. 2017
Our reliance on technology is rapidly changing how each of us experiences life. We’re facing new issues and difficulties, we’re…
encountering new emotional triggers, and we’re relating to each other in new ways. As Dr. Nancy Colier writes, "How we spend our time, what motivates us, and what we want are all are on a radical course of transformation." The promise of technology is that it will make our lives easier; yet to realize that promise, we cannot be passive users—we must bring awareness and mindfulness to our relationships with our devices. "The compulsion to constantly check our devices plays on primal instincts," teaches Colier. "Even people with strong spiritual practices or those who have never had other addiction issues now find themselves caught in the subtle trap of these miraculous tools we’ve created." Through The Power of Off, she offers us a path for making use of the virtual world while still feeling good, having healthy relationships, and staying connected with what is genuinely meaningful in life. You’ll explore: How and why today’s devices push our buttons so effectively, and what you can do to take back control of your life • Tips for navigating the increasingly complex ways in which technology is affecting our relationships—with ourselves, others, and our devices themselves • Self-evaluation tools for bringing greater awareness to your use of technology • Mindfulness practices for helping you interact with your devices in more conscious ways • A 30-day digital detox program to kick-start a new healthier relationship with technology With The Power of Off, Colier sounds the call for wakefulness, reminding us that we can use technology in a way that promotes, rather than detracts from, our well-being. This book provides an essential resource for anyone wanting to create a more empowered relationship with technology in the digital age.Financial Software Engineering (Undergraduate Topics in Computer Science)
By Kevin Lano, Howard Haughton. 2019
In this textbook the authors introduce the important concepts of the financial software domain, and motivate the use of an…
agile software engineering approach for the development of financial software. They describe the role of software in defining financial models and in computing results from these models. Practical examples from bond pricing, yield curve estimation, share price analysis and valuation of derivative securities are given to illustrate the process of financial software engineering.Financial Software Engineering also includes a number of case studies based on typical financial engineering problems:*Internal rate of return calculation for bonds* Macaulay duration calculation for bonds* Bootstrapping of interest rates* Estimation of share price volatility* Technical analysis of share prices* Re-engineering Matlab to C#* Yield curve estimation* Derivative security pricing* Risk analysis of CDOs The book is suitable for undergraduate and postgraduate study, and for practitioners who wish to extend their knowledge of software engineering techniques for financial applicationsDevelop native applications for multiple mobile and desktop platforms including but not limited to iOS, Android, and UWP with the…
Xamarin framework and Xamarin.FormsKey FeaturesUnderstand .NET Core and its cross-platform development philosophy Build Android, iOS, and Windows mobile applications with C#, .NET Core, and Azure Cloud ServicesBring Artificial Intelligence capabilities into your mobile applications with Azure AIBook Description.NET Core is the general umbrella term used for Microsoft’s cross-platform toolset. Xamarin used for developing mobile applications, is one of the app model implementations for .NET Core infrastructure. In this book, you will learn how to design, architect, and develop highly attractive, maintainable, efficient, and robust mobile applications for multiple platforms, including iOS, Android, and UWP, with the toolset provided by Microsoft using Xamarin, .NET Core, and Azure Cloud Services. This book will take you through various phases of application development with Xamarin, from environment setup, design, and architecture to publishing, using real-world scenarios. Throughout the book, you will learn how to develop mobile apps using Xamarin, Xamarin.Forms and .NET Standard; implement a webbased backend composed of microservices with .NET Core using various Azure services including but not limited to Azure App Services, Azure Active Directory, Notification Hub, Logic Apps, and Azure Functions, Cognitive Services; create data stores using popular database technologies such as Cosmos DB, SQL and Realm.Towards the end, the book will help developers to set up an efficient and maintainable development pipeline to manage the application life cycle using Visual Studio App Center and Visual Studio Services.What you will learnImplement native applications for multiple mobile and desktop platformsUnderstand and use various Azure Services with .NET CoreMake use of architectural patterns designed for mobile and web applicationsUnderstand the basic Cosmos DB conceptsUnderstand how different app models can be used to create an app serviceExplore the Xamarin and Xamarin.Forms UI suite with .NET Core for building mobile applicationsWho this book is forThis book is for mobile developers who wish to develop cross-platform mobile applications. Programming experience with C# is required. Some knowledge and understanding of core elements and cross-platform application development with .NET is required.Artificial Life and Evolutionary Computation: 13th Italian Workshop, WIVACE 2018, Parma, Italy, September 10–12, 2018, Revised Selected Papers (Communications in Computer and Information Science #900)
