Title search results
Showing 1 - 20 of 46504 items
Intelligent Systems and Industrial Internet of Things for Sustainable Development (Digital Technologies and Innovative Solutions for Sustainable Development)
By C. Kishor Kumar Reddy, P. R. Anisha, Marlia Mohd Hanafiah, Srinath Doss and Kari Lippert. 2024
The book studies emerging and sustaining technologies for applications of Industry 5.0 to develop technological solutions to address numerous real-life…
challenges to solve sustainable development-related issues. It identifies limitations, pitfalls, and open research questions in industry 5.0, discusses real-time problems, and challenges with equivalent solutions with a focus on sustainable growth to develop, humanization and environmentally friendly intelligent system applications. It analyses applications enabled by Industry 5.0 such as healthcare, supply chain, smart framing, remote sensing, production in manufacturing, and cloud manufacturing. It also includes the difficulties and problems posed by the organization between robots and humans on the assembly line to maintain sustainability. Addresses key challenges in implementing intelligent systems in IoT-based applications, including issues ranging from cost and energy efficiency to availability and quality of service Explores the technologies to allow human-machine association and its impact on consumption and sustainability Provides sustainable solutions to emerging industrial problems, especially in healthcare, manufacturing, remote sensing, environmental engineering Examines need for data pre-processing, classification & prediction, Cluster Analysis, Mining Multimedia, Text, and Web Data, Advanced machine learning techniques for scientific programming in Industry Presents success stories in the form of case studies of IIoT, IIoRT, Big Data, Intelligent Systems, Deep Learning in Industry 5.0 era The text is for postgraduate students, professionals, and academic researchers working in the fields of computer science and information technology, especially for professionals and researchers interested in the technological side of sustainable development.Designing to FIPS-140: A Guide for Engineers and Programmers
By David Johnston, Richard Fant. 2024
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros…
and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs such as AIS31, GM/T-0005-2021, etc.). It also covers how to perform compliance testing. By the end of the book, you will know how to interact with accredited certification labs and with related industry forums (CMUF, ICMC). In short, the book covers everything you need to know to make sound designs.There is a process for FIPS-140 (Federal Information Processing Standard) certification for cryptographic products sold to the US government. And there are parallel certifications in other countries, resulting in a non-trivial and complex process. A large market of companies has grown to help companies navigate the FIPS-140 certification process. And there are accredited certification labs you must contract toget the certification.Although this was once a fairly niche topic, it is no longer so. Other industries—banking, military, healthcare, air travel, and more—have adopted FIPS certification for cryptographic products. The demand for these services has grown exponentially. Still, the available skills pool has not grown. Many people are working on products with zero usable information on what to do to meet these standards and achieve certification or even understand if such certification applies to their products. What You Will Learn What is FIPS-140? What is the SP800 standard?What is certification? What does it look like? What is it suitable for?What is NIST? What does it do?What do accredited certification labs do?What do certification consultants do?Where and when is certification required?What do FIPS-140 modules look like?What are the sub-components of FIPS-140 modules (RNGs, PUFs, crypto functions)? How does certification work for them?What are the physical primitives (RNGs, PUFs, key stores) and how do you handle the additional complexity of certifying them under FIPS?What are the compliance algorithms (AES, SP800-90 algos, SHA, ECDSA, key agreement, etc.)?How do you design for certification (BIST, startup tests, secure boundaries, test access, zeroization, etc.)?How do you get CAVP certificates (cert houses, ACVTs)?How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)? Who This Book Is For Hardware and software engineers or managers of engineering programs that include any form of cryptographic functionality, including silicon vendors, library vendors, OS vendors, and system integratorsFuzzy Rule-Based Inference: Advances and Applications in Reasoning with Approximate Knowledge Interpolation
By Fangyi Li, Qiang Shen. 2024
This book covers a comprehensive approach to the development and application of a suite of novel algorithms for practical approximate…
