Computer und IT
R 4 Data Science Quick Reference
In this handy, quick reference book you'll be introduced to several R data science packages, with examples of how to use each of them. All concepts will be covered concisely, with many illustrative examples using the following APIs: readr, dibble, forecasts, lubridate, stringr, tidyr, magnittr, dplyr, purrr, ggplot2, modelr, and more.With R 4 Data Science Quick Reference, you'll have the code, APIs, and insights to write data science-based applications in the R programming language. You'll also be able to carry out data analysis. All source code used in the book is freely available on GitHub..WHAT YOU'LL LEARN* Implement applicable R 4 programming language specification features* Import data with readr* Work with categories using forcats, time and dates with lubridate, and strings with stringr* Format data using tidyr and then transform that data using magrittr and dplyr* Write functions with R for data science, data mining, and analytics-based applications* Visualize data with ggplot2 and fit data to models using modelrWHO THIS BOOK IS FORProgrammers new to R's data science, data mining, and analytics packages. Some prior coding experience with R in general is recommended. Thomas Mailund is an associate professor at Aarhus University, Denmark. He has a background in math and computer science. For the last decade, his main focus has been on genetics and evolutionary studies, particularly comparative genomics, speciation, and gene flow between emerging species. He has published Beginning Data Science in R, Functional Programming in R, and Metaprogramming in R with Apress as well as other books on R and C programming.1. Introduction2. Importing Data: readr3. Representing Tables: tibble4. Reformatting Tables: tidyr5. Pipelines: magrittr6. Functional Programming: purrr7. Manipulating Data Frames: dplyr8. Working with Strings: stringr9. Working with Factors: forcats10. Working with Dates: lubridate11. Working with Models: broom and modelr12. Plotting: ggplot213. Conclusions
The Way We Play
Gain insight into what it takes to design and develop your first video game. This book offers a peek behind the scenes, where you will find in-depth knowledge of game design theory and insight into the technical and design aspects of video game development.The Way We Play allows you to explore game design and theory while also learning the nuances of how games in different genres should be approached, their workings, and successful unique selling points in a competitive gaming field. As you progress further into the book, BAFTA Nominated Young Games Design Mentor Michael Killick walks you through the more technical aspects of game development and shares techniques that will enable you to take your first steps in designing your own games.Upon completing this book, you will have a firm understanding of the gaming industry, from theory through design and production.WHAT YOU WILL LEARN* Understand theories within games design* Grasp what it takes to design and create your first game* Look back at previous popular games and what made them so great* Cover all aspects of design to allow you to begin designing your first video gameWHO IS THIS BOOK FOR:Anyone who would like to explore the fundamentals of game design and the theory behind it. This is also a chance to learn what goes into a game and how a game can be designed to be fun.MICHAEL KILLICK is a Games Design Teacher, Games Designer, and BAFTA Nominated Young Games Design Mentor. He is currently the lead of a Level 3 Games Development course and the student publishing company, Rizing Games, which offers students the chance to develop and release their mobile and console games to global markets. It’s his job to work with upcoming games designers to show them what they need to know to create their first video games and how they can publish these to the wider gaming world. Due to his work within games development and the support he has provided to young people, he has been chosen to be a BAFTA Member to continue his support for upcoming games designers.Chapter 1: What is a Game? What is their history?Sub – Topics:- Famous and well-known games, what made them so successful- How to understand a video game and what to look for- Look back at previous consoles- Earliest video games- What worked and what didn’t- A look at where we’re at nowChapter 2: Under the HoodSub - Topics:- Job roles- What you can do within the industry- How to best prepare yourself for the futureChapter 3: Paper to ScreenSub - Topics:- Cameras, controls, and characters- Designing your game- Setting up goals- Setting a narrativeChapter 4: Designing a 3D Character ControllerSub - Topics:- Cameras and controls- C# programming/scripting- Using Unity- Common terms within UnityChapter 5: Rule the World: Level DesignSub - Topics:- Mapping- Making your world fun and engaging- Bringing the world to lifeChapter 6: Friend or Foe? Enemy DesignSub - Topics:- What makes a good enemy?- How to design a foe- Obstacles- Weapons and abilitiesChapter 7: MCM: Mechanics, Combat, and MultiplayerSub - Topics:- Multiplayer design- Mechanics and their importance to video games- Enemies and their combatChapter 8: 2D Games Design within UnitySub - Topics:- Unity 2D design- How to implement enemies- Tilemap tutorialChapter 9: What to Avoid?Sub - Topics:- What to be on the lookout for when designing a video game- What pitfalls can be avoided to make a successful gameChapter 10: Accessibility in GamesSub - Topics:- How to be inclusive in games design- What is accessibility within games designChapter 11: Conclusion: The End. Or Your Beginning?Sub - Topics:- Final summary and looking forward
The Essential Guide to HTML5
HTML5 opens up a plethora of new avenues for application and game development on the web. Games can now be created and interacted with directly within HTML, with no need for users to download extra plugins, or for developers to learn new languages. Important new features such as the Canvas tag enable drawing directly onto the web page. The Audio tag allows sounds to be triggered and played from within your HTML code, the WebSockets API facilitates real-time communication, and the local storage API enables data such as high scores or game preferences to be kept on a user's computer for retrieval next time they play. All of these features and many more are covered within _The Essential Guide to HTML5_.The book begins at an introductory level, teaching the essentials of HTML5 and JavaScript through game development. Each chapter features a familiar game type as its core example, such as hangman, rock-paper-scissors, or dice games, and uses these simple constructs to build a solid skillset of the key HTML5 concepts and features. By working through these hands on examples, you will gain a deep, practical knowledge of HTML5 that will enable you to build your own, more advanced games and applications.* Concepts are introduced and motivated with easy-to-grasp, appealing examples * Code is explained in detail after general explanations * Reader is guided into how to make the examples 'their own' JEANINE MEYER is Professor Emerita at Purchase College/SUNY and past Coordinator of the Mathematics/Computer Science Board of Study. Before Purchase, she taught at Pace University and before that worked as a Research Staff Member and Manager in robotics and manufacturing research at IBM Research and as a consultant for IBM’s educational grant programs. She is the single author of 5 books and co-author of 5 more on topics ranging from educational uses of multimedia, programming (three published by Apress/Springer), databases, number theory and origami. She earned a PhD in computer science at the Courant Institute at New York University, an MA in mathematics at Columbia University, and a SB (the college used the Latin form) in mathematics from the University of Chicago. She is a member of Phi Beta Kappa, Sigma Xi, Association for Women in Science, Association for Computing Machinery, and was a featured reviewer for ACM Computing Reviews.For Jeanine, programming is both a hobby and a vocation. Every day, she plays computer puzzles online (including Words with Friends, various solitaire card games, and Duolingo for Spanish, which she views as a game). She also participates in Daf Yomi, the seven-and-a-half-year study of Talmud, which certainly has puzzle-solving aspects. She tries The New York Times crossword puzzle many days, but does better at the mini-puzzle, ken ken, and Two Not Touch in which she sometimes competes with her children. She enjoys cooking, baking, eating, gardening, travel, and a moderate amount of walking. She misses her mother, who inspired many family members to take up piano, and her father, who gave Jeanine a love of puzzles. She is an active volunteer for progressive causes and candidates.Chapter 1 : The BasicsChapter 2: Dice GameChapter 3: Bouncing Things: Ball, Image, VideoChapter 4: Cannonball and SlingshotChapter 5: Memory Game (aka Concentration): Polygons or PhotosChapter 6: Quiz, with audio and video rewardChapter 7: Mazes, including making and storing a maze using localStorageChapter 8: Rock, Paper, Scissors, with sound effectsChapter 9: Guess a WordChapter 10: BlackjackAppendix: Making a path with Eyes following.- Moving connected circles.- Determining if Line Crossed.- Demonstration of Scalar Vector Graphics.-Index
Data Science with Semantic Technologies
DATA SCIENCE WITH SEMANTIC TECHNOLOGIESTHIS BOOK WILL SERVE AS AN IMPORTANT GUIDE TOWARD APPLICATIONS OF DATA SCIENCE WITH SEMANTIC TECHNOLOGIES FOR THE UPCOMING GENERATION AND THUS BECOMES A UNIQUE RESOURCE FOR SCHOLARS, RESEARCHERS, PROFESSIONALS, AND PRACTITIONERS IN THIS FIELD. To create intelligence in data science, it becomes necessary to utilize semantic technologies which allow machine-readable representation of data. This intelligence uniquely identifies and connects data with common business terms, and it also enables users to communicate with data. Instead of structuring the data, semantic technologies help users to understand the meaning of the data by using the concepts of semantics, ontology, OWL, linked data, and knowledge-graphs. These technologies help organizations to understand all the stored data, adding the value in it, and enabling insights that were not available before. As data is the most important asset for any organization, it is essential to apply semantic technologies in data science to fulfill the need of any organization. Data Science with Semantic Technologies provides a roadmap for the deployment of semantic technologies in the field of data science. Moreover, it highlights how data science enables the user to create intelligence through these technologies by exploring the opportunities and eradicating the challenges in the current and future time frame. In addition, this book provides answers to various questions like: Can semantic technologies be able to facilitate data science? Which type of data science problems can be tackled by semantic technologies? How can data scientists benefit from these technologies? What is knowledge data science? How does knowledge data science relate to other domains? What is the role of semantic technologies in data science? What is the current progress and future of data science with semantic technologies? Which types of problems require the immediate attention of researchers? AUDIENCEResearchers in the fields of data science, semantic technologies, artificial intelligence, big data, and other related domains, as well as industry professionals, software engineers/scientists, and project managers who are developing the software for data science. Students across the globe will get the basic and advanced knowledge on the current state and potential future of data science. ARCHANA PATEL, PHD, is a faculty of the Department of Software Engineering, School of Computing and Information Technology, Binh Duong Province, Vietnam. She completed her Postdoc from the Freie Universität Berlin, Berlin, Germany. Dr. Patel is an author or co-author of more than 30 publications in numerous refereed journals and conference proceedings. She has been awarded the Best Paper award (three times) at international conferences. Her research interests are ontological engineering, semantic web, big data, expert systems, and knowledge warehouse.NARAYAN C. DEBNATH, PHD, is the Founding Dean of the School of Computing and Information Technology at Eastern International University, Vietnam. He is also serving as the Head of the Department of Software Engineering at Eastern International University, Vietnam. Dr. Debnath has been the Director of the International Society for Computers and their Applications (ISCA), USA since 2014. Formerly, Dr. Debnath served as a Full Professor of Computer Science at Winona State University, Minnesota, USA for 28 years. BHARAT BHUSAN, PHD, is an assistant professor in the Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, India. In the last three years, he has published more than 80 research papers in various renowned international conferences and SCI indexed journals and edited 11 books. Preface xv1 A BRIEF INTRODUCTION AND IMPORTANCE OF DATA SCIENCE 1Karthika N., Sheela J. and Janet B.1.1 What is Data Science? What Does a Data Scientist Do? 21.2 Why Data Science is in Demand? 21.3 History of Data Science 41.4 How Does Data Science Differ from Business Intelligence? 