Computer und IT
Industrial Vision Systems with Raspberry Pi
Today’s industries are faced with a growing demand for vision systems due to their non-invasive characteristics in inspecting product quality. These systems identify surface defects and faults, and verify components’ orientation and their measurements, etc. This book explores the vision techniques needed to design and develop your own industrial vision system with the help of Raspberry Pi.You’ll start by reviewing basic concepts and applications of machine vision systems, followed by the preliminaries of Python, OpenCV, required libraries, and installing OpenCV for Python on Raspberry Pi. These are used when implementing image processing for the system applications. You’ll then look at interfacing techniques and some of the challenges industrial vision systems encounter, such as lighting and camera angles.Algorithms and image processing techniques are also discussed, along with machine learning and deep learning techniques. Later chapters explain the use of GUI apps and real-time applications of Industrial vision systems. Each chapter concludes with examples and demo implementations to facilitate your knowledge of the concepts.By the end of the book, you’ll be able to build and deploy computer vision applications with Python, OpenCV, and Raspberry Pi.WHAT YOU'LL LEARN* Build and deploy industrial vision system using Raspberry Pi and Python programming* Explore computer vision techniques using Raspberry Pi and OpenCV* Implement popular vision techniques for industrial applications in real time* Review modern image processing techniques such as image segmentation, thresholding, and contoursWHO THIS BOOK IS FORRaspberry Pi and Python enthusiasts interested in computer vision applications; educators, industrialists, and industrial solution providers who want to design vision-based testing products with the help of Raspberry PiDR. K. MOHAIDEEN ABDUL KADHAR completed his Undergraduate degree in Electronics and Communication Engineering and his M.Tech with a specialization in Control and Instrumentation in 2005. In 2015, he obtained a Ph.D. in Control System Design using evolutionary algorithms. He has more than 16 years of experience in teaching and research. His area of interests includes Robust control systems, Optimization techniques, computer vision and image processing, data science, python programming, and working with Raspberry Pi boards. He is currently developing customized industrial vision systems for various industrial requirements. He has been a consultant for several industries in developing machine vision systems for industrial applications, a master trainer, and delivered workshops in the control systems, computer vision, image processing, optimization techniques, data science and Python programming.G. ANAND completed his Undergraduate degree in Electronics and Communication Engineering in 2008 and his Postgraduate Degree (M.E) in Communication Systems in 2011. He has more than 10 years of experience in teaching and research. His areas of interest include Signal Processing, Image processing, Vision system, Python programming, Data science, and Machine Learning. He has also delivered workshops in signal processing, image processing and python programming.Chapter 1: Introduction to Industrial Vision Systems.- Chapter 2: Raspberry Pi and required software.- Chapter 3: OpenCV - Python.- Chapter 4: Challenges in Industrial Vision Systems.- Chapter 5: Image Processing using OpenCV.- Chapter 6: Graphical User Interface with OpenCV and tkinter.- Chapter 7: Feature Detection and Matching.- Chapter 8: Image segmentation.- Chapter 9: Optical Character Recognition.- Chapter 10: Machine learning techniques for vision applications.- Chapter 11: Industrial Vision system Applications.
Sensor Projects with Raspberry Pi
