Service Alert
Website maintenance April 24 10pm ET
On Wednesday April 24 at 10pm ET the CELA website will be unavailable for about 15 minutes for planned maintenance.
On Wednesday April 24 at 10pm ET the CELA website will be unavailable for about 15 minutes for planned maintenance.
Showing 27401 - 27420 of 45878 items
By Amar Patnaik, Vikas Kukshal, Pankaj Agarwal, Ankush Sharma, Mahavir Choudhary. 2023
This book focuses on the application of soft computing in materials and manufacturing sectors with the objective to offer an…
intelligent approach to improve the manufacturing process, material selection and characterization techniques for developing advanced new materials. It unveils different models and soft computing techniques applicable in the field of advanced materials and solves the problems to help the industry and scientists to develop sustainable materials for all purposes. The book focuses on the overall well-being of the environment for better sustenance and livelihood. Firstly, the authors discuss the implementation of soft computing in the various areas of engineering materials. They also review the latest intelligent technologies and algorithms related to the state-of-the-art methodologies of monitoring and effective implementation of sustainable engineering practices. Finally the authors examine the future generation of sustainable and intelligent monitoring techniques beneficial for manufacturing, and cover novel soft computing techniques for the purpose of effective manufacturing processes at par with the standards laid down by the International Standards of Organization (ISO). This book is intended for academics and researchers from all the fields of engineering interested in joining interdisciplinary initiatives on soft computing techniques for advanced materials and manufacturing.By Gerard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu. 2022
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022,…
held in Singapore, during August 6–8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections:Volume I:Knowledge Science with Learning and AI (KSLA)Volume II:Knowledge Engineering Research and Applications (KERA)Volume III:Knowledge Management with Optimization and Security (KMOS)By Paul M. Salmon, Neville A. Stanton, Guy H. Walker, Adam Hulme, Natassia Goode, Jason Thompson, Gemma J.M. Read. 2021
The systems thinking philosophy has become popular in human factors and ergonomics and safety science. These methods are being used…
to understand and resolve complex societal problems in areas such as transport safety, workplace safety, medication error, disaster management, child abuse, financial crises, terrorism, climate change and public health and wellbeing. This handbook presents practical step-by-step guidance for practitioners and researchers wishing to use these methods to tackle complex problems. Each method includes an example case study which demonstrates how the method can be applied and how the results can be interpreted and translated into practical recommendations. The book presents practical guidance on state-of-the-art systems thinking methods and offers case study applications describing systems thinking methods in novel areas. It explains how to translate the outputs of systems thinking methods in practice and introduces systems thinking with an overview of Human Factors and Ergonomics applications. This book will serve as a great reference for students and engineers in the field of systems engineering, complex systems and the design and development of systems, including ergonomics/human factors and systems engineers, designers, architects, industrial engineers, project management engineers, reliability engineers, risk engineers, software engineers and computer engineers.By Stefania Bandini, Francesca Gasparini, Viviana Mascardi, Matteo Palmonari, Giuseppe Vizzari. 2022
This book constitutes revised selected papers from the refereed proceedings of the 20th International Conference of the Italian Association for…
Artificial Intelligence, AIxIA 2021, which was held virtually in December 2021.The 36 full papers included in this book were carefully reviewed and selected from 58 submissions; the volume also contains 12 extended and revised workshop contributions. The papers were organized in topical sections as follows: Planning and strategies; constraints, argumentation, and logic programming; knowledge representation, reasoning, and learning; natural language processing; AI for content and social media analysis; signal processing: images, videos and speech; machine learning for argumentation, explanation, and exploration; machine learning and applications; and AI applications.This book constitutes the refereed proceedings of the 16th International Conference on Parallel Computational Technologies, PCT 2022, held in Dubna,…