knowledge-based inference. It includes an introduction to the fundamental concepts of fuzzy sets, fuzzy logic, and fuzzy inference. Collectively, this book provides a systematic tutorial and self-contained reference to recent advances in the field of fuzzy rule-based inference. Approximate reasoning systems facilitate inference by utilizing fuzzy if-then production rules for decision-making under circumstances where knowledge is imprecisely characterized. Compositional rule of inference (CRI) and fuzzy rule interpolation (FRI) are two typical techniques used to implement such systems. The question of when to apply these potentially powerful reasoning techniques via automated computation procedures is often addressed by checking whether certain rules can match given observations. Both techniques have been widely investigated to enhance the performance of approximate reasoning. Increasingly more attention has been paid to the development of systems where rule antecedent attributes are associated with measures of their relative significance or weights. However, they are mostly implemented in isolation within their respective areas, making it difficult to achieve accurate reasoning when both techniques are required simultaneously. This book first addresses the issue of assigning equal significance to all antecedent attributes in the rules when deriving the consequents. It presents a suite of weighted algorithms for both CRI and FRI fuzzy inference mechanisms. This includes an innovative reverse engineering process that can derive attribute weightings from given rules, increasing the automation level of the resulting systems. An integrated fuzzy reasoning approach is then developed from these two sets of weighted improvements, showcasing more effective and efficient techniques for approximate reasoning. Additionally, the book provides an overarching application to interpretable medical risk analysis, thanks to the semantics-rich fuzzy rules with attribute values represented in linguistic terms. Moreover, it illustrates successful solutions to benchmark problems in the relevant literature, demonstrating the practicality of the systematic approach to weighted approximate reasoning.This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going…
through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications, different kinds of networks need to collaborate and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. This book aims to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.New Directions on Hybrid Intelligent Systems Based on Neural Networks, Fuzzy Logic, and Optimization Algorithms (Studies in Computational Intelligence #1146)
By Patricia Melin, Oscar Castillo. 2024
This book contains a collection of papers focused on hybrid intelligent systems based on soft computing techniques. In this book,…
new directions on the theoretical developments of fuzzy logic, neural networks and optimization algorithms, as well as their hybrid combinations, are offered. In addition, the abovementioned methods are discussed in application areas such as control and robotics, pattern recognition, medical diagnosis, decision-making, prediction and optimization of complex problems. There are a group of papers with the main theme of type-1, type-2 and type-3 fuzzy logic, which basically consists of papers that propose new concepts and algorithms based on type-1, type-2 and type-3 fuzzy logic and their applications. There is also a set of papers that offer theoretical concepts and applications of meta-heuristics in different areas. Another group of papers outlines diverse applications of hybrid intelligent systems in real problems. There are also some papers that presenttheory and practice of neural networks in different applications. Finally, there are papers that offer theory and practice of optimization and evolutionary algorithms in different application areasNew Advances in Designs, Codes and Cryptography: Stinson66, Toronto, Canada, June 13-17, 2022 (Fields Institute Communications #86)
By Charles J. Colbourn, Jeffrey H. Dinitz. 2024
This volume records and disseminates selected papers from the Stinson66 conference, including surveys, prospectives, and papers presenting original and current…
research. It contains four accessible surveys of topics in combinatorial designs and related topics, ranging from a tutorial survey of connections to classical group theory, to surveys of "hot topics" in current research. It also contains a prospective paper identifying topics for future research efforts, co-authored by one of the elder statesmen of the field, Alex Rosa. Finally, the research papers examine topics ranging from pure mathematics to applied work in computing, networking, communications, and cryptography. For students and newcomers to these topics, the volume provides accessible survey material that does not have onerous prerequisites. The breadth of topics reflects the vibrancy of the field in a way that can be appreciated by all researchers. The papers present important advances on theory and applications,which also benefit advanced researchers.AI Technologies and Virtual Reality: Proceedings of 7th International Conference on Artificial Intelligence and Virtual Reality (AIVR 2023) (Smart Innovation, Systems and Technologies #382)
By Kazumi Nakamatsu, Srikanta Patnaik, Roumen Kountchev. 2024
This book gathers a collection of selected works and new research results of scholars and graduate students presented at the…
7th International Conference on Artificial Intelligence and Virtual Reality (AIVR 2023) held in Kumamoto, Japan during July 21-23, 2023. The focus of the book is interdisciplinary in nature and includes research on all aspects of artificial intelligence and virtual reality, from fundamental development to the applied system. The book covers topics such as system techniques, performance, and implementation; content creation and modelling; cognitive aspects, perception, user behaviour; AI technologies; interactions, interactive and responsive environments; AI/VR applications and case studies.Graphic Horizons: Volume 3 - Graphics for Knowledge (Springer Series in Design and Innovation #44)
By Luis Hermida González, João Pedro Xavier, Inés Pernas Alonso, Carlos Losada Pérez. 2024