Use Python to develop Rasperry Pi projects to solve common digital image processing and IoT problems. Using a free IoT server you’ll tackle fundamental topics and concepts behind theses two areas. This second edition includes new content on Artificial Intelligence and updated sensor guidance to help you better explore virtual animations, create a homemade spectrometer, and master object classification with Edge Impulse.Start by creating a system to detect movement with a PIR motion sensor and a Raspberry Pi board. Use the MQ2 gas sensor and a Raspberry Pi board as a gas leak alarm system to detect dangerous explosive and fire hazards. Then train your system to send the captured data to the remote server ThingSpeak. You’ll also develop a weather station with your Raspberry Pi. Using the DHT11 (humidity and temperature sensor) and BMP (barometric pressure and temperature sensor) in conjunction with ThingSpeak and X, you can receive real time weather alerts from your own meterological system!Spectral sensers used with the Raspberry Pi include the AS7262 (six colors), and AS7263 (near infrared) for the construction of a filter spectrometer, sensing colored solutions, and assessing plant foliage health. Finally, expand your skills into the popular machine learning world of digital image processing using OpenCV and a Pi. Make your own object classifiers and finally manipulate an object by means of an image in movement. This skillset has many applications, ranging from recognizing people or objects, to creating your own video surveillance system.With the skills gained from _Sensor Projects with Raspberry Pi_, you'll be well-equipped to explore other applications in mobile development and electrical engineering as well.WHAT YOU'LL LEARN* Work with ThingSpeak to receive X alerts from your systems.* Cultivate skills in processing sensor inputs that are applicable to mobile and machine learning projects.* Incorporate sensors into projects to make interactive devices.* Experiment with virtual scenarios and objects.* Create Python and Pygame games that contain virtual scenarios and animations.* Detect colored solutions and assess the plant foliage health.WHO THIS BOOK IS FORHobbyists and makers working with robotics and IoT. Electronic engineers and programmers who would like to expand their familiarity with basic sensor projects.GUILLERMO GUILLEN is an Electronics and Communications Engineer, and Military Engineer. He has worked on CITIZEN and Government projects. GUILLERMOis the winner of “Make with Ada 2018-19” and several other contests. In addition to this book, he has written over 40 articles about the research, design, development and testing of the electronic equipment used in various systems. He currently works as a micro entrepreneur. You can find more information at www.guillengap.com.Chapter 1. Theoretical Fundamentals.- Chapter 2. Alarm System.- Chapter 3. Gas Leak Alarm.- Chapter 4. Weather Station.- Chapter 5. Digital Image Processing with Python and OpenCV. - Chapter 6. Animations With Python And Pygame.- Chapter 7.- Homemade Spectrometer.- Chapter 8.- Object Classification Using Edge Impulse on Raspberry Pi.
Effektive Softwarearchitekturen
- Aktueller Überblick und methodische Einführung - Direkt umsetzbare Tipps für praktizierende Softwarearchitekten - Ideal zur Vorbereitung auf die Zertifizierung zum «Certified Professional for Software Architecture™» (Foundation Level) des iSAQB - Praxisnahe Darstellung von Architekturstilen und -mustern, ausführliche technische Konzepte, NoSQL-Datenbanken sowie aktualisierte und erweiterte Beispielarchitekturen - Neu in der 7. Auflage: Evolution und Verbesserung bestehender Systeme - Detaillierte Beispiele zum Einsatz von arc42 - Extra: E-Book inside Softwarearchitekten müssen komplexe fachliche und technische Anforderungen an IT-Systeme umsetzen, und sie müssen diese Systeme durch nachvollziehbare Strukturen flexibel und erweiterbar gestalten. Dieser Praxisleitfaden zeigt Ihnen, wie Sie Softwarearchitekturen effektiv und systematisch entwickeln können. Gernot Starke unterstützt Sie mit praktischen Tipps, Architekturmustern und seinen Erfahrungen. Sie finden Antworten auf zentrale Fragen: - Welche Aufgaben haben Softwarearchitekten? - Wie gehe ich beim Entwurf vor? - Wie kommuniziere und dokumentiere ich Softwarearchitekturen? - Wie helfen Architekturstile und -muster? - Wie bewerte ich Softwarearchitekturen? - Wie behandle ich Persistenz, grafische Benutzeroberflächen, Geschäftsregeln, Integration, Verteilung, Sicherheit, Fehlerbehandlung, Business-Process-Management, Microservices und sonstige technische Konzepte? - Was müssen Softwarearchitekten über NoSQL, Domain-Driven-Design und arc42 wissen? - Wie verbessere ich bestehende Systeme? AUS DEM INHALT // Vorgehen bei der Architekturentwicklung // Architekturmuster und -stile // Technische Konzepte // SOA und Enterprise-IT-Architektur // Architekturbewertung // Dokumentation von Architekturen // Modellierung für Softwarearchitekten // Werkzeuge für Softwarearchitekten // Beispiele realer Softwarearchitekturen // iSAQB Curriculum