By Stefano Cagnoni, Marco Villani, Andrea Roli, Monica Mordonini, Riccardo Pecori. 2019
This book constitutes the revised selected papers of the 13th Italian Workshop on Artificial Life and Evolutionary Computation, WIVACE 2018,…
held in Parma, Italy, in September 2018. The 12 full papers presented were thoroughly reviewed and selected from 30 submissions. They cover the following topics: Boolean networks and complex systems; economic, societal and technological applications; chemical, biological and medical applications. The chapter “Unveiling Latent Relations in the Photonics Techno-Economic Complex System” is open access under a CC BY 4.0 license at link.springer.com.This book gives the definitive mathematical answer to what thermodynamics really is: a variational calculus applied to probability distributions. Extending…
Gibbs's notion of ensemble, the Author imagines the ensemble of all possible probability distributions and assigns probabilities to them by selection rules that are fairly general. The calculus of the most probable distribution in the ensemble produces the entire network of mathematical relationships we recognize as thermodynamics. The first part of the book develops the theory for discrete and continuous distributions while the second part applies this thermodynamic calculus to problems in population balance theory and shows how the emergence of a giant component in aggregation, and the shattering transition in fragmentation may be treated as formal phase transitions. While the book is intended as a research monograph, the material is self-contained and the style sufficiently tutorial to be accessible for self-paced study by an advanced graduate student in such fields as physics, chemistry, and engineering.March Forth
By Trevor Greene, Debbie Greene. 2013
At the age of forty-one, Trevor Greene, a journalist and a reservist in the Canadian Forces, was deployed to Afghanistan,…
leaving behind his fiance, Debbie, and his young daughter, Grace. On March 4, 2006, while meeting with village elders in a remote village in Kandahar Province, Trevor removed his helmet, confident that a centuries-old pact would protect him from harm. Without warning, a teenage boy under the influence of the Taliban walked up to him and landed a rusty axe in his skull, nearly splitting his brain in two. Initially, Debbie was told that Trevor would not survive. When he did, she was told that he would never be able to communicate or move on his own. But after years of rehabilitation, setbacks and crises, Trevor not only learned how to talk and move again, but in July 2010, he stood up at his wedding, Debbie at his side and Grace carrying their rings down the aisle as their flower girl. March Forth is a remarkable story of love told in two voices: first in Trevor's, up until the attack; then in Debbie's, as she works tirelessly to rehabilitate her fiance. Together, Trevor and Debbie have written the next chapter in their remarkable story.Agile & Scrum: Un aperçu
By Ajit Singh. 2021
L'une des premières questions que l'on se pose pour chacune de nos implémentations de projet est "Quelle méthodologie de développement…
va-t-on utiliser?" C'est un sujet qui suscite beaucoup de discussions car il s'agit de la manière d'organiser le travail pour le projet, et non pas comme souvent perçu à tort, d'un style de gestion de projet ou d'une approche technique spécifique. Les deux méthodologies de base et les plus populaires sont: •Le modèle en cascade, connu comme l'approche "traditionnelle", et •L'agilité: un type spécifique de développement rapide d'applications et plus récent que le modèle en cascade, mais pas si nouveau, qui est souvent implémenté en utilisant Scrum. Les deux sont des méthodologies utilisables et matures. Ces derniers temps, l'agilité et surtout Scrum sont devenus de plus en plus populaires. Dans de nombreuses administrations d'entreprise, il est considéré que travailler de manière agile est la clé du succès. Mais est-ce vrai? A-t-on trouvé la solution miracle? Tous les individus peuvent-ils travailler de manière agile? Si oui, est-ce que l'équipe dont l'individu fait partie parviendra à adopter et utiliser l'agilité dans son travail et son fonctionnement avec succès? Toutes ces questionnements ont provoqué l'écriture de ce manuel pratique.Bases de Hacking: um guia de iniciantes ao hacking ético e aos testes de penetração
By Adidas Wilson. 2021
Originalmente, o termo “hacker” referia-se a um programador que tinha competências a nível de sistemas operativos e código de máquina.…
