Title search results
Showing 1 - 20 of 47325 items
Developments and Advances in Defense and Security: MICRADS 2023 (Smart Innovation, Systems and Technologies #380)
By Álvaro Rocha, Carlos Hernán Fajardo-Toro, José María Riola Rodríguez. 2024
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS 2023), held…
at Graduate School of the Colombian Air Force, in Bogota, Colombia, during July 6–8, 2023. It covers a broad range of topics in systems, communication, and defense; strategy and political–administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.Good Practices and New Perspectives in Information Systems and Technologies: WorldCIST 2024, Volume 1 (Lecture Notes in Networks and Systems #985)
By Álvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Aneta Poniszewska-Marańda. 2024
This book is composed by a selection of articles from the 12th World Conference on Information Systems and Technologies (WorldCIST'24),…
held between 26 and 28 of March 2024, at Lodz University of Technology, Lodz, Poland. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main and distinctive topics covered are: A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human-Computer Interaction; J) Ethics, Computers and Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications. The primary market of this book are postgraduates and researchers in Information Systems and Technologies field. The secondary market are undergraduates and professionals as well in Information Systems and Technologies field.Modelling and Mining Networks: 19th International Workshop, WAW 2024, Warsaw, Poland, June 3–6, 2024, Proceedings (Lecture Notes in Computer Science #14671)
By Megan Dewar, Bogumił Kamiński, Daniel Kaszyński, Łukasz Kraiński, Paweł Prałat, François Théberge, Małgorzata Wrzosek. 2024
This book constitutes the refereed proceedings of the 19th International Workshop on Modelling and Mining Networks, WAW 2024, held in…
Warsaw, Poland, during June 3–6, 2024. The 12 full papers presented in this book were carefully reviewed and selected from 19 submissions. The aim of this workshop was to further the understanding of networks that arise in theoretical as well as applied domains. The goal was also to stimulate the development of high-performance and scalable algorithms that exploit these networks.Advances in Intelligent Computing Techniques and Applications: Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #211)
By Faisal Saeed, Fathey Mohammed, Yousef Fazea. 2024
This book presents the papers included in the proceedings of the 7th International Conference of Reliable Information and Communication Technology…
2023 (IRICT 2023) that was held in Pulai Springs Resorts, Johor, Malaysia on 27-28, December 2023. IRICT 2023 is organized by the Yemeni Scientists Research Group (YSRG) and Big Data Center in Universiti Teknologi Malaysia (Malaysia) in collaboration with Association for Information Systems – Malaysia Chapter (MyAIS) and College of Engineering, IT and Environment at Charles Darwin University (Australia). IRICT2023 is a forum for the presentation of technological advances in the field of Information and Communication Technology. The main theme of the conference is “Advances in Intelligent Computing Techniques and Applications”. The book discusses several research topics such as Health Informatics, Artificial Intelligence, Soft Computing, Data Science, Big Data Analytics, Internet of Things (IoT), Intelligent Communication Systems, Cyber Security, and Information System. These papers were presented in three parallel sessions during the two days.Intelligent Systems and Computing (Lecture Notes on Data Engineering and Communications Technologies #207)
By Bing-Yuan Cao, Shu-Feng Wang, Seyed Hadi Nasseri, Yu-Bin Zhong. 2024
This book includes high quality research papers submitted at the 2022 “Four Session (ICFIE, ICORG, GDORS, CGHMORS) Celebration” Joint International…
Conference held on December 28, 2022 and the online meeting of the Fuzzy Information and Engineering Branch of the China Operations Research Society on September 17, 2022. It covers topics in the fields of certainty, stochastic uncertainty, and fuzzy uncertainty, including computer science and mathematics, operations research and control, artificial intelligence, information and engineering technology, barrier-free communication for people with disabilities, digital logistics and knowledge representation, medical applications, queuing theory and game theory, algorithms and optimization methods. The book is a valuable reference book for scholars, engineers, management professionals, and graduate, undergraduate, and vocational students interested in computer science, mathematics, and fuzzy mathematics and operations research, as well as their applications in information technology and engineering.Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs
By Thomas W. MacFarland. 2024
Introduction to Data Science in Biostatistics: Using R, the Tidyverse Ecosystem, and APIs defines and explores the term "data science"…