Cybersecurity in Context
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.”—JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.”—BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them BackTHE FIRST-EVER INTRODUCTION TO THE FULL RANGE OF CYBERSECURITY CHALLENGESCybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field. CHRIS JAY HOOFNAGLE is Professor of Law in Residence at the University of California, Berkeley, where he has taught since 2006. He has published extensively on cybersecurity law and related subjects, and is a practicing attorney with venture law firm Gunderson Dettmer, as well as an advisor to multiple defense and intelligence technology companies. GOLDEN G. RICHARD III is Professor of Computer Science and Director of the Cyber Center at Louisiana State University. He is a Fellow of the American Academy of Forensic Sciences with over thirty years of experience in teaching cybersecurity and related topics in computer science. His primary areas of expertise are in memory forensics, digital forensics, malware analysis, reverse engineering, and systems programming. About the Authors xiiiPreface xvAcknowledgments xixAbout the Companion Website xxiIntroduction xxiiiI WHAT IS CYBERSECURITY?1 WHAT IS CYBERSECURITY? 31.1 What Is the Cyber in Cybersecurity? 51.1.1 Cyberspace’s Places and the Problem of Internet Sovereignty 81.2 What Is the Security in Cybersecurity? The “CIA” Triad 121.2.1 The Internet’s Threat Model 151.2.2 Computer Security Versus “Cybersecurity” 191.2.3 Security, Innovation, “Hacking” 231.2.4 Security from a Private Sector Perspective 241.2.5 Building on the CIA Triad 261.2.6 Cybersecurity Definitions 271.3 Encryption Is Critical in Cybersecurity 281.3.1 Modern Cryptosystems 291.3.2 Hashing 331.4 Cyberpower: How Insecurity Empowers and Undermines Nations 371.5 Is Disinformation a Cybersecurity Concern? 401.5.1 From Information Scarcity to Glut 411.5.2 The Power of Influence Campaigns on the Internet 431.5.3 Libicki’s Disinformation Framework 461.5.4 The US Approach: Free Speech First 481.5.5 Election Interference 501.5.6 Is There Really Reason to Be Concerned? 531.6 International Views 551.7 Conclusion: A Broad Approach 572 TECHNOLOGY BASICS AND ATTRIBUTION 592.1 Technology Basics 602.1.1 Fundamentals 602.1.2 Reliance Is a Fundamental Element of Computing and the Internet 662.1.3 Internet Layers 682.1.4 Cybersecurity Depends on Generations of Legacy Technologies 772.1.5 “Controlling” the Internet 842.1.6 Why Not Start Over? 852.2 Attribution 862.2.1 Types of Attribution 912.2.2 Attribution Process 922.2.3 Don’t Be Surprised: Common Dynamics in Attribution 1032.2.4 The Future of Attribution 1062.3 Conclusion: An End to Anonymity? 108II CYBERSECURITY’S CONTOURS3 ECONOMICS AND THE HUMAN FACTOR 1113.1 Economics of Cybersecurity 1123.1.1 Asymmetry and the Attack/Defense Balance 1163.1.2 Incentive “Tussles” 1183.2 The People Shaping Internet Technology and Policy 1203.2.1 Tragedies of the Un- managed Commons 1243.3 The Human Factor— The Psychology of Security 1273.3.1 Attackers as Behavioral Economists 1273.3.2 Institutions as Rational Choice Economists 1303.3.3 User Sophistication 1343.3.4 The Role of Emotion and the Body 1363.3.5 Security as Afterthought 1383.3.6 RCT: The User View 1383.4 Conclusion 1404 THE MILITARY AND INTELLIGENCE COMMUNITIES 1414.1 Why Cybersecurity Is Center Stage 1444.2 Are Cyberattacks War? 1484.2.1 Cyber War Will Not Take Place 1484.2.2 Cyber War Is Coming 1534.2.3 The Law of War 1554.2.4 Cyber Realpolitik 1624.3 Computers and the Future of Conflict 1654.3.1 The Changing Nature of Conflict 1664.4 Cybersecurity and the Intelligence Community 1764.4.1 The Intelligence Community 1784.4.2 The Power of the Platform 1874.4.3 The Vulnerabilities Equities Process 1894.4.4 Cyber Soldiers and/or Cyber Spies? 