91.5 Data Science Life Cycle 111.6 Data Science Components 131.7 Why Data Science is Important 141.8 Current Challenges 151.8.1 Coordination, Collaboration, and Communication 161.8.2 Building Data Analytics Teams 161.8.3 Stakeholders vs Analytics 171.8.4 Driving with Data 171.9 Tools Used for Data Science 191.10 Benefits and Applications of Data Science 281.11 Conclusion 28References 292 EXPLORATION OF TOOLS FOR DATA SCIENCE 31Qasem Abu Al-Haija2.1 Introduction 322.2 Top Ten Tools for Data Science 352.3 Python for Data Science 352.3.1 Python Datatypes 362.3.2 Helpful Rules for Python Programming 372.3.3 Jupyter Notebook for IPython 372.3.4 Your First Python Program 382.4 R Language for Data Science 392.4.1 R Datatypes 392.4.2 Your First R Program 412.5 SQL for Data Science 442.6 Microsoft Excel for Data Science 482.6.1 Detection of Outliers in Data Sets Using Microsoft Excel 482.6.2 Regression Analysis in Excel Using Microsoft Excel 502.7 D3.JS for Data Science 572.8 Other Important Tools for Data Science 582.8.1 Apache Spark Ecosystem 582.8.2 MongoDB Data Store System 602.8.3 MATLAB Computing System 622.8.4 Neo4j for Graphical Database 632.8.5 VMWare Platform for Virtualization 652.9 Conclusion 66References 683 DATA MODELING AS EMERGING PROBLEMS OF DATA SCIENCE 71Mahyuddin K. M. Nasution and Marischa Elveny3.1 Introduction 723.2 Data 723.2.1 Unstructured Data 743.2.2 Semistructured Data 743.2.3 Structured Data 763.2.4 Hybrid (Un/Semi)-Structured Data 773.2.5 Big Data 783.3 Data Model Design 793.4 Data Modeling 813.4.1 Records-Based Data Model 813.4.2 Non–Record-Based Data Model 843.5 Polyglot Persistence Environment 87References 884 DATA MANAGEMENT AS EMERGING PROBLEMS OF DATA SCIENCE 91Mahyuddin K. M. Nasution and Rahmad Syah4.1 Introduction 924.2 Perspective and Context 924.2.1 Life Cycle 934.2.2 Use 954.3 Data Distribution 984.4 CAP Theorem 1004.5 Polyglot Persistence 101References 1025 ROLE OF DATA SCIENCE IN HEALTHCARE 105Anidha Arulanandham, A. Suresh and Senthil Kumar R.5.1 Predictive Modeling—Disease Diagnosis and Prognosis 1065.1.1 Supervised Machine Learning Models 1075.1.2 Clustering Models 1105.1.2.1 Centroid-Based Clustering Models 1105.1.2.2 Expectation Maximization (EM) Algorithm 1105.1.2.3 DBSCAN 1115.1.3 Feature Engineering 1115.2 Preventive Medicine—Genetics/Molecular Sequencing 1115.2.1 Technologies for Sequencing 1135.2.2 Sequence Data Analysis with BioPython 1145.2.2.1 Sequence Data Formats 1145.2.2.2 BioPython 1175.3 Personalized Medicine 1215.4 Signature Biomarkers Discovery from High Throughput Data 1225.4.1 Methodology I — Novel Feature Selection Method with Improved Mutual Information and Fisher Score 1235.4.1.1 Algorithm for the Novel Feature Selection Method with Improved Mutual Information and Fisher Score 1245.4.1.2 Computing F-Score Values for the Features 1255.4.1.3 Block Diagram for the Method-1 1255.4.1.4 Data Set 1265.4.1.5 Identification of Biomarkers Using the Feature Selection Technique-I 1275.4.2 Feature Selection Methodology-II — Entropy Based Mean Score with mRMR 1285.4.2.1 Algorithm for the Feature Selection Methodology-II 1305.4.2.2 Introduction to mRMR Feature Selection 1325.4.2.3 Data Sets 1325.4.2.4 Identification of Biomarkers Using Rank Product 1335.4.2.5 Fold Change Values 133Conclusion 136References 1366 PARTITIONED BINARY SEARCH TREES (P(H)-BST): A DATA STRUCTURE FOR COMPUTER RAM 139Pr. D.E Zegour6.1 Introduction 1406.2 P(h)-BST Structure 1416.2.1 Preliminary Analysis 1436.2.2 Terminology and Conventions 1436.3 Maintenance Operations 1436.3.1 Operations Inside a Class 1456.3.2 Operations Between Classes (Outside a Class) 1486.4 Insert and Delete Algorithms 1536.4.1 Inserting a New Element 1536.4.2 Deleting an Existing Element 1576.5 P(h)-BST as a Generator of Balanced Binary Search Trees 1606.6 Simulation Results 1626.6.1 Data Structures and Abstract Data Types 1646.6.2 Analyzing the Insert and Delete Process in Random Case 1646.6.3 Analyzing the Insert Process in Ascending (Descending) Case 1686.6.4 Comparing P(2)-BST/P(∞)-BST to Red-Black/AVL Trees 1746.7 Conclusion 175Acknowledgments 176References 1767 SECURITY ONTOLOGIES: AN INVESTIGATION OF PITFALL RATE 179Archana Patel and Narayan C. Debnath7.1 Introduction 1797.2 Secure Data Management in the Semantic Web 1847.3 Security Ontologies in a Nutshell 1877.4 InFra_OE Framework 1897.5 Conclusion 193References 1938 IOT-BASED FULLY-AUTOMATED FIRE CONTROL SYSTEM 199Lalit Mohan Satapathy8.1 Introduction 2008.2 Related Works 2018.3 Proposed Architecture 2038.4 Major Components 2058.4.1 Arduino UNO 2058.4.2 Temperature Sensor 2078.4.3 LCD Display (16X2) 2088.4.4 Temperature Humidity Sensor (DHT11) 2098.4.5 Moisture Sensor 2108.4.6 CO2 Sensor 2118.4.7 Nitric Oxide Sensor 2128.4.8 CO Sensor (MQ-9) 2128.4.9 Global Positioning System (GPS) 2128.4.10 GSM Modem 2138.4.11 Photovoltaic System 2148.5 Hardware Interfacing 2168.6 Software Implementation 2188.7 Conclusion 222References 2239 PHRASE LEVEL-BASED SENTIMENT ANALYSIS USING PAIRED INVERTED INDEX AND FUZZY RULE 225Sheela J., Karthika N. and Janet B.9.1 Introduction 2269.2 Literature Survey 2289.3 Methodology 2339.3.1 Construction of Inverted Wordpair Index 2349.3.1.1 Sentiment Analysis Design Framework 2359.3.1.2 Sentiment Classification 2369.3.1.3 Preprocessing of Data 2379.3.1.4 Algorithm to Find the Score 2409.3.1.5 Fuzzy System 2409.3.1.6 Lexicon-Based Sentiment Analysis 2419.3.1.7 Defuzzification 2429.3.2 Performance Metrics 2439.4 Conclusion 244References 24410 SEMANTIC TECHNOLOGY PILLARS: THE STORY SO FAR 247Michael DeBellis, Jans Aasman and Archana Patel10.1 The Road that Brought Us Here 24810.2 What is a Semantic Pillar? 24910.2.1 Machine Learning 24910.2.2 The Semantic Approach 25010.3 The Foundation Semantic Pillars: IRI’s, RDF, and RDFS 25210.3.1 Internationalized Resource Identifier (IRI) 25410.3.2 Resource Description Framework (RDF) 25410.3.2.1 Alternative Technologies to RDF: Property Graphs 25610.3.3 RDF Schema (RDFS) 25710.4 The Semantic Upper Pillars: OWL, SWRL, SPARQL, and SHACL 25910.4.1 The Web Ontology Language (OWL) 26010.4.1.1 Axioms to Define Classes 26210.4.1.2 The Open World Assumption 26310.4.1.3 No Unique Names Assumption 26310.4.1.4 Serialization 26410.4.2 The Semantic Web Rule Language 26410.4.2.1 The Limitations of Monotonic Reasoning 26710.4.2.2 Alternatives to SWRL 26710.4.3 SPARQL 26810.4.3.1 The SERVICE Keyword and Linked Data 26810.4.4 SHACL 27110.4.4.1 The Fundamentals of SHACL 27210.5 Conclusion 274References 27411 EVALUATING RICHNESS OF SECURITY ONTOLOGIES FOR SEMANTIC WEB 277Ambrish Kumar Mishra, Narayan C. Debnath and Archana Patel11.1 Introduction 27711.2 Ontology Evaluation: State-of-the-Art 28011.2.1 Domain-Dependent Ontology Evaluation Tools 28111.2.2 Domain-Independent Ontology Evaluation Tools 28211.3 Security Ontology 28411.4 Richness of Security Ontologies 28711.5 Conclusion 295References 29512 HEALTH DATA SCIENCE AND SEMANTIC TECHNOLOGIES 299Haleh Ayatollahi12.1 Health Data 30012.2 Data Science 30112.3 Health Data Science 30112.4 Examples of Health Data Science Applications 30412.5 Health Data Science Challenges 30612.6 Health Data Science and Semantic Technologies 30812.6.1 Natural Language Processing (NLP) 30912.6.2 Clinical Data Sharing and Data Integration 31012.6.3 Ontology Engineering and Quality Assurance (QA) 31112.7 Application of Data Science for COVID-19 31312.8 Data Challenges During COVID-19 Outbreak 31412.9 Biomedical Data Science 31512.10 Conclusion 316References 31713 HYBRID MIXED INTEGER OPTIMIZATION METHOD FOR DOCUMENT CLUSTERING BASED ON SEMANTIC DATA MATRIX 323Tatiana Avdeenko and Yury Mezentsev13.1 Introduction 32413.2 A Method for Constructing a Semantic Matrix of Relations Between Documents and Taxonomy Concepts 32713.3 Mathematical Statements for Clustering Problem 33013.3.1 Mathematical Statements for PDC Clustering Problem 33013.3.2 Mathematical Statements for CC Clustering Problem 33413.3.3 Relations between PDC Clustering and CC Clustering 33613.4 Heuristic Hybrid Clustering Algorithm 34013.5 Application of a Hybrid Optimization Algorithm for Document Clustering 34213.6 Conclusion 344Acknowledgment 344References 34414 ROLE OF KNOWLEDGE DATA SCIENCE DURING COVID-19 PANDEMIC 347Veena Kumari H. M. and D. S. Suresh14.1 Introduction 34814.1.1 Global Health Emergency 35014.1.2 Timeline of the COVID-19 35114.2 Literature Review 35414.3 Model Discussion 35614.3.1 COVID-19 Time Series Dataset 35714.3.2 FBProphet Forecasting Model 35814.3.3 Data Preprocessing 36014.3.4 Data Visualization 36014.4 Results and Discussions 36214.4.1 Analysis and Forecasting: The World 36214.4.2 Performance Metrics 37114.4.3 Analysis and Forecasting: The Top 20 Countries 37714.5 Conclusion 388References 38915 SEMANTIC DATA SCIENCE IN THE COVID-19 PANDEMIC 393Michael DeBellis and Biswanath Dutta15.1 Crises Often Are Catalysts for New Technologies 39315.1.1 Definitions 39415.1.2 Methodology 39515.2 The Domains of COVID-19 Semantic Data Science Research 39715.2.1 Surveys 39815.2.2 Semantic Search 39915.2.2.1 Enhancing the CORD-19 Dataset with Semantic Data 39915.2.2.2 CORD-19-on-FHIR – Semantics for COVID-19 Discovery 40015.2.2.3 Semantic Search on Amazon Web Services (AWS) 40015.2.2.4 COVID*GRAPH 40215.2.2.5 Network Graph Visualization of CORD-19 40315.2.2.6 COVID-19 on the Web 40415.2.3 Statistics 40515.2.3.1 The Johns Hopkins COVID-19 Dashboard 40515.2.3.2 The NY Times Dataset 40615.2.4 Surveillance 40615.2.4.1 An IoT Framework for Remote Patient Monitoring 40615.2.4.2 Risk Factor Discovery 40815.2.4.3 COVID-19 Surveillance in a Primary Care Network 40815.2.5 Clinical Trials 40915.2.6 Drug Repurposing 41115.2.7 Vocabularies 41415.2.8 Data Analysis 41515.2.8.1 CODO 41515.2.8.2 COVID-19 Phenotypes 41615.2.8.3 Detection of “Fake News” 41715.2.8.4 Ontology-Driven Weak Supervision for Clinical Entity Classification 41715.2.9 Harmonization 41815.3 Discussion 41815.3.1 Privacy Issues 42015.3.2 Domains that May Currently be Under Utilized 42115.3.2.1 Detection of Fake News 42115.3.2.2 Harmonization 42115.3.3 Machine Learning and Semantic Technology: Synergy Not Competition 42215.3.4 Conclusion 423Acknowledgment 423References 423Index 427
macOS Ventura For Dummies
LEARN THE INS AND OUTS OF MACOS VENTURAmacOS Ventura For Dummies is packed with all the information you need on this latest version of macOS. With expert tips, tricks, and troubleshooting ideas, it’s the trusted guide for those new to Mac computers and those upgrading their systems. Learn how to organize your files, ensure that your data is secure, work more efficiently, and take advantage of the newest features. Dummies helps you navigate the interface, use helpful shortcuts, and beyond—the easy way.* Explore the features of macOS Ventura and get things done with ease* Find out how to locate files, open and close programs, and customize the OS* Troubleshoot common problems and keep your system running smoothly* Make sure your data is secure and your computer is hacker-proofThis is the perfect Dummies guide for first-time macOS users, as well as people who are upgrading their systems and need a reference. GUY HART-DAVIS IS AUTHOR OR COAUTHOR OF VARIOUS TECHNOLOGY BOOKS, INCLUDING IPHONE FOR DUMMIES AND TEACH YOURSELF VISUALLY IPHONE 14.Introduction 1PART 1: MACOS BASICS 5Chapter 1: macOS Ventura 101 (Prerequisites: None) 7Chapter 2: Desktop and Windows and Menus (Oh My!) 21Chapter 3: What’s Up, Dock? 43Chapter 4: Getting to Know Finder and Its Desktop 61Chapter 5: Delving Even Deeper into Ventura’s Desktop and Finder 93Chapter 6: Having It Your Way 105PART 2: GETTING THINGS DONE 125Chapter 7: Opening and Saving Files 127Chapter 8: File and Folder Management Made Easy 151Chapter 9: Eight Terrific Time-Saving Tools 165Chapter 10: Organizing Your Life 195Chapter 11: Maps Are Where It’s At 217Chapter 12: Apps Born in iOS 229PART 3: GETTING ALONG WITH OTHERS 241Chapter 13: (Inter)Networking 243Chapter 14: Dealing with People 261Chapter 15: Communicating with Mail and Messages 273Chapter 16: Sharing Your Mac and Liking It 299PART 4: GETTING CREATIVE 327Chapter 17: The Musical Mac 329Chapter 18: The Multimedia Mac 343Chapter 19: Publish or Perish: Creating Documents and Printing 355PART 5: CARE AND FEEDING 377Chapter 20: Features for the Way You Work 379Chapter 21: Safety First: Backups and Other Security Issues 409Chapter 22: Utility Chest 425Chapter 23: Troubleshooting macOS 437PART 6: THE PART OF TENS 447Chapter 24: Ten Ways to Speed Up Your Mac Experience 449Chapter 25: Ten Great Websites for Mac Freaks 457Index 463
Convergence of Deep Learning in Cyber-IoT Systems and Security
CONVERGENCE OF DEEP LEARNING IN CYBER-IOT SYSTEMS AND SECURITYIN-DEPTH ANALYSIS OF DEEP LEARNING-BASED CYBER-IOT SYSTEMS AND SECURITY WHICH WILL BE THE INDUSTRY LEADER FOR THE NEXT TEN YEARS. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through deep learning techniques and analytics with the study of all these systems. This book provides innovative solutions and implementation of deep learning-based models in cyber-IoT systems, as well as the exposed security issues in these systems. The 20 chapters are organized into four parts. Part I gives the various approaches that have evolved from machine learning to deep learning. Part II presents many innovative solutions, algorithms, models, and implementations based on deep learning. Part III covers security and safety aspects with deep learning. Part IV details cyber-physical systems as well as a discussion on the security and threats in cyber-physical systems with probable solutions. AUDIENCEResearchers and industry engineers in computer science, information technology, electronics and communication, cybersecurity and cryptography. RAJDEEP CHAKRABORTY, PHD, is an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. His fields of interest are mainly in cryptography and computer security. He was awarded the Adarsh Vidya Saraswati Rashtriya Puraskar, National Award of Excellence 2019 conferred by Glacier Journal Research Foundation, ANUPAM GHOSH, PHD, is a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. He has published more than 80 international papers in reputed international journals and conferences. His fields of interest are mainly in AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, and data mining. JYOTSNA KUMAR MANDAL, PHD, has more than 30 years of industry and academic experience. His fields of interest are coding theory, data and network security, remote sensing & GIS-based applications, data compression error corrections, information security, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing/security, unify computing, chaos theory, and applications. S. BALAMURUGAN, PHD, is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents. Preface xviiPART I: VARIOUS APPROACHES FROM MACHINE LEARNING TO DEEP LEARNING 11 WEB-ASSISTED NONINVASIVE DETECTION OF ORAL SUBMUCOUS FIBROSIS USING IOHT 3Animesh Upadhyaya, Vertika Rai, Debdutta Pal, Surajit Bose and Somnath Ghosh1.1 Introduction 31.2 Literature Survey 61.2.1 Oral Cancer 61.3 Primary Concepts 71.3.1 Transmission Efficiency 71.4 Propose Model 91.4.1 Platform Configuration 91.4.2 Harvard Architectural Microcontroller Base Wireless Communication Board 101.4.2.1 NodeMCU ESP8266 Microcontroller 101.4.2.2 Gas Sensor 121.4.3 Experimental Setup 131.4.4 Process to Connect to Sever and Analyzing Data on Cloud 141.5 Comparative Study 161.6 Conclusion 17References 172 PERFORMANCE EVALUATION OF MACHINE LEARNING AND DEEP LEARNING TECHNIQUES: A COMPARATIVE