This book reports on several advances in architectural graphics, with a special emphasis on education, research and heritage. It gathers…
a selection of contributions to the 20th International Congress of Architectural Graphic Expression, EGA 2024, held on May 27-29, 2024, in Porto, Portugal, with the motto: "Graphic Horizons". This is the third volume of a 3-volume set.Künstliche Intelligenz im Bauwesen: Grundlagen und Anwendungsfälle
By Shervin Haghsheno, Gerhard Satzger, Svenja Lauble, Michael Vössing. 2024
Dieses Fachbuch demonstriert das Potenzial Künstlicher Intelligenz (KI) im Bauwesen. Die rasant wachsende Menge an Daten sowie die in Bauprojekten…
eingesetzte Hard- und Software bilden die Grundlage für projektübergreifende und vorausschauende Analysen, die u.a. durch Ansätze des maschinellen Lernens und der Robotik ermöglicht werden.Die einzelnen Beiträge dieses Buches geben einen allgemeinen Überblick über Methoden der Künstlichen Intelligenz (KI) und veranschaulichen deren Einsatz im Bauwesen anhand konkreter Anwendungsfälle aus Forschung und Praxis. KI-Methoden versprechen hier sowohl Effizienzgewinne und Fehlerreduzierung durch Automatisierung repetitiver Tätigkeiten als auch völlig neue Möglichkeiten der Entscheidungsunterstützung in Bauplanung, -ausführung und -betrieb. Die Publikation richtet sich insbesondere an Führungskräfte und Fachexperten der Bauwirtschaft, die mit KI-Methoden eine nachhaltige Verbesserung ihrer Unternehmensprozesse erreichen wollen.Advances in Bioinformatics
By Vijai Singh, Ajay Kumar. 2024
The second edition of Advances in Bioinformatics presents the latest developments in bioinformatics in gene discovery, genome analysis, genomics, transcriptomics,…
proteomics, metabolomics, metabolic flux analysis, drug discovery, and drug repurposing. It includes advancements in the applications of bioinformatics in the analysis of non-coding RNA, next-generation sequencing, genome-scale modelling, high throughput drug screening, precision medicine, automation and artificial intelligence, and machine learning. The chapter also summarizes the technologies and concepts that form the basis of this functional genomics approach. Additionally, the book highlights some of the areas in which bioinformatics resources and methods are being developed to support the drug discovery pipeline. The chapter also discusses the role of bioinformatics in modelling and simulations of molecular biology systems in pathways identification and design. It is a valuable source of information for beginners in bioinformatics and students, researchers, scientists, clinicians, practitioners, policymakers, and stakeholders who are interested in harnessing the potential of bioinformatics in biomedical and allied sciences.Dieses Lehrbuch richtet sich an Studierende von fachfremden Studiengängen mit Informatikanteilen. Ein besonderer Schwerpunkt liegt dabei auf den sogenannten Lebenswissenschaften,…
wie Medizintechnik, Rettungsingenieurwesen, Biotechnologie, Umwelttechnik oder Verfahrenstechnik. Das Lehrbuch eignet sich für Leser in Studium und Praxis, die sich einen Einstieg in die Informatik verschaffen wollen. Die Besonderheit dieses Buches liegt in der problembasierten Herangehensweise, sowie der nach verschiedenen Taxonomiestufen konzipierten Übungsaufgaben.The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory…
of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to…
deliver digital change. It introduces The Galapagos Framework, which is a new, innovative, and human-centric approach to transformational change. The framework allows organizations to move from digital transformation to digital acceleration, resulting in the creation of exciting and groundbreaking products as well as having a positive impact on the motivation and well-being of their teams.Digital Acceleration is an iterative process that allows organizations to deliver transformations and demonstrate continual progress at pace. Rather than tackling the transformation as one large single event, Digital Acceleration enables organizations to improve one or, at most, two discrete areas of the business quickly and then move onto the next area needing improvement.Presenting a detailed guide to The Galapagos Framework, the book also highlights solutions to common issues, expert case studies, and The Galapagos Roadmap. It discusses how the framework provides the key to increasing productivity, delivery velocity, and performance while reducing cost and complexity, ultimately resulting in digital and business success. The book demonstrates how The Galapagos Framework operates in practice to provide clear solutions to common issues that are classifi ed into Human Elements, Organizational Factors, and the Delivery Aspects. The book also explains why the current approaches to digital transformation are failing and shows how digital leaders and organizations can: Increase productivity Reduce costs Improve delivery performance Reduce operational, financial, and delivery risks Increase profits Deliver digital transformation successDjango 4 By Example: Build powerful and reliable Python web applications from scratch, 4th Edition
By Antonio Mele, Bob Belderbos. 2022
Learn to create fully functional web applications with authentication, content management systems, payment processing, RESTful APIs, and morePurchase of the…
