Title search results
Showing 1 - 20 of 2624 items
Learning SAS by Example: A Programmer's Guide
By Ron Cody. 2018
Learn to program SAS by example! Learning SAS by Example: A Programmer’s Guide, Second Edition, teaches SAS programming from very…
basic concepts to more advanced topics. Because most programmers prefer examples rather than reference-type syntax, this book uses short examples to explain each topic. The second edition has brought this classic book on SAS programming up to the latest SAS version, with new chapters that cover topics such as PROC SGPLOT and Perl regular expressions. This book belongs on the shelf (or e-book reader) of anyone who programs in SAS, from those with little programming experience who want to learn SAS to intermediate and even advanced SAS programmers who want to learn new techniques or identify new ways to accomplish existing tasks. In an instructive and conversational tone, author Ron Cody clearly explains each programming technique and then illustrates it with one or more real-life examples, followed by a detailed description of how the program works. The text is divided into four major sections: Getting Started, DATA Step Processing, Presenting and Summarizing Your Data, and Advanced Topics. Subjects addressed includeIf you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingEffective TypeScript
By Dan Vanderkam. 2024
TypeScript is a typed superset of JavaScript with the potential to solve many of the headaches for which JavaScript is…
famous. But TypeScript has a learning curve of its own, and understanding how to use it effectively takes time and practice. Using the format popularized by Effective C++ and Effective Java (both Addison-Wesley), this practical book features 83 items that give specific advice on what to do and what not to do, and how to think about the language. Author Dan Vanderkam shows you how to apply each item's advice through concrete examples. This book will help you advance from a beginning or intermediate user familiar with TypeScript basics to an expert who knows how to use the language well. Updated for TypeScript 5, this second edition includes two new chapters on type-level programming and TypeScript recipes.Learn the nuts and bolts of TypeScript's type systemUse type inference to get full safety with a minimum of type annotationsDesign types to make your code safer and more understandableModel complex APIs using generic types and type-level programmingUnderstand how dependencies and type declaration files work in TypeScriptSuccessfully migrate your JavaScript code base to TypeScriptFuzzy Learning and Applications (International Series on Computational Intelligence)
By Marco Russo. 2000
With low computational complexity and relatively short development time, Fuzzy Logic is an indispensable tool for engineering applications. The field…
is growing at an unprecedented rate, and there is a need for a book that describes essential tools, applications, examples, and perspectives in the field of fuzzy learning. The editors of Fuzzy LearniResponsible Use of AI in Military Systems (Chapman & Hall/CRC Artificial Intelligence and Robotics Series)
By Jan Maarten Schraagen. 2024
Artificial Intelligence (AI) is widely used in society today. The (mis)use of biased data sets in machine learning applications is…
well‑known, resulting in discrimination and exclusion of citizens. Another example is the use of non‑transparent algorithms that can’t explain themselves to users, resulting in the AI not being trusted and therefore not being used when it might be beneficial to use it.Responsible Use of AI in Military Systems lays out what is required to develop and use AI in military systems in a responsible manner. Current developments in the emerging field of Responsible AI as applied to military systems in general (not merely weapons systems) are discussed. The book takes a broad and transdisciplinary scope by including contributions from the fields of philosophy, law, human factors, AI, systems engineering, and policy development.Divided into five sections, Section I covers various practical models and approaches to implementing military AI responsibly; Section II focuses on liability and accountability of individuals and states; Section III deals with human control in human‑AI military teams; Section IV addresses policy aspects such as multilateral security negotiations; and Section V focuses on ‘autonomy’ and ‘meaningful human control’ in weapons systems.Key Features: Takes a broad transdisciplinary approach to responsible AI Examines military systems in the broad sense of the word Focuses on the practical development and use of responsible AI Presents a coherent set of chapters, as all authors spent two days discussing each other’s work This book provides the reader with a broad overview of all relevant aspects involved with the responsible development, deployment and use of AI in military systems. It stresses both the advantages of AI as well as the potential downsides of including AI in military systems.Learn R: As a Language (Chapman & Hall/CRC The R Series)
By Pedro J. Aphalo. 2024
Learning a computer language like R can be either frustrating, fun or boring. Having fun requires challenges that wake up…
