Allgemein
Critical Security Controls for Effective Cyber Defense
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world.WHAT YOU WILL LEARN* IMPLEMENTATION STRATEGIES: Learn detailed strategies for implementing each of the CIS 18 Controls within your organization. The book provides step-by-step guidance and practical insights to help you integrate these controls effectively, ensuring that your cyber defenses are robust and resilient.* RISK MITIGATION TECHNIQUES: Discover how to identify and mitigate risks associated with failing to implement these controls. By understanding the potential consequences of neglecting each control, you can prioritize actions that protect your organization from the most significant threats.* ACTIONABLE RECOMMENDATIONS: Access practical, actionable recommendations for managing and maintaining these controls. The book offers clear and concise advice on how to continuously improve your cybersecurity measures, adapting to evolving cyber threats and organizational needs to ensure long-term protection.* TRAINING AND SIMPLIFICATION: Explore recommended training programs and simplified security control measures that can be tailored to fit the specific needs and challenges of your business environment. This section emphasizes the importance of ongoing education and streamlined processes to enhance your organization's overall cybersecurity readiness.* IMPORTANCE AND RELEVANCE: Understand the importance and relevance of each CIS 18 Control in the context of contemporary cybersecurity challenges. Learn why these controls are crucial for safeguarding your organization against the most prevalent cyber threats.* KEY CONCEPTS AND TERMS: Familiarize yourself with the key concepts and terms associated with each CIS 18 Control. This foundational knowledge will help you communicate more effectively with stakeholders and ensure a common understanding of cybersecurity principles.* QUESTIONS TO ASK: Discover the critical questions you should ask when assessing your organization’s implementation of each control. These questions will guide your evaluation and help identify areas for improvement.WHO THIS BOOK IS FORIT and cybersecurity professionals, business leaders and executives, small business owners and managers, students and academics in cybersecurity fields, government and on-profit sector professionals, and cybersecurity consultants and trainersDR. JASON EDWARDS is a seasoned cyber author and professional with over 20 years of experience in the cybersecurity field, having held diverse roles from IT operations and project management to cybersecurity strategy and governance. His strategic approach has enabled him to guide organizations through complex cyber defense challenges, ensuring robust protection against evolving threats. As the author of several books and dozens of articles, Dr. Edwards shares deep knowledge and practical insights with IT professionals, cybersecurity experts, and organizational leaders. Active on LinkedIn, he connects with over 70,000 professionals through daily and weekly posts, and manages a 20,000-subscriber mailing list called the Cyber Spear. Passionate about education and community engagement, he offers monthly group sessions, one-on-one consultations, and is a frequent podcast guest discussing cybersecurity trends, strategies, and best practices. For more information, visit his website at jason-edwards.me.Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident Response Management.- Chapter 18. Control 18: Penetration Testing.
Java Microservices and Containers in the Cloud
Spring Boot helps developers create applications that simply run. When minimal configuration is required to start up an application, even novice Java developers are ready to start. But this simplicity shouldn't constrain developers in addressing more complex enterprise requirements where microservice architecture is concerned. With the need to rapidly deploy, patch, or scale applications, containers provide solutions which can accelerate development, testing as well as production cycles. The cloud helps companies to scale and adapt at speed, accelerate innovation and drive business agility, without heavy upfront IT investment. What if we can equip even a novice developer with all that is required to help enterprises achieve all of this, this book does this and more._Java Microservices and Containers in the Cloud_offers a comprehensive guide to both architecture and programming aspects to Java microservices development, providing a fully hands-on experience. We not only describe various architecture patterns but also provide practical implementations of each pattern through code examples. Despite the focus on architecture, this book is designed to be accessible to novice developers with only basic programming skills, such as writing a "Hello World" program and using Maven to compile and run Java code. It ensures that even such readers can easily comprehend, deploy, and execute the code samples provided in the book. Regardless of your current knowledge or lack thereof in Docker, Kubernetes, and Cloud technologies, this book will empower you to develop programming skills in these areas.There is no restriction on beginners attempting to understand serious and non-trivial architecture constraints. While mastering concurrency and scalability techniques often requires years of experience, this book promises to empower you to write microservices, as well as how to containerize and deploy them in the cloud. If you are a non-programming manager who is not afraid to read code snippets, this book will empower you to navigate the challenges posed by seasoned architects. It will equip you with the necessary understanding of specialized jargon, enabling you to engage in more meaningful discussions and break through barriers when collaborating with programmers, architects and engineers across the table.The code examples provided in the book are intentionally designed to be simple and accessible to all, regardless of your programming background. Even if you are a C# or Python programmer and not familiar with Java, you will find the code examples easy to follow and understand.YOU WILL* Acquire proficiency in both RPC-style and Messaging-style inter-microservice communication* Construct microservices utilizing a combination of SQL (PostgreSQL) and NoSQL (MongoDB) databases* Leverage Liquibase, a database schema version control tool, and administer UI in conjunction with PostgreSQL* Leverage both GraphQL and conventional REST approaches side by side* Gain practical experience in implementing Hexagonal and Onion Architectures through hands-on exercises* Integrate asynchronous processing into your Java applications using powerful APIs such as DeferredResult and CompletableFutureWHO IT'S FOR:Developers, programmers and Architects who want to level up their Java Micoservices and Archtecture knowledge as well as managers who want to brush up on their technical knowledge around the topic.BINILDAS A. CHRISTUDAS is an experienced architect and developer, specializing in building distributed software solutions for the Airlines, Hospitality, and Telecommunications domains ever since the inception of Java. He is currently working in IBS Software, a leader in Airline Cargo software domain as Vice President, heading Technology Services. Binildas is currently engaged in architecting highly resilient and highly available software solutions for some of the world's largest Cruise and Airline companies. He specializes in ensuring data consistency across distributed and decentralized systems, encompassing various scenarios such as cross-region deployments across major public cloud.Binildas is a Mechanical engineer from the College of Engineering, Trivandrum (CET) with a post-graduation in Systems from the Institute of Management Kerala (IMK). Leveraging over 25 years of experience in distributed systems, Binil currently dedicates his focus to architecting Conflict-Free, Replicated, and Eventually Consistent systems thathandle streaming data and big data and is the author of “_Practical Microservices Architectural Patterns_” by Apress and “_Service Oriented Java Business Integration_” by Packt. Binildas was the captain of Kerala University Power Lifting team and was the national champion during his studies. He has been awarded patent for “_A Method and a System for Facilitating Multitenancy of Services_” by the USPTO.Binildas can be contacted through www.linkedin.com/in/binildasca/1: Microservices for the Enterprise.- 2 More Hands-on Microservices .- 3: Onion and Hexagonal Architecture in Practice.- 4: Message Oriented Microservices,- 5: Microservices Integration in Practice.- 6: Production Grade Message Oriented Microservices.- 7: Introducing Docker.- 8: Microservices Containers.- 9: Composing Multi Service Containers.- 10: Microservices with Kubernetes.- 11: Message Oriented Microservices in Kubernetes.- 12:Automating Kubernetes Deployment and Helm Packaging.-13: CI/CD for Microservices in Containers.- 14: Microservices in AWS Elastic Compute Cloud (EC2).-15: Microservices in AWS Elastic Kubernetes Service (EKS).
Numerical Python
Learn how to leverage the scientific computing and data analysis capabilities of Python, its standard library, and popular open-source numerical Python packages like NumPy, SymPy, SciPy, matplotlib, and more. This book demonstrates how to work with mathematical modeling and solve problems with numerical, symbolic, and visualization techniques. It explores applications in science, engineering, data analytics, and more._Numerical Python, Third Edition_, presents many case study examples of applications in fundamental scientific computing disciplines, as well as in data science and statistics. This fully revised edition, updated for each library's latest version, demonstrates Python's power for rapid development and exploratory computing due to its simple and high-level syntax and many powerful libraries and tools for computation and data analysis.After reading this book, readers will be familiar with many computing techniques, including array-based and symbolic computing, visualization and numerical file I/O, equation solving, optimization, interpolation and integration, and domain-specific computational problems, such as differential equation solving, data analysis, statistical modeling, and machine learning.WHAT YOU'LL LEARN* Work with vectors and matrices using NumPy* Review Symbolic computing with SymPy* Plot and visualize data with Matplotlib* Perform data analysis tasks with Pandas and SciPy* Understand statistical modeling and machine learning with statsmodels and scikit-learn* Optimize Python code using Numba and CythonWHO THIS BOOK IS FORDevelopers who want to understand how to use Python and its ecosystem of libraries for scientific computing and data analysis.ROBERT JOHANSSON is an experienced Python programmer and computational scientist with a Ph.D. in Theoretical Physics from Chalmers University of Technology, Sweden. He has worked with scientific computing in academia and industry for over 15 years and participated in open source and proprietary research and development projects. His open-source contributions include work on QuTiP, a popular Python framework for simulating the dynamics of quantum systems, and he has also contributed to several other popular Python libraries in the scientific computing landscape. Robert is passionate about scientific computing and software development, teaching and communicating best practices for combining these fields with optimal outcomes: novel, reproducible, extensible, and impactful computational results.1. Introduction to Computing with Python.- 2. Vectors, Matrices and Multidimensional Arrays.- 3. Symbolic Computing.- 4. Plotting and Visualization.- 5. Equation Solving.- 6. Optimization.- 7. Interpolation.- 8. Integration.- 9. Ordinary Differential Equations.- 10. Sparse Matrices and Graphs.- 11. Partial Differential Equations.- 12. Data Processing and Analysis.- 13. Statistics.- 14. Statistical Modeling.- 15. Machine Learning.- 16. Bayesian Statistics.- 17. Signal and Image Processing.- 18. Data Input and Output.- 19. Code Optimization.- Appendix.