1934.5 Conclusion 1955 CYBERSECURITY THEORY 1975.1 Deterrence Theory 1985.1.1 Deterrence Theory Contours 1995.1.2 Deterring with Entanglement and Norms 2075.1.3 Cyber “Power” 2095.1.4 The Deterrence Theory Critique 2135.2 Security Studies: Anarchy, Security Dilemma, and Escalation 2155.2.1 Anarchy 2155.2.2 The Security Dilemma 2165.2.3 Escalation and the Security Dilemma 2185.2.4 Securitization: Nissenbaum Revisited 2225.2.5 The Problem of Referent Object 2235.2.6 Nissenbaum’s Alternative Vision: Cyberattacks Are Just Crimes 2245.2.7 A Response to Nissenbaum: Strategic Risks Do Exist 2255.3 Economic Theory: The Tragedy of the Cybersecurity Commons 2265.3.1 The Free Problem 2275.4 The Public Health Approach 2305.5 Gerasimov and “Hybrid War:” Information Domain Revisited 2335.5.1 The US Reaction 2355.6 Barlowism as Theory 2375.6.1 Technology Utopianism: The Internet as Democratizing 2375.6.2 Utopia as No Place, But as Organic 2425.6.3 High Modernism and Authoritarian High Modernism 2435.7 Conclusion 246III CYBERSECURITY LAW AND POLICY6 CONSUMER PROTECTION LAW 2496.1 Federal Trade Commission Cybersecurity 2506.1.1 FTC’s Legal Authority 2526.1.2 Unfairness 2546.1.3 Deception 2576.1.4 The Zoom Case— Complaint 2586.1.5 The Zoom Case— Settlement 2626.2 FTC Adjacent Cybersecurity 2676.2.1 The Attorneys General 2676.2.2 Self- regulation 2686.2.3 Product Recalls 2706.3 The Limits of the Consumer Protection Approach 2716.3.1 Two Litigation Moats: Standing and Economic Loss 2726.3.2 The Devil in the Beltway 2756.4 Conclusion 2797 CRIMINAL LAW 2817.1 Computer Crime Basics 2827.2 Computer Crime Incentive Contours 2837.3 The Political/Economic Cyber Enforcement Strategy 2877.4 Cybercrime’s Technical Dependencies 2917.5 The Major Substantive Computer Crime Laws 2937.5.1 Identity Theft 2947.5.2 The Computer Fraud and Abuse Act (CFAA) 2977.5.3 Other Computer Crime Relevant Statutes 3097.5.4 Digital Abuse 3117.6 High- Level Investigative Procedure 3127.6.1 Investigative Dynamics 3127.6.2 Investigative Process 3177.6.3 Obtaining the Data 3177.6.4 Stored Communications, Metadata, Identity, and “Other” 3187.7 Live Monitoring 3247.7.1 International Requests and the CLOUD Act 3267.7.2 National Security Access Options 3297.8 Conclusion 3328 CRITICAL INFRASTRUCTURE 3338.1 What Is “Critical Infrastructure” 3368.2 Political Challenges in Securing Critical Infrastructure 3418.3 Cyber Incident Reporting for Critical Infrastructure Act of 2022 3438.4 Technical Dynamics 3458.4.1 What Does CI Designation Mean 3458.5 NIST Cybersecurity Framework 3468.5.1 NIST Broken Down 3468.5.2 Electricity and Cybersecurity 3488.6 Alternative Approaches to the NIST Cybersecurity Framework 3518.6.1 Assessments and Audits— They’re Different 3528.6.2 Requirements- based Standards 3528.6.3 Process- Based and Controls- Based Standards 3548.6.4 Privacy != Security 3568.6.5 Standards Critiques 3578.7 The Other CISA— Cybersecurity Information Sharing Act of 2015 3588.7.1 Information- sharing Theory 3588.7.2 Information- Sharing Practice 3608.7.3 Provisions of CISA (the Act) 3628.8 Conclusion 3659 INTELLECTUAL PROPERTY RIGHTS 3679.1 IPR Problems: Context 3689.1.1 IP Threats 3699.1.2 Apt1 3719 2 Protection of Trade Secrets 3739.2.1 Reasonable Measures for Protecting Trade Secrets 3749.2.2 Rights Under the DTSA 3759.2.3 The Electronic Espionage Act (EEA) 3789.3 Copyright and Cybersecurity 3799.3.1 The DMCA and Critical Lessons for Software Testing 3859.4 Online Abuse and IP Remedies 3859.4.1 Public Law Remedies for Abuse 3879.4.2 Private Law Remedies for Abuse 3929 5 Conclusion 39210 THE PRIVATE SECTOR 39310.1 There Will Be Blood: Risk and Business Operations 39410.2 The Politics of Sovereignty 39710.2.1 Homo Economicus Meets North Korea 40010.2.2 Technological Sovereignty 40210.2.3 Committee on Foreign Investment in the United States 40410.2.4 Data Localization 40510.2.5 Export Control 40610.3 The APT Problem 40710.4 The Security Breach Problem 41110.4.1 Trigger Information 41310.4.2 What Is an Incident? What Is a Breach? 