Title search results
Showing 1 - 20 of 46675 items
Sh**ged. Married. Annoyed.: The Sunday Times No. 1 Bestseller
By Chris Ramsey, Rosie Ramsey. 2020
Whether you've barely recovered from spending lockdown with your other half or desperately heading back to the clubs to meet…
'the one', SH**GED. MARRIED. ANNOYED. is here to see you through . . .THE SUNDAY TIMES BESTSELLER FROM THE STARS OF THE CHART-TOPPING PODCASTNOW FEATURING A BONUS CHAPTER'An absolute triumph' Daisy May Cooper'These two are bloody hilarious' Zoe Sugg'A hilarious look at the highs and lows of relationships' Sun__________SH**GED.Hitting the bars, necking drinks and necking strangers, stumbling home, one-night-stands, nightmare dates, thinking this one's alright, ghosting, tears, more drinking, living off late-night chips.MARRIED.Meeting 'the one', weekends away, moving in, declaring life-long love, stags and hens, the perfect wedding, the honeymoon period, getting through the hard bits together, starting a family.ANNOYED.Can you close the bathroom door if you're doing that? Sleepless nights, arguing about whose turn it is to change the baby's nappy, toys everywhere, only having two drinks, still being hungover, wondering when it all stopped being easy.Whether you're sh**ged, married, annoyed, or all of the above, Chris and Rosie Ramsey write hilariously and with honesty about the ups and downs of dating, relationships, arguing, parenting and everything in between.Convergence of Blockchain and Internet of Things in Healthcare (Smart Engineering Systems: Design and Applications)
By Arun Kumar Rana, Vishnu Sharma, Ajay Rana, Maksud Alam and Suman Lata Tripathi. 2024
The Internet of Things (IoT) and blockchain are two new technologies that combine elements in many ways. A system where…
the virtual and physical worlds interact is created by integrating pervasive computing, ubiquitous computing, communication technologies, sensing technologies, Internet Protocol, and embedded devices. A massive number of linked devices and vast amounts of data present new prospects for developing services that can directly benefit the economy, environment, society, and individual residents. Due to the size of IoT and insufficient data security, security breaches may have a huge impact and negative effects. IoT not only connects gadgets but also people and other entities, leaving every IoT component open to a wide variety of assaults. The implementation and application of IoT and blockchain technology in actual scientific, biomedical, and data applications are covered in this book. The book highlights important advancements in health science research and development by applying the distinctive capabilities inherent to distributed ledger systems. Each chapter describes the current uses of blockchain in real-world data collection, medicine development, device tracking, and more meaningful patient interaction. All of these are used to create opportunities for expanding health science research. This paradigm change is studied from the perspectives of pharmaceutical executives, biotechnology entrepreneurs, regulatory bodies, ethical review boards, and blockchain developers.Key Features: Provides a foundation for the implementation process of blockchain and IoT devices based on healthcare-related technology Image processing and IoT device researchers can correlate their work with other requirements of advanced technology in the healthcare domain Conveys the latest technology, including artificial intelligence and machine learning, in healthcare-related technology Useful for the researcher to explore new things like security, cryptography, and privacy in healthcare related technology Tailored for people who want to start in healthcare-related technology with blockchain and IoT This book is primarily for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, computer science and engineering, and biomedical engineering.Intelligent Security Solutions for Cyber-Physical Systems (Chapman & Hall/CRC Cyber-Physical Systems)
By Vandana Mohindru Sood, Yashwant Singh, Bharat Bhargava, Sushil Kumar Narang. 2024
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and…
involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: • Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management. • Showcases cyber-physical systems (CPSs) security solutions, lightweight cryptographic solutions, and CPS forensics, etc. • Emphasizes machine learning methods for behavior-based intrusion detection in cyber-physical systems (CPSs), resilient machine learning for networked CPS, fog computing industrial CPS, etc. • Elaborates classification of network abnormalities in Internet of Things-based cyber-physical systems (CPSs) using deep learning. • Includes case studies and applications in the domain of smart grid systems, industrial control systems, smart manufacturing, social network and gaming, electric power grid and energy systems, etc.Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications (Texts in Computer Science)
By Joakim Kävrestad, Marcus Birath, Nathan Clarke. 2024
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to…
ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector. Emphasis is placed on reinforcing sound forensic thinking, and gaining experience in common tasks through hands-on exercises.This enhanced third edition describes practical digital forensics with open-source tools and includes an outline of current challenges and research directions.Topics and features:Outlines what computer forensics is, and what it can do, as well as what its limitations areDiscusses both the theoretical foundations and the fundamentals of forensic methodologyReviews broad principles that are applicable worldwideExplains how to find and interpret several important artifactsDescribes free and open-source software toolsFeatures content on corporate forensics, ethics, SQLite databases, triage, and memory analysisIncludes new supporting video lectures on YouTubeThis easy-to-follow primer is an essential resource for students of computer forensics, and will also serve as a valuable reference for practitioners seeking instruction on performing forensic examinations.Custom Components in Architecture: Strategies for Customizing Repetitive Manufacturing
By Dana Gulling. 2024
This book offers architects strategies in the design and manufacturing of custom, repetitively manufactured building components.A total of 36 case…
studies from around the globe demonstrate the diversity of CRM in architecture and are contributed by architecture firms, including Diller Scofidio + Renfro, Kengo Kuma & Associates, Abin Design Studio, Behnisch Architekten, Belzberg Architects, and many more. The book is organized by manufacturing process and covers the use of various types of glass, clay, plastic, metal, wood, plaster, and concrete. Each process is described with diagrams and text and expanded with one or more examples of customized building components. Projects included are of buildings of various types, sizes, and clients, and many deviate from the typical manufacturing process as they include a secondary process (e.g. casting glass, then slumping it), special tooling modifications (e.g. dams used to subdivide a mold), post-production processes, or other notable manufacturing features. Each case study includes a project overview, behind‐the‐scenes images of the component manufacturing, and original diagrams that illustrate how those components were customized.Custom Components in Architecture will be essential reading for any architect interested in building design details and keeping up-to-speed on material advances. Upper-level students of digital architecture, fabrication, and building technology will also find this a useful tool.Master the skills required to become an AI product manager and drive the successful development and deployment of AI products…
to deliver value to your organization.Purchase of the print or Kindle book includes a free PDF eBook.Key FeaturesBuild products that leverage AI for the common good and commercial successTake macro data and use it to show your customers you're a source of truthBest practices and common pitfalls that impact companies while developing AI productBook DescriptionProduct managers working with artificial intelligence will be able to put their knowledge to work with this practical guide to applied AI. This book covers everything you need to know to drive product development and growth in the AI industry. From understanding AI and machine learning to developing and launching AI products, it provides the strategies, techniques, and tools you need to succeed.The first part of the book focuses on establishing a foundation of the concepts most relevant to maintaining AI pipelines. The next part focuses on building an AI-native product, and the final part guides you in integrating AI into existing products.You'll learn about the types of AI, how to integrate AI into a product or business, and the infrastructure to support the exhaustive and ambitious endeavor of creating AI products or integrating AI into existing products. You'll gain practical knowledge of managing AI product development processes, evaluating and optimizing AI models, and navigating complex ethical and legal considerations associated with AI products. With the help of real-world examples and case studies, you'll stay ahead of the curve in the rapidly evolving field of AI and ML.By the end of this book, you'll have understood how to navigate the world of AI from a product perspective.What you will learnBuild AI products for the future using minimal resourcesIdentify opportunities where AI can be leveraged to meet business needsCollaborate with cross-functional teams to develop and deploy AI productsAnalyze the benefits and costs of developing products using ML and DLExplore the role of ethics and responsibility in dealing with sensitive dataUnderstand performance and efficacy across verticalsWho this book is forThis book is for product managers and other professionals interested in incorporating AI into their products. Foundational knowledge of AI is expected. If you understand the importance of AI as the rising fourth industrial revolution, this book will help you surf the tidal wave of digital transformation and change across industries.Technology Innovation for Business Intelligence and Analytics: Techniques and Practices for Business Intelligence Innovation (Studies in Big Data #147)
By Haitham M. Alzoubi, Muhammad Turki Alshurideh, Srinidhi Vasudevan. 2024
This book provides a standpoint on how to effectively use technology innovation for business intelligence and analytics. It presents an…
approach that combines cutting-edge technological advancements with practical applications in the business world. The book covers a range of innovative technologies and how they can be applied to enhance business intelligence and analytics. It is primarily aimed at professionals in the business field data analysts and students studying subjects. This book is especially beneficial for those who want to grasp and apply the technological trends in making strategic business decisions. Its comprehensive coverage makes it an indispensable resource for anyone, in the intersection of technology and business analytics.Fourth Congress on Intelligent Systems: CIS 2023, Volume 1 (Lecture Notes in Networks and Systems #868)