Russia, during March 29–31, 2022.The 22 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.By Gerard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu. 2022
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022,…
held in Singapore, during August 6–8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections:Volume I:Knowledge Science with Learning and AI (KSLA)Volume II:Knowledge Engineering Research and Applications (KERA)Volume III:Knowledge Management with Optimization and Security (KMOS)By Ana Paula Rocha, Luc Steels, Jaap van den Herik. 2022
This book constitutes selected papers from the refereed proceedings of the 13th International Conference on Agents and Artificial Intelligence, ICAART…
2021, which was held online during February 4–6, 2021.A total of 72 full and 99 short papers were carefully reviewed and selected for the conference from a total of 298 submissions; 17 selected full papers are included in this book. They were organized in topical sections named agents and artificial intelligence.By Krishan Kumar, Sunny Behal, Abhinav Bhandari and Sajal Bhatia. 2023
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main…
aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS Spark-based DDoS Classification System for Cyber-Physical SystemsBy Ali Kashif Bashir, Giancarlo Fortino, Ashish Khanna, Deepak Gupta. 2022
This book includes selected peer-reviewed papers presented at the International Conference on Computing and Communication Networks (ICCCN 2021), held at…
Manchester Metropolitan University, United Kingdom, during 19–20 November 2021. The book covers topics of network and computing technologies, artificial intelligence and machine learning, security and privacy, communication systems, cyber physical systems, data analytics, cyber security for Industry 4.0, and smart and sustainable environmental systems.By Paulo Rogério de Almeida Ribeiro, Vinícius Rosa Cota, Dante Augusto Couto Barone, Alexandre César Muniz de Oliveira. 2022
This book constitutes the refereed proceedings of the Third Latin American Workshop, LAWCN 2021, held in Sao Luis do Maranhao,…
Brazil, during December 8–10, 2021.The 13 full papers and 3 short papers included in this book were carefully reviewed and selected from 27 submissions. They were organized in topical sections as follows: Interdisciplinary applications of Artificial Intelligence (AI) and Machine Learning (ML); AI and ML applied to robotics; AI and ML applied to biomedical sciences; Health issues and computational neuroscience; Software and hardware implementations in neuroscience; and Neuroengineering – science and technology.By Anghel Leonard, Lukas Eder. 2022
Learn the best way to write SQL in Java by taking control of SQL in your app via a type-safe,…
dynamic and versatile API that supports almost any type or feature compatible with a database and emphasizes SQL syntax correctnessKey FeaturesWrite complex, type-safe, and dynamic SQL using the powerful jOOQ APITackle complex persistence tasks, such as lazy fetching, R2DBC, transactions, and batching while sustaining high traffic in your modern Java applicationsUse a comprehensive SPI to shape and extend jOOQ according to your needsBook DescriptionjOOQ is an excellent query builder framework that allows you to emulate database-specific SQL statements using a fluent, intuitive, and flexible DSL API. jOOQ is fully capable of handling the most complex SQL in more than 30 different database dialects.jOOQ Masterclass covers jOOQ from beginner to expert level using examples (for MySQL, PostgreSQL, SQL Server, and Oracle) that show you how jOOQ is a mature and complete solution for implementing the persistence layer. You'll learn how to use jOOQ in Spring Boot apps as a replacement for SpringTemplate and Spring Data JPA. Next, you'll unleash jOOQ type-safe queries and CRUD operations via jOOQ's records, converters, bindings, types, mappers, multi-tenancy, logging, and testing. Later, the book shows you how to use jOOQ to exploit powerful SQL features such as UDTs, embeddable types, embedded keys, and more. As you progress, you'll cover trending topics such as identifiers, batching, lazy loading, pagination, and HTTP long conversations. For implementation purposes, the jOOQ examples explained in this book are written in the Spring Boot context for Maven/Gradle against MySQL, Postgres, SQL Server, and Oracle.By the end of this book, you'll be a jOOQ power user capable of integrating jOOQ in the most modern and