41410.4.3 Notification Regimes 41510.4.4 Does Security Breach Notification Work? 42010.5 Hacking Back: CISA (The Statute) Revisited 42110.6 The Special Case of Financial Services 42510.6.1 Gramm Leach Bliley Act (GLBA) 42510.7 Publicly Traded Companies and Cybersecurity 43010.7.1 Material Risks and Incidents 43110.7.2 SEC Enforcement 43210.7.3 The Board of Directors 43410.8 Cybersecurity Insurance 43710.8.1 Insurer Challenges 43810.8.2 Buying Insurance 43910.9 Conclusion 440IV CYBERSECURITY AND THE FUTURE11 CYBERSECURITY TUSSLES 44311.1 A Public Policy Analysis Method 44411.2 Software Liability: Should Developers Be Legally Liable for Security Mistakes? 44611.3 Technical Computer Security Versus Cybersecurity Revisited 44911.3.1 The Criminal Law Alternative 45011.3.2 The Consumer Law Approach 45111.3.3 The Industrial Policy Approach 45111.4 Encryption and Exceptional Access 45311.5 Disinformation Revisited 45711.5.1 Racist Speech and Cybersecurity 46011.5.2 What Expectations About Disinformation Are Reasonable? 46111.6 Conclusion 46112 CYBERSECURITY FUTURES 46312.1 Scenarios Methods 46412.2 Even More Sophisticated Cyberattacks 46512.3 Quantum Computing 46612.4 Automaticity and Autonomy: Artificial Intelligence and Machine Learning 46712.5 The Data Trade and Security 47012.6 The Sovereign Internet 47112.7 Outer Space Cyber 47312.8 Classification Declassed 47512.9 Attribution Perfected or Not 47612.10 Conclusion 476V FURTHER READING AND INDEXFurther Reading 481Index 495
Nonlinear Dispersive Waves
Preface.- BOUNDARY VALUE PROBLEMS RELATED TO THE MUSKAT PROBLEM.- SOME FLOW CHARACTERISTICS OF STOKES WAVES VIA COMPLEX ANALYSIS.- RECOVERY OF TRAVELING WATER WAVES WITH SMOOTH VORTICITY FROM THE HORIZONTAL VELOCITY ON A LINE OF SYMMETRY FOR VARIOUS WAVE REGIMES.- NUMERICAL COMPUTATION OF STEADY ROTATIONAL WAVES AND RECOVERY OF THE SURFACE PROFILE FROM BOTTOM PRESSURE MEASUREMENTS.- Hamiltonian models for the propagation of long gravity waves, higher-order KdV-type equations and integrability.- An introduction to the Zakharov equation for modelling deep water waves.- Rotating convection and flows with horizontal kinetic energy backscatter.- Flexural-gravity waves under ice plates and related flows.- Nonlinear water waves and wave-current interactions at arbitrary latitude.- HOLLOW VORTICES AS NONLINEAR WAVES.- SPHERICAL COORDINATES FOR ARCTIC OCEAN FLOWS.
Mathematical Models Using Artificial Intelligence for Surveillance Systems
THIS BOOK GIVES COMPREHENSIVE INSIGHTS INTO THE APPLICATION OF AI, MACHINE LEARNING, AND DEEP LEARNING IN DEVELOPING EFFICIENT AND OPTIMAL SURVEILLANCE SYSTEMS FOR BOTH INDOOR AND OUTDOOR ENVIRONMENTS, ADDRESSING THE EVOLVING SECURITY CHALLENGES IN PUBLIC AND PRIVATE SPACES.Mathematical Models Using Artificial Intelligence for Surveillance Systems aims to collect and publish basic principles, algorithms, protocols, developing trends, and security challenges and their solutions for various indoor and outdoor surveillance applications using artificial intelligence (AI). The book addresses how AI technologies such as machine learning (ML), deep learning (DL), sensors, and other wireless devices could play a vital role in assisting various security agencies. Security and safety are the major concerns for public and private places in every country. Some places need indoor surveillance, some need outdoor surveillance, and, in some places, both are needed. The goal of this book is to provide an efficient and optimal surveillance system using AI, ML, and DL-based image processing. The blend of machine vision technology and AI provides a more efficient surveillance system compared to traditional systems. Leading scholars and industry practitioners are expected to make significant contributions to the chapters. Their deep conversations and knowledge, which are based on references and research, will result in a wonderful book and a valuable source of information. PADMESH TRIPATHI, PHD, completed his Ph.D. from Sharda University, Greater Noida, UP, India. Currently, Dr Tripathi is working as Professor of Mathematics in Department of AIDS at Delhi Technical Campus, Greater Noida, UP, India. He has more than 23 years of teaching experience, published 22 papers/book chapters in reputed journals/publishers and 4 Indian