ANALYSIS FOR HOUSE PRICE PREDICTION 21Sajeev Ram Arumugam, Sheela Gowr, Abimala, Balakrishna and Oswalt Manoj2.1 Introduction 222.2 Related Research 232.2.1 Literature Review on Comparing the Performance of the ML/DL Algorithms 232.2.2 Literature Review on House Price Prediction 252.3 Research Methodology 262.3.1 Data Collection 272.3.2 Data Visualization 272.3.3 Data Preparation 282.3.4 Regression Models 292.3.4.1 Simple Linear Regression 292.3.4.2 Random Forest Regression 302.3.4.3 Ada Boosting Regression 312.3.4.4 Gradient Boosting Regression 322.3.4.5 Support Vector Regression 332.3.4.6 Artificial Neural Network 342.3.4.7 Multioutput Regression 362.3.4.8 Regression Using Tensorflow—Keras 372.3.5 Classification Models 392.3.5.1 Logistic Regression Classifier 392.3.5.2 Decision Tree Classifier 392.3.5.3 Random Forest Classifier 412.3.5.4 Naïve Bayes Classifier 412.3.5.5 K-Nearest Neighbors Classifier 422.3.5.6 Support Vector Machine Classifier (SVM) 432.3.5.7 Feed Forward Neural Network 432.3.5.8 Recurrent Neural Networks 442.3.5.9 LSTM Recurrent Neural Networks 442.3.6 Performance Metrics for Regression Models 452.3.7 Performance Metrics for Classification Models 462.4 Experimentation 472.5 Results and Discussion 482.6 Suggestions 602.7 Conclusion 60References 623 CYBER PHYSICAL SYSTEMS, MACHINE LEARNING & DEEP LEARNING— EMERGENCE AS AN ACADEMIC PROGRAM AND FIELD FOR DEVELOPING DIGITAL SOCIETY 67P. K. Paul3.1 Introduction 683.2 Objective of the Work 693.3 Methods 693.4 Cyber Physical Systems: Overview with Emerging Academic Potentiality 703.5 ml and dl Basics with Educational Potentialities 723.5.1 Machine Learning (ML) 723.5.2 Deep Learning 733.6 Manpower and Developing Scenario in Machine Learning and Deep Learning 743.7 dl & ml in Indian Context 793.8 Conclusion 81References 824 DETECTION OF FAKE NEWS AND RUMORS IN THE SOCIAL MEDIA USING MACHINE LEARNING TECHNIQUES WITH SEMANTIC ATTRIBUTES 85Diganta Saha, Arijit Das, Tanmay Chandra Nath, Soumyadip Saha and Ratul Das4.1 Introduction 864.2 Literature Survey 874.3 Proposed Work 884.3.1 Algorithm 894.3.2 Flowchart 904.3.3 Explanation of Approach 914.4 Results and Analysis 924.4.1 Datasets 924.4.2 Evaluation 934.4.2.1 Result of 1st Dataset 934.4.2.2 Result of 2nd Dataset 944.4.2.3 Result of 3rd Dataset 944.4.3 Relative Comparison of Performance 954.5 Conclusion 95References 96PART II: INNOVATIVE SOLUTIONS BASED ON DEEP LEARNING 995 ONLINE ASSESSMENT SYSTEM USING NATURAL LANGUAGE PROCESSING TECHNIQUES 101S. Suriya, K. Nagalakshmi and Nivetha S.5.1 Introduction 1025.2 Literature Survey 1035.3 Existing Algorithms 1085.4 Proposed System Design 1115.5 System Implementation 1155.6 Conclusion 120References 1216 ON A REFERENCE ARCHITECTURE TO BUILD DEEP-Q LEARNING-BASED INTELLIGENT IOT EDGE SOLUTIONS 123Amit Chakraborty, Ankit Kumar Shaw and Sucharita Samanta6.1 Introduction 1246.1.1 A Brief Primer on Machine Learning 1246.1.1.1 Types of Machine Learning 1246.2 Dynamic Programming 1286.3 Deep Q-Learning 1296.4 IoT 1306.4.1 Azure 1306.4.1.1 IoT on Azure 1306.5 Conclusion 1446.6 Future Work 144References 1457 FUZZY LOGIC-BASED AIR CONDITIONER SYSTEM 147Suparna Biswas, Sayan Roy Chaudhuri, Ayusha Biswas and Arpan Bhawal7.1 Introduction 1477.2 Fuzzy Logic-Based Control System 1497.3 Proposed System 1497.3.1 Fuzzy Variables 1497.3.2 Fuzzy Base Class 1547.3.3 Fuzzy Rule Base 1557.3.4 Fuzzy Rule Viewer 1567.4 Simulated Result 1577.5 Conclusion and Future Work 163References 1638 AN EFFICIENT MASKED-FACE RECOGNITION TECHNIQUE TO COMBAT WITH COVID- 19 165Suparna Biswas8.1 Introduction 1658.2 Related Works 1678.2.1 Review of Face Recognition for Unmasked Faces 1678.2.2 Review of Face Recognition for Masked Faces 1688.3 Mathematical Preliminaries 1698.3.1 Digital Curvelet Transform (DCT) 1698.3.2 Compressive Sensing–Based Classification 1708.4 Proposed Method 1718.5 Experimental Results 1738.5.1 Database 1738.5.2 Result 1758.6 Conclusion 179References 1799 DEEP LEARNING: AN APPROACH TO ENCOUNTER PANDEMIC EFFECT OF NOVEL CORONA VIRUS (COVID-19) 183Santanu Koley, Pinaki Pratim Acharjya, Rajesh Mukherjee, Soumitra Roy and Somdeep Das9.1 Introduction 1849.2 Interpretation With Medical Imaging 1859.3 Corona Virus Variants Tracing 1889.4 Spreading Capability and Destructiveness of Virus 1919.5 Deduction of Biological Protein Structure 1929.6 Pandemic Model Structuring and Recommended Drugs 1929.7 Selection of Medicine 1959.8 Result Analysis 1979.9 Conclusion 201References 20210 QUESTION ANSWERING SYSTEM USING DEEP LEARNING IN THE LOW RESOURCE LANGUAGE BENGALI 207Arijit Das and Diganta Saha10.1 Introduction 20810.2 Related Work 21010.3 Problem Statement 21510.4 Proposed Approach 21510.5 Algorithm 21610.6 Results and Discussion 21910.6.1 Result Summary for TDIL Dataset 21910.6.2 Result Summary for SQuAD Dataset 21910.6.3 Examples of Retrieved Answers 22010.6.4 Calculation of TP, TN, FP, FN, Accuracy, Precision, Recall, and F1 score 22110.6.5 Comparison of Result with other Methods and Dataset 22210.7 Analysis of Error 22310.8 Few Close Observations 22310.9 Applications 22410.10 Scope for Improvements 22410.11 Conclusions 224Acknowledgments 225References 225PART III: SECURITY AND SAFETY ASPECTS WITH DEEP LEARNING 23111 SECURE ACCESS TO SMART HOMES USING BIOMETRIC AUTHENTICATION WITH RFID READER FOR IOT SYSTEMS 233K.S. Niraja and Sabbineni Srinivasa Rao11.1 Introduction 23411.2 Related Work 23511.3 Framework for Smart Home Use Case With Biometric 23611.3.1 RFID-Based Authentication and Its Drawbacks 23611.4 Control Scheme for Secure Access (CSFSC) 23711.4.1 Problem Definition 23711.4.2 Biometric-Based RFID Reader Proposed Scheme 23811.4.3 Reader-Based Procedures 24011.4.4 Backend Server-Side Procedures 24011.4.5 Reader Side Final Compute and Check Operations 24011.5 Results Observed Based on Various Features With Proposed and Existing Methods 24211.6 Conclusions and Future Work 245References 24612 MQTT-BASED IMPLEMENTATION OF HOME AUTOMATION SYSTEM PROTOTYPE WITH INTEGRATED CYBER-IOT INFRASTRUCTURE AND DEEP LEARNING–BASED SECURITY ISSUES 249Arnab Chakraborty12.1 Introduction 25012.2 Architecture of Implemented Home Automation 25212.3 Challenges in Home Automation 25312.3.1 Distributed Denial of Service and Attack 25412.3.2 Deep Learning–Based Solution Aspects 25412.4 Implementation 25512.4.1 Relay 25612.4.2 DHT 11 25712.5 Results and Discussions 26212.6 Conclusion 265References 26613 MALWARE DETECTION IN DEEP LEARNING 269Sharmila Gaikwad and Jignesh Patil13.1 Introduction to Malware 27013.1.1 Computer Security 27013.1.2 What Is Malware? 27113.2 Machine Learning and Deep Learning for Malware Detection 27413.2.1 Introduction to Machine Learning 27413.2.2 Introduction to Deep Learning 27613.2.3 Detection Techniques Using Deep Learning 27913.3 Case Study on Malware Detection 28013.3.1 Impact of Malware on Systems 28013.3.2 Effect of Malware in a Pandemic Situation 28113.4 Conclusion 283References 28314 PATRON FOR WOMEN: AN APPLICATION FOR WOMENS SAFETY 285Riya Sil, Snatam Kamila, Ayan Mondal, Sufal Paul, Santanu Sinha and Bishes Saha14.1 Introduction 28614.2 Background Study 28614.3 Related Research 28714.3.1 A Mobile-Based Women Safety Application (I safe App) 28714.3.2 Lifecraft: An Android-Based Application System for Women Safety 28814.3.3 Abhaya: An Android App for the Safety of Women 28814.3.4 Sakhi—The Saviour: An Android Application to Help Women in Times of Social Insecurity 28914.4 Proposed Methodology 28914.4.1 Motivation and Objective 29014.4.2 Proposed System 29014.4.3 System Flowchart 29114.4.4 Use-Case Model 29114.4.5 Novelty of the Work 29414.4.6 Comparison with Existing System 29414.5 Results and Analysis 29414.6 Conclusion and Future Work 298References 29915 CONCEPTS AND TECHNIQUES IN DEEP LEARNING APPLICATIONS IN THE FIELD OF IOT SYSTEMS AND SECURITY 303Santanu Koley and Pinaki Pratim Acharjya15.1 Introduction 30415.2 Concepts of Deep Learning 30715.3 Techniques of Deep Learning 30815.3.1 Classic Neural Networks 30915.3.1.1 Linear Function 30915.3.1.2 Nonlinear Function 30915.3.1.3 Sigmoid Curve 31015.3.1.4 Rectified Linear Unit 31015.3.2 Convolution Neural Networks 31015.3.2.1 Convolution 31115.3.2.2 Max-Pooling 31115.3.2.3 Flattening 31115.3.2.4 Full Connection 31115.3.3 Recurrent Neural Networks 31215.3.3.1 LSTMs 31215.3.3.2 Gated RNNs 31215.3.4 Generative Adversarial Networks 31315.3.5 Self-Organizing Maps 31415.3.6 Boltzmann Machines 31515.3.7 Deep Reinforcement Learning 31515.3.8 Auto Encoders 31615.3.8.1 Sparse 31715.3.8.2 Denoising 31715.3.8.3 Contractive 31715.3.8.4 Stacked 31715.3.9 Back Propagation 31715.3.10 Gradient Descent 31815.4 Deep Learning Applications 31915.4.1 Automatic Speech Recognition (ASR) 31915.4.2 Image Recognition 32015.4.3 Natural Language Processing 32015.4.4 Drug Discovery and Toxicology 32115.4.5 Customer Relationship Management 32215.4.6 Recommendation Systems 32315.4.7 Bioinformatics 32415.5 Concepts of IoT Systems 32515.6 Techniques of IoT Systems 32615.6.1 Architecture 32615.6.2 Programming Model 32715.6.3 Scheduling Policy 32915.6.4 Memory Footprint 32915.6.5 Networking 33215.6.6 Portability 33215.6.7 Energy Efficiency 33315.7 IoT Systems Applications 33315.7.1 Smart Home 33415.7.2 Wearables 33515.7.3 Connected Cars 33515.7.4 Industrial Internet 33615.7.5 Smart Cities 33715.7.6 IoT in Agriculture 33715.7.7 Smart Retail 33815.7.8 Energy Engagement 33915.7.9 IoT in Healthcare 34015.7.10 IoT in Poultry and Farming 34015.8 Deep Learning Applications in the Field of IoT Systems 34115.8.1 Organization of DL Applications for IoT in Healthcare 34215.8.2 DeepSense as a Solution for Diverse IoT Applications 34315.8.3 Deep IoT as a Solution for Energy Efficiency 34615.9 Conclusion 346References 34716 EFFICIENT DETECTION OF BIOWEAPONS FOR AGRICULTURAL SECTOR USING NARROWBAND TRANSMITTER AND COMPOSITE SENSING ARCHITECTURE 349Arghyadeep Nag, Labani Roy, Shruti, Soumen Santra and Arpan Deyasi16.1 Introduction 35016.2 Literature Review 35316.3 Properties of Insects 35516.4 Working Methodology 35716.4.1 Sensing 35716.4.1.1 Specific Characterization of a Particular Species 35716.4.2 Alternative Way to Find Those Previously Sensing Parameters 35716.4.3 Remedy to Overcome These Difficulties 35816.4.4 Take Necessary Preventive Actions 35816.5 Proposed Algorithm 35916.6 Block Diagram and Used Sensors 36016.6.1 Arduino Uno 36116.6.2 Infrared Motion Sensor 36216.6.3 Thermographic Camera 36216.6.4 Relay Module 36216.7 Result Analysis 36216.8 Conclusion 363References 36317 A DEEP LEARNING–BASED MALWARE AND INTRUSION DETECTION FRAMEWORK 367Pavitra Kadiyala and Kakelli Anil Kumar17.1 Introduction 36717.2 Literature Survey 36817.3 Overview of the Proposed Work 37117.3.1 Problem Description 37117.3.2 The Working Models 37117.3.3 About the Dataset 37117.3.4 About the Algorithms 37317.4 Implementation 37417.4.1 Libraries 37417.4.2 Algorithm 37617.5 Results 37617.5.1 Neural Network Models 37717.5.2 Accuracy 37717.5.3 Web Frameworks 37717.6 Conclusion and Future Work 379References 38018 PHISHING URL DETECTION BASED ON DEEP LEARNING TECHNIQUES 381S. Carolin Jeeva and W. Regis Anne18.1 Introduction 38218.1.1 Phishing Life Cycle 38218.1.1.1 Planning 38318.1.1.2 Collection 38418.1.1.3 Fraud 38418.2 Literature Survey 38518.3 Feature Generation 38818.4 Convolutional Neural Network for Classification of Phishing vs Legitimate URLs 38818.5 Results and Discussion 39118.6 Conclusion 394References 394Web Citation 396PART IV: CYBER PHYSICAL SYSTEMS 39719 CYBER PHYSICAL SYSTEM—THE GEN Z 399Jayanta Aich and Mst Rumana Sultana19.1 Introduction 39919.2 Architecture and Design 40019.2.1 Cyber Family 40119.2.2 Physical Family 40119.2.3 Cyber-Physical Interface Family 40219.3 Distribution and Reliability Management in CPS 40319.3.1 CPS Components 40319.3.2 CPS Models 40419.4 Security Issues in CPS 40519.4.1 Cyber Threats 40519.4.2 Physical Threats 40719.5 Role of Machine Learning in the Field of CPS 40819.6 Application 41119.7 Conclusion 411References 41120 AN OVERVIEW OF CYBER PHYSICAL SYSTEM (CPS) SECURITY, THREATS, AND SOLUTIONS 415Krishna Keerthi Chennam, Fahmina Taranum and Maniza Hijab20.1 Introduction 41620.1.1 Motivation of Work 41720.1.2 Organization of Sections 41720.2 Characteristics of CPS 41820.3 Types of CPS Security 41920.4 Cyber Physical System Security Mechanism—Main Aspects 42120.4.1 CPS Security Threats 42320.4.2 Information Layer 42320.4.3 Perceptual Layer 42420.4.4 Application Threats 42420.4.5 Infrastructure 42520.5 Issues and How to Overcome Them 42620.6 Discussion and Solutions 42720.7 Conclusion 431References 431Index 435
Advances in Data Science and Analytics