By Sandeep Kumar, Balachandran K., Joong Hoon Kim, Jagdish Chand Bansal. 2024
This book is a collection of selected papers presented at the Fourth Congress on Intelligent Systems (CIS 2023), organized by …
CHRIST (Deemed to be University), Bangalore, India, under the technical sponsorship of the Soft Computing Research Society, India, during September 4–5, 2023. It includes novel and innovative work from experts, practitioners, scientists, and decision-makers from academia and industry. It covers topics such as the Internet of Things, information security, embedded systems, real-time systems, cloud computing, big data analysis, quantum computing, automation systems, bio-inspired intelligence, cognitive systems, cyber-physical systems, data analytics, data/web mining, data science, intelligence for security, intelligent decision-making systems, intelligent information processing, intelligent transportation, artificial intelligence for machine vision, imaging sensors technology, image segmentation, convolutional neural network, image/video classification, soft computing for machine vision, pattern recognition, human-computer interaction, robotic devices and systems, autonomous vehicles, intelligent control systems, human motor control, game playing, evolutionary algorithms, swarm optimization, neural network, deep learning, supervised learning, unsupervised learning, fuzzy logic, rough sets, computational optimization, and neuro-fuzzy systems.Proceedings of International Conference on Information Technology and Applications: ICITA 2023 (Lecture Notes in Networks and Systems #839)
By Abrar Ullah, Sajid Anwar, Davide Calandra, Raffaele Di Fuccio. 2024
This book includes high-quality papers presented at 17th International Conference on Information Technology and Applications (ICITA 2023), held in Turin,…
Italy during 20 – –22 October 2023. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in information technology and applications. The topics covered in the book are cloud computing, business process engineering, machine learning, evolutionary computing, big data analytics, internet of things and cyber-physical systems, information and knowledge management, computer vision and image processing, computer graphics and games programming, mobile computing, ontology engineering, software and systems modelling, human computer interaction, online learning /e-learning, computer networks, and web engineering.This LNCS conference volume constitutes the proceedings of the MICCAI Workshop GRAIL 2023 and MICCAI Challenge OCELOT 2023, Held in…
Conjunction with MICCAI 2023, Vancouver, BC, Canada, September 23, and October 4, 2023. The 9 full papers (GRAIL 2023) and 6 full papers (OCELOT 2023) included in this volume were carefully reviewed and selected from GRAIL 14 (GRAIL 2023) and 6 (OCELOT 2023) submissions. The conference GRAIL 2023 a wide set of methods and application and OCELOT 2023 focuses on the cover a wide range of methods utilizing tissue information for better cell detection, in the sense of training strategy, model architecture, and especially how to model cell-tissue relationships.Proceedings of 3rd 2023 International Conference on Autonomous Unmanned Systems: Volume V (Lecture Notes in Electrical Engineering #1175)
By Yi Qu, Mancang Gu, Yifeng Niu, Wenxing Fu. 2024
This book includes original, peer-reviewed research papers from the 3rd ICAUS 2023, which provides a unique and engaging platform for…
scientists, engineers and practitioners from all over the world to present and share their most recent research results and innovative ideas. The 3rd ICAUS 2023 aims to stimulate researchers working in areas relevant to intelligent unmanned systems. Topics covered include but are not limited to: Unmanned Aerial/Ground/Surface/Underwater Systems, Robotic, Autonomous Control/Navigation and Positioning/ Architecture, Energy and Task Planning and Effectiveness Evaluation Technologies, Artificial Intelligence Algorithm/Bionic Technology and their Application in Unmanned Systems.The papers presented here share the latest findings in unmanned systems, robotics, automation, intelligent systems, control systems, integrated networks, modelling and simulation. This makes the book a valuable resource for researchers, engineers and students alike.Data Analytics and Machine Learning: Navigating the Big Data Landscape (Studies in Big Data #145)
By Pushpa Singh, Asha Rani Mishra, Payal Garg. 2024
This book presents an in-depth analysis of successful data-driven initiatives, highlighting how organizations have leveraged data to drive decision-making processes,…
optimize operations, and achieve remarkable outcomes. Through case studies, readers gain valuable insights and learn practical strategies for implementing data analytics, big data, and machine learning solutions in their own organizations. The book discusses the transformative power of data analytics and big data in various industries and sectors and how machine learning applications have revolutionized exploration by enabling advanced data analysis techniques for mapping, geospatial analysis, and environmental monitoring, enhancing our understanding of the world and its dynamic processes. This book explores how big data explosion, the power of analytics and machine learning revolution can bring new prospects and opportunities in the dynamic and data-rich landscape. It highlights the future research directions in data analytics, big data, and machine learning that explores the emerging trends, challenges, and opportunities in these fields by covering interdisciplinary approaches such as handling and analyzing real-time and streaming data.Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities: Includes selected Papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022) (EAI/Springer Innovations in Communication and Computing)