the learner’s curiosity but also provide an emotional reward for overcoming them. The book is designed so that it includes smaller and bigger challenges, in what I call playgrounds, in the hope that all readers will enjoy their path to R fluency. Fluency in the use of a language is a skill that is acquired through practice and exploration. For students and professionals in the biological sciences, humanities and many applied fields, recognizing the parallels between R and natural languages should help them feel at home with R. The approach I use is similar to that of a travel guide, encouraging exploration and describing the available alternatives and how to reach them. The intention is to guide the reader through the R landscape of 2024 and beyond.What is new in the second edition? Text expanded by more than 25% to include additional R features and gentler and more detailed explanations Contains 24 new diagrams and flowcharts, seven new tables, and revised text and code examples for clarity All three indexes were expanded, and answers to 28 frequently asked questions added What will you find in this book? Programming concepts explained as they apply to current R Emphasis on the role of abstractions in programming Few prescriptive rules—mostly the author’s preferences together with alternatives Presentation of the R language emphasizing the “R way of doing things” Tutoring for “programming in the small” using scripts for data analysis Explanation of the differences between R proper and extensions for data wrangling The grammar of graphics is described as a language for the construction of data visualisations Examples of data exchange between R and the foreign world using common file formats Coaching to become an independent R user, capable of writing original scripts and solving future challengesBuilding China into a Cyber Superpower: Desires, Drivers, and Devices
By Munish Sharma. 2024
This book provides a comprehensive look into China’s emerging cyberspace strategy. It highlights the prime drivers of China’s desire to…
be a cyber superpower and discusses the ways in which China is turning resources into cyber power.The book analyses China’s domestic cyber policy initiatives, strategy documents, censorship measures, and the rationale behind its strong advocacy for sovereignty in cyberspace. It examines China’s position on the prominent issues of cyberspace governance, norms and security in cyberspace, and key diplomatic initiatives. The book also discusses next-generation networks, artificial intelligence, quantum information sciences, and cyber warfare.An important contribution to the study of China’s cyber policy, the book will be of interest to students and researchers of international relations,Chinese digitalisation, security studies, Chinese politics, international security, Chinese foreign policy, and Chinese economy. It will also be useful to the policymakers and corporate professionals engaged with China’s digital sphere.Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the field of Artificial…
Intelligence. The book covers the state of the art in AI research, including machine learning, natural language processing, computer vision, and robotics, and explores how these technologies are transforming various industries and domains, such as healthcare, finance, education, and entertainment.The book also addresses the challenges that come with the widespread adoption of AI, including ethical concerns, bias, and the impact on jobs and society. It provides insights into how to mitigate these challenges and how to design AI systems that are responsible, transparent, and trustworthy.The book offers a forward-looking perspective on the future of AI, exploring the emerging trends and applications that are likely to shape the next decade of AI innovation. It also provides practical guidance for businesses and individuals on how to leverage the power of AI to create new products, services, and opportunities.Overall, the book is an essential read for anyone who wants to stay ahead of the curve in the rapidly evolving field of Artificial Intelligence and understand the impact that this transformative technology will have on our lives in the coming years.Advancement of Data Processing Methods for Artificial and Computing Intelligence (River Publishers Series in Computing and Information Science and Technology)
By Seema Rawat, V. Ajantha Devi, Praveen Kumar. 2024
This book emphasizes the applications of advances in data processing methods for Artificial Intelligence in today's fast-changing world, as well…
as to serve society through research, innovation, and development in this field. This book is applicable to a wide range of data that contribute to data science concerns and can be used to promote research in this high-potential new field. People's perceptions of the world and how they conduct their lives have changed dramatically as a result of technological advancements. The world has been gripped by technology, and the advances that are being made every day are undeniably transforming the planet. In the domains of Big Data, engineering, and data science, this cutting-edge technology is ready to support us.Artificial intelligence (AI) is a current research topic because it can be applied to a wide range of applications and disciplines to solve complicated problems and find optimal solutions. In research, medicine, technology, and the social sciences, the benefits of AI have already been proven. Data science, also known as pattern analytics and mining, is a technique for extracting useful and relevant information from databases, enabling better decision-making and strategy formulation in a range of fields. As a result of the exponential growth of data in recent years, the combined notions of big data and AI have given rise to many study areas, such as scale-up behaviour from classical algorithms. Furthermore, combining numerous AI technologies from other areas (such as vision, security, control, and biology) in order to build efficient and durable systems that interact in the real world is a new problem. Despite recent improvements in fundamental AI technologies, the integration of these skills into larger, trustworthy, transparent, and maintainable systems is still in its development. Both conceptually and practically, there are a number of unanswered issues.Model-Driven Software Systems Development Using the Meta-Artifact Process