ADVANCES IN DATA SCIENCE AND ANALYTICSPRESENTING THE CONCEPTS AND ADVANCES OF DATA SCIENCE AND ANALYTICS, THIS VOLUME, WRITTEN AND EDITED BY A GLOBAL TEAM OF EXPERTS, ALSO GOES INTO THE PRACTICAL APPLICATIONS THAT CAN BE UTILIZED ACROSS MULTIPLE DISCIPLINES AND INDUSTRIES, FOR BOTH THE ENGINEER AND THE STUDENT, FOCUSING ON MACHINING LEARNING, BIG DATA, BUSINESS INTELLIGENCE, AND ANALYTICS.Data science is an interdisciplinary field that uses scientific methods, processes, algorithms, and systems to extract knowledge and insights from many structural and unstructured data. Data science is related to data mining, deep learning, and big data. Data analytics software is a more focused version of this and can even be considered part of the larger process. Analytics is devoted to realizing actionable insights that can be applied immediately based on existing queries. For the purposes of this volume, data science is an umbrella term that encompasses data analytics, data mining, machine learning, and several other related disciplines. While a data scientist is expected to forecast the future based on past patterns, data analysts extract meaningful insights from various data sources. Although data mining and other related areas have been around for a few decades, data science and analytics are still quickly evolving, and the processes and technologies change, almost on a day-to-day basis. This volume provides an overview of some of the most important advances in these areas today, including practical coverage of the daily applications. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in these areas, this is a must-have for any library. M. NIRANJANAMURTHY, PHD, is an assistant professor in the Department of Computer Applications, M. S. Ramaiah Institute of Technology, Bangalore, Karnataka, India. He earned his PhD in computer science at JJTU. He has over 13 years of teaching experience and two years of industry experience as a software engineer. He has published four books and 85 papers in technical journals and conferences. He has six patents to his credit and has won numerous awards. HEMANT KUMAR GIANEY, PHD, is a senior assistant professor in the Computer Science Department at Vellore Institute of Technology, AP, India. He also worked at Thapar Institute of Engineering and Technology, Patiala, Punjab, India and worked as a post-doctoral researcher in the Computer Science and Engineering Department at National Cheng Kung University in Taiwan. He has over 15 years of teaching and industry experience. He has conducted many workshops and has been a guest speaker in various universities. He has also published many research papers on in scientific and technical journals. AMIR H. GANDOMI, PHD, is a professor of data science in the Department of Engineering and Information Technology, University of Technology Sydney. Before joining UTS, he was an assistant professor at the School of Business, Stevens Institute of Technology, NJ, and a distinguished research fellow at BEACON Center, Michigan State University. He has published over 150 journal papers and four books and collectively has been cited more than 14,000 times. He has been named as one of the world’s most influential scientific minds and a Highly Cited Researcher (top 1%) for three consecutive years, from 2017 to 2019. He has also served as associate editor, editor, and guest editor in several prestigious journals and has delivered several keynote talks. He is also part of a NASA technology cluster on Big Data, Artificial Intelligence, and Machine Learning. Preface xv1 IMPLEMENTATION TOOLS FOR GENERATING STATISTICAL CONSEQUENCE USING DATA VISUALIZATION TECHNIQUES 1Dr. Ajay B. Gadicha, Dr. Vijay B. Gadicha, Prof. Sneha Bohra and Dr. Niranjanamurthy M.1.1 Introduction 21.2 Literature Review 41.3 Tools in Data Visualization 41.4 Methodology 141.4.1 Plotting the Data 141.4.2 Plotting the Model on Data 151.4.3 Quantifying Linear Relationships 161.4.4 Covariance vs. Correlation 171.5 Conclusion 18References 182 DECISION MAKING AND PREDICTIVE ANALYSIS FOR REAL TIME DATA 21Umesh Pratap Singh2.1 Introduction 222.2 Data Analytics 232.2.1 Descriptive Analytics 232.2.2 Diagnostic Analytics 232.2.3 Predictive Analytics 232.2.4 Prescriptive Analytics 242.3 Predictive Modeling 242.4 Categories of Predictive Models 242.5 Process of Predictive Modeling 252.5.1 Requirement Gathering 262.5.2 Data Gathering 262.5.3 Data Analysis and Massaging 262.5.4 Machine Learning Statistics 262.5.5 Predictive Modeling 262.5.6 Prediction and Decision Making 272.6 Predictive Analytics Opportunities 272.6.1 Detecting Fraud 272.6.2 Reduction of Risk 272.6.3 Marketing Campaign Optimization 282.6.4 Operation Improvement 282.6.5 Clinical Decision Support System 282.7 Classification of Predictive Analytics Models 282.7.1 Predictive Models 282.7.2 Descriptive Models 292.7.3 Decision Models 292.8 Predictive Analytics Techniques 292.8.1 Predictive Analytics Software 292.8.2 The Importance of Good Data 302.8.3 Predictive Analytics vs. Business Intelligence 302.8.4 Pricing Information 302.9 Data Analysis Tools 302.9.1 Excel 302.9.2 Tableau 312.9.3 Power BI 312.9.4 Fine Report 312.9.5 R & Python 312.10 Advantages & Disadvantages of Predictive Modeling 312.10.1 Advantages 312.10.2 Disadvantages 322.10.2.1 Data Labeling 322.10.2.2 Obtaining Massive Training Datasets 322.10.2.3 The Explainability Problem 322.10.2.4 Generalizability of Learning 332.10.2.5 Bias in Algorithms and Data 332.11 Predictive Analytics Biggest Impact 332.11.1 Predicting Demand 332.11.2 Transformation Using Technology and Process 342.11.3 Improved Pricing 342.11.4 Predictive Maintenance 352.12 Application of Predictive Analytics 352.12.1 Financial and Banking Services 352.12.2 Retail 352.12.3 Health and Insurance 362.12.4 Oil and Gas Utilities 362.12.5 Public Sector 362.13 Future Scope of Predictive Modeling 362.13.1 Technological Advancements 372.13.2 Changes in Work 372.13.3 Risk Mitigation 372.14 Conclusion 37References 383 OPTIMIZING WATER QUALITY WITH DATA ANALYTICS AND MACHINE LEARNING 39Bin Liang, Zhidong Li, Hongda Tian, Shuming Liang, Yang Wang and Fang Chen3.1 Introduction 393.2 Related Work 413.3 Data Sources and Collection 423.4 Water Demand Forecasting 433.4.1 Network Flow and Zone Demand Estimation 433.4.2 Demand Forecasting 443.4.2.1 Feature Importance 453.4.2.2 Forecast Horizon 463.4.3 Performance Characterization 463.5 Re-Chlorination Optimization 493.5.1 Data 513.5.2 Water Age Estimation 523.5.2.1 Travel Time Estimation 533.5.2.2 Residential Time Estimation 543.5.3 Ammonia Prediction 543.5.4 Optimization Model Definition 573.5.5 Improvements in Customer Water Quality 593.5.6 Plant Dosing Optimization 623.6 Conclusion 63Acknowledgements 63References 634 LIP READING FRAMEWORK USING DEEP LEARNING AND MACHINE LEARNING 67Hemant Kumar Gianey, Parth Khandelwal, Prakhar Goel, Rishav Maheshwari, Bhannu Galhotra and Divyanshu Pratap Singh4.1 Introduction 684.1.1 Overview 684.1.2 Motivation 684.1.3 Lip Reading System Outcomes and Deliverables 694.2 The Emergence and Definition of the Lip-Reading System 704.2.1 Background of Domain 704.2.2 Identified Problems 784.2.3 Tools and Technologies Used 784.2.4 Implementation Aspects 784.2.4.1 Data Preparation 794.3 Design and Components of Lip-Reading System 824.4 Lip Reading System Architecture 824.5 Testing 844.6 Problems Encountered During Implementation 844.6.1 Assumptions and Constraints 854.7 Conclusion 854.8 Future Work 85References 865 NEW PERSPECTIVE TO MANAGEMENT, ECONOMIC GROWTH AND DEBT NEXUS ANALYSIS: EVIDENCE FROM INDIAN ECONOMY 89Edmund Ntom Udemba, Festus Victor Bekun, Dervis Kirikkaleli and Esra Sipahi Döngül5.1 Introduction 905.2 Literature Review 925.2.1 External Debt and Economic Growth 925.2.2 Trade Openness, FDI, and Economic Growth 945.2.3 FDI and Economic Growth 945.3 Data 955.3.1 Analytical Framework and Data Description 965.3.2 Theoretical Background and Specifications 965.3.2.1 Model Specification 985.4 Methodology and Findings 995.4.1 Unit Root Testing 995.4.2 Cointegration 995.4.3 Vector Error Correction Model 1035.4.4 Long-Run Relationship Estimation 1055.4.5 Causality Test 1075.5 Conclusion and Policy Implications 108Declarations 109Availability of Data and Materials 109Competing Interests 110Funding 110Authors’ Contributions 110Acknowledgments 110References 1106 DATA-DRIVEN DELAY ANALYSIS WITH APPLICATIONS TO RAILWAY NETWORKS 115Boyu Li, Ting Guo, Yang Wang and Fang Chen6.1 Introduction 1166.2 Related Works 1186.3 Background Knowledge 1196.3.1 Background and Problem Formulation 1206.3.1.1 Train Delay 1206.3.1.2 Delay Propagation 1216.3.2 Preliminaries 1226.3.2.1 Bayesian Inference 1236.3.2.2 Markov Property 1236.4 Delay Propagation Model 1236.4.1 Conditional Bayesian Delay Propagation 1236.4.1.1 Delay Self-Propagation 1246.4.1.2 Incremental Run-Time Delay 1256.4.1.3 Incremental Dwell Time Delay 1256.4.1.4 Accumulative Departure Delay 1266.4.2 Cross-Line Propagation, Backward Propagation and Train Connection Propagation 1276.5 Primary Delay Tracing Back 1306.5.1 Delay Candidates Selection 1306.5.2 Relation Construction 1316.5.2.1 Preceding and Following Trains 1316.5.2.2 Preceding and Connecting Trains 1316.6 Evaluation on Dwell Time Improvement Strategy 1326.7 Experiments 1356.7.1 Experiment Setting 1356.7.2 Temporal Prediction of Delay Propagation 1376.7.3 Spatial Prediction of Delay Propagation 1386.7.4 Case Study of Primary Delay Tracing Down 1396.7.5 Evaluation of Dwell Time Improvement Strategy 1406.8 Conclusion 142References 1427 PROPOSING A FRAMEWORK TO ANALYZE BREAST CANCER IN MAMMOGRAM IMAGES USING GLOBAL THRESHOLDING, GRAY LEVEL CO-OCCURRENCE MATRIX, AND CONVOLUTIONAL NEURAL NETWORK (CNN) 145Ms. Tanishka Dixit and Ms. Namrata Singh7.1 Introduction & Purpose of Study 1467.1.1 Segmentation 1467.1.1.1 Types of Segmentation 1477.1.2 Compression 1507.2 Literature Review & Motivation 1537.3 Proposed Work 1617.3.1 Algorithm 1617.3.2 Explanation 1627.3.3 Flowchart 1627.4 Observation Tables and Figures 1637.5 Conclusion 1767.6 Future Work 176References 1768 IOT TECHNOLOGIES FOR SMART HEALTHCARE 181Rehab A. Rayan, Imran Zafar and Christos Tsagkaris8.1 Introduction 1828.2 Literature Review 1838.2.1 IoT-Based Smart Health 1838.2.2 Advantages of Applying IoT in Health 1868.3 Findings 1878.3.1 Significant Features and Applications of IoT in Health 1878.3.1.1 Simultaneous Monitoring and Reporting 1898.3.1.2 End-to-End Connectivity and Affordability 1908.3.1.3 Data Analysis 1908.3.1.4 Tracking, Alerts, and Remote Medical Care 1908.3.1.5 Research 1918.3.1.6 Patient-Generated Health Data (PGHD) 1918.3.1.7 Management of Chronic Diseases and Preventative Care 1918.3.1.8 Home-Based and Short-Term Care 1928.4 Case Study: CyberMed as an IoT-Based Smart Health Model 1928.5 Discussions 1938.5.1 Limitations of Adopting IoT in Health 1938.5.1.1 Data Security and Privacy 1938.5.1.2 Connectivity 1948.5.1.3 Compatibility and Data Integration 1958.5.1.4 Implementation Cost 1958.5.1.5 Complexity and Risk of Errors 1958.6 Future Insights 1968.7 Conclusions 197References 1979 ENHANCEMENT OF SCALABILITY OF SVM CLASSIFIERS FOR BIG DATA 203Vijaykumar Bhajantri, Shashikumar G. Totad and Geeta R. Bharamagoudar9.1 Introduction 2049.2 Support Vector Machine 2059.2.1 Challenges 2089.3 Parallel and Distributed Mechanism 2099.3.1 Shared-Memory Parallelism 2099.4 Distributed Big Data Architecture 2109.4.1 Hadoop MapReduce 2109.4.2 Spark 2109.4.3 Akka 2119.5 Distributed High Performance Computing 2129.5.1 GASNet 2129.5.2 Charm++ 2139.6 GPU Based Parallelism 2149.6.1 Cuda 2159.6.2 OpenCL 2159.7 Parallel and Distributed SVM Algorithms 2179.7.1 Ls-svm 2189.7.2 Cascade SVM 2199.7.3 dc Svm 2209.7.4 Parallel Distributed Multiclass SVM Algorithms 2229.8 Conclusion and Future Research Directions 222References 22510 ELECTRICAL NETWORK-RELATED INCIDENT PREDICTION BASED ON WEATHER FACTORS 233Hongda Tian, Jessie Nghiem and Fang Chen10.1 Introduction 23310.2 Related Work 23510.3 Methodology 23510.3.1 Binary Classification of Incident and Normality 23510.3.2 Incident Categorization Using Natural Language Processing 23610.3.3 Classification of Multiple Types of Incidents 23610.4 Experiments 23710.4.1 Data Sets 23710.4.2 Evaluation Metrics 23910.4.3 Binary Classification 23910.4.4 Incident Categorization 24110.4.5 Multi-Class Classification 24210.5 Conclusion and Future Work 244Acknowledgements 244References 24511 GREEN IOT: ENVIRONMENT-FRIENDLY APPROACH TO IOT 247Abhishek Goel and Siddharth Gautam11.1 Introduction 24711.2 G-IoT (Green Internet of Things) 24911.3 Layered Architecture of G-IoT 25111.3.1 Data Center/Cloud 25211.3.2 Data Analytics and Control Applications It 25211.3.3 Data Aggregation and Storage 25311.3.4 Edge Computing 25311.3.5 Communication and Processing Unit 25411.4 Techniques for Implementation of G-IoT 25711.5 Power Saving Methods Based on Components 26611.6 Applications of G-IoT 26611.7 Challenges and Future Scope 26911.8 Case Study 26911.9 Conclusion 270References 27112 BIG-DATA ANALYTICS: A NEW PARADIGM SHIFT IN MICRO FINANCE INDUSTRY 275Vinay Pal Singh, Rohit Bansal and Ram Singh12.1 Introduction 27612.2 Reality of Area and Transcendent Difficulties 27612.2.1 Probable Overlending 27812.2.2 Information Imbalance 27812.2.3 Retreating Not-for-Profit Sector 27812.2.4 Neighbourhood Pressure 27912.3 Data Analytics in Microfinance 28012.3.1 Types of Data Analytics Used in Microfinance 28012.3.2 Use of Big Data in Microfinance Industry 28112.3.3 Risk and Data Based Credit Decisions 28212.3.4 Product Development and Selection 28312.3.5 Product or Service Positioning 28312.3.6 M-Commerce and E-Payments 28312.3.7 Making Reliable Credit Decisions 28412.3.8 Big Data-Driven Model Promises Psychometric Evaluations 28412.3.9 Product Build-Up, Service Positioning, and Offering 28412.4 Opportunities and Risks in Using Data Analytics 28412.5 Risk in Utilizing Big Data 28712.6 Conclusion 290References 29013 BIG DATA STORAGE AND ANALYSIS 293Namrata Dhanda13.1 Introduction 29313.1.1 6 V’s of Big Data 29413.1.2 Types of Data 29513.1.3 Issues in Handling Big Data 29713.2 Hadoop as a Solution to Challenges of Big Data 29713.2.1 The Hadoop Ecosystem 29813.2.2 Rack Awareness Policy in HDFS 30713.3 In-Memory Storage and NoSQL 30813.3.1 Key-Value Data Stores 30913.3.2 Document Stores 30913.3.3 Wide Column Stores 31013.3.4 Graph Stores 31013.3.5 Multi-Modal Databases 31013.4 Advantages of NoSQL Database 31013.5 Conclusion 311References 31114 A FRAMEWORK FOR ANALYSING SOCIAL MEDIA AND DIGITAL DATA BY APPLYING MACHINE LEARNING TECHNIQUES FOR PANDEMIC MANAGEMENT 313Mutyala Sridevi14.1 Introduction 31414.2 Literature Review 31414.3 Understanding Pandemic Analogous to a Disaster 31714.4 Application of Machine Learning Techniques at Various Phases of Pandemic Management 31814.4.1 Mitigation Phase 31914.4.2 Preparedness Phase 32014.4.3 Response Phase 32114.4.4 Recovery Phase 32114.5 Generalized Framework to Apply Machine Learning Techniques for Pandemic Management 32214.6 Conclusion 324References 324About the Editors 327Index 329
A Pocket Guide to Hci and Ux Design
Currently, the Human Computer Interaction (HCI) and User Experience (UX) design is a hot topic to nurture and practice in various industry as related knowledge is very relevant to create best quality consumer experiences and thus increases the chance of product/service/software acceptance in the market. This book provides concise information on HCI and UX Design. A practice-oriented contents are presented inside this book in these fields of study. This book covers principles of interaction design, Information Design, System design, user interface (UI) design, human factors engineering, essential UX process & methods, usability engineering etc. and fundamentals of UI prototyping is also covered in this book. Strategies to design interfaces for augmented reality (AR), virtual reality (VR), extended reality (ER), AI based Virtual Agents and Chatbots are also elaborated in this book. This book is also serving as a guide for design ethics and intellectual property rights (IPR). It is worth to have this book by the UX & UI design Practionars, and Aspirants of HCI and UX Design, to gain the knowledge in these domains very quickly. The UX design students and the students of Computer Science & Engineering can also refer this book as a tutorial for their curriculum.