sophisticated apps including enterprise apps, microservices, and so on.What you will learnEnable the jOOQ Code Generator in any combination of Java and Kotlin, Maven and GradleGenerate jOOQ artifacts directly from database schema, or without touching the real databaseUse jOOQ DSL to write and execute a wide range of queries for different databasesUnderstand jOOQ type-safe queries, CRUD operations, converters, bindings, and mappersImplement advanced SQL concepts such as stored procedures, derived tables, CTEs, window functions, and database viewsImplement jOOQ multi-tenancy, tuning, jOOQ SPI, logging, and testingWho this book is forThis book is for Java developers who write applications that interact with databases via SQL. No prior experience with jOOQ is assumed.Understand how to use modern C++ templates for writing maintainable, robust, and fast softwareKey FeaturesGrasp the fundamentals of and learn…
to write effective C++ templatesGet up to speed with the latest C++20 template features such as constraints and conceptsExplore different patterns and idioms to integrate templates in your program designBook DescriptionLearn how the metaprogramming technique enables you to create data structures and functions that allow computation to happen at compile time. With this book, you'll realize how templates help you avoid writing duplicate code and are key to creating generic libraries, such as the standard library or Boost, that can be used in a multitude of programs. The introductory chapters of this book will give you insights into the fundamentals of templates and metaprogramming. You'll then move on to practice writing complex templates and exploring advanced concepts such as template recursion, template argument deduction, forwarding references, type traits, and conditional compilation. Along the way, you'll learn how to write variadic templates and how to provide requirements to the template arguments with C++20 constraints and concepts. Finally, you'll apply your knowledge of C++ metaprogramming templates to implement various metaprogramming patterns and techniques. By the end of this book, you'll have learned how to write effective templates and implement metaprogramming in your everyday programming journey.What you will learnUnderstand the syntax for all types of templatesDiscover how specialization and instantiation worksGet to grips with template argument deduction and forwarding referencesWrite variadic templates with easeBecome familiar with type traits and conditional compilationRestrict template arguments in C++20 with constraints and conceptsImplement patterns such as CRTP, mixins, and tag dispatchingWho this book is forThis book is for beginner-to-intermediate C++ developers who want to learn about template metaprogramming as well as advanced C++ developers looking to get up to speed with the new C++20 features related to templates and the the various idioms and patterns. Basic C++ coding experience is necessary to get started with this book.By Premanand Chandrasekaran, Karthik Krishnan. 2022
Adopt a practical and modern approach to architecting and implementing DDD-inspired solutions to transform abstract business ideas into working software…
across the entire spectrum of the software development life cycleKey FeaturesImplement DDD principles to build simple, effective, and well-factored solutionsUse lightweight modeling techniques to arrive at a common collective understanding of the problem domainDecompose monolithic applications into loosely coupled, distributed components using modern design patternsBook DescriptionDomain-Driven Design (DDD) makes available a set of techniques and patterns that enable domain experts, architects, and developers to work together to decompose complex business problems into a set of well-factored, collaborating, and loosely coupled subsystems. This practical guide will help you as a developer and architect to put your knowledge to work in order to create elegant software designs that are enjoyable to work with and easy to reason about. You'll begin with an introduction to the concepts of domain-driven design and discover various ways to apply them in real-world scenarios. You'll also appreciate how DDD is extremely relevant when creating cloud native solutions that employ modern techniques such as event-driven microservices and fine-grained architectures. As you advance through the chapters, you'll get acquainted with core DDD's strategic design concepts such as the ubiquitous language, context maps, bounded contexts, and tactical design elements like aggregates and domain models and events. You'll understand how to apply modern, lightweight modeling