and discusses the many professional skills and competencies affiliated with the industry. With data science being a leading indicator of interest in STEM fields, the text also investigates this ongoing growth of demand in these spaces, with the goal of providing readers who are entering the professional world with foundational knowledge of required skills, job trends, and salary expectations. The text provides a historical overview of computing and the field's progression to R as it exists today, including the multitude of packages and functions associated with both Base R and the tidyverse ecosystem. Readers will learn how to use R to work with real data, as well as how to communicate results to external stakeholders. A distinguishing feature of this text is its emphasis on the emerging use of APIs to obtain data.This book constitutes the refereed post-proceedings of the 11th International Conference on Industrial Engineering and Applications, ICIEA 2024, held in…
Nice, France, during January 10-12, 2024. The 16 full papers and 3 short papers included in this book were carefully reviewed and selected from 90 submissions. They focus on the most recent and relevant research, theories and practices in industrial engineering and its applications.Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
By Andy Greenberg. 2019
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the…
cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of DemocracyThe true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times).In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.Practical Handbook for Professional Investigators
By Rory J. McMahon CLI CFE, Randy Dickson. 2014
The third edition of this popular volume continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday…
reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including insurance fraud, fire and arson investigation; indicators of online marital infidelity; obtaining governmental reports; service of subpoenas for witnesses in federal courts; the Rules of Professional Conduct; niche markets in the investigative industry; and managing and marketing an investigative practice.Learn Ansible: Automate cloud, security, and network infrastructure using Ansible 2.x
By Russ McKendrick. 2018
Run Ansible playbooks to launch complex multi-tier applications hosted in public cloudsKey FeaturesBuild your learning curve using AnsibleAutomate cloud, network,…
and security infrastructures with easeGain hands-on exposure on AnsibleBook DescriptionAnsible has grown from a small, open source orchestration tool to a full-blown orchestration and configuration management tool owned by Red Hat. Its powerful core modules cover a wide range of infrastructures, including on-premises systems and public clouds, operating systems, devices, and services—meaning it can be used to manage pretty much your entire end-to-end environment. Trends and surveys say that Ansible is the first choice of tool among system administrators as it is so easy to use.This end-to-end, practical guide will take you on a learning curve from beginner to pro. You'll start by installing and configuring the Ansible to perform various automation tasks. Then, we'll dive deep into the various facets of infrastructure, such as cloud, compute and network infrastructure along with security.By the end of this book, you'll have an end-to-end understanding of Ansible and how you can apply it to your own environments.What you will learnWrite your own playbooks to configure servers running CentOS, Ubuntu, and WindowsIdentify repeatable tasks and write playbooks to automate themDefine a highly available public cloud infrastructure in code, making it easy to distribute your infrastructure configurationDeploy and configure Ansible Tower and Ansible AWXLearn to use community contributed rolesUse Ansible in your day-to-day role and projectsWho this book is forLearn Ansible is perfect for system administrators and developers who want to take their current workflows and transform them into repeatable playbooks using Ansible. No prior knowledge of Ansible is required.Lean Product Management: Successful products from fuzzy business ideas
By Mangalam Nandakumar. 2018
A guide to product management exploring the best practices: identifying the impact-driven product, planning for success, setting up and measuring…
time-bound metrics, and developing a lean product roadmap.Key FeaturesIdentifying Impact-Driven ProductsInvesting in Key Business OutcomesValue mapping to maintain a lean product backlogUtilizing time-bound product metricsEliminating process wasteBook DescriptionLean Product Management is about finding the smartest way to build an Impact Driven Product that can deliver value to customers and meet business outcomes when operating under internal and external constraints. Author, Mangalam Nandakumar, is a product management expert, with over 17 years of experience in the field. Businesses today are competing to innovate. Cost is no longer the constraint, execution is. It is essential for any business to harness whatever competitive advantage they can, and it is absolutely vital to deliver the best customer experience possible. The opportunities for creating impact are there, but product managers have to improvise on their strategy every day in order to capitalize