innovation patents. His research areas include Data Science, Machine Learning, Inverse Problems, Optimization, Signal/Image Processing, etc. Dr Tripathi has been listed in lifetime achievement by Marquis Who's Who and received the best academician of 2021 award from SEMS Foundation, Noida, India. Dr Tripathi has been associated with several reputed publishers like IGI Global, Wiley-Scrivener, Taylor & Francis, Elsevier, Springer, Inderscience, etc. in various roles like author, reviewer, editor, guest editor, etc. Dr Tripathi received grants from prestigious institutes like Cambridge University, UK; University of California at Los Angeles, USA; INRIA, Sophia Antipolis, France; University of Eastern Finland, Kuopio, Finland; RICAM, Linz, Austria, etc and visited these places.MRITUNJAY RAI, PHD, has completed his Ph.D. in Thermal imaging applications in the department of Electrical Engineering from IIT-ISM Dhanbad, Master of Engineering (with distinction) in Instrumentation and Control from Birla Institute of Technology-Mesra, Ranchi, and B.Tech in ECE from Shri Ramswaroop Memorial College of Engineering and Management, Lucknow. Currently, Dr. Rai is working as Assistant Professor in Shri Ramswaroop Memorial University, Barabanki, U.P., India. Dr. Rai has more than 12 years of working experience in research as well as academics. In addition, he has guided several UG and PG projects. He has published many research articles in reputed journals published by Springer, Elsevier, IEEE, Inderscience, and MECS. He has contributed many chapters to books published by Intech Open Access, CRC, IGI Global, and Elsevier. He is an editor of books (edited) published by reputed publishers Wiley, AAP, NOVA & IGI, He is an active reviewer and has reviewed many research papers in journals and at international and national conferences. His areas of interest lie in image processing, speech processing, artificial intelligence, machine learning, deep learning, Intelligent Traffic Monitoring System, the Internet of Things (IoT), and robotics and automation.NITENDRA KUMAR, PHD, an accomplished scholar with a PhD in Mathematics from Sharda University and a master’s degree in mathematics and Statistics from Dr. Ram Manohar Lohia Avadh University, boasts over a decade of expertise as an Assistant Professor at Amity Business School, Amity University, Noida. His diverse research interests encompass Wavelets and its Variants, Data Mining, Inverse Problems, Epidemic Modelling, Fractional Derivatives Business Analytics, and Statistical Methods, reflecting a profound commitment to advancing knowledge across multiple domains. Dr. Kumar's prolific contributions to academia are evidenced by his extensive publication record, comprising over 30 research papers in esteemed journals, 16 book chapters, and 12 authored books on engineering mathematics, computation, and Business Analytics and related topics. Notably, his scholarly impact extends beyond traditional research avenues, as evidenced by his involvement in patenting two innovative solutions. Beyond his individual achievements, Dr. Kumar actively engages with the academic community, serving as editor for two edited books and as Guest Editor for reputable journals like the Journal of Information and Optimization Sciences, Journal of Statistical and Management Sciences, and Environment and Social Psychology. His editorial roles underscore his dedication to fostering intellectual discourse and shaping the trajectory of scholarly inquiry. Dr Nitendra Kumar epitomizes academic excellence, blending profound expertise with a steadfast commitment to advancing mathematical knowledge and its interdisciplinary applications.SANTOSH KUMAR, PHD, is Assistant Professor in the Department of Mathematics, Sharda School of Basic Sciences and Research, Sharda University, Greater Noida, India. He obtained his Ph.D. degree from Aligarh Muslim University Aligarh, in 2016. He is actively involved in the research areas, namely nonlinear partial differential equations, diffusion models, wavelet transform, mathematical modeling, image processing, etc. He has taught undergraduate subjects such as linear algebra, differential equations, complex analysis, advanced