techniques such as business value canvas, Wardley mapping, domain storytelling, and event storming, while also learning how to test-drive the system to create solutions that exhibit high degrees of internal quality. By the end of this software design book, you'll be able to architect, design, and implement robust, resilient, and performant distributed software solutions.What you will learnDiscover how to develop a shared understanding of the problem domainEstablish a clear demarcation between core and peripheral systemsIdentify how to evolve and decompose complex systems into well-factored componentsApply elaboration techniques like domain storytelling and event stormingImplement EDA, CQRS, event sourcing, and much moreDesign an ecosystem of cohesive, loosely coupled, and distributed microservicesTest-drive the implementation of an event-driven system in JavaGrasp how non-functional requirements influence bounded context decompositionsWho this book is forThis book is for intermediate Java programmers looking to upgrade their software engineering skills and adopt a collaborative and structured approach to designing complex software systems. Specifically, the book will assist senior developers and hands-on architects to gain a deeper understanding of domain-driven design and implement it in their organization. Familiarity with DDD techniques is not a prerequisite; however, working knowledge of Java is expected.By Corey Weisinger, Maarit Widmann, Daniele Tonini. 2022
Perform time series analysis using KNIME Analytics Platform, covering both statistical methods and machine learning-based methodsKey FeaturesGain a solid understanding…
of time series analysis and its applications using KNIMELearn how to apply popular statistical and machine learning time series analysis techniquesIntegrate other tools such as Spark, H2O, and Keras with KNIME within the same applicationBook DescriptionThis book will take you on a practical journey, teaching you how to implement solutions for many use cases involving time series analysis techniques.This learning journey is organized in a crescendo of difficulty, starting from the easiest yet effective techniques applied to weather forecasting, then introducing ARIMA and its variations, moving on to machine learning for audio signal classification, training deep learning architectures to predict glucose levels and electrical energy demand, and ending with an approach to anomaly detection in IoT. There's no time series analysis book without a solution for stock price predictions and you'll find this use case at the end of the book, together with a few more demand prediction use cases that rely on the integration of KNIME Analytics Platform and other external tools.By the end of this time series book, you'll have learned about popular time series analysis techniques and algorithms, KNIME Analytics Platform, its time series extension, and how to apply both to common use cases.What you will learnInstall and configure KNIME time series integrationImplement common preprocessing techniques before analyzing dataVisualize and display time series data in the form of plots and graphsSeparate time series data into trends, seasonality, and residualsTrain and deploy FFNN and LSTM to perform predictive analysisUse multivariate analysis by enabling GPU training for neural networksTrain and deploy an ML-based forecasting model using Spark and H2OWho this book is forThis book is for data analysts and data scientists who want to develop forecasting applications on time series data. While no coding skills are required thanks to the codeless implementation of the examples, basic knowledge of KNIME Analytics Platform is assumed. The first part of the book targets beginners in time series analysis, and the subsequent parts of the book challenge both beginners as well as advanced users by introducing real-world time series applications.By Ameur Salem Zaidoun. 2022
This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages…
them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware.Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers.It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. It is this combined expertise of individuals and organizations that will guarantee a minimum level of security for families, schools, the workplace and society in general.By Konstantinos N. Zafeiris, Christos H. Skiadas, Yiannis Dimotikalis, Alex Karagrigoriou, Christiana Karagrigoriou-Vonta. 2022
The scientific field of data analysis is constantly expanding due to the rapid growth of the computer industry and the…