on them. This is the Agile battleground, where you need to stay Lean and be able to respond to abstract feedback from an ever shifting market. This is where Lean Product Management will help you thrive. Lean Product Management is an essential guide for product managers, and to anyone embarking on a new product development. Mangalam Nandakumar will help you to align your product strategy with business outcomes and customer impact. She introduces the concept of investing in Key Business Outcomes as part of the product strategy in order to provide an objective metric about which product idea and strategy to pursue. You will learn how to create impactful end-to-end product experiences by engaging stakeholders and reacting to external feedback. What you will learnHow do you execute ideas that matter?How can you define the right success metrics?How can you plan for product success?How do you capture qualitative and quantitative insights about the product? How do you know whether your product aligns to desired business goals?What processes are slowing you down?Who this book is forIf you are leading a team that is building a new product, then this book is for you. The book is targeted at product managers, functional leads in enterprises, business sponsors venturing into new product offerings, product development teams, and start-up founders.Intelligent Systems and Industrial Internet of Things for Sustainable Development (Digital Technologies and Innovative Solutions for Sustainable Development)
By C. Kishor Kumar Reddy, P. R. Anisha, Marlia Mohd Hanafiah, Srinath Doss and Kari Lippert. 2024
The book studies emerging and sustaining technologies for applications of Industry 5.0 to develop technological solutions to address numerous real-life…
challenges to solve sustainable development-related issues. It identifies limitations, pitfalls, and open research questions in industry 5.0, discusses real-time problems, and challenges with equivalent solutions with a focus on sustainable growth to develop, humanization and environmentally friendly intelligent system applications. It analyses applications enabled by Industry 5.0 such as healthcare, supply chain, smart framing, remote sensing, production in manufacturing, and cloud manufacturing. It also includes the difficulties and problems posed by the organization between robots and humans on the assembly line to maintain sustainability. Addresses key challenges in implementing intelligent systems in IoT-based applications, including issues ranging from cost and energy efficiency to availability and quality of service Explores the technologies to allow human-machine association and its impact on consumption and sustainability Provides sustainable solutions to emerging industrial problems, especially in healthcare, manufacturing, remote sensing, environmental engineering Examines need for data pre-processing, classification & prediction, Cluster Analysis, Mining Multimedia, Text, and Web Data, Advanced machine learning techniques for scientific programming in Industry Presents success stories in the form of case studies of IIoT, IIoRT, Big Data, Intelligent Systems, Deep Learning in Industry 5.0 era The text is for postgraduate students, professionals, and academic researchers working in the fields of computer science and information technology, especially for professionals and researchers interested in the technological side of sustainable development.Designing to FIPS-140: A Guide for Engineers and Programmers
By David Johnston, Richard Fant. 2024
This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros…
and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs such as AIS31, GM/T-0005-2021, etc.). It also covers how to perform compliance testing. By the end of the book, you will know how to interact with accredited certification labs and with related industry forums (CMUF, ICMC). In short, the book covers everything you need to know to make sound designs.There is a process for FIPS-140 (Federal Information Processing Standard) certification for cryptographic products sold to the US government. And there are parallel certifications in other countries, resulting in a non-trivial and complex process. A large market of companies has grown to help companies navigate the FIPS-140 certification process. And there are accredited certification labs you must contract toget the certification.Although this was once a fairly niche topic, it is no longer so. Other industries—banking, military, healthcare, air travel, and more—have adopted FIPS certification for cryptographic products. The demand for these services has grown exponentially. Still, the available skills pool has not grown. Many people are working on products with zero usable information on what to do to meet these standards and achieve certification or even understand if such certification applies to their products. What You Will Learn What is FIPS-140? What is the SP800 standard?What is certification? What does it look like? What is it suitable for?What is NIST? What does it do?What do accredited certification labs do?What do certification consultants do?Where and when is certification required?What do FIPS-140 modules look like?What are the sub-components of FIPS-140 modules (RNGs, PUFs, crypto functions)? How does certification work for them?What are the physical primitives (RNGs, PUFs, key stores) and how do you handle the additional complexity of certifying them under FIPS?What are the compliance algorithms (AES, SP800-90 algos, SHA, ECDSA, key agreement, etc.)