Nos nossos dias, é qualquer pessoa que incorra em atividades de hacking. Hacking é o ato de mudar as funcionalidades de um sistema de forma a atingir um objetivo que não está no propósito original do criador. A palavra “hacking” é normalmente percebida de forma negativa, especialmente por pessoas que não percebem o trabalho de um hacker ético. No mundo do hacking, os hackers éticos são boas pessoas. Qual o seu papel? Usam o seu vasto conhecimento de computadores para o bem em vez do mal. Procuram falhas de segurança nos sistemas da organizações e negócios para prevenir atores maliciosos de tomarem vantagem dos mesmos. Para alguém que adora o mundo da tecnologia e dos computadores, seria inteligente considerar uma carreira de hacking ético. Você é pago (quantia interessante) para quebrar os sistemas. Começar não será como ir dar um passeio ao parque – tal como qualquer outra carreira. No entanto, se for determinado, verá que irá conseguir uma carreira lucrativa. Quando decidir iniciar-se nesta jornada, terá de cultivar a paciência. O primeiro passo para muitas pessoas é normalmente obter um curso em ciências de computadores. Pode também obter uma certificação A+ (CompTIA) – tem de fazer e passar a dois exames diferentes. Para conseguir fazer o teste de qualificação, precisa de ter pelo menos 500 horas de experiência em computação prática. A experiência é requerida, e uma qualificação em CCNA ou Network+ para avançar na carreira.Comment gagner de l'argent avec l'impression 3D: la nouvelle révolution numérique
By Adidas Wilson. 2020
Alors que l'impression 3D est de plus en plus populaire, de nombreuses personnes gagnent une fortune et la font grandir…
dans l'industrie. Une telle réalisation n'est peut-être pas un jeu d'enfant, mais chercher des moyens de faire une percée est de loin le seul moyen d'y parvenir et de réaliser ce que les autres ont conceptualisé en moyens de gagner de l'argent. Si vous avez toujours été intéressé par l'impression 3D et que vous souhaitez gagner de l'argent avec cette technologie, il est temps que vous travailliez intelligemment pour relever les défis à venir. Les modèles imprimables en 3D peuvent être créés avec un package de conception assistée par ordinateur (CAO), via un scanner 3D ou par un appareil photo numérique et un logiciel de photogrammétrie. Les modèles imprimés en 3D créés avec la CAO réduisent les erreurs et peuvent être corrigés avant l'impression, ce qui permet de vérifier la conception de l'objet avant son impression.Swarm Intelligence Algorithms (Two Volume Set): A Tutorial
By Adam Slowik. 2021
Swarm intelligence algorithms are a form of nature-based optimization algorithms. Their main inspiration is the cooperative behavior of animals within…
specific communities. This can be described as simple behaviors of individuals along with the mechanisms for sharing knowledge between them, resulting in the complex behavior of the entire community. Examples of such behavior can be found in ant colonies, bee swarms, schools of fish or bird flocks. Swarm intelligence algorithms are used to solve difficult optimization problems for which there are no exact solving methods or the use of such methods is impossible, e.g. due to unacceptable computational time. This set comprises two volumes: Swarm Intelligence Algorithms: A Tutorial and Swarm Intelligence Algorithms: Modifications and Applications. The first volume thoroughly presents the basics of 24 algorithms selected from the entire family of swarm intelligence algorithms. It contains a detailed explanation of how each algorithm works, along with relevant program codes in Matlab and the C ++ programming language, as well as numerical examples illustrating step-by-step how individual algorithms work. The second volume describes selected modifications of these algorithms and presents their practical applications. This book presents 24 swarm algorithms together with their modifications and practical applications. Each chapter is devoted to one algorithm. It contains a short description along with a pseudo-code showing the various stages of its operation. In addition, each chapter contains a description of selected modifications of the algorithm and shows how it can be used to solve a selected practical problem.Deja de detenerte usted mismo. No puedes ser pobre si tienes un dispositivo Android. Más personas que nunca se ven…
a sí mismas como quejándose o recuperándose de una queja, ya sea contra el gobierno o las circunstancias, sobre el dinero, los ingresos, los privilegios, los antecedentes, habilidades o falta de trabajo. Pero a pesar del aumento sin precedentes, nuestra entendimiento de la queja está atrapado en un razonamiento infundado del siglo pasado, la queja como una protesta silenciosa o como un medio para llamar la atención, y también constituye una estrategia obsoleta. Desafiando tanto la idea de tales quejosos, Dave McAllen, ofrece una nueva perspectiva radical e innovadora, argumentando que quejarse de la suerte de uno en la vida no es válido en nuestra era digital, con casi todos en posesión de un teléfono Android. Ofrece algunos ejemplos de lo que puede hacer con su teléfono y ganar dinero y muestra cómo ver las cosas de esta manera puede evitar que se detenga en el camino hacia el éxito. Entonces, aprenda por qué él dice que el obstáculos para tu éxito eres tú mismo.Smart Computing with Open Source Platforms
By Nilanjan Dey, Amartya Mukherjee. 2019