By Ahmed A. Abd El-Latif, Lo’ai Tawalbeh, Yassine Maleh, Brij B. Gupta. 2024
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection…
in IoT and edge and fog computing. The primary focus of the book addresses security mechanisms in IoT and edge/ fog computing, advanced secure deployments for large scaled edge/ fog computing, and new efficient data security strategy of IoT and edge/ fog computing. The book lays a foundation of the core concepts and principles of IoT and 5G security, walking the reader through the fundamental ideas. This book is aimed at researchers, graduate students, and engineers in the fields of secure IoT and edge/ fog computing. The book also presents selected papers from International Conference on Advanced Computing & Next-Generation Communication (ICACNGC 2022).Health Information Processing. Evaluation Track Papers: 9th China Conference, CHIP 2023, Hangzhou, China, October 27–29, 2023, Proceedings (Communications in Computer and Information Science #2080)
By Hua Xu, Qingcai Chen, Hongfei Lin, Fei Wu, Lei Liu, Buzhou Tang, Tianyong Hao, Zhengxing Huang, Jianbo Lei, Zuofeng Li, Hui Zong. 2024
This book constitutes the refereed proceedings of the evaluation track of the 9th China Health Information Processing Conference, CHIP 2023,…
held in Hangzhou, China, during October 27–29, 2023. The 15 algorithms papers and 6 overview papers included in this book were carefully reviewed and selected from a total of 66 submissions to the conference. They were organized in topical sections as follows: CHIP-PromptCBLUE Medical Large Model Evaluation; Chinese Medical Text Few-shot Named Entity Recognition; Drug Paper Document Recognition and Entity Relation Extraction; CHIP-YIER Medical Large Model Evaluation; Medical Literature PICOS Identification; Chinese Diabetes Question Classification;Flexibility, Resilience and Sustainability (Flexible Systems Management)
By Sushil, Neelam Rani, Rohit Joshi. 2024
This book discusses initiatives intended to promote strategic flexibility, resilience, sustainability, and information system flexibility and analytics, through AI, HR…
analytics, employee attrition using perspectives from machine learning, agile competencies, agile organization, digital recruitment, e-governance, cyber security controls, and cyber security risk management. It explores areas such as banking system, medical tourism, pharmaceutical industry, defense sector, online shopping, to name some. It brings different perspectives on how to improve the resilience of human resources in organizations through employee engagement, exploration, experimentation, and so on, to create sustainable organizations. There is also some focus on innovation and environmental sustainability concerns, co-worker support, exploring the linkages, and in one case, culture essentials for Industry 5.0. Divided into three parts, covering a range of topics, contexts, and methods used to understand the relevant issues in flexibility, resilience, and sustainability, thes book is a useful addition to the literature on the topic as well as a practical resource for practitioners. It will be a useful resource for a variety of audiences such as management students and researchers, practicing business managers, consultants, and professional institutions.The Curious Case of Usable Privacy: Challenges, Solutions, and Prospects (Synthesis Lectures on Information Security, Privacy, and Trust)
By Simone Fischer-Hübner, Farzaneh Karegar. 2024
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI)…
reveals a myriad of challenges, solutions, and new possibilities. Establishing a solid understanding of usable privacy research, practices, and challenges, the book illuminates for readers the often shadowy corridors of such a multifaceted domain and offers guidelines and solutions to successfully traverse the challenging maze. The book does not simply focus on data protection or legislative frameworks but also on what it takes for privacy to be safeguarded, understood, embraced, and easily practiced by all. It begins with a thorough exploration of the background of privacy tools and technologies, the evolution of privacy rules and regulations, and the backdrop upon which this narrative unfolds. After establishing this context, its next important focus is the current state and future directions of the field, including thefrontiers of usable privacy research in relation to the Internet of Things (IoT), usability of PETs, and usable privacy for UX and software developers. The book also considers the often-overlooked privacy narratives of marginalized communities and delves into the complexities of user-centric privacy. Readers are provided with a blueprint for addressing these hurdles and establishing pathways for a more privacy-conscious world. The text will be of interest to students studying Computer Science, Information Systems, or Law, as well as researchers and practitioners working in the fields of usable privacy, privacy by design, Privacy-Enhancing Technologies (PETs), or HCI. All will benefit from the book’s central deliberation of a question that echoes through time and technological advancements: why does usable privacy matter?The Road towards 6G: A Comprehensive View of the Enabling Technologies