calculus, and probability and statistics. He has taught real analysis, topology, functional analysis, partial differential equations, and many more at the post-graduation level. Besides attending, presenting scientific papers, delivering invited talks, and chairing sessions at national/international conferences and seminars, he has organized several workshops and conferences as an organizing secretary. He has published many research papers in reputed national and international journals and book chapters published in an edited book published by international publishers. He is also reviewer of many reputed journals.Preface xv1 Elevating Surveillance Integrity-Mathematical Insights into Background Subtraction in Image Processing 1S. Priyadharsini2 Machine Learning and Artificial Intelligence in the Detection of Moving Objects Using Image Processing 19K. Janagi, Devarajan Balaji, P. Renuka and S. Bhuvaneswari3 Machine Learning and Imaging-Based Vehicle Classification for Traffic Monitoring Systems 51Parthiban K. and Eshan Ratnesh Srivastava4 AI-Based Surveillance Systems for Effective Attendance Management: Challenges and Opportunities 69Pallavi Sharda Garg, Samarth Sharma, Archana Singh and Nitendra Kumar5 Enhancing Surveillance Systems through Mathematical Models and Artificial Intelligence: An Image Processing Approach 91Tarun Kumar Vashishth, Vikas Sharma, Bhupendra Kumar, Kewal Krishan Sharma, Sachin Chaudhary and Rajneesh Panwar6 A Study on Object Detection Using Artificial Intelligence and Image Processing—Based Methods 121Vidushi Nain, Hari Shankar Shyam, Nitendra Kumar, Padmesh Tripathi and Mritunjay Rai7 Application of Fuzzy Approximation Method in Pattern Recognition Using Deep Learning Neural Networks and Artificial Intelligence for Surveillance 149M. Geethalakshmi, Sriram V. and Vakkalagadda Drishti Rao8 A Deep Learning System for Deep Surveillance 169Aman Anand, Rajendra Kumar, Nikita Verma, Akash Bhasney and Namita Sharma9 Study of Traditional, Artificial Intelligence and Machine Learning Based Approaches for Moving Object Detection 187Apoorv Joshi, Amrita, Rohan Sahai Mathur, Nitendra Kumar and Padmesh Tripathi10 Arduino-Based Robotic Arm for Farm Security in Rural Areas 215Canute Sherwin, Shahid D. P., N. R. Hritish, Sujan Kumar S. N., Nikhil R. and K. Raju11 Graph Neural Network and Imaging Based Vehicle Classification for Traffic Monitoring System 241Shivam Sinha, Nilesh kumar Singh and Lidia Ghosh12 A Novel Zone Segmentation (ZS) Method for Dynamic Obstacle Detection and Flawless Trajectory Navigation of Mobile Robot 271Rapti Chaudhuri, Jashaswimalya Acharjee and Suman Deb13 Artificial Intelligence in Indoor or Outdoor Surveillance Systems: A Systematic View, Principles, Challenges and Applications 293Varun Gupta, Tushar Bansal, Vinay Kumar Yadav and Dhrubajyoti BhowmikReferences 330Index 335
Künstliche Intelligenz selber programmieren für Dummies Junior (2. Auflg.)
WAS KÖNNEN INTELLIGENTE COMPUTER – UND WAS NICHT?Finde heraus, wie Künstliche Intelligenz funktioniert. Dieses Buch hilft dir dabei. Kapitel für Kapitel beantwortet es folgende Fragen: Was ist Künstliche Intelligenz? Wie denken Computer? Wie lernen Computer? Wie kannst du mit Computern sprechen? Wie generieren Computer Texte und Bilder? Spielen Computer auch? Und können Computer fühlen? Grundlegende Methoden und Anwendungsbereiche von Künstlicher Intelligenz werden anhand von anschaulichen Beispielen erklärt. Beispielprogramme in Python zeigen, wie KI-Methoden konkret umgesetzt werden können und es werden Anregungen für eigene Experimente gegeben. DU LERNST* GEMEINSAMKEITEN UND UNTERSCHIEDE ZWISCHEN MENSCHLICHEM DENKEN UND KI##SINGLE_LINE##* WIE PROGRAMME FUNKTIO-NIEREN, DIE LERNEN KÖNNEN##SINGLE_LINE##* WIE DU EINEN EIGENEN CHATBOT PROGRAMMIEREN KANNST##SINGLE_LINE##* WIE DU EINEM COMPUTER BEIBRINGEN KANNST, GEGEN DICH TIC-TAC-TOE ZU SPIELEN##SINGLE_LINE####SINGLE_LINE## UTE SCHMID, KATHARINA WEITZ UND MICHAEL SIEBERS haben alle drei Informatik und Psychologie studiert. Sie forschen in den Themenbereichen Künstliche Intelligenz und maschinelles Lernen und geben ihr Wissen in Vorträgen und Workshops an Kinder und Jugendliche weiter. Widmung 7EINFÜHRUNG 9Über Künstliche Intelligenz 9Über dieses Buch 11Über dich 11Über die Symbole, die wir in diesem Buch verwenden 12KAPITEL 1: DENKEN 13Wie denken eigentlich Menschen? 