?How do you design for certification (BIST, startup tests, secure boundaries, test access, zeroization, etc.)?How do you get CAVP certificates (cert houses, ACVTs)?How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)? Who This Book Is For Hardware and software engineers or managers of engineering programs that include any form of cryptographic functionality, including silicon vendors, library vendors, OS vendors, and system integratorsLife After A Death: A Study of the Elderly Widowed (Routledge Library Editions: Aging)
By Ann Bowling, Ann Cartwright. 1982
The recently widowed experience many complex problems, and an understanding of their needs and the kinds of difficulties they encounter…
is essential if appropriate services and help are to be mobilized. It is the old who are most likely to be widowed, and they may face this crisis at a time when they may also be adjusting to ill health and increasing infirmity, and to retirement, with its problems of role identification and adaptation to an increase in leisure and a decrease in wealth. Most will have to learn to live alone, or to uproot themselves from their home and adjust to life with relatives. Often, the elderly person will have been involved in caring for their spouse during his or her terminal illness; widowhood will mean that they have lost their main occupation. For some, who are themselves disabled, widowhood may mean that they have lost the person who cared for them, so that there is an immediate crisis as alternative sources of care need to be found. These problems have to be faced in a situation often complicated by the anxiety, loneliness, apathy, and bewilderment of bereavement.Originally published in 1982, Life After A Death presents the results of a study of the experiences and attitudes of over 350 elderly widowed men and women, their general practitioners, and their relatives, friends, and neighbours, and considers the implications of the help the widowed received, or failed to receive, from those to whom it was most likely that they would turn for support. The authors’ identification and description of the emotional and practical day-to-day needs of the widowed, and their recommendations about the potential role of the general practitioner and voluntary and social services, should be considered by all those concerned to alleviate the difficulties of the widowed, and to help them to live a better ‘life after a death’.Fuzzy Rule-Based Inference: Advances and Applications in Reasoning with Approximate Knowledge Interpolation
By Fangyi Li, Qiang Shen. 2024
This book covers a comprehensive approach to the development and application of a suite of novel algorithms for practical approximate…
knowledge-based inference. It includes an introduction to the fundamental concepts of fuzzy sets, fuzzy logic, and fuzzy inference. Collectively, this book provides a systematic tutorial and self-contained reference to recent advances in the field of fuzzy rule-based inference. Approximate reasoning systems facilitate inference by utilizing fuzzy if-then production rules for decision-making under circumstances where knowledge is imprecisely characterized. Compositional rule of inference (CRI) and fuzzy rule interpolation (FRI) are two typical techniques used to implement such systems. The question of when to apply these potentially powerful reasoning techniques via automated computation procedures is often addressed by checking whether certain rules can match given observations. Both techniques have been widely investigated to enhance the performance of approximate reasoning. Increasingly more attention has been paid to the development of systems where rule antecedent attributes are associated with measures of their relative significance or weights. However, they are mostly implemented in isolation within their respective areas, making it difficult to achieve accurate reasoning when both techniques are required simultaneously. This book first addresses the issue of assigning equal significance to all antecedent attributes in the rules when deriving the consequents. It presents a suite of weighted algorithms for both CRI and FRI fuzzy inference mechanisms. This includes an innovative reverse engineering process that can derive attribute weightings from given rules, increasing the automation level of the resulting systems. An integrated fuzzy reasoning approach is then developed from these two sets of weighted improvements, showcasing more effective and efficient techniques for approximate reasoning. Additionally, the book provides an overarching application to interpretable medical risk analysis, thanks to the semantics-rich fuzzy rules with attribute values represented in linguistic terms. Moreover, it illustrates successful solutions to benchmark problems in the relevant literature, demonstrating the practicality of the systematic approach to weighted approximate reasoning.This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going…