Technical Building Blocks
This book offers comprehensive coverage of the various technologies and techniques used to build technical products. You will learn how technical product development is collaboratively done across multiple technical teams, primarily those in software engineering, data engineering, and AI/ML engineering. You will also be introduced to the technologies these teams use to develop features and products.Many roles in the organization work alongside these technical product development teams and act as liaisons between them, the stakeholders, the customers, and the leadership team. The people in these roles must understand technical aspects ranging from system design to artificial intelligence, and be able to engage in technical discussions with the engineering teams to determine the pros, cons, and risks associated with the development of a technology product or feature.Technical Building Blocks will help you master these technical skills. The book has just the right level of technical details to neither overwhelm with unnecessary technical depth, nor be superficial.From concepts to code snippets, authors Gaurav Sagar and Vitalii Syrovatskyi cover it all to give you an understanding of the engineer's mind and their work. Special emphasis on figures and charts will help you grasp complex ideas more quickly. After reading this book, you’ll be able to effectively communicate with engineering teams, provide valuable inputs in the system design review meetings of upcoming features and products, synthesize and simplify technical updates for cross-functional teams and stakeholders, and pass those dreaded technical interviews at your dream companies.WHAT YOU WILL LEARN* Intrinsic details of the teams and techniques used for product development * Concepts of cloud computing and its deployment models* System design fundamentals required to architect features and products * Evolution of data pipelines and data storage solutions to support big data* ML and deep learning algorithms to build intelligence into products* Securing products through identity and access management using cryptography* Role and working of blockchains, smart contracts, NFTs, and dApps in Web3 WHO THIS BOOK IS FORProfessionals in roles who work with software engineering teams and want to build their technical muscle, such as product managers, program managers, business analysts, project managers and product owners. Also useful for those preparing to crack the technical interview for these roles.GAURAV SAGAR is a director of product management at Salesforce, Inc. and has done product management at Indeed, Amazon Web Services, and Amazon payments. He has over 11 years of experience in building both consumer and enterprise products and has deep industry knowledge of cloud computing, online advertising, ecommerce, and fintech. He has multiple patents and speaks at conferences. He is also an avid programmer and was a data scientist prior to his transition in product management. He holds a M.S. in Business Analytics and a B.S. in Computer Science. In his off hours, he loves to hike and go on short road trips, besides programming for his hobby projects.VITALII SYROVATSKYI is an engineering manager at Google. Previously, he was the software development manager at Amazon where he led the development of products and features for Amazon Web Services (AWS) and Amazon payment products. He has over 15 years of experience in developing technical products, managing, and building engineering teams in multiple industries, namely, search advertising, cloud computing, capital management, online payments, and computer networking. He is founder of a tech company and has firsthand experience in leading cross-functional teams and managing all end-to-end aspects of the business. He has a M.S. and a B.S. in Mathematics, and a M.S. and a B.S. in Economics. Outside of work, he enjoys exploring the beautiful Pacific Northwest. Chapter 1: PRODUCT DEVELOPMENT - A SYNERGY OFTEAM, TECHNIQUES, AND TECHNOLOGIESComposition of a product team* The Product managerThe UX researcher and the UX Designer * The Product marketing managerThe Product scientist / Data Scientist* Popular software development methodologiesWaterfall vs Agile * Scrum vs KanbanVersion control* Need for version control Understanding Git * Gitfarm and Github Feature development using Git* Overview of core software development technologies OSI model and the Internet * Client side vs server sideCloud * MicroservicesData management * Artificial intelligenceCryptography * Federated Identity managementDevops and CI/CD* Rise of DevopsUnderstanding CI / CD* Metrics monitoring Tracking health - System metrics * Tracking success - Product metrics (A/B tests, multivariate tests, multiarmed bandit models)CHAPTER 2: CLOUD - ON DEMAND COMPUTING RESOURCES FOR SCALE AND SPEED* History of cloud * Motivations for cloud adoption Cloud delivery models* IaaS vs PaaS vs SaaSCloud deployment models* Public / Private / HybridVirtualization* OS based vs Hardware basedVirtualization management* ContainerizationContainer architecture * Containers vs VMsInfrastructure as code * Serverless compute Cloud storage * Cloud security and NetworkingThreats and need for security * Data centers and the ISPsVirtual private networks and Access control lists * Firewalls and Load balancersIdentity and access management* Service quality metrics (SLAs)Use cases* Configuring a virtual machine in public cloud (EC2)Static website using object storage in public cloud (S3)CHAPTER 3: SYSTEM DESIGN: ARCHITECTING ROBUST, SCALABLE AND MODULAR APPLICATIONS* Need for distributed system design* Monolithics and some issues* Vertical and horizontal scalingKey characteristics of distributed systems * Considerations and trade-offsPerformance and scalability * Latency and throughputAvailability and consistency* MicroservicesCommunication style* RESTful, RPC, Webhook and GraphQLAPI gateway and service discovery * API documentation API measures (Latency, Availability, Robustness) * Use case: Building a RESTful APIContent delivery networks (CDNs) * Load balancer and Reverse proxyDatabase* Relational database management system Replication * FederationDenormalization and Sharding * NoSQL systems* Key-value storeDocument store * Columnar databases Graph databases* CacheMotivation * Types of caching (Client, CDN, server, application)CDN* AsynchronismTesting and Security * Use casesBuilding a ticketing system (like ticketmaster) * Building a video streaming service (like Netflix)CHAPTER 4: DATA ENGINEERING AND ANALYTICS - MANAGING DATA AND DERIVING INSIGHTS* Data engineering and analytics* Evolution of data needs * Supply chain of data (from raw to actionable insights)* Data storage * Streaming data sources* NoSQL databasesRDBMS * Data warehouseData lake* Data pipelinesData cleaning and transformation * ETLWorkflow orchestration (Airflow)* Big dataData vs Big data * Big data formats (Parquet, ORC, Avro)Data Analytics* Streaming vs batch analyticsPopular analysis tools* Hadoop and HivePresto and Spark* Popular data analytics platformPowerBI, Tableau, Looker * Offerings from public cloud providersCHAPTER 5: ARTIFICIAL INTELLIGENCE - BUILDING INTELLIGENCE THROUGHAUTOMATIC LEARNING* Relationship of Machine learning and Deep learning Learning approaches of machine learning * Steps to solve a machine learning problemOverview of ML algorithms * Popular (shallow) ML algorithmsUses cases - Shallow ML in action * Overview of deep learning algorithmsPopular deep learning algorithms * Use cases - Deep learning in actionWhen not to use deep learning * Rise of AI EthicsCHAPTER 6: INFORMATION SECURITY - SAFEGUARDING RESOURCES AND BUILDING TRUST* Need for securing digital assetsEncryption and hashing * Digital signaturesPublic key infrastructure * Certificate management (TLS)Identity Management* Single sign-on SAML * Openid / OauthAccess Management* RBACABAC* Use CasesUse of digital signatures in Docusign * Use of JWT for financial transactions through StripeCHAPTER 7: Specialty technologies - Special purpose technologies gaining traction* Blockchain * History * StructurePopular applications (Cryptocurrencies and NFTs) * Use case: Building a simple block chainInternet of things (IoT)* HistoryIoT architecture * IoT ApplicationsChallenges and criticism * IoT, Edge computing and 5GConcept and applications* Virtual realityDevelopments over time * Mixed realityApplications * ConcernsSearch Engines* Information retrievalImportance of relevance * Semantic search enginesUse case: Building a search engine using elastic searchAppendix* INSTALLING VIRTUALBOX * Windows * MacOS * Linux (Ubuntu)* LINUX 101* Linux vs Mac OS vs WindowsDirectory structure of linux * Basic linux management through command line* INSTALLING DOCKER * Windows MacOS * Linux (Ubuntu)* INTRODUCTION TO PYTHON * Variables Data structures (Lists, Tuples, Dictionaries and Sets) * Flow control: Conditional statements and loopsFunctions * Classes* Modules and Packages
Certified OpenStack Administrator Study Guide
Gain a better understanding of how to work with the modern OpenStack IaaS Cloud platform. This updated book is designed to help you pass the latest “Yoga” version of the Certified OpenStack Administrator (COA) exam from the Open Infrastructure Foundation. OpenStack is a cloud operating system that controls large pools of computer storage and networking resources throughout a datacenter.All exercises have been updated and re-written for the current version of the exam using the modern CLI tool. This book covers 100% of the exam requirements and each topic is taught using practical exercises and instructions for the command line and for the Horizon dashboard. All chapters are followed by review questions and answers.Even after you have taken and passed the COA exam, this book will remain a useful reference to come back to time after time.WHAT YOU WILL LEARN* Understand the components that make up the Cloud* Install OpenStack distribution from Red Hat, Canonical or community versions* Run OpenStack in a virtual test environment* Understand where to find information for to further work with OpenStackWHO THIS BOOK IS FOR__Cloud and Linux engineers who want to pass the Certified OpenStack Administrator Exam.ANDREY MARKELOV is an experienced Linux and Cloud architect who has worked for large Russian and International companies (LANIT, Red Hat and Ericsson, currently). He has written and published more than fifty articles about Linux and Unix systems services, virtual systems and open source (Linux Format RE, Сomputerra, PCWeek/RE and others). Andrey is the author of the only Russian OpenStack book. He has been teaching Microsoft and Red Hat authorized courses for over 10 years. Andrey is a Red Hat Certified Architect since 2009, and is also a Microsoft Certified System Engineer, Sun Certified System Administrator, Novell Certified Linux Professional, Mirantis Certified OpenStack Administrator, and VMware Certified Professional.CHAPTER 1: GETTING STARTED with Certified OpenStackWhat is Certified OpenStack Administrator Exam?Tips for COA Exam PreparationOther OpenStack CertificationsUnderstanding the Components That Make Up the CloudHistory of OpenStack ProjectOpenStack Distribution and VendorsCHAPTER 2: HOW TO BUILD YOUR OWN VIRTUAL TEST ENVIRONMENTInstalling Vanilla OpenStack with the DevStack ToolInstalling RDO OpenStack Distribution with PackStackInstalling Ubuntu OpenStack with MicrostackCHAPTER 3: OPENSTACK APISUsing the OpenStack CLICreate and manage RC files to authenticate with Keystone for command line useArchitecture of HorizonVerify Operation of the DashboardReview QuestionAnswer to Review QuestionCHAPTER 4: IDENTITY MANAGEMENTArchitecture and Main Components of KeystoneManaging Keystone Catalog Services and EndpointsManaging/Creating Domains, Projects, Users, and RolesCreate and manage policy files and user access rulesManaging and Verifying Operation of the Identity ServiceReview QuestionsAnswers to Review QuestionsCHAPTER 5: IMAGE MANAGEMENTArchitecture and Main Components of GlanceDeploying a New Image to an OpenStack InstanceManaging ImagesManaging Image Back EndsVerifying Operation of the Image ServiceReview QuestionsAnswers to Review QuestionsCHAPTER 6: OPENSTACK NETWORKINGArchitecture and Components of NeutronArchitecture of Open vSwitchManage Network ResourcesManage Project Security Group RulesManage QuotasManage network interfaces on compute instancesVerify Operation of Network ServiceReview QuestionsAnswers to Review QuestionsCHAPTER 7: OPENSTACK COMPUTEArchitecture and Components of NovaManaging FlavorsManaging and Accessing an Instance Using a KeypairLaunching, Shutting Down, and Terminating the InstanceConfigure an instance with a floating IPManaging Instance SnapshotsManaging QuotasGetting Nova StatsManage Nova host consoles (VNC, NOVNC, spice)Verifying Operation and Managing Nova Compute ServersReview QuestionsAnswers to Review QuestionsCHAPTER 8: OPENSTACK OBJECT STORAGEOverview of Swift Object StorageManaging Permissions on a Container in Object StorageUsing the cURL Tool for Working with SwiftManaging Expiring ObjectsMonitoring Swift ClusterReview QuestionsAnswers to Review QuestionsCHAPTER 9: BLOCK STORAGEArchitecture and Components of CinderManage Volume and Mount It to a Nova InstanceCreate Volume Group for Block StorageManage QuotasBack Up and Restore Volumes and SnapshotsManage Volume SnapshotsManage Volumes EncryptionSet Up Storage PoolsReview QuestionsAnswers to Review QuestionsCHAPTER 10: TROUBLESHOOTINGThe Main Principles of TroubleshootingHow to Check the OpenStack VersionWhere to Find and How to Analyze Log FilesBack Up the Database Used by an OpenStack InstanceAnalyze Host/Guest OS and Instance StatusAnalyze Messaging ServersAnalyze Network StatusDigest the OpenStack EnvironmentReview QuestionsAnswers to Review QuestionsCHAPTER 11: CONCLUSIONANNEX: ORCHESTRATION OF OPENSTACK WITH HEAT
Introduction to Transformers for NLP
Get a hands-on introduction to Transformer architecture using the Hugging Face library. This book explains how Transformers are changing the AI domain, particularly in the area of natural language processing.This book covers Transformer architecture and its relevance in natural language processing (NLP). It starts with an introduction to NLP and a progression of language models from n-grams to a Transformer-based architecture. Next, it offers some basic Transformers examples using the Google colab engine. Then, it introduces the Hugging Face ecosystem and the different libraries and models provided by it. Moving forward, it explains language models such as Google BERT with some examples before providing a deep dive into Hugging Face API using different language models to address tasks such as sentence classification, sentiment analysis, summarization, and text generation.After completing Introduction to Transformers for NLP, you will understand Transformer concepts and be able to solve problems using the Hugging Face library.WHAT YOU WILL LEARN* Understand language models and their importance in NLP and NLU (Natural Language Understanding)* Master Transformer architecture through practical examples* Use the Hugging Face library in Transformer-based language models* Create a simple code generator in Python based on Transformer architectureWHO THIS BOOK IS FORData Scientists and software developers interested in developing their skills in NLP and NLU (Natural Language Understanding)Shashank Mohan Jain has been working in the IT industry for around 20 years mainly in the areas of cloud computing, machine learning and distributed systems. He has keen interests in virtualization techniques, security, and complex systems. Shashank has software patents to his name in the area of cloud computing, IoT, and machine learning. He is a speaker at multiple reputed cloud conferences. Shashank holds Sun, Microsoft, and Linux kernel certifications. CHAPTER 1: INTRODUCTION TO LANGUAGE MODELSChapter Goal: History and introduction to language modelsSub-topics:• What is a language model• Evolution of language models from n-grams to now Transformer based models• High-level intro to Google BERTCHAPTER 2: TRANSFORMERSChapter Goal: Introduction to Transformers and their architectureSub-topics:Introduction to Transformers• Deep dive into Transformer architecture and how attention plays a key role in Transformers• How Transformer realizes tasks like sentiment analysis, Q&A, sentence masking, etc.CHAPTER 3: INTRO TO HUGGING FACE LIBRARYChapter Goal: Gives an introduction to Hugging Face libraries and how they are used in achieving NLP tasksSub-topics:• What is Hugging Face, and how its emerge as a relevant library for various data sets and models related to NLP• Creating simple Hugging Face applications for NLP tasks like sentiment analysis, sentence masking, etc.• Play around with different models available in the IT space.CHAPTER 4: CODE GENERATORChapter Goal: Cover an example of a code generator using Transformer architecture.Sub-topics:• Creating a simple code generator wherein user input is text in NLP like sorting a given array of numbers.• The generator will take the user text and generate Python code or YAML (yet another markup language)file as an example for Kubernetes• Deploying the model on the cloud as a service in KubernetesCHAPTER 5: TRANSFORMER BASED APPLICATIONSChapter Goal: Summary of the topics around Transformers, Hugging Face libraries, and their usage.Subtopics:• Summary of Transformer based applications and language models.• Summarize Hugging Face libraries and why how they are relevant in NLP.