By Wayne O'Brien. 2024
The importance of architecture for software systems is widely accepted, but the role of architecture in the overall development process…
is not so clear. Presenting an architecture-centric process, Model-Driven Software Systems Development Using the Meta-Artifact Process makes the role of architecture clear. At its core, this book is about developing software systems and, more specifically, software code. It describes three major innovations for making software, which are combined with five widely used enabling technologies, to provide a complete, hypothesis-driven software development process known as Meta-Artifact Process (MAP). Having complete requirements is essential for making good software and supports the hypothesis-driven MAP.MAP offers properties, qualities, and capabilities that help stakeholders and developers understand and reason about a domain and target systems of interest. MAP, through the central role of the Meta-Artifact and incorporating the view that a computer program is a hypothesis about the requirements, offers new ways to look at systems and their development, even changing the roles of developers and stakeholders.Recommending agile methods wherever appropriate while supporting the OMG Essence standard and working within an overarching architecture, MAP presents ways to ensure that the requirements are complete and correct. It helps to identify likely points during development to form alternative hypotheses about them. Because MAP requires an underlying software development process, it can provide that clarity to existing processes in which the organization’s developers are already proficient.This book provides concrete examples from two broad but diverse areas—Accounting Information Systems in the commercial area and a military command and control system—to show the wide applicability of MAP in both commercial and defense domains.This book constitutes the refereed proceedings of the 13th International Conference on Artificial Intelligence in Music, Sound, Art and Design,…
EvoMUSART 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3–5, 2024. The 17 full papers and 8 short papers presented in this book were carefully reviewed and selected from 55 submissions. The main purpose of this conference proceedings was to bring together practitioners who are using Artificial Intelligence techniques for artistic tasks, providing the opportunity to promote, present, and discuss ongoing work in the area.Human-Computer Interaction – INTERACT 2023: 19th IFIP TC13 International Conference, York, UK, August 28 – September 1, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14144)
By José Abdelnour Nocera, Marta Kristín Lárusdóttir, Helen Petrie, Antonio Piccinno, Marco Winckler. 2023
The four-volume set LNCS 14442 -14445 constitutes the proceedings of the 19th IFIP TC 13 International Conference on Human-Computer Interaction,…
INTERACT 2023, held in York, UK, in August/September 2023. The 71 full papers and 58 short papers included in this book were carefully reviewed and selected from 406 submissions. They were organized in topical sections as follows: 3D Interaction; Accessibility; Accessibility and Aging; Accessibility for Auditory/Hearing Disabilities; Co-Design; Cybersecurity and Trust; Data Physicalisation and Cross-device; Eye-Free, Gesture Interaction and Sign Language; Haptic interaction and Healthcare applications; Self-Monitoring; Human-Robot Interaction; Information Visualization; Information Visualization and 3D Interaction; Interacting with Children; Interaction with Conversational Agents; Methodologies for HCI; Model-Based UI Design and Testing; Montion Sickness, Stress and Risk perception in 3D Environments and Multisensory interaction; VR experiences; Natural Language Processing and AI Explainability; Online Collaboration and Cooperative work; Recommendation Systems and AI Explainability; Social AI; Social and Ubiquitous Computing; Social Media and Digital Learning; Understanding Users and Privacy Issues; User movement and 3D Environments; User Self-Report; User Studies; User Studies, Eye-Tracking, and Physiological Data; Virtual Reality; Virtual Reality and Training; Courses; Industrial Experiences; Interactive Demonstrations; Keynotes; Panels; Posters; and Workshops.Innovative Technologies for Enhancing Experiences and Engagement (SpringerBriefs in Applied Sciences and Technology)
By Azman Ismail, Fatin Nur Zulkipli, Rahimah Mahat, Mohd Amran Mohd Daril, Andreas Öchsner. 2024
The book showcases how the technologies are transforming entertainment, education, and professional training, offering readers real-world examples of their applications.…
"Innovative Technologies for Enhancing Experiences and Engagement" is an enlightening guide that reveals how emerging technologies are shaping our world, offering insights into the evolving digital landscape and inspiring a future of more personalized, immersive, and engaging experiences.Proceedings of the 2nd International Conference on Internet of Things, Communication and Intelligent Technology (Lecture Notes in Electrical Engineering #1197)
By Jian Dong, Long Zhang, Deqiang Cheng. 2024
This conference discussed the application of communication and IoT engineering in the era of smart technologies from the perspective of…