Data Engineering for Machine Learning Pipelines
This book covers modern data engineering functions and important Python libraries, to help you develop state-of-the-art ML pipelines and integration code.The book begins by explaining data analytics and transformation, delving into the Pandas library, its capabilities, and nuances. It then explores emerging libraries such as Polars and CuDF, providing insights into GPU-based computing and cutting-edge data manipulation techniques. The text discusses the importance of data validation in engineering processes, introducing tools such as Great Expectations and Pandera to ensure data quality and reliability. The book delves into API design and development, with a specific focus on leveraging the power of FastAPI. It covers authentication, authorization, and real-world applications, enabling you to construct efficient and secure APIs using FastAPI. Also explored is concurrency in data engineering, examining Dask's capabilities from basic setup to crafting advanced machine learning pipelines. The book includes development and delivery of data engineering pipelines using leading cloud platforms such as AWS, Google Cloud, and Microsoft Azure. The concluding chapters concentrate on real-time and streaming data engineering pipelines, emphasizing Apache Kafka and workflow orchestration in data engineering. Workflow tools such as Airflow and Prefect are introduced to seamlessly manage and automate complex data workflows.What sets this book apart is its blend of theoretical knowledge and practical application, a structured path from basic to advanced concepts, and insights into using state-of-the-art tools. With this book, you gain access to cutting-edge techniques and insights that are reshaping the industry. This book is not just an educational tool. It is a career catalyst, and an investment in your future as a data engineering expert, poised to meet the challenges of today's data-driven world.WHAT YOU WILL LEARN* Elevate your data wrangling jobs by utilizing the power of both CPU and GPU computing, and learn to process data using Pandas 2.0, Polars, and CuDF at unprecedented speeds* Design data validation pipelines, construct efficient data service APIs, develop real-time streaming pipelines and master the art of workflow orchestration to streamline your engineering projects* Leverage concurrent programming to develop machine learning pipelines and get hands-on experience in development and deployment of machine learning pipelines across AWS, GCP, and AzureWHO THIS BOOK IS FORData analysts, data engineers, data scientists, machine learning engineers, and MLOps specialistsPAVAN KUMAR NARAYANAN has an extensive and diverse career in the information technology industry, with a primary focus on the data engineering and machine learning domains. Throughout his professional journey, he has consistently delivered solutions in environments characterized by heterogeneity and complexity. His experience spans a broad spectrum, encompassing traditional data warehousing projects following waterfall methodologies and extending to contemporary integrations that involve APIs and message-based systems. Pavan has made substantial contributions to large-scale data integrations for applications in data science and machine learning. At the forefront of these endeavors, he has played a key role in delivering sophisticated data products and solutions, employing a versatile mix of both traditional and agile approaches. Currently employed with Ether Infinitum LLC, Sheridan, WY, Pavan Kumar Narayanan continues to bring his wealth of experience to the forefront of the data engineering and machine learning landscape.Chapter 1: Data Manipulation and Analytics Using Pandas.- Chapter 2: Data Manipulation Using Polars and CuDF.- Chapter 3: Introduction to Data Validation.- Chapter 4: Data Validation Using Great Expectations.- Chapter 5: Introduction to API Design Using FastAPI.- Chapter 6: Introduction to Concurrency Programming Using Task.- Chapter 7: Dask ML.- Module 5: Data Pipelines in the Cloud.- Chapter 9: Introduction to Microsoft Azure.- Chapter 10: Introduction to Google Cloud.- Chapter 11: Introduction to Streaming Data.- Chapter 12: Introduction to Workflow Management Using Airflow.- Chapter 13: Introduction to Workflow Management Using Prefect.
Knowledge Management and Industry Revolution 4.0
GET UP TO SPEED WITH HOW THE LATEST KNOWLEDGE MANAGEMENT AND INDUSTRY 4.0 TECHNOLOGYHELP MAKE ENTERPRISES SECURE, CONTROLLED, AND OPTIMIZED FOR A BETTER FUTURE.This book focuses on how the practices of Industrial Revolution 4.0 and knowledge management interact to create value. In recent years, value chain relationships and related activities have utilized new technologies so that existing conceptual frameworks require a roadmap for innovation strategies and effective implementation. The chapters in this book include case studies contributed by researchers and industry practitioners that showcase the impact of practices and challenges presented by technological changes, upgrading of old systems, and internal and external factors. Knowledge Management and Industrial Revolution 4.0 describes how knowledge management impacts the automation of the industry in secure, controlled, and optimized ways. For instance, the use of the latest technologies and sensors can lead to significant time and cost savings, and operators can utilize their machines and equipment from remote locations. The Industrial Revolution 4.0 incorporates the latest technologies for automation and, in many cases, the result is similar to working from home, even in manufacturing. The use of deep learning should offer many quality control benefits. Furthermore, blockchain technology can help the industry with automation in secure and transparent ways. Apart from industry automation, other departments like human resources can also use effective knowledge management for better outcomes. The use of HR knowledge management allows employees to find and access the information they require without the assistance of the HR department. The book focuses on every aspect of the industry to help all the stakeholders of an organization. The benefits include a reduction in time required for accessing information, easier training, decreased operational expenses, improved stakeholders’ satisfaction, faster problem-solving, increased pace of innovation, simpler employee review and progress reports. AUDIENCEThe book will have a wide audience within academia, education, businesses, and industrial organizations, especially those who are undergoing industry 4.0 changes to optimize for a better future. RAJENDRA KUMAR, PHD, is an associate professor in the Department of Computer Science & Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India. He has published 5 textbooks and about 35 papers in national and international journals and conferences. VISHAL JAIN, PHD, is an associate professor at Sharda University, Greater Noida, India. His research interests focus on information retrieval, the semantic web, ontology engineering, data mining, etc. He has edited 50 books for a variety of publishers and authored 95 research papers for reputed conferences and journals. Jain has several awards, which include the 2012 Young Active Member Award and the 2019 Best Researcher Award. VENUS C. IBARRA, MD, DBA, works as the dean of the MBA/DBA Department of San Pablo Colleges, Philippines. Ibarra also works as a lecturer at the Ateneo Graduate School of Business in management accounting. Ibarra earned her master’s degree in business administration at the Philippines Women’s University. She has professional experience in administration, finance, budgeting, and statistical functions. In 2009, Ibarra was recognized as an outstanding finance educator by CITI NBank and Bank Central in the Philippines. CORRIENNA ABDUL TALIB, PHD, is a senior lecturer in the Department of Educational Science, Mathematics, and Creative Multimedia, Universiti Teknologi, Malaysia. She is a certified computational thinking master trainer who designs professional skill courses at UTM and researches and leads projects on computational skills, microscale chemistry, visual programming language, and educational robotic and game-based learning. VINAY KUKREJA, PHD, is a professor of computer science & engineering at Chitkara University, Punjab, India. His research interests primarily focus on machine learning, deep learning, agile software development, image processing, etc. He has about 90 articles indexed in Scopus and has authored 3 books. In 2018, Kukreja received the first prize in the SIH Hackathon from the Ministry of Housing & Urban Affairs, India.
Foundations and Opportunities of Biometrics
Biometrics are used in many situations of our daily lives, but we still don’t fully understand the way they work and what potential lies behind them. This book covers a fascinating and broad area that impacts everyone, not only companies involved in deep-tech. Over the past decades, biometrics have made their way into our daily lives after being first limited to science fiction and later expensive high-tech applications. With the widespread use of smartphones and other technological gadgets we interact with on a daily basis, the ability to collect and use biometric signals has become ubiquitous.This book provides a comprehensive overview of the type of biometric signals that are being used, how they are implemented, and what their limitations are. With technology being more relevant in all aspects of life, it’s more important for people who make decisions in their business to understand the opportunities and limitations of biometric use.This book will guide the readerthrough the history of biometric technology, including initial applications of the technology, and reflect on how pop culture like science fiction media has influenced the way we look at biometrics and shaped our expectations and fears. It also covers real-world applications and how they work. This book provides foundational information that will help readers understand how they can use biometrics in their everyday life and assess their ability to disrupt existing business processes and models.WHAT YOU WILL LEARN:How Biometrics have evolved over time and the main drivers for them being disruptive.The scope and limitations of various types of biometrics.Foundational knowledge to lead the conversation about biometrics within your company.An analysis of BMD sources that remain stable over time.Develop an analytical understanding of accuracy, precision and errors and understand how the various uses of BMD rate within these contexts.WHO THIS BOOK IS FOR:This book is aimed at people who have an interest in technology, but perhaps aren’t very technical themselves. It focuses on business leaders, product managers, product designers, etc. who want to understand the opportunities biometrics offer to their customers and how to implement them in a useful and effective way.Dario Salice is a seasoned professional in the space of Telecommunications, Security, and Online-Identities. While most recently working at Google and then Meta, he provided the right security tools to billions of users to protect their online accounts. I also launched dedicated security programs to protect highly targeted individuals from more sophisticated attacks. Serving as Meta’s representative on the Board of the FIDO Alliance, an industry standards organization working on strong authentication methods, he gained a broader perspective on the global authentication market. Dario's current focus is ramping up an independent boutique consulting service to engage with companies of any size who want to benefit from my insights Part I - Laying the foundationJennifer Bailey-Salice is an author of calculus workbooks at Calculus Workbooks at White Willow Math. For over 20 year, Jennifer Bailey-Salice taught all levels of math from 6th grade through Multi-Variable Calculus. As a classroom teacher and a private tutor, Ms. Bailey-Salice developed an understanding of what students need to know in order to fully understand the topic at hand. While her teaching took her from Atlanta to Spain and then California, she is now settled in Surrey, UK where she hopes to continue helping students succeed atmath.Part I: Laying Down the Foundation.- Chapter 1: The growing Use of Biometrics.- Chapter 2: What are Biometrics?.- Chapter 3: Adversarial Behavior - Attack and Defense.- Part II: Sources of Biometric Signals.- Chapter 4: Physiological Biometrics.- Chapter 5: Facial Recognition.- Chapter 6: Behavioral Biometrics.- Chapter 7: Voice Analysis.- Part III: Critical Analysis.- Chapter 8: How Do We Judge Accuracy?.- Chapter 9: Risks and Responsibilities.- Chapter 10: Usability and Practicality.
Biotech and IoT
Dive into the intricacies of biotech and IoT integration with a meticulously crafted journey through the chapters. This book unveils the synergies between lab-based biotech processes and cloud-connected technologies, promising a paradigm shift in healthcare, agriculture, and beyond.Beginning with an introduction to IoT applications and biotechnological principles, the book navigates historical developments and convergence. Chapters unfold transformation of laboratories into smart spaces, revolutionizing healthcare through remote patient monitoring and personalized medicine. Explore the world of IoT-enabled biomedical devices and their impact, while delving into data management, security challenges, and ethical considerations. The narrative extends to precision agriculture, environmental monitoring, and synergy of biometric security systems with wearable devices. Bioinformatics and cloud analytics take center stage, unraveling their role in the biotech IoT landscape. Finally, gaze into the future, anticipating trends, innovations, and global collaborations, concluding with practical insights for professionals and enthusiasts alike.On completion, you will emerge from this enlightening journey equipped with a deep understanding of the transformative power at the intersection of biotechnology and IoT. Gain insights into the historical context, current applications, and future trends shaping the landscape. Armed with a wealth of technical knowledge, readers will navigate smart laboratories, healthcare revolutions, environmental interventions, and more. This book not only opens doors to the intricacies of biotech IoT but also provides practical guidance for navigating the evolving field.WHAT YOU WILL LEARN* Understand the core principles of IoT and its versatile applications across various fields* Review the integration of IoT in laboratories, witnessing the metamorphosis of traditional labs into intelligent, connected spaces* Explore real-world applications of IoT in healthcare, agriculture, and environmental monitoringWHO THIS BOOK IS FORProfessionals in healthcare, agriculture, or laboratory settings with a foundational knowledge of biotechnology or IoT looking to deepen their understanding of how these technologies converge and impact their respective industries would greatly benefit from this book.DR. ALOK KUMAR SRIVASTAV is an accomplished Assistant Professor in the Department of Health Science at the University of the People, Pasadena, California, USA. His academic background includes a Ph.D., M.Tech, M.Sc. in Bio-Technology, a Post-Doctoral Fellowship (Research) in Bio-Technology from Lincoln University College, Malaysia, and an MBA in Human Resource Management. He is a distinguished figure in Academia and Research, honored with the "International Pride of Educationist Award" at AIT, Thailand in 2022, for pioneering contributions to advancing education in the digital era and receiving a prestigious accolade "Innovative Academic Researcher Award" at HULT, France, UK in 2024 for his exceptional creativity, innovation, and impact in academic research.DR. PRIYANKA DAS serves as an Assistant Professor in the Department of Health Science at the prestigious University of the People in Pasadena, California, USA. She holds a Ph.D., M.Tech, and M.Sc. in Biotechnology along with an MBA in Human Resource Management. Prior to her current position, she was a Post-Doctoral Fellow (Research) in Biotechnology at Lincoln University College, Malaysia. Dr. Priyanka Das is a dedicated scholar, contributing significantly to the field of Biotechnology.ASHISH KUMAR SRIVASTAVA is renowned in the industry for expertise in IoT and smart connected products, with a proven track record of collaborating across functions to develop assets in new products, R&D, and portfolios. As a seasoned manager, Ashish effectively launched smart connected products, providing value in processes, designs, and business models. Leading product development in IoT platforms, Ashish excels in stakeholder alignment and managing client relationships. With extensive experience in IoT and cloud architecture, Ashish has spearheaded the development of innovative solutions in categories such as smart home, security, and sensors. Beyond corporate achievements, Ashish has contributed significantly to community building, mentoring in Intel CAG youth empowerment programs and leading projects in diverse areas such as robotics, embedded systems, and innovation. Ashish is an active participant in Intel College excellence programs, offering hands-on training and workshops on IoT projects. As an accomplished author, Ashish brings a wealth of knowledge and a commitment to advancing technology.Chapter 1: Introduction to Biotechnology and IoT Integration.- Chapter 2: Historical Development and Convergence.- Chapter 3: Smart Laboratories and IoT Transformation.- Chapter 4: Healthcare Revolution.- Chapter 5: Connected Biomedical Devices and Digital Integration.- Chapter 6: Data Management, Security, and Ethical Considerations.- Chapter 7: Precision Agriculture and Environmental Monitoring.- Chapter 8: Biometric Security Systems and Wearable Devices.- Chapter 9: Bioinformatics and Cloud Analytics.- Chapter 10: Future Trends, Innovations, and Global Collaboration.