wide applicability of computational and algorithmic techniques, in conjunction with new advances in statistical, stochastic and analytic tools. There is a constant need for new, high-quality publications to cover the recent advances in all fields of science and engineering.This book is a collective work by a number of leading scientists, computer experts, analysts, engineers, mathematicians, probabilists and statisticians who have been working at the forefront of data analysis and related applications. The chapters of this collaborative work represent a cross-section of current concerns, developments and research interests in the above scientific areas. The collected material has been divided into appropriate sections to provide the reader with both theoretical and applied information on data analysis methods, models and techniques, along with related applications.By Yuqing Sun, Tun Lu, Buqing Cao, Hongfei Fan, Dongning Liu, Bowen Du, Liping Gao. 2022
The two-volume set CCIS 1491 and 1492 constitutes the refereed post-conferenceproceedings of the 16th CCF Conference on Computer Supported Cooperative…
Work and Social Computing, ChineseCSCW 2021, held in Xiangtan, China, November 26–28, 2021. The conference was held in a hybrid mode i.e. online and on-site in Xiangtan due to the COVID-19 crisis.The 65 revised full papers and 22 revised short papers were carefully reviewed and selected from 242 submissions. The papers are organized in the following topical sections:Volume I:Collaborative Mechanisms, Models, Approaches, Algorithms and Systems; Cooperative Evolutionary Computation and Human-like Intelligent Collaboration; Domain-Specific Collaborative Applications;Volume II: Crowd Intelligence and Crowd Cooperative Computing; Social Media and Online Communities.By Paul Groth, Anisa Rula, Jodi Schneider, Ilaria Tiddi, Elena Simperl, Panos Alexopoulos, Rinke Hoekstra, Mehwish Alam, Anastasia Dimou, Minna Tamper. 2022
This book constitutes the proceedings of the satellite events held at the 19th Extended Semantic Web Conference, ESWC 2022, during…
May—June in Hersonissos, Greece, 2022. The included satellite events are: the poster and demo session; the PhD symposium; industry track; project networking; workshops and tutorials. During ESWC 2022, the following ten workshops took place:10th Linked Data in Architecture and Construction Workshop (LDAC 2022); 5th International Workshop on Geospatial Linked Data (GeoLD 2022); 5th Workshop on Semantic Web solutions for large-scale biomedical data analytics (SeMWeBMeDA 2022); 7th Natural Language Interfaces for the Web of Data (NLIWOD+QALD 2022); International Workshop on Knowledge Graph Generation from Text (Text2KG 2022); 3rd International Workshop on Deep Learning meets Ontologies and Natural Language Processing (DeepOntoNLP 2022); 1st Workshop on Modular Knowledge (ModularK 2022); Third International Workshop On Knowledge Graph Construction (KGCW 2022); Third International Workshop On Semantic Digital Twins (SeDIT 2022); and the 1st International Workshop on Semantic Industrial Information Modelling (SemIIM 2022).Wie bilde ich mir ein ethisches Urteil, um Konflikten zu begegnen? Was ist Technik und wer ist verantwortlich, wenn sie…
versagt? Stehen Menschen noch im Mittelpunkt – obwohl oder gerade weil Maschinen immer „smarter“ werden? Fragen wie diese verlangen nach einer übersichtlichen und verständlichen Präsentation ethischer Methoden der Technikbewertung. Dabei rückt vorliegendes Buch die Auseinandersetzung mit den Folgen, Risiken und Nebeneffekten technischen Handelns in den Mittelpunkt. Diese reichen von ökologischen Fragen der Entsorgung über Zweckentfremdung bis hin zur individuellen und kollektiven Verantwortung von Ingenieur*innen. Aufbauend auf Grundlagen der angewandten Ethik wird in Bottom-up- und Top-down-Verfahren die Kasuistik sowie analogisch-vergleichende und logisch-ableitende Urteilsbildung eingeführt. Wesentliche Charakteristika technischen Handelns sowie Akteursrollen werden systematisch vorgestellt. Abbildungen, Beispiele und Aufgaben runden den verständlichen Aufbau ab. Als methodischer Grundriss richtet sich vorliegendes Buch an Ingenieurwissenschaftler*innen, Informatiker*innen und Geisteswissenschaftler*innen im Berufsalltag, aber auch an interessierte Lai*innen, die mehr über ethische Praxis erfahren wollen. Es bildet den zweiten, in sich abgerundeten Teil der Buchreihe Grundlagen der Technikethik.Haben wir die Technik, die wir brauchen, und brauchen wir die Technik, die wir haben?By G. Rajakumar, Ke-Lin Du, Chandrasekar Vuppalapati, Grigorios N. Beligiannis. 2023
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held…
at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies and network security.