disciplinary integration, combining the theory and relevant algorithms of IoT and smart technologies. The book encompasses the entire spectrum of IoT solutions, from IoT to cybersecurity. It explores communication systems, including sixth generation (6G) mobile, D2D and M2M communications. It also focuses on intelligent technologies, especially information systems modeling and simulation. In addition, it explores the areas of pervasive computing, distributed computing, high performance computing, pervasive and mobile computing, and cloud computing.Applied Multi-objective Optimization (Springer Tracts in Nature-Inspired Computing)
By Nilanjan Dey. 2024
The book explains basic ideas behind several kinds of applied multi-objective optimization and shows how it will be applied in…
practical contexts in the domain of healthcare, engineering design, and manufacturing. The book discusses how meta-heuristic algorithms are successful in resolving challenging, multi-objective optimization issues in various disciplines, including engineering, economics, medical and environmental management. The topic is useful for graduates, researchers and lecturers in optimization, engineering, management science and computer science.Proceedings of Eighth International Congress on Information and Communication Technology: ICICT 2023, London, Volume 4 (Lecture Notes in Networks and Systems #696)
By Xin-She Yang, R. Simon Sherratt, Nilanjan Dey, Amit Joshi. 2024
This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at…
Brunel University, London, on 20–23 February 2023. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The work is presented in four volumes.Work Remotely (Penguin Business Experts Series)
By Anastasia Tohmé, Martin Worner. 2021
Remote working makes us happier, more productive and more profitable, but it can bring its own set of challenges. How…
do we manage our work-life balance; communicate and collaborate effectively as teams; and ensure our technology is efficient?In Work Remotely, Penguin Business Experts Anastasia Tohmé and Martin Worner explain everything you need to know:- Set your own targets and monitor productivity- Establish boundaries between working hours and free time- Manage effective communication and decision-making at a distanceIncluding case studies from the companies around the world who are innovating and revolutionizing the way we work, Work Remotely shares useful advice and practical tips to ensure you get the most out of working away from the office environment.The Trust Manifesto: What you Need to do to Create a Better Internet
By Damian Bradfield. 2019
From the moment we wake up and unlock our phones, we're producing data. We offer up our unique fingerprint to…
the online world, scan our route to work, listen to a guided meditation or favourite playlist, slide money around, share documents and update our social media accounts. We reach for our phones up to 200 times a day, not knowing which companies are storing, using, selling and manipulating our data. But do we care? We're busy. We've got lives. We're pressed for time! There aren't enough hours in the day to read the terms and conditions. Or, maybe we're happy to trade our personal data for convenient services and to make our lives easier?Big data is the phenomenon of our age, but should we trust it without question? This is the trust dilemma.In 2009, Damian Bradfield founded WeTransfer, the largest file-sharing platform in the world with 50 million global users shipping more than one billion files of data a month. His unique experience of the big data economy has led him to question if there is another way to build the internet, one that is fairer and safer for everyone and, in The Trust Manifesto, he lays out this vision.From Concepts to Code: Introduction to Data Science
By Adam P. Tashman. 2024
The breadth of problems that can be solved with data science is astonishing, and this book provides the required tools…
and skills fot a broad audience. The reader takes a journey into the forms, uses, and abuses of data and models, and learns how to critically examine each step. Python coding and data analysis skills are built from the ground up, with no prior coding experience assumed. The necessary background in computer science, mathematics, and statistics is provided in an approachable manner.Each step of the machine learning lifecycle is discussed, from business objective planning to monitoring a model in production. This end-to-end approach supplies the broad view necessary to sidestep many of the pitfalls that can sink a data science project. Detailed examples are provided from a wide range of applications and fields, from fraud detection in banking to breast cancer classification in healthcare. The reader will learn the techniques to accomplish tasks that include predicting outcomes, explaining observations, and detecting patterns. Improper use of data and models can introduce unwanted effects and dangers to society. A chapter on model risk provides a framework for comprehensively challenging a model and mitigating weaknesses. When data is collected, stored, and used, it may misrepresent reality and introduce bias. Strategies for addressing bias are discussed. From Concepts to Code: Introduction to Data Science leverages content developed by the author for a full-year data science course suitable for advanced high school or early undergraduate students. This course is freely available and it includes weekly lesson plans.Threat Modeling: Designing for Security
By Adam Shostack. 2014
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies…
and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.