Jedes Team ist anders
Praxiserprobtes Know-how für die nachhaltige Entwicklung von Team und Team-Coach - Schrittweise Einführung einer Methode für nachhaltige Teamentwicklung - Präsentiert 12 Team-Personas mit typischem Teamverhalten zur Unterstützung des Team-Coaches bei der Einschätzung seines Teams - Fokussiert die Haltung und nicht nur das Handwerkszeug - Mit vielen Erfahrungsberichten, Analogien und Tipps aus der Praxis Teamentwicklung ist ein kontinuierlicher, komplexer Prozess. Er erfordert vom Team-Coach Empathie, ein schrittweises Vorgehen und ständige Reflexion, mag er nun Teamleiter, Projektleiter, People Lead, Scrum Master, Agile Coach oder Teammitglied heißen. »Jedes Team ist anders« ist eine Methode für kontinuierliche, nachhaltige Teamentwicklung. Sie umfasst eine Teamdefinition, ein Modell mit fünf Entwicklungsfeldern und zwei Leitfragen, eingebettet in einen Regelkreis. Team-Personas unterstützen die Einschätzung der Situation und die Wahl des nächsten Entwicklungsschritts. Praxistipps und Reflexionsfragen helfen dem Team-Coach, das Team und sich selbst weiterzuentwickeln und dabei gut auf sich zu achten. In diese 2., aktualisierte und erweiterte Auflage sind zwei Jahre Praxiserfahrung und das Feedback der Community eingeflossen. Begriffe wurden geschärft, das Modell überarbeitet und weitere Erfahrungsberichte ergänzt. Die Themen im Einzelnen: - Umgang mit Störungen - Den nächsten Entwicklungsschritt festlegen - Entwicklungsfelder bestimmen - Maßnahmen planen und umsetzen - Wirksamkeit und eigene Haltung reflektieren - Sich als Team-Coach weiterentwickeln - Die passenden Werkzeuge finden
Angular Routing
Welcome to the book “Angular Routing”. In this book, I explain everything you need to know about Angular routing. Routing helps you to change what the user sees in a single-page app. In this book, you will learn how to implement common routing tasks. You will learn how to set up routes, retrieve route information, display 404 pages, prevent unauthorized access, and much more. By the end of this book, you will be confident working with routing in your Angular application and be able to handle all kinds of scenarios. Let us get started. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.
Cybersecurity Essentials
Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your expertise or a newcomer eager to navigate the cybersecurity landscape, this guide serves as your trusted companion.Expect to gain a profound grasp of foundational concepts, illustrated through real-world examples and practical applications. Dive into the logical flow of CompTIA Pentest+ objectives and (ISC)2 SSCP & CCSP, aligning your learning with industry standards. Beyond theory, this guide empowers you with actionable tips and emerging trends, ensuring your knowledge remains current in the dynamic realm of cybersecurity.As you progress through each chapter, anticipate a hands-on exploration of offensive and defensive security, offering a pathway to certification from a vendor-neutral perspective. Ultimately, this guide is designed to not only enhance your cybersecurity skill set but to foster a holistic approach, making you adept at navigating the evolving cyber landscape with confidence and expertise.WHAT YOU WILL LEARN* Study a step-by-step guide to conducting vulnerability assessments* Follow post-exploitation techniques for maintaining access* Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures* Review secure coding practices and the importance of web application security* Explore mobile and IoT security best practices* Review tools and practices for securing cloud environments* Discover tips for recognizing and mitigating social engineering threatsWHO THIS BOOK IS FORAnyone interested in cybersecurity: recent graduates, IT professionals transitioning into security, veterans, and those who are self taught. One of the largest motivating factors is that there are several certifications—this book will greatly improve the reader's chance of obtaining.KODI COCHRAN is highly invested in the field of cybersecurity, something he has followed as a hobbyist for the past decade and expanded to make it his field of study and work. He has both a bachelor's degree and a master's degree in Cybersecurity and Information Assurance, in addition to working as an Information Systems Manager for the Networking and Infrastructure team of the Department of Human and Health Resources under the agency of the Office of Management of Information Services at the state of West Virginia.Kodi is responsible for networking administration, project management, system support, and site support for the state of West Virginia in all state-owned health care facilities, hospitals, and labs. In addition, he holds the following certifications: CompTIA A+, Network+, Security+, Project+, CySA+, and Pentest+. He’s currently working on the CompTIA CASP+.Chapter 1. Safeguarding the Digital Realm.- Chapter 2. The CIA Triad: Safeguarding Data in the Digital Realm.- Chapter 3. Information Gathering and Footprinting in Cybersecurity.- Chapter 4. Scanning and Enumeration.- Chapter 5. Securing Strength: A Comprehensive Guide to Vulnerability Assessment.- Chapter 6. Exploitation Unveiled: Navigating the Cybersecurity Offensive.- Chapter 7. After the Breach: Decoding Post-Exploitation Dynamics.- Chapter 8. Network Security: Safeguarding Digital Pathways.- Chapter 9. Securing thhe Airwaves: Essentials of Wireless Security.- Chapter 10. Fortifying the Front: Mastering Web Application Security.- Chapter 11. Security the Internet of Things and our Mobile World.- Chapter 12. Securing the Cloud: A Comprehensive Guide to Cloud Security.- Chapter 13. Social Engineering: Manipulating the Human Element.- Chapter 14. Incident Response, Business Continuity. and Disaster Recovery.-Chapter 15. Legal and Compliance Considerations in Cybersecurity.
Online Machine Learning (2. Auflg.)
Dieses Buch beschreibt Theorie und Anwendungen aus dem Bereich des Online Maschine Learnings (OML), wobei der Fokus auf Verfahren des überwachten Lernens liegt. Es werden Verfahren zur Drifterkennung und -behandlung beschrieben. Verfahren zur nachträglichen Aktualisierung der Modelle sowie Methoden zur Modellbewertung werden dargestellt. Besondere Anforderungen aus der amtlichen Statistik (unbalancierte Daten, Interpretierbarkeit, etc.) werden berücksichtigt. Aktuelle und mögliche Anwendungen werden aufgelistet. Ein Überblick über die verfügbaren Software-Tools wird gegeben. Anhand von zwei Studien (“simulierten Anwendungen”) werden Vor- und Nachteile des OML-Einsatz in der Praxis experimentell analysiert.Das Buch eignet sich als Handbuch für Experten, Lehrbuch für Anfänger und wissenschaftliche Publikation, da es den neuesten Stand der Forschung wiedergibt. Es kann auch als OML-Consulting dienen, indem Entscheider und Praktiker OML anpassen und für ihre Anwendung einsetzen, um abzuwägen, ob die Vorteile die Kosten aufwiegen. Einleitung: Vom Batch Machine Learning zum Online Machine Learning. Supervised Learning: Klassifikation und Regression. Drifterkennung und -Behandlung. Initiale Auswahl und nachträgliche Aktualisierung von OML Modellen. Evaluation und Performance-Messung. Besondere Anforderungen an OML-Verfahren. Praxisanwendungen. Open-Source-Software für Online Machine Learning. Ein experimenteller Vergleich von Batch- und Online Machine Learning-Algorithmen. Hyperparameter Tuning. Zusammenfassung und Ausblick. PROF. DR. THOMAS BARTZ-BEIELSTEIN ist Experte für KI mit über 30 Jahren Erfahrung. Als Professor für Angewandte Mathematik an der TH Köln und Leiter des Instituts für Data Science, Engineering und Analytics (IDE+A) forscht er in den Bereichen KI, maschinelles Lernen, Simulation und Optimierung.EVA BARTZ ist auf KI und Datenschutz spezialisierte Juristin. Seit 2014 führt sie die angesehene Unternehmensberatung Bartz & Bartz GmbH. Diese bietet KI-basierte Lösungen für die Praxis in industriellen Anwendungen an. Die herausragende Arbeit der Unternehmensberatung führte zur Erstellung einer Expertise für das Statistische Bundesamt, aus der schließlich dieses wegweisende Buch entstand.