Target C#
So, you want to learn C# and Visual Studio 2022, but are a bit intimidated? Don’t be. Programming is within your grasp! Programmers at any level have to fully understand, and more importantly, be able to code the core constructs. It is impossible to use complex programming concepts such as classes before understanding what methods and variables and their data types are. Once there is a foundation built on the basics, then all other topics can fall in line.While it is a forgone conclusion that languages change with the introduction of new features, the core concepts do not. Even large enterprises do not always update to the latest versions of languages and frameworks; their "backbone" applications have been developed to work, regardless. More than ever, enterprises need developers who can master and apply the core programming concepts and then be "up-skilled" with newer language levels and features as they integrate into the company.This book builds from the ground up. You will begin with an introduction to programming, learning the foundational concepts needed to become a C# programmer. You will then put to practice a wide range of programming concepts, including data types, selection, iteration, arrays, methods, classes and objects, serialization, file handling, and string handling. You will learn enough to develop applications that emulate commercial application code. Once you’ve got the foundational concepts, get ready to dive into common programming routines, including linear search, binary search, bubble sort and insertion sort, and use C# to code them. Code example annotations supplement the learning and are designed to enhance learning while also explaining why the code does what it does. This book:* Teaches core programming through well-explained and simple-to-follow instructions* Reinforces programming skills through the use of coding examples that extend user learnings* Explains theoretical programming concepts; applies them practically with code examples * Introduces the latest Microsoft C# Integrated Development Environment (Visual Studio 2022)* Enlists clear, precise, and easy-to-understand language to assist readers of all levels and experience* Uses a mix of "theory" and practical information that is designed to be friendly and engagingWHO THIS BOOK IS FORBeginners, those refreshing their C# skills, or those moving from another programming language. No skills or previous knowledge is required. Readers will need to download Visual Studio 2022 Community Edition as this is what the book code has been based on, but they could use other Integrated Development Environments.GERARD BYRNE is Senior Technical Trainer for a US-based Forbes 100 company. He works to up-skill and re-skill software engineers who develop business-critical software applications. He also helps refine the programming skills of "returners" to the workforce, and introduces new graduates to the application of software development within the commercial environment.Gerard's subject expertise has been developed over a multi-decade career as a teacher, lecturer, and technical trainer in a corporate technology environment. He has delivered a range of courses across computer languages and frameworks, and understands how to teach skills and impart knowledge to a range of learners. He has taught people in the use of legacy technologies such as COBOL and JCL and more "modern" technologies and frameworks such as C#, Java, Spring, Android, JavaScript, Node, HTML, CSS, Bootstrap, React, Python, and Test-Driven Development.Gerard has mastered how to teach difficult concepts in a simple way that makes learning accessible and enjoyable. The content of his notes, labs, and other materials follow the simple philosophy of keeping it simple, while making the instructions detailed. He is passionate about software development and believes we can all learn to write code if we are patient and understand the basic coding concepts.Chapter 1. .NETChapter 2. Software InstallationChapter 3. IntroductionChapter 4. Input and OutputChapter 5. Commenting CodeChapter 6. Data TypesChapter 7. Casting and ParsingChapter 8. ArithmeticChapter 9. SelectionChapter 10. IterationChapter 11. ArraysChapter 12. MethodsChapter 13. ClassesChapter 14. InterfacesChapter 15. String HandlingChapter 16. File HandlingChapter 17. Exception HandlingChapter 18. SerializationChapter 19. StructsChapter 20. EnumerationsChapter 21. DelegatesChapter 22. EventsChapter 23. GenericsChapter 24. Common RoutinesChapter 25. Programming LabsChapter 26. C# 11
MCA Microsoft Certified Associate Azure Security Engineer Study Guide
PREPARE FOR THE MCA AZURE SECURITY ENGINEER CERTIFICATION EXAM FASTER AND SMARTER WITH HELP FROM SYBEXIn the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You’ll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. You’ll learn to maintain the security posture of an Azure environment, implement threat protection, and respond to security incident escalations. Readers will also find:* Efficient and accurate coverage of every topic necessary to succeed on the MCA Azure Security Engineer exam* Robust discussions of all the skills you need to hit the ground running at your first—or next—Azure cybersecurity job* Complementary access to online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossaryThe MCA Azure Security Engineer AZ-500 exam is a challenging barrier to certification. But you can prepare confidently and quickly with this latest expert resource from Sybex. It’s ideal for anyone preparing for the AZ-500 exam or seeking to step into their next role as an Azure security engineer. ABOUT THE AUTHORSHIMON BRATHWAITE is Editor-in-Chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their companies and helping cybersecurity professionals start and advance their careers. He is the author of three cybersecurity books and holds CEH, Security+, and AWS Security specialist certifications. Introduction xixAssessment Test xxvCHAPTER 1 INTRODUCTION TO MICROSOFT AZURE 1What Is Microsoft Azure? 3Cloud Environment Security Objectives 4Confidentiality 4Integrity 4Availability 5Nonrepudiation 5Common Security Issues 5Principle of Least Privilege 5Zero-Trust Model 6Defense in Depth 6Avoid Security through Obscurity 9The AAAs of Access Management 9Encryption 10End-to-End Encryption 11Symmetric Key Encryption 11Asymmetric Key Encryption 11Network Segmentation 13Basic Network Configuration 13Unsegmented Network Example 14Internal and External Compliance 15Cybersecurity Considerations for the Cloud Environment 16Configuration Management 17Unauthorized Access 17Insecure Interfaces/APIs 17Hijacking of Accounts 17Compliance 18Lack of Visibility 18Accurate Logging 18Cloud Storage 18Vendor Contracts 19Link Sharing 19Major Cybersecurity Threats 19DDoS 19Social Engineering 20assword Attacks 21Malware 21Summary 24Exam Essentials 24Review Questions 26CHAPTER 2 MANAGING IDENTITY AND ACCESS IN MICROSOFT AZURE 29Identity and Access Management 31Identifying Individuals in a System 31Identifying and Assigning Roles in a System and to an Individual 32Assigning Access Levels to Individuals or Groups 33Adding, Removing, and Updating Individuals and Their Roles in a System 33Protecting a System’s Sensitive Data and Securing the System 33Enforcing Accountability 34IAM in the Microsoft Azure Platform 34Creating and Managing Azure AD Identities 34Managing Azure AD Groups 37Managing Azure Users 39Adding Users to Your Azure AD 39Managing External Identities Using Azure AD 40Managing Secure Access Using Azure Active Directory 42Implementing Conditional Access Policies, Including MFA 44Implementing Azure AD Identity Protection 45Enabling the Policies 47Implement Passwordless Authentication 50Configuring an Access Review 52Managing Application Access 57Integrating Single Sign-On and Identity Providers for Authentication 57Creating an App Registration 58Configuring App Registration Permission Scopes 58Managing App Registration Permission Consent 59Managing API Permission to Azure Subscriptions 60Configuring an Authentication Method for a Service Principal 61Managing Access Control 62Interpret Role and Resource Permissions 62Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources 63Assigning Built-In Azure AD Roles 64Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles 65Summary 66Exam Essentials 67Review Questions 70CHAPTER 3 IMPLEMENTING PLATFORM PROTECTIONS 73Implementing Advanced Network Security 75Securing Connectivity of Hybrid Networks 75Securing Connectivity of Virtual Networks 77Creating and Configuring Azure Firewalls 78Azure Firewall Premium 79Creating and Configuring Azure Firewall Manager 82Creating and Configuring Azure Application Gateway 82Creating and Configuring Azure Front Door 87Creating and Configuring a Web Application Firewall 91Configuring Network Isolation for Web Apps and Azure Functions 93Implementing Azure Service Endpoints 94Implementing Azure Private Endpoints, Including Integrating with Other Services 97Implementing Azure Private Link 98Implementing Azure DDoS Protection 101Configuring Enhanced Security for Compute 102Configuring Azure Endpoint Protection for VMs 102Enabling Update Management in Azure Portal 104Configuring Security for Container Services 108Managing Access to the Azure Container Registry 109Configuring Security for Serverless Compute 109Microsoft Recommendations 111Configuring Security for an Azure App Service 112Exam Essentials 118Review Questions 122CHAPTER 4 MANAGING SECURITY OPERATIONS 125Configure Centralized Policy Management 126Configure a Custom Security Policy 126Create Custom Security Policies 127Creating a Policy Initiative 128Configuring Security Settings and Auditing by Using Azure Policy 129Configuring and Managing Threat Protection 130Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint) 131Configuring Microsoft Defender for SQL 134Using the Microsoft Threat Modeling Tool 139Azure Monitor 147Visualizations in Azure Monitor 148Configuring and Managing Security Monitoring Solutions 149Creating and Customizing Alert Rules by Using Azure Monitor 149Configuring Diagnostic Logging and Retention Using Azure Monitor 157Monitoring Security Logs Using Azure Monitor 159Microsoft Sentinel 167Configuring Connectors in Microsoft Sentinel 170Evaluating Alerts and Incidents in Microsoft Sentinel 175Summary 176Exam Essentials 177Review Questions 179CHAPTER 5 SECURING DATA AND APPLICATIONS 183Configuring Security for Storage in Azure 184Storage Account Access Keys 185Configuring Access Control for Storage Accounts 185Configuring Storage Account Access Keys 189Configuring Azure AD Authentication for Azure Storage and Azure Files 191Configuring Delegated Access for Storage Accounts 202Configuring Security for Databases 220Summary 254Exam Essentials 255Review Questions 257APPENDIX A AN AZURE SECURITY TOOLS OVERVIEW 261Chapter 2, “Managing Identity and Access on Microsoft Azure” 262Azure Active Directory (AD) 262Microsoft Authenticator App 265Azure API Management 265Chapter 3, “Implementing Platform Protections” 266Azure Firewall 266Azure Firewall Manager 267Azure Application Gateway 269Azure Front Door 273Web Application Firewall 273Azure Service Endpoints 274Azure Private Links 274Azure DDoS Protection 275Microsoft Defender for Cloud 276Azure Container Registry 277Azure App Service 278Chapter 4, “Managing Security Operations” 279Azure Policy 279Microsoft Threat Modeling Tool 281Microsoft Sentinel 287How Does Microsoft Sentinel Work? 289Automation 290Chapter 5, “Securing Data and Applications” 290Azure Key Vault 299APPENDIX B ANSWERS TO REVIEW QUESTIONS 301Chapter 1: Introduction to Microsoft Azure 302Chapter 2: Managing Identity and Access in Microsoft Azure 303Chapter 3: Implementing Platform Protections 304Chapter 4: Managing Security Operations 305Chapter 5: Securing Data and Applications 306Index 309
CompTIA Project+ Practice Tests
AN INDISPENSABLE STUDY AID FOR AN IN-DEMAND PROJECT MANAGEMENT CERTIFICATIONIn the newly updated second edition of CompTIA Project+ Practice Tests: Exam PK0-005, veteran tech educator and project manager Brett J. Feddersen delivers an indispensable study aid for anyone preparing for the CompTIA Project+ certification exam or a new career in project management. This new edition is fully revised to reflect recent changes to the Project+ PK0-005 exam, and offers new questions that emphasize the importance of agile and other iterative project management methodologies commonly used in IT environments. You’ll explore every objective covered by the Project+ exam, including project management concepts, project life cycle phases, project tools and documentation, and the basics of information technology and governance. You’ll also find:* Hands-on and practical information you can use immediately to prepare for a new career in project management, or for expanding your existing skillset* Hundreds of domain-by-domain questions that pinpoint exactly where you excel and where you need more training* A true-to-life testing format that prepares you for the real-world exam and reduces test anxiety so you can focus on succeeding your first time taking the testA can’t-miss resource for aspiring and veteran project managers, CompTIA Project+ Practice Tests: Exam PK0-005, Second Edition, belongs in the hands of anyone hoping to master the latest version of the Project+ exam or distinguish themselves on their first day of a new project management job. ABOUT THE AUTHORBRETT J. FEDDERSEN, Project+, MPS, PMP, is a career public servant with 25 years of experience in government including the United States Marine Corps, the state of Colorado, the city of Boulder (Colorado), and with the Regional Transportation District (RTD) in the Denver/Metro area. Brett has been a certified project manager since 2007, and has contributed to several books on both CompTIA Project+ and the PMP exams. In additional to his commitment to the project management community, Brett is passionate about leadership and organizational excellence, and has contributed to several cultural revolutions helping government agencies transform into high performing organizations. Introduction xvChapter 1 Project Management Concepts (Domain 1.0) 1Chapter 2 Project Life Cycle Phases (Domain 2.0) 39Chapter 3 Tools and Documentation (Domain 3.0) 79Chapter 4 Basics of IT and Governance (Domain 4.0) 123Chapter 5 Practice Test 1 163Chapter 6 Practice Test 2 183APPENDIX ANSWERS TO REVIEW QUESTIONS 203Chapter 1: Project Management Concepts (Domain 1.0) 204Chapter 2: Project Life Cycle Phases (Domain 2.0) 218Chapter 3: Tools and Documentation (Domain 3.0) 232Chapter 4: Basics of IT and Governance (Domain 4.0) 246Chapter 5: Practice Test 1 261Chapter 6: Practice Test 2 268Index 275
Android Smartphones For Dummies