By Valeria Loscri, Luca Chiaraviglio, Anna Maria Vegni. 2024
The proposed book will provide a comprehensive picture of the journey from 5G networks towards 6G. Different aspects, ranging from…
theoretical foundations to existing platforms and technologies will be presented and analysed, by critically highlighting the real opportunities and the challenges. The first chapters are to describe the general “transitioning” aspects from 5G to 6G. After that, an overview on the different technologies is provided, to present at the end the security aspects, the new applications and an analysis of the electromagnetic exposure, above all in terms of comparative in respect of 5G. Security and Application will be straightforward better explained after the big picture on the different technologies is detailed in the previous chapters. 6G is an emerging complex paradigm, with some important new concepts, that would enable an extremely high reliability and low latency. The main purpose is to provide the reader a thorough vision of the enabling technologies, their potential and what is still needed to fill the gap in terms of sustainability and coexistence of the different technologies. Since different emerging technologies will be considered and detailed in the book, it will be interesting for the reader to infer the major opportunities of each and the main limitations. This kind of information will mainly boost the potential interactions of different technologies to provide a more reliable system.Dependable Computing: Design and Assessment (IEEE Press)
By Ravishankar K. Iyer, Zbigniew T. Kalbarczyk, Nithin M. Nakka. 2024
Dependable Computing Covering dependability from software and hardware perspectives Dependable Computing: Design and Assessment looks at both the software and…
hardware aspects of dependability. This book: Provides an in-depth examination of dependability/fault tolerance topics Describes dependability taxonomy, and briefly contrasts classical techniques with their modern counterparts or extensions Walks up the system stack from the hardware logic via operating systems up to software applications with respect to how they are hardened for dependability Describes the use of measurement-based analysis of computing systems Illustrates technology through real-life applications Discusses security attacks and unique dependability requirements for emerging applications, e.g., smart electric power grids and cloud computing Finally, using critical societal applications such as autonomous vehicles, large-scale clouds, and engineering solutions for healthcare, the book illustrates the emerging challenges faced in making artificial intelligence (AI) and its applications dependable and trustworthy. This book is suitable for those studying in the fields of computer engineering and computer science. Professionals who are working within the new reality to ensure dependable computing will find helpful information to support their efforts. With the support of practical case studies and use cases from both academia and real-world deployments, the book provides a journey of developments that include the impact of artificial intelligence and machine learning on this ever-growing field. This book offers a single compendium that spans the myriad areas in which dependability has been applied, providing theoretical concepts and applied knowledge with content that will excite a beginner, and rigor that will satisfy an expert. Accompanying the book is an online repository of problem sets and solutions, as well as slides for instructors, that span the chapters of the book.Linux Pocket Guide: Essential Commands
By Daniel J. Barrett. 2016
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated…
20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, and more.In this concise guide, author Daniel Barrett provides the most useful Linux commands grouped by functionality. Whether you're a novice or an experienced user, this practical book is an ideal reference for the most important Linux commands.You'll learn:Essential concepts—commands, shells, users, and the filesystemFile commands-creating, organizing, manipulating, and processing files of all kindsSysadmin basics-superusers, processes, user management, and software installationFilesystem maintenance-disks, RAID, logical volumes, backups, and moreNetworking commands-working with hosts, network connections, email, and the webGetting stuff done-everything from math to version control to graphics and audioThis proceedings presents the papers included in the 2nd International Congress of Electrical and Computer Engineering (ICECENG), which took place…
in Bandirma, Turkey, 22-25 November 2023. The conference aims to bring together researchers, developers, and students in computing, technology trends, artificial intelligence, and security who are interested in studying the application of formal methods to the construction and analysis of models describing technological processes at both micro and macro levels. ICECENG’23 also aims to provide a platform for discussing the issues, challenges, opportunities, and findings of computer engineering research. The conference seeks to provide some answers and explore the processes, actions, challenges, and outcomes of learning and teaching.