Vertrauen in Künstliche Intelligenz
Der vorliegende Band markiert einen initialen Schritt zur umfassenden Erörterung des Themenfelds ‚Vertrauen in KI‘ aus vielfältigen Blickwinkeln. Dabei wird eine Herangehensweise sowohl aus wirtschafts- und sozialwissenschaftlicher als auch aus informationstechnischer Perspektive gewählt, die zudem interdisziplinäre Aspekte einbezieht. Insgesamt präsentiert der Band fünfzehn Beiträge von 25 renommierten Autorinnen und Autoren, die ihre Expertise aus vierzehn unterschiedlichen Einrichtungen einbringen. Ziel dieser Debatten ist es, Lernende, Lehrende, Forschende sowie Entscheidungsträgerinnen und -träger aus Politik und Wirtschaft dazu zu befähigen, auf Basis von Fakten eine fundierte Meinung zu bilden. Auf dieser Grundlage sollen sie in der Lage sein, gut durchdachte persönliche Entscheidungen im Umgang mit KI zu treffen. Die Herausgeberin Dr. Sabrina Schork ist Forschungsprofessorin an der Technischen Hochschule Aschaffenburg. Ihr Ziel ist die Stärkung der Innovationskraft in Deutschland. Sie setzt sich dafür ein, frühzeitig kognitive und kreative Potenziale zu identifizieren und zu Talenten auszubauen. Ihr Fokus liegt darauf, individuelle Begabungen bei der Ausbildung von nachhaltigen Innovatorinnen und Innovatoren zu nutzen. Die Begabungen braucht es, um komplexe Probleme auf originelle und nutzbringende Weise lösen können. Dabei legt sie besonderen Wert darauf, dass entwickelte Lösungen von Anfang bis Ende nachhaltig konzipiert und umgesetzt werden, sowohl sozial als auch ökologisch verträglich. Im Bereich digitaler Lösungen berücksichtigt sie die Nachhaltigkeit der Datennutzung und -speicherung, digitaler Technologien und Netzwerksysteme. Die Kapitel 9 und 11 werden auf link.springer.com unter der Creative Commons Namensnennung 4.0 International Lizenz veröffentlicht. Der vorliegende Band markiert einen initialen Schritt zur umfassenden Erörterung des Themenfelds ‚Vertrauen in KI‘ aus vielfältigen Blickwinkeln. Dabei wird eine Herangehensweise sowohl aus wirtschafts- und sozialwissenschaftlicher als auch aus informationstechnischer Perspektive gewählt, die zudem interdisziplinäre Aspekte einbezieht. Insgesamt präsentiert der Band fünfzehn Beiträge von 25 renommierten Autorinnen und Autoren, die ihre Expertise aus vierzehn unterschiedlichen Einrichtungen einbringen. Ziel dieser Debatten ist es, Lernende, Lehrende, Forschende sowie Entscheidungsträgerinnen und -träger aus Politik und Wirtschaft dazu zu befähigen, auf Basis von Fakten eine fundierte Meinung zu bilden. Auf dieser Grundlage sollen sie in der Lage sein, gut durchdachte persönliche Entscheidungen im Umgang mit KI zu treffen. Die Kapitel 9 und 11 werden auf link.springer.com unter der Creative Commons Namensnennung 4.0 International Lizenz veröffentlicht. Dr. Sabrina Schork ist Forschungsprofessorin an der Technischen Hochschule Aschaffenburg. Ihr Ziel ist die Stärkung der Innovationskraft in Deutschland. Sie setzt sich dafür ein, frühzeitig kognitive und kreative Potenziale zu identifizieren und zu Talenten auszubauen. Ihr Fokus liegt darauf, individuelle Begabungen bei der Ausbildung von nachhaltigen Innovatorinnen und Innovatoren zu nutzen. Die Begabungen braucht es, um komplexe Probleme auf originelle und nutzbringende Weise lösen können. Dabei legt sie besonderen Wert darauf, dass entwickelte Lösungen von Anfang bis Ende nachhaltig konzipiert und umgesetzt werden, sowohl sozial als auch ökologisch verträglich. Im Bereich digitaler Lösungen berücksichtigt sie die Nachhaltigkeit der Datennutzung und -speicherung, digitaler Technologien und Netzwerksysteme. Vertrauen in KI aus einer relationalen Perspektive.- Vertrauen in KI aus der Perspektive der Hochschulbildung.- Vertrauen in KI aus der Perspektive der Informatik.- Andere Perspektiven auf Vertrauen in KI.
Python programmieren lernen mit ChatGPT
Der leichte Weg, um als Einsteiger Python programmieren zu lernen! Programmiere 5x schneller professionelle Anwendungen mit der künstlichen Intelligenz „ChatGPT“ und das ohne Vorkenntnisse! Alle Programmiergrundlagen Damit du eigene Anwendungen programmieren kannst, findest du alle relevanten Bausteine in diesem Buch: Daten- und Kontrollstrukturen, mathematische und logische Operatoren, rekursive und objektorientierte Programmierung und vieles mehr! Durch Übung zum Profi In jedem Kapitel erwarten dich Übungen mit einem steigenden Schwierigkeitsgrad und einer Musterlösung. Damit kannst du dein Wissen anwenden und testen. Mit Tipps und Tricks zu schnelleren Ergebnissen Lerne aus meiner jahrelangen Erfahrung als Softwareentwickler, worauf es ankommt, effizient und effektiv zu programmieren. Die praktischen Tipps und Tricks lernst du in der Regel nicht an der Universität, sodass du deinen Kommilitonen und Arbeitskollegen meilenweit voraus sein wirst. Als Anfänger professionelle Anwendungen programmieren Dafür nutzen wir die Fähigkeiten der künstlichen Intelligenz „ChatGPT“. Damit wird der Weg zu deinen professionellen Anwendungen mindestens 5x schneller sein. Worauf du genau achten musst und wie du Schritt-für Schritt einen funktionierenden Code mit ChatGPT erstellen kannst, erfährst du in diesem Buch. Ich verrate dir sogar meine optimierten Eingabebefehle für ChatGPT, damit du sie als Vorlage für die Erstellung deines Codes nutzen kannst. Worauf wartest du also noch? Denn schon bald wirst du in der Lage sein, Anwendungen zu entwickeln wie erfahrene Softwareentwickler! Ich wünsche dir viel Erfolg beim Programmieren mit Python! Simon FlaigNeben exzellenten Leistungen im Programmieren im Schulunterricht, eignete sich Simon Flaig in seiner Freizeit selbstständig verschiedene Programmierkenntnisse an. Nach einem sehr guten Abschluss seines Informatikstudiums, konnte Simon reichlich praktische Erfahrung im Bereich der Softwareentwicklung in etablierten Unternehmen im In- und Ausland sammeln. Nun vermittelt Simon sein Know-How im Bereich der Programmierung mithilfe seiner praxisnahen Lehrbücher.
Large Language Models Projects
This book offers you a hands-on experience using models from OpenAI and the Hugging Face library. You will use various tools and work on small projects, gradually applying the new knowledge you gain.The book is divided into three parts. Part one covers techniques and libraries. Here, you'll explore different techniques through small examples, preparing to build projects in the next section. You'll learn to use common libraries in the world of Large Language Models. Topics and technologies covered include chatbots, code generation, OpenAI API, Hugging Face, vector databases, LangChain, fine tuning, PEFT fine tuning, soft prompt tuning, LoRA, QLoRA, evaluating models, and Direct Preference Optimization. Part two focuses on projects. You'll create projects, understanding design decisions. Each project may have more than one possible implementation, as there is often not just one good solution. You'll also explore LLMOps-related topics. Part three delves into enterprise solutions. Large Language Models are not a standalone solution; in large corporate environments, they are one piece of the puzzle. You'll explore how to structure solutions capable of transforming organizations with thousands of employees, highlighting the main role that Large Language Models play in these new solutions.This book equips you to confidently navigate and implement Large Language Models, empowering you to tackle diverse challenges in the evolving landscape of language processing.WHAT YOU WILL LEARN* Gain practical experience by working with models from OpenAI and the Hugging Face library* Use essential libraries relevant to Large Language Models, covering topics such as Chatbots, Code Generation, OpenAI API, Hugging Face, and Vector databases* Create and implement projects using LLM while understanding the design decisions involved* Understand the role of Large Language Models in larger corporate settingsWHO THIS BOOK IS FORData analysts, data science, Python developers, and software professionals interested in learning the foundations of NLP, LLMs, and the processes of building modern LLM applications for various tasksPERE MARTRA is a seasoned IT Engineer and AI Enthusiast with years of experience in the financial sector. He is currently pursuing a Master's in Research on Artificial Intelligence. Initially, he delved into the world of AI through his passion for game development. Applying Reinforcement Learning techniques, he infused video game characters with personality and autonomy, sparking his journey into the realm of AI. Today, AI is not just his passion but a pivotal part of his profession. Collaborating with startups on NLP-based solutions, he plays a crucial role in defining technological stacks, architecting solutions, and guiding team inception. As the author of a course on Large Language Models and their applications, available on GitHub, Pere shares his expertise in this cutting-edge field. He serves as a mentor in the TensorFlow Advanced Techniques Specialization at Deeplearning.AI, assisting students in solving problems within their tasks. He holds the distinction of being one of the few TensorFlow Certified Developers in Spain, complementing this achievement with an Azure Data Scientist Associate certification. Follow Pere on Medium, where he writes about AI, emphasizing Large Language Models and deep learning with TensorFlow, contributing valuable insights to TowardsAI.net. Top skills include Keras, Artificial Intelligence (AI), TensorFlow, Generative AI, and Large Language Models (LLM). Connect with Pere on https://www.linkedin.com/in/pere-martra/ for project collaborations or insightful discussions in the dynamic field of AI.Part I: Techniques and Libraries.- Chapter 1. Introduction to Large Language Models with OpenAI.- Chapter 2: Vector Databases and LLMs.- Chapter 3: LangChain & Agents.- Chapter 4: Evaluating Models.- Chapter 5: Fine-Tuning Models.- Part II: Projects.- Chapter 6: Natural Language to SQL.- Chapter 7: Creating and Publishing Your Own LLM.- Part III: Enterprise solutions.- Chapter 8: Architecting an NL2SQL Project for Immense Enterprise Databases.- Chapter 9: Transforming Banks with Customer Embeddings.
All Hands on Tech
SUPERCHARGE YOUR ORGANIZATION'S CAPACITY FOR INNOVATIONThe greatest untapped asset in an enterprise today is the ingenuity of its people. Dive into a future of work where technology empowers everyone to be a creator and builder with All Hands on Tech: The Citizen Revolution in Business Technology. This pivotal book offers a comprehensive look into the role of citizen developers—business domain experts who are driving IT-enabled innovation using technology previously reserved for professional technologists. Through case studies of citizens and citizen-enabled enterprises, the authors demonstrate how emerging technology bestows unprecedented power on these individuals and unprecedented value on the organizations that channel their efforts. They outline a transformative approach to citizen development that not only enhances companies' innovative capacity via the empowerment of domain experts, but also minimizes risk and liberates IT departments to pursue more strategic initiatives. All Hands on Tech describes a revolution in work—powered by technology becoming more human and humans becoming more comfortable with technology. This convergence provides a clear pathway for enterprises to leverage the on-the-ground experience and insight of all employees. The authors provide diverse examples of companies that have aligned the work of their citizen developers with wider organizational goals across citizen data science, automation, and development projects. These examples demonstrate why and how to commit to the citizen revolution in your organization. In the book, you'll:* Discover the untapped potential of citizen developers to revolutionize business operations with technology democratization* Find a practical framework for integrating citizen development into a broader corporate digital and data strategy, while controlling risk* Explore a forward-thinking approach to redefining the roles of all hands in an enterprise, empowering them to turn ideas into applications, automations, and analytical/AI modelsFor business leaders, executives, managers, and IT professionals looking to harness the full potential of their front-line employees and redefine the landscape of IT work, All Hands on Tech is a must-have resource. For business domain specialists and those eager to turn ideas into action, the citizen revolution democratizes information technology and empowers you to lead your organization towards a more innovative and efficient future. For subject matter experts, domain specialists, and those eager to put their ideas to work while also future-proofing their careers with invaluable skills, the citizen revolution ushers in an entirely new way of working. THOMAS H. DAVENPORT is Distinguished Professor at Babson College, the Bodily Centennial Professor of Analytics at the UVA Darden School of Business, a Fellow at the MIT Initiative on the Digital Economy, and Senior Advisor to Deloitte. He’s authored or co-authored 24 books, including Process Innovation, Working Knowledge, Competing on Analytics, and All In on AI.IAN BARKIN is a co-founder of 2B Ventures, an investment and advisory firm, and a serial entrepreneur in RPA and AI. He has an extensive background in BPO and digital operations. He co-authored the book Intelligent Automation and has multiple LinkedIn Learning courses on technology and business. CHASE DAVENPORT is focused on the intersection of artificial intelligence and climate change. After many years as an AI researcher at Accenture, Chase founded the Ocean Beach Institute to bring intelligent technology to coastal climate issues.