Focuses on the concept of open source prototyping and product development and designing sensor networks and covers IoT base applications…
This book will serves as a single source of introductory material and reference for programming smart computing and Internet of Things (IoT) devices using Arduino with the use of Python It covers number of comprehensive DIY experiments through which the reader can design various intelligent systemsGet up to speed with various penetration testing techniques and resolve security threats of varying complexityKey FeaturesEnhance your penetration testing…
skills to tackle security threatsLearn to gather information, find vulnerabilities, and exploit enterprise defensesNavigate secured systems with the most up-to-date version of Kali Linux (2019.1) and Metasploit (5.0.0)Book DescriptionSending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats. The book will even help you leverage the best tools, such as Kali Linux, Metasploit, Burp Suite, and other open source pentesting tools to perform these techniques. Toward the later chapters, you'll focus on best practices to quickly resolve security threats.By the end of this book, you'll be well versed with various penetration testing techniques so as to be able to tackle security threats effectivelyWhat you will learnPerform entry-level penetration tests by learning various concepts and techniquesUnderstand both common and not-so-common vulnerabilities from an attacker's perspectiveGet familiar with intermediate attack methods that can be used in real-world scenariosUnderstand how vulnerabilities are created by developers and how to fix some of them at source code levelBecome well versed with basic tools for ethical hacking purposesExploit known vulnerable services with tools such as MetasploitWho this book is forIf you’re just getting started with penetration testing and want to explore various security domains, this book is for you. Security professionals, network engineers, and amateur ethical hackers will also find this book useful. Prior knowledge of penetration testing and ethical hacking is not necessary.Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment—digital culture and audiences in particular—by drawing on…
psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.Nonlinear Combinatorial Optimization: Algorithms And Applications (Springer Optimization and Its Applications #147)
By Panos M. Pardalos, Ding-Zhu Du, Zhao Zhang. 2019
Graduate students and researchers in applied mathematics, optimization, engineering, computer science, and management science will find this book a useful…
reference which provides an introduction to applications and fundamental theories in nonlinear combinatorial optimization. Nonlinear combinatorial optimization is a new research area within combinatorial optimization and includes numerous applications to technological developments, such as wireless communication, cloud computing, data science, and social networks. Theoretical developments including discrete Newton methods, primal-dual methods with convex relaxation, submodular optimization, discrete DC program, along with several applications are discussed and explored in this book through articles by leading experts.Approximation and Optimization: Algorithms, Complexity and Applications (Springer Optimization and Its Applications #145)
By Panos M. Pardalos, Ioannis C. Demetriou. 2019
This book focuses on the development of approximation-related algorithms and their relevant applications. Individual contributions are written by leading experts…
and reflect emerging directions and connections in data approximation and optimization. Chapters discuss state of the art topics with highly relevant applications throughout science, engineering, technology and social sciences. Academics, researchers, data science practitioners, business analysts, social sciences investigators and graduate students will find the number of illustrations, applications, and examples provided useful. This volume is based on the conference Approximation and Optimization: Algorithms, Complexity, and Applications, which was held in the National and Kapodistrian University of Athens, Greece, June 29–30, 2017. The mix of survey and research content includes topics in approximations to discrete noisy data; binary sequences; design of networks and energy systems; fuzzy control; large scale optimization; noisy data; data-dependent approximation; networked control systems; machine learning ; optimal design; no free lunch theorem; non-linearly constrained optimization; spectroscopy.This book describes five qualitative investment decision-making methods based on the hesitant fuzzy information. They are: (1) the investment decision-making…
method based on the asymmetric hesitant fuzzy sigmoid preference relations, (2) the investment decision-making method based on the hesitant fuzzy trade-off and portfolio selection, (3) the investment decision-making method based on the hesitant fuzzy preference envelopment analysis, (4) the investment decision-making method based on the hesitant fuzzy peer-evaluation and strategy fusion, and (5) the investment decision-making method based on the EHVaR measurement and tail analysis.