BECOME SMARTPHONE SAVVY WITH DUMMIESAndroid Smartphones For Dummies is the all-new guide to Android phones with the familiar Dummies charm everyone loves. This book will give Android rookies a crash-course in how to use these popular phones. You’ll go beyond the basics of texting and taking photos—we’ll walk you through all the pro tips and tricks for customizing your phone, optimizing all your settings, using social media (safely), and making the most of apps and widgets. We’ll even teach you how to make calls, because phones can still do that.* Set up and customize your new Android phone* Take stunning pictures, video, and even selfies* Find the best apps to make your life easier and more fun* Keep your data secure and private while you browse the internetNew and inexperienced Android users will love the helpful, step-by-step guidance and friendly advice in Android Smartphones For Dummies. J.F. DIMARZIO has nearly 30 years’ experience developing games and applications for a variety of operating systems and in several programming languages. He is a veteran Android developer, the author of 15 books, and has worked with organizations including The Walt Disney Company and the U.S. Department of Defense. Introduction 1PART 1: THE UNBOXING 3Chapter 1: Introducing All Things Android 5Chapter 2: Checking Out and Charging What’s in the Box 11Chapter 3: Deciding on Carrier Service 25Chapter 4: Setting Up Your Device 31Chapter 5: Tapping and Swiping Your Way around the Phone 43PART 2: THE GRAND TOUR 53Chapter 6: Unlocking the Secrets of the Screens 55Chapter 7: G-Whiz: The Google Experience 67Chapter 8: Investigating Apps for Everything 89Chapter 9: Finding Widgets for Your Gadget 105Chapter 10: Enjoying Quick Access Features 113Chapter 11: Staying in the Know with Notifications 125Chapter 12: Customizing Your Settings. 135PART 3: COMMUNICATING ANYTIME, ANYWHERE 153Chapter 13: Texting to Keep in Touch 155Chapter 14: Using the Phone as a Phone 169Chapter 15: Browsing the Internet and Maintaining Your Privacy 181Chapter 16: Keeping It Social 191Chapter 17: Smile! Using the Camera 199PART 4: PERSONALIZING JUST THE WAY YOU LIKE IT 221Chapter 18: Customizing Your Device 223Chapter 19: Saying ‘Hey’ to Google 233PART 5: THE PART OF TENS 245Chapter 20: Ten Cool Tips and Tricks 247Chapter 21: Ten Settings to Enable 255Chapter 22: Ten Settings to Disable. 259Index 263
Building Quality Shaders for Unity®
Understand what shaders are and what they’re used for: Shaders are often seen as mystical and difficult to develop, even by skilled programmers, artists, and developers from other game design disciplines. This book dispels that idea by building up your shader knowledge in stages, starting with fundamental shader mathematics and how shader development mindset differs from other types of art and programming, and slowly delves into topics such as vertex and fragment shaders, lighting, depth-based effects, texture mapping, and Shader Graph.This book presents each of these topics with a comprehensive breakdown, the required theory, and some practical applications for the techniques learned during each chapter. The HLSL (High Level Shading Language) code and Shader Graphs will be provided for each relevant section, as well as plenty of screenshots.By the end of this book, you will have a good understanding of the shader development pipeline and you will be fully equipped to start making your own aesthetic and performant shader effects for your own games!YOU WILL LEARN TO• Use shaders across Unity’s rendering pipelines• Write shaders and modify their behavior with C# scripting• Use Shader Graph for codeless development• Understand the important math behind shaders, particularly space transformations• Profile the performance of shaders to identify optimization targetsWHO IS THIS BOOK FORThis book is intended for beginners to shader development, or readers who may want to make the jump from shader code to Shader Graph. It will also include a section on shader examples for those who already know the fundamentals of shaders and are looking for specific use cases. Daniel Ilett is an ambitious and motivated PhD student at the University of Warwick. He is a passionate game developer, specialising in shaders and technical art. He publishes a range of educational and tutorial content, including videos and written work, aimed at beginners and intermediate developers. He also does freelance work on shaders and visual effects for games. Chapter 1: Introduction to Shaders in UnitySub-topics:• Brief overview of shader fundamentals• Unity’s built-in pipeline• URP (Universal Render Pipeline)• HDRP (High Definition Render Pipeline)Chapter 2: Maths for Shader DevelopmentSub-topics:• Vectors in 2D and 3D• Dot product, cross product, and other vector operations• Matrices• Multiplication, transpose, inverse, and common matrix operations• Important spaces in computer graphics• Homogeneous coordinate systems• Transformation between spacesChapter 3: Your Very First ShaderSub-topics:• The shader pipeline, and data flow• ShaderLab, SubShaders and Fallbacks• Shader Tags• The appdata struct: Input to the vertex shader• The vertex shader• The v2f struct: Data passed between the vertex and fragment shader• The fragment shaderChapter 4: Shader GraphSub-topics:• The argument for node-based editors• The vertex and fragment stages• Shader nodes & properties• Your first Shader GraphChapter 5: Textures, UV Coordinates & Normal MappingSub-topics:• What is texture mapping?• What are UV coordinates?• Scaling, rotating and offsetting UVs• Sampler states• Normal mapping & tangent spaceChapter 6: TransparencySub-topics:• Transparency vs opacity• Alpha-blended transparency• Sorting• Screen-door (“dithered”) transparencyChapter 7: The Depth Buffer• What is the depth buffer?• Depth-testing and culling• Depth-based shader effectsChapter 8: More Shader FundamentalsSub-topics:• Shader keywords and variants• Single- and multi-pass shaders• GrabPass and UsePass• Unity’s standard shader librariesChapter 9: Lighting & ShadowsSub-topics:• Lighting theory: Diffuse, specular, ambient, and Fresnel light• Phong shading• Physically based rendering• Shadow castingChapter 10: Image Effects & Post ProcessingSub-topics:• Post Processing in the Built-in pipeline, URP and HDRP• Convolution kernels, Gaussian blur and multi-pass effects.• Edge detection with a Sobel kernel• Better edge detection using the depth texture and normal textureChapter 11: Advanced ShadersSub-topics:• Geometry shaders: adding or modifying vertices• Tessellation shaders: subdividing a mesh• Building an LOD system with tessellation shaders• Compute shaders: arbitrary computation on the GPUChapter 12: Profiling & OptimizationSub-topics:• The Unity Profiler and Frame Debugger• Branching in shaders• Avoiding overdraw• Multi-material objects• BatchingChapter 13: Shader Recipes For Your GamesSub-topics:• World-space reconstruction in post processing shaders• Custom lighting: cel-shading (toon shading)• Vertex displacement – realistic water (Gerstner waves)• Refraction by modifying the framebuffer• Interactive snow layers (modifying the height of a mesh based on gameplay actions)• Holograms using emissive colour• Using Voronoi noise to make marble
Hyperrealität und Transhumanismus
Digitale Technologien sind heute ein fester Bestandteil des Alltags. Der Mensch wird zunehmend selbst zu einem Teil dieses Netzwerks aus Maschinen. Der französische Soziologe Jean Baudrillard beschreibt bereits vor mehreren Jahrzehnten eine solche Welt, in der sich Realität und Fiktion nicht länger unterscheiden lassen. Sie verschmelzen untrennbar zu einer neuen Realität, einer Hyperrealität, in der jeglicher Bezug zu den eigentlichen Phänomenen verloren gegangen ist. Der Transhumanismus hat die Verbesserung des Menschen durch Technologien im Fokus. Durch die Verbindung des biologischen Körpers mit Maschinen sollen die natürlichen Grenzen seiner physischen und mentalen Leistungsfähigkeit überwunden werden. Der Mensch soll seine Evolution aktiv gestalten, um sich letztendlich zu einem posthumanen Wesen zu entwickeln. Dieser Fortschritt erscheint nötig, um nicht durch Maschinen ersetzt zu werden. Auf den ersten Blick wirken viele Ideen zu Cyborgs und Künstlicher Intelligenz wie Science-Fiction Vorstellungen. Jean Baudrillard greift Bilder dieser Art auf und illustriert an ihnen, wie die Welt bereits ist. Eine fiktive Welt, die zur Wirklichkeit wird – Mirco Spiegel untersucht in diesem Buch, ob Visionen des Transhumanismus ein Teil davon sind.
Weighted Automata, Formal Power Series and Weighted Logic
The main objective of this work is to represent the behaviors of weighted automata by expressively equivalent formalisms: rational operations on formal power series, linear representations by means of matrices, and weighted monadic second-order logic. First, we exhibit the classical results of Kleene, Büchi, Elgot and Trakhtenbrot, which concentrate on the expressive power of finite automata. We further derive a generalization of the Büchi–Elgot–Trakhtenbrot Theorem addressing formulas, whereas the original statement concerns only sentences. Then we use the language-theoretic methods as starting point for our investigations regarding power series. We establish Schützenberger’s extension of Kleene’s Theorem, referred to as Kleene–Schützenberger Theorem. Moreover, we introduce a weighted version of monadic second-order logic, which is due to Droste and Gastin. By means of this weighted logic, we derive an extension of the Büchi–Elgot–Trakhtenbrot Theorem. Thus, we point out relations among the different specification approaches for formal power series. Further, we relate the notions and results concerning power series to their counterparts in Language Theory. Overall, our investigations shed light on the interplay between languages, formal power series, automata and monadic second-order logic. Introduction.- Languages, Automata and Monadic Second-Order Logic.- Weighted Automata.- The Kleene–Schützenberger Theorem.- Weighted Monadic Second-Order Logic and Weighted Automata.- Summary and Further Research.
Beginning Eleventy
Leverage the power of Eleventy to quickly produce static sites that are efficient and fast. This project-oriented book simplifies the process of setting up Eleventy and manipulating content, using little more than a text editor or free software.It will equip you with a starting tool set that you can use to develop future projects or incorporate into your existing workflow. More importantly, you'll take websites to the next level, reducing the reliance on tools that are bloated, prone to being hacked and not the most efficient. Beginning Eleventy is an excellent resource for getting acquainted with creating and manipulating blogs using a static site generator approach. It takes the view that you don’t have to create something complex and unwieldy; you can build something quickly, then extend it using the power of the API and plugins over time, without sacrificing speed or features.WHAT YOU’LL LEARN:* Implement the Eleventy framework in a project* Explore some of the options for customizing content using the framework* Gain an appreciation of pointers around maintenance requirements, and how this might compare to other blog systems* Work through some example projects, to help build up a working blog from standalone demos to implementing with other tools or librariesTHIS BOOK IS FOR?* Website developers who are already familiar with JavaScript, who are looking for a fast and simple framework to deliver high quality results fast* Developers who are looking to leverage the Eleventy framework to quickly create an online blog using little more than a text editor, producing optimized content in modern browsers using tools they will already have* Those in agile development teams, where time is of the essence and need to deliver high quality results quicklyALEX LIBBY is a frontend engineer and seasoned computer book author who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development and has been hooked ever since. His daily work involves extensive use of React, NodeJS, JavaScript, HTML, and CSS; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library and enjoys writing about Open Source technologies, principally for front end UI development.INTRODUCTIONChapter 1: Introducing EleventyChapter 2: Creating StructureChapter 3: Sourcing DataChapter 4: Creating TemplatesChapter 5: Configuring OptionsChapter 6: Styling the Site and ContentChapter 7: Creating PluginsChapter 8: Internationalizing the SiteChapter 9: Localizing ContentChapter 10: Polishing the SiteChapter 11: Deployment and Publishing
Cognitive Computing Models in Communication Systems
COGNITIVE COMPUTING MODELS IN COMMUNICATION SYSTEMSA CONCISE BOOK ON THE LATEST RESEARCH FOCUSING ON PROBLEMS AND CHALLENGES IN THE AREAS OF DATA TRANSMISSION TECHNOLOGY, COMPUTER ALGORITHMS, AI-BASED DEVICES, COMPUTER TECHNOLOGY, AND THEIR SOLUTIONS.The book provides a comprehensive overview of state-of-the-art research work on cognitive models in communication systems and computing techniques. It also bridges the gap between various communication systems and solutions by providing the current models and computing techniques, their applications, the strengths and limitations of the existing methods, and the future directions in this area. The contributors showcase their latest research work focusing on the issues, challenges, and solutions in the field of data transmission techniques, computational algorithms, artificial intelligence (AI)-based devices, and computing techniques. Readers will find in this succinctly written and unique book:* Topics covering the applications of advanced cognitive devices, models, architecture, and techniques.* A range of case studies and applications that will provide readers with the tools to apply cutting-edge models and algorithms.* In-depth information about new cognitive computing models and conceptual frameworks and their implementation.AUDIENCEThe book is designed for researchers and electronics engineers, computer science engineers, industrial engineers, and mechanical engineers (both in academia and industry) working in the fields of machine learning, cognitive computing, mobile communication, and wireless network system. BUDATI ANIL KUMAR, PHD, is an associate professor in the ECE Department, Gokaraju Rangaraju Institute of Engineering & Technology (Autonomous), Hyderabad, India. He has more than 12 years of experience in teaching and six years of experience in research and has published more than 50 research articles in journals and conferences. His current research interests include cognitive radio networks, software-defined radio networks, artificial intelligence, 6G emerging technologies, mulsemedia computing, and UAVs in 5G and 6G. S. B. GOYAL, PHD, is Director, Faculty of Information Technology, City University, Malaysia. He has more than 20 experience and has published 100+ papers in journals and conferences. SARDAR M.N. ISLAM, PHD, is Director of Decision Sciences and Modelling Program at Victoria University, Australia. He has authored 31scholarly academic books in different disciplines, as well as more than 250 journal articles in his specialized research areas. Preface xiAcknowledgement xiii1 DESIGN OF A LOW-VOLTAGE LDO OF CMOS VOLTAGE REGULATOR FOR WIRELESS COMMUNICATIONS 1S. Pothalaiah, Dayadi Lakshmaiah, B. Prabakar Rao, D. Nageshwar Rao, Mohammad Illiyas and G. Chandra Sekhar1.1 Introduction 21.2 LDO Controller Arrangement and Diagram Drawing 21.2.1 Design of the LDO Regulator 41.2.1.1 Design of the Fault Amplifier 41.2.1.2 Design of the MPT Phase 81.3 Conclusion 14References 142 PERFORMANCE ANALYSIS OF MACHINE LEARNING AND DEEP LEARNING ALGORITHMS FOR SMART CITIES: THE PRESENT STATE AND FUTURE DIRECTIONS 15Pradeep Bedi, S. B. Goyal, Sardar MN Islam, Jia Liu and Anil Kumar Budati2.1 Introduction 162.2 Smart City: The Concept 162.3 Application Layer 182.3.1 Smart Homes and Buildings 182.3.1.1 Smart Surveillance 182.3.2 Smart Transportation and Driving 192.3.3 Smart Healthcare 192.3.4 Smart Parking 192.3.5 Smart Grid 192.3.6 Smart Farming 192.3.7 Sensing Layer 202.3.8 Communication Layer 202.3.9 Data Layer 202.3.10 Security Layer 212.4 Issues and Challenges in Smart Cities: An Overview 212.5 Machine Learning: An Overview 222.5.1 Supervised Learning 222.5.2 Support Vector Machines (SVMs) 222.5.3 Artificial Neural Networks 232.5.4 Random Forest 242.5.5 Naïve Bayes 252.6 Unsupervised Learning 262.7 Deep Learning: An Overview 262.7.1 Autoencoder 272.7.2 Convolution Neural Networks (CNNs) 272.7.3 Recurrent Neural Networks (RNNs) 282.8 Deep Learning vs Machine Learning 292.9 Smart Healthcare 302.9.1 Evolution Toward a Smart Healthcare Framework 302.9.2 Application of ML/DL in Smart Healthcare 312.10 Smart Transport System 332.10.1 Evolution Toward a Smart Transport System 332.10.2 Application of ML/DL in a Smart Transportation System 342.11 Smart Grids 362.11.1 Evolution Toward Smart Grids 362.11.2 Application of ML/DL