CompTIA Tech+ Study Guide
AN EASY-TO-READ AND AUTHORITATIVE NEW STUDY GUIDE FOR THE UPDATED COMPTIA TECH+ CERTIFICATION EXAMIn the newly updated third edition of the CompTIA Tech+ Study Guide: Exam FC0-U71, veteran IT professional and tech trainer Quentin Docter delivers an up-to-date resource for effectively and efficiently preparing for the popular new introductory Tech+ certification from CompTIA. This Sybex Study Guide is the gold-standard exam prep roadmap, offering complete coverage of every exam domain, including IT concepts and terminology, infrastructure, applications and software development, data and database fundamentals, security, and more. Perfect for practicing and aspiring entry-level IT pros as well as those preparing to take the CompTIA Tech+ test, this book includes complementary access to online learning resources, two practice exams, flashcards, and practice questions with answer explanations. You'll also find:* Optimized learning resources to get you up to speed as fast as possible* Exam resources designed to reduce test anxiety and familiarize you with testing procedure and content* One full year of access to the Sybex online learning environment, complete with real-world examples and scenarios, objective maps, and a glossary of useful terminologyThe new, entry-level CompTIA Tech+ certification has been created to get you ready for further certification paths, like the A+, Security+, and Network+ credentials, and prepare you for an exciting career in tech. Whether you're an IT beginner or you've already begun your tech journey and are looking for a refresher on foundational concepts, CompTIA Tech+ Study Guide: Exam FC0-U71 is the book you've been waiting for. QUENTIN DOCTER, TECH+ A+, started in the IT industry in 1994 as a tech support agent for Packard Bell. Since then he has worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA, Microsoft, Cisco, Novell, and Sun Microsystems. He is the author of over a dozen books, including Sybex’s CompTIA A+ Complete Study Guide and CompTIA Cloud Essentials+ Study Guide.Introduction xxvAssessment Test xxxivCHAPTER 1 CORE HARDWARE COMPONENTS 1Introducing Internal Components 3Exploring Motherboards, Processors, and Memory 4Motherboards 4Processors 22Memory 27Exploring Storage and Expansion Devices 34Storage Devices 34Other Internal Expansion Devices 47Exploring Power and Cooling 52Power Supplies 52Cooling Systems 55Summary 58Exam Essentials 59Chapter 1 Lab 60Review Questions 62CHAPTER 2 PERIPHERALS AND CONNECTORS 67Installing and Configuring Audio and Video Devices 70Audio Connectors 71Display Devices and Connectors 73Understanding External Storage and Communications Connectors 88External Storage Devices 88Communications Connectors 96Understanding Input, Output, and Power Devices 101Keyboards 101Pointing Devices 105Uninterruptible Power Supplies 112Printers 114Understanding Installation Basics 124Internal Devices 124External Devices 125IP- and Web-Based Devices 125Reviewing Connector Types 127Summary 128Exam Essentials 129Chapter 2 Lab 130Review Questions 131CHAPTER 3 COMPUTING DEVICES AND THE INTERNET OF THINGS 135Exploring Larger Computing Devices 138Servers and Workstations 138Laptops 140Exploring Handheld and Mobile Devices 147Comparing and Contrasting Mobile Devices 148Using Mobile Devices 150Understanding Augmented and Virtual Reality 176Exploring Gaming Consoles 179Understanding the Internet of Things 182A Brief History of the Internet of Things 182Consumer Uses 183Commercial Uses 189Potential Issues 191Summary 193Exam Essentials 193Chapter 3 Lab 194Review Questions 195CHAPTER 4 OPERATING SYSTEMS 199Operating System Fundamentals 201A Brief History of Operating Systems 202Basic Functions of Operating Systems 206Types of Operating Systems 210Managing an Operating System 228Managing Features and Interfaces 229Managing Folder and File Structures 248Summary 264Exam Essentials 264Chapter 4 Lab 265Review Questions 270CHAPTER 5 SOFTWARE APPLICATIONS 275Understanding Application Installation and Management 277Considerations for Installing Software 278Installing and Uninstalling Software 285Updating and Patching Software 293Exploring Common Application Types 299File Extensions 299Productivity Software 302Collaboration Software 307Utility Software 310Using Web Browsers 323Configuring Web Browsers 323Understanding Basic Browser Security 336Private Browsing 343Summary 344Exam Essentials 345Chapter 5 Lab 346Review Questions 348CHAPTER 6 SOFTWARE DEVELOPMENT 353Exploring Programming Languages 355Assembly Language 356Compiled Languages 362Interpreted Languages 364Query Languages 368Understanding Programming Concepts and Techniques 369Programming Logic 370Organizing Code 373Summary 377Exam Essentials 378Chapter 6 Lab 379Review Questions 380CHAPTER 7 DATABASE FUNDAMENTALS 385Understanding Databases 387Exploring Database Concepts and Structures 388Working With Databases 398Summary 411Exam Essentials 412Chapter 7 Lab 412Review Questions 415CHAPTER 8 NETWORKING CONCEPTS AND TECHNOLOGIES 419Exploring Connection Types and Features 422Choosing External Network Connections 423Choosing Internal Network Connections 435Understanding Network Connectivity Essentials 444Common Networking Devices 444Networking Protocol Basics 449TCP/IP Essentials 449Network Storage Options 459Setting Up a Small Wireless Network 463Basic Configuration 463Wireless Router Security 469Additional Wireless Router Services 472Summary 476Exam Essentials 477Chapter 8 Lab 478Part 1: Setting Up Your Wireless Router 478Part 2: Testing Your Neighbors 479Review Questions 480CHAPTER 9 CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE 485Understanding Virtualization and Cloud Computing 486Virtual Machines 487Cloud Computing 492Exploring Artificial Intelligence 498How AI Works 499Types of AI 501Summary 509Exam Essentials 509Chapter 9 Lab 510Review Questions 512CHAPTER 10 SECURITY CONCEPTS AND THREATS 517Understanding Hackers and Motives 519Understanding Security Threats 523Confidentiality Concerns 524Integrity Concerns 530Availability Concerns 531Privacy Expectations 534Software-Based Security Threats 538Understanding Access Control 546Authentication 546Authorization 549Accounting 551Nonrepudiation 553Summary 554Exam Essentials 554Chapter 10 Lab 556Review Questions 557CHAPTER 11 SECURITY BEST PRACTICES 561Understanding Security Best Practices 564Device Hardening 564Managing Users and Passwords 591Using Data Encryption 597Summary 607Exam Essentials 608Chapter 11 Lab 609Review Questions 611CHAPTER 12 DATA CONTINUITY AND COMPUTER SUPPORT 615Understanding Data Continuity 616Fault Tolerance 616Disaster Recovery 631Exploring Computer Support Concepts 633Understanding the Troubleshooting Methodology 633Troubleshooting Examples 645Summary 666Exam Essentials 666Chapter 12 Lab 667Review Questions 669APPENDIX A ANSWERS TO WRITTEN LABS 673Chapter 1 Lab Answers 674Chapter 2 Lab Answers 674Chapter 3 Lab Answers 675Chapter 4 Lab Answers 675Chapter 5 Lab Answers 676Chapter 6 Lab Answers 676Chapter 7 Lab Answers 677Chapter 8 Lab Answers 677Chapter 9 Lab Answers 678Chapter 10 Lab Answers 679Chapter 11 Lab Answers 679Chapter 12 Lab Answers 680APPENDIX B ANSWERS TO REVIEW QUESTIONS 681Chapter 1: Core Hardware Components 682Chapter 2: Peripherals and Connectors 683Chapter 3: Computing Devices and the Internet of Things 685Chapter 4: Operating Systems 686Chapter 5: Software Applications 687Chapter 6: Software Development 688Chapter 7: Database Fundamentals 690Chapter 8: Networking Concepts and Technologies 691Chapter 9: Cloud Computing and Artificial Intelligence 692Chapter 10: Security Concepts and Threats 694Chapter 11: Security Best Practices 695Chapter 12: Data Continuity and Computer Support 697Index 699
Beginning MongoDB Atlas with .NET
This book is a tutorial on MongoDB customized for developers working in Microsoft .NET 6, .NET 7, and beyond. It explains the differences between relational database systems and the document model supported by MongoDB, and shows how to build .NET applications that run against a MongoDB database, especially one in the cloud.Author Luce Carter kicks things off by teaching you how to determine when to use a document database versus a relational engine. After that, she walks you through building a Microsoft .NET project combining the MongoDB Atlas cloud database as a service solution with a .NET. application. In the process, you will learn how to create, read, update, and delete data in MongoDB from any .NET project.You will come away from this book with a solid understanding of MongoDB’s Developer Data Platform and how to use it from your .NET applications. You’ll be able to connect to MongoDB in the cloud and take advantage of the flexibility and scalability that MongoDB’s document storage model provides, and you’ll understand how to craft your applications to run using document storage and the MongoDB database engine.WHAT YOU WILL LEARN* Know when to use the MongoDB document model* Build .NET applications that connect to MongoDB for data storage* Create MongoDB clusters on the MongoDB Atlas cloud platform* Store data in MongoDB Atlas* Create, Read, Update, and Delete (CRUD) data from .NET Web API projects* Test your CRUD endpoints using RESTful operations* Validate schemas to help protect against breaking changesWHO THIS BOOK IS FOR.NET developers who are looking for an alternative to relational databases, and those looking for a flexible and scalable document storage solution for use from .NET applications. Additionally, anyone wanting to learn MongoDB in the context of .NET and C# will benefit from this book.LUCE CARTER is a Developer Advocate for MongoDB with a passion for sharing knowledge and making technology and code seem less intimidating. She is a Microsoft MVP and an international public speaker, enjoying speaking at conferences and other local meetups to share things she is passionate about. She can also be found creating YouTube videos, and blogging, or on a squash court. Her work to educate developers includes helping them to battle Imposter Syndrome–one line of code and story at a time.PART I. GETTING STARTED.- 1. Choosing MongoDB.- 2. What is MongoDB?.- PART II. SETTING UP MONGODB.- 3. Creating an Account.- 4. Creating Your First Cluster and Loading Sample Dataset.- 5. Browsing Your Data.- PART III. BUILDING A PROJECT.- 6. Creating the Application.- 7. Adding MongoDB.- 8. Creating and Interacting with Documents from Code.- 9. Testing The Endpoints.- PART IV. TAKING IT FURTHER.- 10. Schema Validation.- 11. What Next?.