print or Kindle book includes a free eBook in PDF format.Key FeaturesImplement advanced functionalities, such as full-text search engines, user activity streams, payment gateways, and recommendation enginesIntegrate JavaScript, PostgreSQL, Redis, Celery, and Memcached into your applicationsAdd real-time features with Django Channels and WebSocketsBook DescriptionDjango 4 By Example is the 4th edition of the best-selling franchise that helps you build web apps. This book will walk you through the creation of real-world applications, solving common problems, and implementing best practices using a step-by-step approach.You'll cover a wide range of web app development topics as you build four different apps:A blog application: Create data models, views, and URLs and implement an admin site for your blog. Create sitemaps and RSS feeds and implement a full-text search engine with PostgreSQL. A social website: Implement authentication with Facebook, Twitter, and Google. Create user profiles, image thumbnails, a bookmarklet, and an activity stream. Implement a user follower system and add infinite scroll pagination to your website.An e-commerce application: Build a product catalog, a shopping cart, and asynchronous tasks with Celery and RabbitMQ. Process payments with Stripe and manage payment notifications via webhooks. Build a product recommendation engine with Redis. Create PDF invoices and export orders to CSV.An e-learning platform: Create a content management system to manage polymorphic content. Cache content with Memcached and Redis. Build and consume a RESTful API. Implement a real-time chat using WebSockets with ASGI. Create a production environment using NGINX, uWSGI and Daphne with Docker Compose. This is a practical book that will have you creating web apps quickly.What you will learnLearn Django essentials, including models, ORM, views, templates, URLs, forms, authentication, signals and middlewareImplement different modules of the Django framework to solve specific problemsIntegrate third-party Django applications into your projectBuild asynchronous (ASGI) applications with DjangoSet up a production environment for your projectsEasily create complex web applications to solve real use casesWho this book is forThis book is for readers with basic Python knowledge and programmers transitioning from other web frameworks who wish to learn Django by doing. If you already use Django or have in the past, and want to learn best practices and integrate other technologies to scale your applications, then this book is for you too. This book will help you master the most relevant areas of the framework by building practical projects from scratch. Some previous knowledge of HTML and JavaScript is assumed.Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch Purchase of the print…
or Kindle book includes a free eBook in PDF format.Key FeaturesLearn to think like an adversary to strengthen your cyber defencesExecute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface levelSecurely manipulate environments using Kali Linux, ensuring you're fully equipped to safeguard your systems against real-world threatsBook DescriptionEmbark on an exciting journey into the world of Kali Linux – the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals. In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. Think of this book as your stepping stone into real-world situations that guides you through lab setups and core penetration testing concepts. As you progress in the book you’ll explore the toolkit of vulnerability assessment tools in Kali Linux, where gathering information takes the spotlight. You'll learn how to find target systems, uncover device security issues, exploit network weaknesses, control operations, and even test web applications. The journey ends with understanding complex web application testing techniques, along with industry best practices. As you finish this captivating exploration of the Kali Linux book, you'll be ready to tackle advanced enterprise network testing – with newfound skills and confidence.What you will learnEstablish a firm foundation in ethical hackingInstall and configure Kali Linux 2024.1Build a penetration testing lab environment and perform vulnerability assessmentsUnderstand the various approaches a penetration tester can undertake for an assessmentGathering information from Open Source Intelligence (OSINT) data sourcesUse Nmap to discover security weakness on a target system on a networkImplement advanced wireless pentesting techniquesBecome well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux, then this book is for you.MATLAB and Simulink in Action: Programming, Scientific Computing and Simulation
By Dingyü Xue, Feng Pan. 2024
The textbook is intended for teaching MATLAB language and its applications. The book is composed of three parts: MATLAB programming,…
scientific computing with MATLAB, and system simulation with Simulink. Since MATLAB is widely used in all fields of science and engineering, a good introduction to the language can not only help students learn how to use it to solve practical problems, but also provide them with the skills to use MATLAB independently in their later courses and research. The three parts of the book are well-balanced and tailored to the needs of engineering students, and the mathematical problems commonly encountered in engineering can be easily solved using MATLAB. This textbook is suitable for undergraduate and graduate students majoring in science and engineering.Design Patterns with Java: An Introduction
By Olaf Musch. 2023
A practical description of the software design patterns as they are mentioned in the 1994 book "Design Patterns - Elements…