through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several such applications have been difficult to realize because of many interconnection problems. To fulfill their large range of applications, different kinds of networks need to collaborate and wired and next-generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks. This book aims to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.Life Before Death (Routledge Library Editions: Aging)
By Ann Cartwright, Lisbeth Hockey, John L. Anderson. 1973
Since death is an experience which will inevitably be common to us all, we are often surprisingly uninterested in what…
services are provided for those people, often the elderly and infirm, who are at risk or who are on the point of death. Originally published in 1973, this study describes the last twelve months in the lives of 785 adults. Based mainly on the reports of close relatives, it is concerned with the needs of the dying and the care they receive. This includes the more emotional aspects such as ‘awareness’ of dying and the effects of the death on relatives. The book looks at the part played by hospitals, general practitioners, local authority health and welfare services, and by relatives, friends and neighbours. The views of those who provide these services are also considered. The picture that emerges shows up the gaps in the care that was given to people in the final year of their lives at the time.New Directions on Hybrid Intelligent Systems Based on Neural Networks, Fuzzy Logic, and Optimization Algorithms (Studies in Computational Intelligence #1146)
By Patricia Melin, Oscar Castillo. 2024
This book contains a collection of papers focused on hybrid intelligent systems based on soft computing techniques. In this book,…
new directions on the theoretical developments of fuzzy logic, neural networks and optimization algorithms, as well as their hybrid combinations, are offered. In addition, the abovementioned methods are discussed in application areas such as control and robotics, pattern recognition, medical diagnosis, decision-making, prediction and optimization of complex problems. There are a group of papers with the main theme of type-1, type-2 and type-3 fuzzy logic, which basically consists of papers that propose new concepts and algorithms based on type-1, type-2 and type-3 fuzzy logic and their applications. There is also a set of papers that offer theoretical concepts and applications of meta-heuristics in different areas. Another group of papers outlines diverse applications of hybrid intelligent systems in real problems. There are also some papers that presenttheory and practice of neural networks in different applications. Finally, there are papers that offer theory and practice of optimization and evolutionary algorithms in different application areasNew Advances in Designs, Codes and Cryptography: Stinson66, Toronto, Canada, June 13-17, 2022 (Fields Institute Communications #86)
By Charles J. Colbourn, Jeffrey H. Dinitz. 2024
This volume records and disseminates selected papers from the Stinson66 conference, including surveys, prospectives, and papers presenting original and current…
research. It contains four accessible surveys of topics in combinatorial designs and related topics, ranging from a tutorial survey of connections to classical group theory, to surveys of "hot topics" in current research. It also contains a prospective paper identifying topics for future research efforts, co-authored by one of the elder statesmen of the field, Alex Rosa. Finally, the research papers examine topics ranging from pure mathematics to applied work in computing, networking, communications, and cryptography. For students and newcomers to these topics, the volume provides accessible survey material that does not have onerous prerequisites. The breadth of topics reflects the vibrancy of the field in a way that can be appreciated by all researchers. The papers present important advances on theory and applications,which also benefit advanced researchers.AI Technologies and Virtual Reality: Proceedings of 7th International Conference on Artificial Intelligence and Virtual Reality (AIVR 2023) (Smart Innovation, Systems and Technologies #382)
By Kazumi Nakamatsu, Srikanta Patnaik, Roumen Kountchev. 2024
This book gathers a collection of selected works and new research results of scholars and graduate students presented at the…
7th International Conference on Artificial Intelligence and Virtual Reality (AIVR 2023) held in Kumamoto, Japan during July 21-23, 2023. The focus of the book is interdisciplinary in nature and includes research on all aspects of artificial intelligence and virtual reality, from fundamental development to the applied system. The book covers topics such as system techniques, performance, and implementation; content creation and modelling; cognitive aspects, perception, user behaviour; AI technologies; interactions, interactive and responsive environments; AI/VR applications and case studies.