Parallel Programming with C# and .NET
If you need to understand concurrency, this book is your guide to the fundamentals behind the advanced software you seek to implement to achieve highly responsive and scalable code. Support for parallel computation is an essential part of concurrency. Concurrency is an advanced concept and solutions are not straightforward. Many developers have been burned by it and are still being burned by it. This book aims to simplify the concept for C# developers. It tries to simplify the concept using the Task Parallel Library (TPL), Concurrent Collections, Parallel LINQ (PLINQ), Asynchronous Programming Patterns, and related topics.The book starts with an overview of TPL and discusses Tasks. Understanding these areas is necessary to learn the concepts that follow in the book. You will go through special scenarios, such as handling exceptions and cancellations, followed by demonstrations of synchronization techniques and concurrent collections. You will see demonstrations of parallel loops to speed up the computations. And you'll understand PLINQ in detail. Finally, you'll learn how to simplify asynchronous programming with async and await keywords is discussed.The book contains “Q&A sessions”, review questions, and exercises (in .NET 8 and C#12). After reading the book, you will be able to understand advanced concepts in parallel programming and implement them in your code.WHAT YOU WILL LEARN* Understand concurrent and multi-threaded development* Understand how some modern-day C# features can promote parallel programming* Demonstrate the latest patterns for parallel developmentWHO THIS BOOK IS FORDevelopers familiar with C# but are absolute beginners for parallel programming.VASKARAN SARCAR obtained his Master of Engineering degree in Software Engineering from Jadavpur University, Kolkata (India), and an MCA from Vidyasagar University, Midnapore (India). He was a National Gate Scholar (2007-2009) and has over 12 years of experience in education and the IT industry. He devoted his early years (2005-2007) to the teaching profession at various engineering colleges, and later he joined HP India PPS R&D Hub in Bangalore. He worked there until August 2019 and became a Senior Software Engineer and Team Lead. After working for more than ten years at HP, he decided to follow his passion completely. He is now an independent full-time author.Chapter 1: Understanding Tasks.- Chapter 2: Handling Special Scenarios.- Chapter 3: Exploring Synchronization and Concurrent Collections.- Chapter 4: Working on Parallel Loops.- Chapter 5: Parallel LiNQ.- Chapter 6: Simplifying Asynchronous Programs.- Appendix A.- Appendix B.- Appendix C.
Explorations in the Mathematics of Data Science
This edited volume reports on the recent activities of the new Center for Approximation and Mathematical Data Analytics (CAMDA) at Texas A&M University. Chapters are based on talks from CAMDA’s inaugural conference – held in May 2023 – and its seminar series, as well as work performed by members of the Center. They showcase the interdisciplinary nature of data science, emphasizing its mathematical and theoretical foundations, especially those rooted in approximation theory.Preface.- S-Procedure Relaxation: a Case of Exactness Involving Chebyshev Centers.- Neural networks: deep, shallow, or in between?.- Qualitative neural network approximation over R and C.- Linearly Embedding Sparse Vectors from l2 to l1 via Deterministic Dimension-Reducing Maps.- Ridge Function Machines.- Learning Collective Behaviors from Observation.- Provably Accelerating Ill-Conditioned Low-Rank Estimation via Scaled Gradient Descent, Even with Overparameterization.- CLAIRE: Scalable GPU-Accelerated Algorithms for Diffeomorphic Image Registration in 3D.- A genomic tree based sparse solver.- A qualitative difference between gradient flows of convex functions in finite- and infinite-dimensional Hilbert spaces.
Künstliche Intelligenz für Lehrkräfte
Das Buch Künstliche Intelligenz für Lehrkräfte führt die zentralen Ansätze und Gebiete der KI fundiert und insbesondere für Informatiklehrkräfte aufbereitet ein. Es bietet aber auch Lehrkräften mit anderem Hintergrund die Möglichkeit, sich mit den fachlichen Grundlagen von KI auseinanderzusetzen. Behandelte Themen sind insbesondere Problemlösen und Suche, Grundlagen des Maschinellen Lernens, Wissensrepräsentation und Schließen, Künstliche neuronale Netze, Tiefes Lernen, Generative KI und Robotik. In jedem Kapitel wird eine methodische Einführung gegeben, relevante Anwendungsbereiche aufgezeigt und Vorschläge für die konkrete Umsetzung im Unterricht gegeben. Zudem werden interdisziplinäre Bezüge hergestellt und Fragen der Ethik und gesellschaftliche Bezüge diskutiert.Die Herausgebenden und Autor:innen des Buches sind Lehrkräfte an Hochschulen aus den Bereichen Künstliche Intelligenz und Informatikdidaktik. Durch die interdisziplinäre Kooperation bietet das Buch sowohl einen fachlich fundierten Einstieg in das Thema KI als auch einen geeigneten didaktischen Zugang.ULRICH FURBACH ist Professor im Ruhestand für künstliche Intelligenz an der Universität Koblenz. Seine Forschungsgebiete umfassen automatisches Schließen, Agenten und Kognition. Er ist an der TU München habilitiert, hat an der Universität der Bundeswehr promoviert und ist Gründer und Gesellschafter des KI-Unternehmens wizAI solutions GmbH.EMANUEL KITZELMANN ist Professor für Angewandte Künstliche Intelligenz an der TH Brandenburg. Nach seiner Promotion hat er mehrere Jahre als Lehrer für Informatik, Softwareentwicklung und Mathematik am Berufskolleg Ratingen gearbeitet und dort das das Berufliche Gymnasium für Informatik geleitet. Sein Forschungsschwerpunkt ist im Bereich Induktive Programmsynthese – ein Gebiet im Schnittbereich von maschinellem Lernen und Programmierung.TILMAN MICHAELI ist Professor für Didaktik der Informatik an der TU München. Ziel seiner Arbeit ist es, Informatik nicht nur zu erklären, sondern jede und jeden zu befähigen, diedigitale Welt aktiv und kreativ mitzugestalten. Forschungsschwerpunkte sind Data und AI Literacy, Debugging im Unterricht, digitale Bildung sowie Quantencomputing als Thema informatischer Bildung.UTE SCHMID ist Professorin für Kognitive Systeme an der Otto-Friedrich-Universität Bamberg. Seit mehr als zwanzig Jahren lehrt und forscht sie im Bereich Künstliche Intelligenz. Forschungsschwerpunkte sind intepretierbares und erklärbares Maschinelles Lernen sowie KI und Bildung. Seit vielen Jahren bietet sie Workshops zum Thema KI für Kinder und Jugendliche an und engagiert sich in der Lehrkräftefortbildung. Sie leitet den AK KI und Schule des Fachbereichs KI der Gesellschaft für Informatik.Einführung.- Teil 1 Grundlegende Konzepte der KI: Suche im Problemraum.- Lernen aus Daten.- Schließen aus Wissen.- Teil 2 Maschinelles Lernen: Lernen von Entscheidungsbäumen.- Lernen mit neuronalen Netzen.- Analytisches vs. konnektionistisches Paradigma.- Verstärkendes Lernen.- Tiefes Lernen.- Erklärbarkeit.- Generative KI.- Teil 3 Schließen und Planen: Logistikbasierte Wissensverarbeitung.- Schließen im Alltag und unter Unsicherheit.- Teil 4 Spezielle und vertiefende Themen: Robotik.- Teil 5 Reflexion: Natürliche und künstliche Intelligenz.- Wechselwirkungen von KI mit anderen Schulfächern.- Verantwortung.- Glossar.
Coding mit KI für Dummies
LASSEN SIE SICH BEIM PROGRAMMIEREN ASSISTIERENVon der Prozessautomatisierung über die Code-Optimierung bis hin zur Erledigung von Kernaufgaben wie Dokumentation, Debugging und Aktualisierung – künstliche Intelligenz hilft Ihnen dabei, sich auf den Kern Ihrer Entwicklungsarbeit zu konzentrieren. In diesem Buch lernen Sie die wichtigsten Plattformen kennen, mit denen Sie neuen Code schreiben und Ihre Codequalität verbessern können. Sie erfahren, welche Möglichkeiten und welche Grenzen die KI-Tools haben und wie Sie diese für Routineaufgaben einsetzen. So behalten Sie den Kopf frei für die wichtigen Aufgaben. SIE ERFAHREN* Welche Tools und Plattformen Sie kennen sollten* Wie Sie die Lesbarkeit von Code verbessern* Wie Sie Bugs mithilfe von KI beseitigen* Wie Sie mithilfe von KI Ihren Code wartungsfreundlicher gestaltenCHRIS MINNICK ist ein erfolgreicher Autor, Lehrer, Programmierer und ein begeisterter Lerner. Er ist Autor oder Co-Autor von über zwanzig Büchern, darunter Bücher, die Kindern das Programmieren beibringen. Er hat Videokurse entwickelt und unterrichtet professionelle Entwickler in den Bereichen Programmierung und maschinelles Lernen. Einleitung 19TEIL I: TECHNIKEN UND TECHNOLOGIEN 25Kapitel 1: Wie das Coding von KI profitiert 27Kapitel 2: Maschinelles Lernen und Deep Learning 53Kapitel 3: KI-Coding-Tools 73Kapitel 4: Coding mit Chatbots 97TEIL II: KI FÜRS CODING EINSETZEN 127Kapitel 5: Der Weg vom Plan zum Prototyp 129Kapitel 6: Code formatieren und verbessern 157Kapitel 7: Fehler finden und beseitigen 183Kapitel 8: Code übersetzen und optimieren 211TEIL III: CODE TESTEN, DOKUMENTIEREN UND PFLEGEN 227Kapitel 9: Code testen 229Kapitel 10: Code dokumentieren 253Kapitel 11: Codepflege 281TEIL IV: DER TOP-TEN-TEIL 299Kapitel 12: Zehn weitere Tools zum Ausprobieren 301Kapitel 13: Zehn KI-Coding-Ressourcen 311Abbildungsverzeichnis 319Stichwortverzeichnis 327
Artificial Intelligence-Enabled Blockchain Technology and Digital Twin for Smart Hospitals