of Reusable ObjectOriented Software" by the author group Gamma, Helm, Johnson and Vlissides (also called "Gang of Four", GoF for short). All patterns are explained in detail by means of examples and also critically appreciated. Furthermore, design principles of object-oriented programming are described and considered. All examples are commented in detail in the source code and are executable under Java 16. In part, newer features of Java up to and including version 16 are also explained and used.Data-Centric Business and Applications: Modern Trends in Financial and Innovation Data Processes 2023. Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #195)
By Andriy Semenov, Iryna Yepifanova, Jana Kajanová. 2024
This book examines aspects of financial and investment processes, as well as the application of information technology mechanisms to business…
and industrial management, using the experience of the Ukrainian economy as an example. An effective tool for supporting business data processing is combining modern information technologies and the latest achievements in economic theory. The variety of industrial sectors studied supports the continuous acquisition and use of efficient business analysis in organizations. In addition, the book elaborates on multidisciplinary concepts, examples, and practices that can be useful for researching the evolution of developments in the field. Also, in this book, there is a description of analysis methods for making decisions in business, finance, and innovation management.Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems)
By Bharat Bhushan, Sudhir Kumar Sharma, Parma Nand, Achyut Shankar, Ahmed J. Obaid. 2024
In the past decades, cyber-physical systems (CPSs) have been widely applied to fields such as smart grids, environment monitoring, aerospace,…
smart transportation, and industrial automation. Great strides have been made in CPSs to improve the computing mechanism, communication, and quality of service by applying optimization algorithms. Currently, these efforts are integrated with the applications of machine learning (ML) and artificial intelligence (AI). To maintain system reliability and stability, CPSs such as smart grids face numerous challenges, including large-scale Internet-of-Things (IoT) device adaptation, ever-increasing demands of electrical energy, and the rise of a wide range of security threats. These challenges bring forth the need to find sustainable and advanced solutions to guarantee reliable and secure operations in these systems.The goal of this book is to foster transformative, multidisciplinary, and novel approaches that ensure CPS security by taking into consideration the unique security challenges present in the environment. This book attracts contributions in all aspects pertaining to this multidisciplinary paradigm, which includes the development and implementation of Smart CPS, Supervisory Control and Data Acquisition (SCADA) systems, CPS for Industry 4.0, CPS architecture for IoT applications, and CPS forensics.This book: Discusses concepts including wireless sensor networks (WSNs), CPSs, and the IoT in a comprehensive manner. Covers routing protocols in sensor networks, attacks, and vulnerabilities in WSNs, the Internet of Cyber-Physical Things, and CPSs for industrial applications. Highlights technological advances, practical solutions, emerging trends, and prototypes related to privacy in CPSs and the IoT. Presents a pathway and architecture for proactive security schemes in CPSs to counter vulnerabilities, including phishing attacks, malware injection, internal stealing of data, and hacking. Discusses the most recent research and development on the enabling technologies for IoT-based CPSs. Owing to the scope and diversity of topics covered, the book will be of interest not only to researchers and theorists but also to professionals, material developers, technology specialists, and methodologists dealing with the multifarious aspects of data privacy and security enhancement in CPSs. The book will provide these professionals an overview of CPS security and privacy design, as well as enlighten them to promising solutions to research problems such as cyberattacks in CPS, risk identification and management in CPS, ML-based trust computational models for CPSs, nature-inspired algorithms for CPSs, and distributed consensus algorithms for event detection in CPSs. The secondary target audience of this book includes legal practitioners, hackers, cyber law policymakers, cyber forensic analysts, and global security consortiums who may use it to further their research exposure to pertinent topics in cybersecurity.Intelligent Quantum Information Processing (Quantum Machine Intelligence)
By Siddhartha Bhattacharyya, Iván Cruz-Aceves, Arpan Deyasi, Pampa Debnath, Rajarshi Mahapatra. 2024
The book discusses the foundations of intelligent quantum information processing applied to several real-life engineering problems, including intelligent quantum systems,…
intelligent quantum communication, intelligent process optimization, and intelligent quantum distributed networks.This book:• Showcases a detailed overview of different quantum machine learning algorithmic frameworks.• Presents real-life case studies and applications.• Provides an in-depth analysis of quantum mechanical principles.• Provides a step-by-step guide in the build-up of quantum inspired/quantum intelligent information processing systems.• Provides a video demonstration on each chapter for better understanding.It will serve as an ideal reference text for graduate students and academic researchers in fields such as electrical engineering, electronics and communication engineering, computer engineering, and information technology.