in Smart Grids 382.12 Challenges and Future Directions 402.13 Conclusion 41References 413 APPLICATION OF MACHINE LEARNING ALGORITHMS AND MODELS IN 3D PRINTING 47Chetanpal Singh3.1 Introduction 483.2 Literature Review 503.3 Methods and Materials 653.4 Results and Discussion 693.5 Conclusion 70References 724 A NOVEL MODEL FOR OPTIMAL RELIABLE ROUTING PATH PREDICTION IN MANET 75S.R.M. Krishna, S. Pothalaiah and R. Santosh4.1 Introduction 764.2 Analytical Hierarchical Process Technique 774.3 Mathematical Models and Protocols 784.3.1 Rough Sets 784.3.1.1 Pawlak Rough Set Theory Definitions 784.3.2 Fuzzy TOPSIS 794.4 Routing Protocols 804.4.1 Classification of Routing Paths 804.5 RTF-AHP Model 814.5.1 Rough TOPSIS Fuzzy Set Analytical Hierarchical Process Algorithm 814.6 Models for Optimal Routing Performance 834.6.1 Genetic Algorithm Technique 844.6.2 Ant Colony Optimization Technique 844.6.3 RTF-AHP Model Architecture Flow 844.7 Results and Discussion 854.8 Conclusion 88References 885 IOT-BASED SMART TRAFFIC LIGHT CONTROL 91Sreenivasa Rao Ijjada and K. Shashidhar5.1 Introduction 925.2 Scope of the Proposed Work 935.3 Proposed System Implementation 945.4 Testing and Results 995.5 Test Results 1005.6 Conclusion 104References 1056 DIFFERENTIAL QUERY EXECUTION ON PRIVACY PRESERVING DATA DISTRIBUTED OVER HYBRID CLOUD 107Sridhar Reddy Vulapula, P. V. S. Srinivas and Jyothi Mandala6.1 Introduction 1076.2 Related Work 1086.3 Proposed Solution 1106.3.1 Data Transformation 1106.3.2 Data Distribution 1136.3.3 Query Execution 1146.4 Novelty in the Proposed Solution 1156.5 Results 1156.6 Conclusion 119References 1207 DESIGN OF CMOS BASE BAND ANALOG 123S. Pothalaiah, Dayadi Lakshmaiah, Bandi Doss, Nookala Sairam and K. Srikanth7.1 Introduction 1247.2 Proposed Technique of the BBA Chain for Reducing Energy Consumption 1257.3 Channel Preference Filter 1307.4 Programmable Amplifier Gain 1327.5 Executed Outcomes 1337.6 Conclusion 135References 1358 REVIEW ON DETECTION OF NEUROMUSCULAR DISORDERS USING ELECTROMYOGRAPHY 137G. L. N. Murthy, Rajesh Babu Nemani, M. Sambasiva Reddy and M. K. Linga Murthy8.1 Introduction 1388.2 Materials 1398.3 Methods 1408.4 Conclusion 142References 1429 DESIGN OF COMPLEMENTARY METAL–OXIDE SEMICONDUCTOR RING MODULATOR BY BUILT-IN THERMAL TUNING 145P. Bala Murali Krishna, Satish A., R. Yadgiri Rao, Mohammad Illiyas and I. Satya Narayana9.1 Introduction 1469.2 Device Structure 1479.3 dc Performance 1499.4 Small-Signal Radiofrequency Assessments 1499.5 Data Modulation Operation (High Speed) 1509.6 Conclusions and Acknowledgments 152References 15310 LOW-POWER CMOS VCO USED IN RF TRANSMITTER 155D. Subbarao, Dayadi Lakshmaiah, Farha Anjum, G. Madhu Sudhan Rao and G. Chandra Sekhar10.1 Introduction 15610.2 Transmitter Architecture 15710.3 Voltage-Controlled Ring Oscillator Design 15810.4 CMOS Combiner 16110.5 Conclusion 163References 16311 A NOVEL LOW-POWER FREQUENCY-MODULATED CONTINUOUS WAVE RADAR BASED ON LOW-NOISE MIXER 165Dayadi Lakshmaiah, Bandi Doss, J.V.B. Subrmanyam, M.K. Chaitanya, Suresh Ballala, R. Yadagirir Rao and I. Satya Narayana11.1 Introduction 16611.2 FMCW Principle 16811.3 Results 17411.4 Conclusion 178References 17912 A HIGHLY INTEGRATED CMOS RF T XUsed for IEEE 802.15.4 181Dayadi Lakshmaiah, Subbarao, C.H. Sunitha, Nookala Sairam and S. Naresh12.1 Introduction 18212.2 Related Work 18212.3 Simulation Results and Discussion 18512.4 Conclusion 186References 18713 A NOVEL FEEDFORWARD OFFSET CANCELLATION LIMITING AMPLIFIER IN RADIO FREQUENCIES 189Dayadi Lakshmaiah, L. Koteswara Rao, I. Satya Narayana, B. Rajeshwari and I. Venu13.1 Introduction 19013.2 Hardware Design 19013.2.1 Limiting Amplifier 19013.2.2 Offset Extractor 19213.2.3 Architecture and Gain 19213.2.4 Quadrature Detector 19213.2.5 Sensitivity 19413.3 Experimental Results 19513.4 Conclusion 195References 19614 A SECURED NODE AUTHENTICATION AND ACCESS CONTROL MODEL FOR IOT SMART HOME USING DOUBLE-HASHED UNIQUE LABELED KEY-BASED VALIDATION 199Sulaima Lebbe Abdul Haleem14.1 Introduction 20014.2 Challenges in IoT Security and Privacy 20314.2.1 Heterogeneous Communication and Devices 20314.2.2 Physical Equipment Integration 20414.2.3 Resource Handling Limitations 20414.2.4 Wide Scale 20414.2.5 Database 20414.3 Background 20914.4 Proposed Model 21014.4.1 Communication Flow 21414.4.1.1 IoT Node and Registration Authority 21414.4.1.2 User and Local Authorization Authority 21514.5 Results 21514.6 Conclusion 21814.7 Claims 218References 219Index 221
Battery-less NFC Sensors for the Internet of Things
The implementation of near-field communication (NFC) technology in smartphones has grown rapidly, especially due to the use of this technology as a payment system. In addition, the ability to use the energy transmitted not only for communication, but also for feeding other devices, which together with the low cost of NFC chips and the internet connectivity of the smartphones, allows the design of battery-less RF tags with sensing capabilities, whose information can be sent to the cloud. This is of great interest in the increasing amount of IoT (Internet of Things) scenarios.This book studies the feasibility of these sensors, analyzing the different parameters that have an influence on performance and in the range of operation. It also presents techniques to increase the range and analyzes the effects of certain materials when they are close to the antenna. The design and analysis of several sensors that can be powered and read by any NFC enabled device are presented in this work.MARTÍ BOADA is a postdoctoral researcher in the Department of Electronic, Electric and Automatic Engineering (URV), Tarragona, Spain, and has a PhD in telecommunication engineering.ANTONIO LAZARO is a full-time professor in the Department of Electronic, Electric and Automatic Engineering (URV), Tarragona, Spain, and has a PhD in telecommunication engineering.DAVID GIRBAU is a full-time professor in the Department of Electronic, Electric and Automatic Engineering (URV), Tarragona, Spain, and has a PhD in telecommunication engineering.RAMÓN VILLARINO is an assistant professor in the Department of Electronic, Electric and Automatic Engineering (URV), Tarragona, Spain, and has a PhD in telecommunication engineering.1. Wireless Power Transfer Applied to NFC2. Case Study 1: Soil Moisture Sensor3. Case Study 2: Smart Diaper4. Case Study 3: NFC Sensor for pH Monitoring5. Case Study 4: Fruit Ripeness Sensor
Data Science Handbook
DATA SCIENCE HANDBOOKTHIS DESK REFERENCE HANDBOOK GIVES A HANDS-ON EXPERIENCE ON VARIOUS ALGORITHMS AND POPULAR TECHNIQUES USED IN REAL-TIME IN DATA SCIENCE TO ALL RESEARCHERS WORKING IN VARIOUS DOMAINS.Data Science is one of the leading research-driven areas in the modern era. It is having a critical role in healthcare, engineering, education, mechatronics, and medical robotics. Building models and working with data is not value-neutral. We choose the problems with which we work, make assumptions in these models, and decide on metrics and algorithms for the problems. The data scientist identifies the problem which can be solved with data and expert tools of modeling and coding.The book starts with introductory concepts in data science like data munging, data preparation, and transforming data. Chapter 2 discusses data visualization, drawing various plots and histograms. Chapter 3 covers mathematics and statistics for data science. Chapter 4 mainly focuses on machine learning algorithms in data science. Chapter 5 comprises of outlier analysis and DBSCAN algorithm. Chapter 6 focuses on clustering. Chapter 7 discusses network analysis. Chapter 8 mainly focuses on regression and naive-bayes classifier. Chapter 9 covers web-based data visualizations with Plotly. Chapter 10 discusses web scraping.The book concludes with a section discussing 19 projects on various subjects in data science.AUDIENCEThe handbook will be used by graduate students up to research scholars in computer science and electrical engineering as well as industry professionals in a range of industries such as healthcare.KOLLA BHANU PRAKASH, PHD, is a Professor and Research Group Head for A.I. & Data Science Research group at K L University, India. He has published more than 80 research papers in international and national journals and conferences, as well as authored/edited 12 books and seven patents. His research interests include deep learning, data science, and quantum computing.Acknowledgment xiPreface xiii1 DATA MUNGING BASICS1 Introduction 11.1 Filtering and Selecting Data 61.2 Treating Missing Values 111.3 Removing Duplicates 141.4 Concatenating and Transforming Data 161.5 Grouping and Data Aggregation 20References 202 DATA VISUALIZATION 232.1 Creating Standard Plots (Line, Bar, Pie) 262.2 Defining Elements of a Plot 302.3 Plot Formatting 332.4 Creating Labels and Annotations 382.5 Creating Visualizations from Time Series Data 422.6 Constructing Histograms, Box Plots, and Scatter Plots 44References 543 BASIC MATH AND STATISTICS 573.1 Linear Algebra 573.2 Calculus 583.2.1 Differential Calculus 583.2.2 Integral Calculus 583.3 Inferential Statistics 603.3.1 Central Limit Theorem 603.3.2 Hypothesis Testing 603.3.3 ANOVA 603.3.4 Qualitative Data Analysis 603.4 Using NumPy to Perform Arithmetic Operations on Data 613.5 Generating Summary Statistics Using Pandas and Scipy 643.6 Summarizing Categorical Data Using Pandas 683.7 Starting with Parametric Methods in Pandas and Scipy 843.8 Delving Into Non-Parametric Methods Using Pandas and Scipy 873.9 Transforming Dataset Distributions 91References 944 INTRODUCTION TO MACHINE LEARNING 974.1 Introduction to Machine Learning 974.2 Types of Machine Learning Algorithms 1014.3 Explanatory Factor Analysis 1144.4 Principal Component Analysis (PCA) 115References 1215 OUTLIER ANALYSIS 1235.1 Extreme Value Analysis Using Univariate Methods 1235.2 Multivariate Analysis for Outlier Detection 1255.3 DBSCan Clustering to Identify Outliers 127References 1336 CLUSTER ANALYSIS 1356.1 K-Means Algorithm 1356.2 Hierarchial Methods 1416.3 Instance-Based Learning w/ k-Nearest Neighbor 149References 1567 NETWORK ANALYSIS WITH NETWORKX 1577.1 Working with Graph Objects 1597.2 Simulating a Social Network (ie; Directed Network Analysis) 1637.3 Analyzing a Social Network 169References 1718 BASIC ALGORITHMIC LEARNING 1738.1 Linear Regression 1738.2 Logistic Regression 1838.3 Naive Bayes Classifiers 189References 1959 WEB-BASED DATA VISUALIZATIONS WITH PLOTLY 1979.1 Collaborative Aanalytics 1979.2 Basic Charts 2089.3 Statistical Charts 2129.4 Plotly Maps 216References 21910 WEB SCRAPING WITH BEAUTIFUL SOUP 22110.1 The BeautifulSoup Object 22410.2 Exploring NavigableString Objects 22810.3 Data Parsing 23010.4 Web Scraping 23310.5 Ensemble Models with Random Forests 235References 254DATA SCIENCE PROJECTS 25711 COVID19 DETECTION AND PREDICTION 259Bibliography 27512 LEAF DISEASE DETECTION 277Bibliography 28313 BRAIN TUMOR DETECTION WITH DATA SCIENCE 285Bibliography 29514 COLOR DETECTION WITH PYTHON 297Bibliography 30015 DETECTING PARKINSON’S DISEASE 301Bibliography 30216 SENTIMENT ANALYSIS 303Bibliography 30617 ROAD LANE LINE DETECTION 307Bibliography 31518 FAKE NEWS DETECTION 317Bibliography 31819 SPEECH EMOTION RECOGNITION 319Bibliography 32220 GENDER AND AGE DETECTION WITH DATA SCIENCE 323Bibliography 33921 DIABETIC RETINOPATHY 341Bibliography 35022 DRIVER DROWSINESS DETECTION IN PYTHON 351Bibliography 35623 CHATBOT USING PYTHON 357Bibliography 36324 HANDWRITTEN DIGIT RECOGNITION PROJECT 365Bibliography 36825 IMAGE CAPTION GENERATOR PROJECT IN PYTHON 369Bibliography 37926 CREDIT CARD FRAUD DETECTION PROJECT 381Bibliography 39127 MOVIE RECOMMENDATION SYSTEM 393Bibliography 41128 CUSTOMER SEGMENTATION 413Bibliography 43129 BREAST CANCER CLASSIFICATION 433Bibliography 44330 TRAFFIC SIGNS RECOGNITION 445Bibliography 453
Modern C Up and Running
Learn how to program in modern C, from the basics through the advanced topics required for proficiency. This book is the fastest path to C fluency for anyone experienced in a general-purpose programming language. From start to finish, code examples highlight the idioms and best practices behind efficient, robust programs in a variety of areas.The book opens with a thorough coverage of syntax, built-in data types and operations, and program structure. C has quirks and presents challenges, which are covered in detail. The coverage of advanced features is what sets this book apart from others. Among the advanced topics covered are floating-point representation in the IEEE 754 standard; embedded assembly language in C code for overflow detection; regular expressions, assertions, and internationalization; WebAssembly through C; and software libraries for C and other clients.Memory efficiency and safety are the two major challenges in C programming, and you’ll explore these challenges through a series of C examples. Arrays and structures, which are the means to high-level data representation, are covered in connection with pointers, which provide efficiency. The book again uses code examples in covering networking and wire-level security; concurrency (multiprocessing and multithreading); instruction-level parallelism; and interprocess communication through shared memory and files, pipes, message queues, and signals.Many books introduce C, but few also explain how to use it properly and optimally. Essential C does just that.WHAT YOU'LL LEARN* Accelerate your path to C mastery with this book for experienced programmers* Refresh your approach to program structure and data types* Dive into aggregates and pointers using modern C language* Revisit storage classes and scope* Dive into concurrency (multiprocessing and multithreading) and instruction-level parallelism* Finish with regular expressions, assertions, signals, locales and moreWHO THIS BOOK IS FORProfessional programmers or software developers who has prior experience with C or in general wanting an accelerated learning guide to modern C programming language.Martin Kalin has a Ph.D. from Northwestern University and is a professor in the College of Computing and Digital Media at DePaul University. He has co-written a series of books on C and C++ and written a book on Java for programmers. He enjoys commercial programming and has co-developed large distributed systems in process scheduling and product configuration.1. Program Structure2. Basic Data Types3. Aggregates and Pointers4. Storage Classes5. Input and Output6. Networking7. Concurrency and Parallelism8. Miscellaneous Topics
Generic Multi-Agent Reinforcement Learning Approach for Flexible Job-Shop Scheduling
The production control of flexible manufacturing systems is a relevant component that must go along with the requirements of being flexible in terms of new product variants, new machine skills and reaction to unforeseen events during runtime. This work focuses on developing a reactive job-shop scheduling system for flexible and re-configurable manufacturing systems. Reinforcement Learning approaches are therefore investigated for the concept of multiple agents that control products including transportation and resource allocation.ABOUT THE AUTHORSCHIRIN BÄR researched at the RWTH-Aachen University at the Institute for Information Management in Mechanical Engineering (IMA) on the optimization of production control of flexible manufacturing systems using reinforcement learning. As operations manager and previously as an engineer, she developed and evaluated the research results based on real systems. Introduction.- Requirements for Production Scheduling in Flexible Manufacturing.- Reinforcement Learning as an Approach for Flexible Scheduling.- Concept for Multi-Resources Flexible Job-Shop Scheduling.- Multi-Agent Approach for Reactive Scheduling in Flexible Manufacturing.- Empirical Evaluation of the Requirements.- Integration into a Flexible Manufacturing System.- Bibliography.