THE BOOK UNIQUELY EXPLORES THE FUNDAMENTALS OF BLOCKCHAIN AND DIGITAL TWIN AND THEIR USES IN SMART HOSPITALS.Artificial Intelligence-Enabled Blockchain Technologyand Digital Twin for Smart Hospitals provides fundamental information on blockchain and digital twin technology as effective solutions in smart hospitals. Digital twin technology enables the creation of real-time virtual replicas of hospital assets and patients, enhancing predictive maintenance, operational efficiency, and patient care. Blockchain technology provides a secure and transparent platform for managing and sharing sensitive data, such as medical records and pharmaceutical supply chains. By combining these technologies, smart hospitals can ensure data security, interoperability, and streamlined operations while providing patient-centered care. The book also explores the impact of collected medical data from real-time systems in smart hospitals, and by making it accessible to all doctors via a smartphone or mobile device for fast decisions. Inevitable challenges such as privacy concerns and integration costs must, of course, be addressed. However, the potential benefits in terms of improved healthcare quality, reduced costs, and global health initiatives makes the integration of these technologies a compelling avenue for the future of healthcare. Some of the topics that readers will find in this book include: Wireless Medical Sensor Networks in Smart Hospitals ● DNA Computing in Cryptography ● Enhancing Diabetic Retinopathy and Glaucoma Diagnosis through Efficient Retinal Vessel Segmentation and Disease Classification ● Machine Learning-Enabled Digital Twins for Diagnostic And Therapeutic Purposes ● Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals ● Blockchain for Edge Association in Digital Twin Empowered 6G Networks ● Blockchain for Security and Privacy in Smart Healthcare ● Blockchain-Enabled Internet of Things (IoTs) Platforms for IoT-Based Healthcare and Biomedical Sector ● Electronic Health Records in a Blockchain ● PSO-Based Hybrid Cardiovascular Disease Prediction for Using Artificial Flora Algorithm ● AI and Transfer Learning Based Framework for Efficient Classification And Detection Of Lyme Disease ● Framework for Gender Detection Using Facial Countenances ● Smartphone-Based Sensors for Biomedical Applications ● Blockchain for Improving Security and Privacy in the Smart Sensor Network ● Sensors and Digital Twin Application in Healthcare Facilities Management ● Integration of Internet of Medical Things (IoMT) with Blockchain Technology to Improve Security and Privacy ● Machine Learning-Driven Digital Twins for Precise Brain Tumor and Breast Cancer Assessment ● Ethical and Technological Convergence: AI and Blockchain in Halal Healthcare ● Digital Twin Application in Healthcare Facilities Management ● Cloud-based Digital Twinning for Structural Health Monitoring Using Deep Learning. AUDIENCEThe book will be read by hospital and healthcare providers, administrators, policymakers, scientists and engineers in artificial intelligence, information technology, electronics engineering, and related disciplines. AMIT KUMAR TYAGI, PHD, is an assistant professor at the National Institute of Fashion Technology, New Delhi, India. He obtained his doctorate in 2018. He has published more than 200 papers in refereed international journals, conferences, and books, many of which are with the Wiley-Scrivener imprint. He has filed more than 25 national and international patents in deep learning, the Internet of Things, cyber-physical systems, and computer vision. His current research focuses on next-generation machine-based communications, blockchain technology, smart and secure computing, and privacy. Preface xixPART 1: BASIC FUNDAMENTALS AND PRINCIPLES 11 Introduction to Smart Hospital 3R. Bhuvana, R. J. Hemalatha, S. Baskar and Krishnakumar Kosalaram2 Wireless Medical Sensor Networks in Smart Hospitals 19Renugadevi A. S., Jayaprakash M., Kaviya P., Kavin Raj P.N. and Jenish G.S.3 Introduction of DNA Computing in Cryptography 39M. Venkata Krishna Reddy, R. Ravinder Reddy, E. Padma Latha, Sirisha Alamanda and P.V.S. SrinivasPART 2: METHODS AND APPLICATIONS 614 Enhancing Diabetic Retinopathy and Glaucoma Diagnosis through Efficient Retinal Vessel Segmentation and Disease Classification 63Asadi Srinivasulu5 Machine Learning–Enabled Digital Twins for Diagnostic and Therapeutic Purposes 77Neel Shah, Jayansh Nagar, Kesha Desai, Nirav Bhatt, Nikita Bhatt and Hiren Mewada6 Blockchain as the Backbone of a Connected Ecosystem of Smart Hospitals 99C.M. Nalayini, V. Sathya, Shruthi Arunkumar and M. Dinesh Babu7 Blockchain for Edge Association in Digital Twin Empowered 6G Networks 123C. Fancy, M. Anand and T. M. Sheeba8 Blockchain for Security and Privacy in the Smart Healthcare 153V. Karthikeyan, S. Sridhar Raj, K. Gopalakrishnan, J. Dani Reagan Vivek and Anita Antwiwaa9 Conceptual and Empirical Evidence for the Implementation of Blockchain Technology as a Solution for Healthcare Service Providers in India 179B.C.M. Patnaik, Ipseeta Satpathy, Rocky Dwyer, Amit Kumar Tyagi and Anish Patnaik10 Blockchain-Enabled Internet of Things (IoTs) Platforms for IoT-Based Healthcare and Biomedical Sectors 201Amit Kumar Tyagi11 Electronic Health Records in a Blockchain 219Reshma V. and Rajesh Mamilla12 A PSO-Based Hybrid Cardiovascular Disease Prediction for Using Artificial Flora Algorithm 231Ritu Aggarwal, Gulbir Singh and Eshaan Aggarwal13 AI and Transfer Learning–Based Framework for Efficient Classification and Detection of Lyme Disease 245Pramit Brata Chanda, Saikat Das, Sharanya Bhattacharya, Souhardya Biswas and Subir Kumar Sarkar14 Framework for Gender Detection Using Facial Countenances 269Shyla, Shalu and Mohit DayalPART 3: ISSUES AND CHALLENGES 28715 Unveiling the Challenges and Limitations in COVID-19 Health Data Prediction with Convolutional Neural Networks: A Data Science Research Perspective 289Asadi Srinivasulu, Piyush Agrawal, Amit Agrawal and Goddindla SreenivasuluPART 4: FUTURE OPPORTUNITIES 30916 Cloud-Based Digital Twinning for Structural Health Monitoring Using Deep Learning 311K. Renugadevi, T. Jayasankar and J. ArputhaVijaya Selvi17 Smartphone-Based Sensors for Biomedical Applications 327Amit Kumar Tyagi, Richa and Shabnam Kumari18 Blockchain for Improving Security and Privacy in the Smart Sensor Network 347Amit Kumar Tyagi and Tanuj Surve19 Sensors and Digital Twin Application in Healthcare Facilities Management 369Amit Kumar Tyagi20 Integration of Internet of Medical Things (IoMT) with Blockchain Technology to Improve Security and Privacy 391Silky Pareyani, Neeta Nathani and Jagdeesh Kumar Ahirwar21 Advancing Healthcare Diagnostics: Machine Learning–Driven Digital Twins for Precise Brain Tumor and Breast Cancer Assessment 413J. Olalekan Awujoola, T. Aniemeka Enem, F. N. Ogwueleka, O. Abioye and E. Abidemi Awujoola22 Digital Twin Applications in Healthcare Facilities Management 435Kandan M., Naveen P., G. Nagarajan and S. Janagiraman23 Ethical and Technological Convergence: AI and Blockchain in Halal Healthcare 451md Mahfujur RahmanIndex 467
Digital Twin and Blockchain for Smart Cities
THE BOOK UNIQUELY EXPLORES THE FUNDAMENTALS OF BLOCKCHAIN AND DIGITAL TWIN TECHNOLOGIES AND THEIR USES IN SMART CITIES.In the previous decade, many governments explored artificial intelligence, digital twin, and blockchain, and their roles in smart cities. This book discusses the convergence of two transformative technologies, digital twin and blockchain, to address urban challenges and propel the development of smarter, more sustainable cities. This convergence empowers cities to create real-time replicas of urban environments (digital twins) and secure, transparent data management (blockchain) to improve city planning, management, and civic services. In this application, the concept of a digital twin involves creating a virtual, data-driven replica of a city or specific urban systems, such as transportation, energy, or infrastructure. This digital twin mirrors the real world, gathering data from various sensors, IoT devices, and other sources to provide a holistic view of the city’s operations. Furthermore, blockchain technology offers a decentralized and tamper-resistant ledger for securely storing and managing data. In the context of smart cities, blockchain can ensure data integrity, privacy, and transparency, enabling trust and collaboration among various stakeholders. This book covers many important topics, including real-time city modeling; data security and the trustworthy storage of sensitive urban data; transparent governance to facilitate accountable governance and decision-making processes in smart cities; improved city services; disaster resilience (by providing insights into vulnerabilities and efficient resource allocation during crises); sustainable urban planning that optimizes resource allocation, reduces energy consumption, and minimizes environmental impact, which fosters sustainable development; citizen engagement; and much more. This book will not only provide information about more efficient, resilient, and sustainable urban environments, but it also empowers citizens to be active participants in shaping the future of their cities. By converging these technologies, cities can overcome existing challenges, encourage innovation, and create more livable, connected, and responsive urban spaces. AUDIENCEThis book has a wide audience in computer science, artificial intelligence, and information technology as well as engineers in a variety of industrial manufacturing industries. It will also appeal to economists and government/city policymakers working on smart cities, the circular economy, clean tech investors, urban decision-makers, and environmental professionals. AMIT KUMAR TYAGI, PHD, is an assistant professor at the National Institute of Fashion Technology, New Delhi, India. He obtained his doctorate in 2018. He has published more than 200 papers in refereed international journals, conferences, and books, many of which are with the Wiley-Scrivener imprint. He has filed more than 25 national and international patents in deep learning, the Internet of Things, cyber-physical systems, and computer vision. His current research focuses on next-generation machine-based communications, blockchain technology, smart and secure computing, and privacy. Preface xxixPART 1: BASIC FUNDAMENTALS 11 Introduction to Blockchain Technology for Smart Cities 3Roopa Devi E.M., Shanthakumari R., Vinothkumar S. and Balasurya K.R.2 Blockchain Technology: Insight into Future 27Amit Kumar Tyagi, Shabnam Kumari and Tanuj Surve3 Safe and Reliable Smart City Design Based on Blockchain Technology 47Amita Sanjiv Mirge and Gulbakshee Dharmale4 Blockchain and Digital Twin for Enhancing Personal Security in Modern Cities 59Charanya J., Abinaya P.S., Dhanusha R., Aadhavan G.V. and Prakash Duraisamy5 Integration of Digital Twin and Blockchain for Smart Cities 81Amit Kumar Tyagi, Shabnam Kumari and Tanuj SurvePART 2: METHODS AND APPLICATIONS 1016 Optimized CNN Learning Model With Multi-Threading for Forgery Feature Detection in Real-Time Streaming Approaches 103Sneha Venkateshalu and Santosh Deshpande7 Enhancing Weather Data Forecasting: A Comprehensive Approach with Advanced Statistical Techniques for Accurate Modeling of Atmospheric Dynamics and Climate Pattern Adaptation 117Asadi Srinivasulu, Goddindla Sreenivasulu, Gayathri R., Rajasekaran S., Shaik Mastan Vali, P. Dolly Diana, Nenavath Abhiram Naik and Tarkeshwar Barua8 Blockchain-Based Secure Digital Twin Framework for Smart Healthy City 135Sneha Kanawade, Suvarna Patil, Shivganga Gavhane, Nalini S. Jagtap and Amit Bhanushali9 Blockchain and Digital Twin for Smart Grid 159Amit Kumar Tyagi and Shabnam Kumari10 Blockchain, AI, and IoT for Smart Road Traffic Management System 197Amit Kumar Tyagi, Shrikant Tiwari and Kanchan Naithani11 Blockchain for Safety of Internet of Vehicles in Smart Transportation 215Amit Kumar Tyagi, Shabnam Kumari, Muthumeenakshi Rajasekaran and Shrikant Tiwari12 Blockchain-Enabled Internet of Things (IoTs) Platforms for Vehicle Sensing and Transportation Monitoring 257Amit Kumar Tyagi, Shrikant Tiwari and Kanchan Naithani13 An Innovative Water Control System Based on Blockchain Technologies 277M. Ramprasath, Kiran Bellam, T. Chandrasekar, Praveen Kumar B., A. Thilagavathy and Elangovan G.14 Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities 297Savaridassan P., Sahasra K., Kalaiselvi B., Nagoormeeran A. R. and N. Krishnaraj15 Analysis of Block Chain Based Technologies Employed in Inter-EV and Grid-EV Energy Trade 323Anand Krishnadas, Jarin T., Saju P. John, Bukola Fatimah Balogun, and Santosh Reddy Addula16 Blockchain for Enhancing Security and Privacy in the Smart Healthcare 343Amit Kumar Tyagi and Seranmadevi R.PART 3: ISSUES AND CHALLENGES 37117 Internet of Things for Smart Home: A Survey 373Shabnam Kumari and Amit Kumar Tyagi18 Deep Learning-Based Traffic Sign Detection and Recognition for Autonomous Vehicles 407Murali Krishnan Mani, Sonaa Rajagopal, Kavitha D. and Saravanabalagi Ramachandran19 Role of Emerging Technologies in Smart Grids and Power Systems 429Shabnam Kumari and Amit Kumar Tyagi20 Blockchain-Enabled Smart Healthcare Applications in 6G Networks 459Amit Kumar Tyagi and Shrikant TiwariPART 4: FUTURE OPPORTUNITIES 49521 Wireless Sensor Networks: An Introduction 497Shabnam Kumari and Amit Kumar Tyagi22 Future Professions in Agriculture, Medicine, Education, Fitness, R&D, Transport, and Communication 529Lakshmikanthan Narayanan, Priyanga Subbiah, Rengaraj Alias Muralidharan, Aravind Pitchai Venkataraman and Sandhiya M.23 Blockchain–Artificial Intelligence-Based Secured Solutions for Smart Environment 547Amit Kumar Tyagi24 Smart Hospital in Smart Cities 579M. Pradeep, Shabnam Kumari, Amit Kumar Tyagi and Shrikant Tiwari25 Digital Twin for Smart City Resilience and Solutions 605Sivaretinamohan R. and R. Samiksha Reddy26 IoT-Based Autonomous Vehicle System for Maintaining Driving Safety and Comfortability Based on Machine Learning Techniques 621D. Kavitha, S. Ravikumar and K.R. Naghul PranavIndex 643
Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing
AN ESSENTIAL BOOK ON THE APPLICATIONS OF AI AND DIGITAL TWIN TECHNOLOGY IN THE SMART MANUFACTURING SECTOR.In the rapidly evolving landscape of modern manufacturing, the integration of cutting-edge technologies has become imperative for businesses to remain competitive and adaptive. Among these technologies, Artificial Intelligence (AI) stands out as a transformative force, revolutionizing traditional manufacturing processes and making the way for the era of smart manufacturing. At the heart of this technological revolution lies the concept of the Digital Twin—an innovative approach that bridges the physical and digital realms of manufacturing. By creating a virtual representation of physical assets, processes, and systems, organizations can gain unprecedented insights, optimize operations, and enhance decision-making capabilities. This timely book explores the convergence of AI and Digital Twin technologies to empower smart manufacturing initiatives. Through a comprehensive examination of principles, methodologies, and practical applications, it explains the transformative potential of AI-enabled Digital Twins across various facets of the manufacturing lifecycle. From design and prototyping to production and maintenance, AI-enabled Digital Twins offer multifaceted advantages that redefine traditional paradigms. By leveraging AI algorithms for data analysis, predictive modeling, and autonomous optimization, manufacturers can achieve unparalleled levels of efficiency, quality, and agility. This book explains how AI enhances the capabilities of Digital Twins by creating a powerful tool that can optimize production processes, improve product quality, and streamline operations. Note that the Digital Twin in this context is a virtual representation of a physical manufacturing system, including machines, processes, and products. It continuously collects real-time data from sensors and other sources, allowing it to mirror the physical system’s behavior and performance. What sets this Digital Twin apart is the incorporation of AI algorithms and machine learning techniques that enable it to analyze and predict outcomes, recommend improvements, and autonomously make adjustments to enhance manufacturing efficiency. This book outlines essential elements, like real-time monitoring of machines, predictive analytics of machines and data, optimization of the resources, quality control of the product, resource management, decision support (timely or quickly accurate decisions). Moreover, this book elucidates the symbiotic relationship between AI and Digital Twins, highlighting how AI augments the capabilities of Digital Twins by infusing them with intelligence, adaptability, and autonomy. Hence, this book promises to enhance competitiveness, reduce operational costs, and facilitate innovation in the manufacturing industry. By harnessing AI’s capabilities in conjunction with Digital Twins, manufacturers can achieve a more agile and responsive production environment, ultimately driving the evolution of smart factories and Industry 4.0/5.0. AUDIENCEThis book has a wide audience in computer science, artificial intelligence, and manufacturing engineering, as well as engineers in a variety of industrial manufacturing industries. It will also appeal to economists and policymakers working on the circular economy, clean tech investors, industrial decision-makers, and environmental professionals. AMIT KUMAR TYAGI, PHD, is an assistant professor at the National Institute of Fashion Technology, New Delhi, India. He obtained his doctorate in 2018. He has published more than 200 papers in refereed international journals, conferences, and books, many of which are with the Wiley-Scrivener imprint. He has filed more than 25 national and international patents in deep learning, the Internet of Things, cyber-physical systems, and computer vision. His current research focuses on next-generation machine-based communications, blockchain technology, smart and secure computing, and privacy. SHRIKANT TIWARI, PHD, is an associate professor in the Department of Computer Science & Engineering, School of Computing Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh India. He obtained his doctorate in 2012. He has authored or co-authored more than 75 national and international journal publications, book chapters, and conference articles. He has five patents filed to his credit. His research interests include machine learning, deep learning, computer vision, medical image analysis, pattern recognition, and biometrics. SENTHIL KUMAR ARUMUGAM, PHD, is an assistant professor in the Professional Studies Department, CHRIST (Deemed to be University), Bangalore Central Campus, Bengaluru, India. He obtained his doctorate in 2014. He has received 9 awards. AVINASH KUMAR SHARMA, PHD, is an associate professor in the Department of Computer Science and Engineering, Sharda School of Engineering and Technology, Sharda University, Greater Noida, India. He has published about 30 research articles in national/international conferences, journals, and book chapters, edited four books and has published four patents including one design patent. Preface xxiiiPART 1: FUNDAMENTALS OF AI-BASED SMART MANUFACTURING 11 Machine Learning Fundamentals 3Renugadevi A. S., R. Jayavadivel, Charanya J., Kaviya P. and Guhan R.2 Industry 4.0 in Manufacturing, Communication, Transportation, Healthcare 19P. Nancy, S. Gnanavel, V. Sudha, G. Deepika and Mahmoud Elsisi3 Data Analytics and Big Data Analytics 39Neeta Nathani and Jagdeesh Kumar Ahirwar4 Artificial Intelligence Empowered Smart Manufacturing for Modern Society: A Review 55Amit Kumar Tyagi, Pooja Bhatt, Chidambaram N. and Shabnam Kumari5 Use Cases of Digital Twin in Smart Manufacturing 85Vijayakumar Ponnusamy, Dilliraj Ekambaram and Nemanja ZdravkovicPART 2: METHODS AND APPLICATIONS 1036 Distributed Systems and Distributed Ledger Technology - An Introduction 105Amit Kumar Tyagi, Shrikant Tiwari and Kanchan Naithani7 Digital Twins Tools and Technologies in Smart Manufacturing 125K. Jayashree, S. Muralidharan, V. Sathya, M. Rajakumaran and C.M. Nalayini8 Blockchain Based Digital Twin for Smart Manufacturing 143Amit Kumar Tyagi, Shabnam Kumari, Richa and Utkarsh Kumar9 Blockchain for Internet of Things and Machine Learning-Based Automated Sectors 179Amit Kumar Tyagi, Shabnam Kumari and Shrikant Tiwari10 An Enhanced Threat Detection Model to Assist Supply Chain Management Using Artificial Intelligence 215Ambika N.11 Role of AI and Digital Twin in Smart Manufacturing 233M. Anand, T. M. Sheeba and C. Fancy12 Data Analytics and Visualization in Smart Manufacturing Using AI-Based Digital Twins 249M. Sivakumar, M. Maranco, N. Krishnaraj and U. Srinivasulu ReddyPART 3: ISSUES AND CHALLENGES TOWARDS AI AND DIGITAL TWIN-BASED SMART MANUFACTURING 27913 The IoT of Robotics: The Frontier of Automation 281G. Rithik and A. Kathirvel14 Real-Time Monitoring and Predictive Maintenance 305R. Patel, S. Shah, S. Lella and A. Gajbahar15 Advanced Topics for Blockchain-Based Applications: Open Issues, Technical, Legal, and Research Challenges 325Amit Kumar Tyagi, Shabnam Kumari and Tanuj Surve16 Issues and Challenges in Implementing Smart Manufacturing in the Current Scenario 341Charanya J., Shrisudhan B., Sathruba P., Sharun P. and Prakash DuraisamyPART 4: NEAR-FUTURE DEVELOPMENTS TOWARDS AI AND DIGITAL TWIN-BASED SMART MANUFACTURING 35917 Artificial Intelligence for Malware Analysis: A Systematic Study 361Amit Kumar Tyagi and Santosh Reddy Addula18 Artificial Intelligence-Based Cyber Security and Digital Forensics: A Review 391Amit Kumar Tyagi, Shabanm Kumari and Richa19 Blockchain Application in Industry 5.0 421D. Saveetha, Vijayakumar Ponnusamy, Nemanja Zdravković and Nandini S.M.20 Blockchain-Empowered Internet of Things (IoTs) Platforms for Automation in Various Sectors 443Santosh Reddy Addula, Amit Kumar Tyagi, Kanchan Naithani and Shabnam Kumari21 Digital Twin-Enabled Smart Manufacturing: Challenges and Future Directions 479M. Maranco, M. Sivakumar, N. Krishnaraj, Kashyapa Abhiram Ivaturi and Nidhya R.22 Future of Computer Vision and Industrial Robotics in Smart Manufacturing 505Santosh Reddy Addula and Amit Kumar Tyagi23 The Future of Manufacturing with AI and Data Analytics 541Neel Shah, Sneh Shah, Janvi Bhanushali, Nirav Bhatt, Nikita Bhatt and Hiren Mewada24 Artificial Intelligence Techniques in Predictive Maintenance, Their Applications, Challenges, and Prospects 565Akriti Rai, Jyotika shastri and Hina BansalIndex 581