13Netze ohne Spinnen – dafür mit Knoten und Kanten 15Schlussfolgerndes Denken mit semantischen Netzen 17Wissensfragen 17Schlussfolgerungsfragen 18Komplizierte Schlussfolgerungsfragen 18Baue dein eigenes semantisches Netz 21Was heißt eigentlich »Denken«? 22Deduktives Denken 22Abduktives Denken 23Induktives Denken 24Denken mit Wahrscheinlichkeiten 25KAPITEL 2: LERNEN 27Warum Lernen so wichtig ist 27Wie lernen wir Menschen? 28Wie kann ein Computer lernen? 28Geschenke, Katzen und andere Konzepte 30Lernen mit Perzeptron 31Testen des Perzeptrons 35Schwierigere Paketprobleme 36Vom Perzeptron zum neuronalen Netz 37Vom neuronalen Netz zum tiefen Lernen 39Auswendiglernen vermeiden 41Lernen aus ganz wenigen Beispielen 42Lernen mit Bäumen 42Lernen und Vorurteile 48Und die Profis? 49Lösung: Welche Pakete enthalten ein Geschenk? 50KAPITEL 3: SPRECHEN UND SCHREIBEN 51Natürliche und künstliche Sprachen 51Sprachverarbeitung mit Künstlicher Intelligenz 52Muster suchen und erkennen 52Porzellankisten sind nicht immer Porzellankisten 52Computer, die Sprache verstehen – von SHRDLU, WATSON und ELIZA 53Hallo LILI 55Familiengespräche 55Schreiben statt sprechen 56Mensch oder Computer? 56Die Chatbots kommen 57Der Chatbot, der alle zum Staunen bringt 57Ein Blick hinter die Kulissen 58Sehr überzeugend – bei völliger Ahnungslosigkeit! 59Wo bleibt der Link zu ChatGPT? 60KAPITEL 4: BILDER GENERIEREN 61Ein Prompt, aber prompt! 61So malst du mit Generativer KI 62Tipps und Tricks für bessere Ergebnisse 65SDXL – kein Buchstabensalat, sondern eine KI, die Bilder generiert 66KAPITEL 5: SPIELEN 69Roboterfußball – Toooor 69Schlangen und ärgerliche Vögel 70Brett vorm Kopf? Nicht bei Brettspielen! 72Tic-Tac-Toe 73Die Regeln 73Tic-Tac-Toe mit einem Computer spielen 73Gute Spieler, schlechte Spieler 74Warum kann man nicht alle Züge ausprobieren? 76Schieben und rutschen 78KAPITEL 6: FÜHLEN 81Über die Emotionen 81Computer, die einen ärgern 82Kreise und Dreiecke mit Absichten 83Ein emotionaler Staubsauger? 84Erklären, was die Künstliche Intelligenz sieht 85KAPITEL 7: WAS DU JETZT ÜBER KI WEIẞT 87Wie unterscheiden sich KI-Systeme von Standard-Software? 88KI ist nicht immer korrekt, aber trotzdem nützlich 90Was unterscheidet menschliche und künstliche Intelligenz? 90Geschichte der KI 92KI vor der KI 92Von Informatik- und KI-Pionieren 94Wo steht KI jetzt? 95Ein Blick in die Glaskugel 96KAPITEL 8: KI SELBER PROGRAMMIEREN MIT PYTHON 97Schnelleinstieg Python 98Der Python-Editor IDLE 98Einfache Datentypen und Variablen 100Listen und Tupel 102Bedingte Anweisungen 104Schleifen 106Funktionen 109Module 110Klassen 112Denken 113Netze ohne Spinnen – dafür mit Knoten und Kanten 113Semantische Netze in Python 115Darf’s ein bisschen komplizierter werden? 119Lernen 120Pakete wahrnehmen 121Das Perzeptron lernt aus Fehlern 122Testen des Perzeptrons 124Schwierigere Paketprobleme 126Entscheidungsbäume in Python 128Testen des Entscheidungsbaums 131Sprechen und Schreiben 132Familiengespräche 134Schreiben statt Sprechen 135LILI spricht 139Spielen 140Tic-Tac-Toe in Python 140Der Minimax-Algorithmus 142Wer gewinnt? 145Zum Wiederfinden 147Über die Autoren 151Danksagung 153Was du jetzt denkst 155
Mastering AI
An urgent book on generative artificial intelligence exploring the risk and benefits looming in this seminal moment'Easily the best exploration to date on the perils and promise of AI." —ASHLEE VANCE author of When the Heavens Went on Sale'Mastering AI is a must-read. It's hard to put down'. —BETHANY McLEAN, coauthor of The Smartest Guys in the Room and The Big Fail'A timely and urgent exploration of AI's dizzying acceleration' —BRAD STONE, author of The Everything StoreThe debut of ChatGPT on November 30th was a watershed moment in the history of technology. We stand on the threshold of a new age — one where content of all kinds, even software itself, will be conjured, seemingly from thin air, with simple conversation.In a culture fraught with misinformation, Mastering AI pierces through the thicket of exaggerated claims, explaining how we arrived at this moment and mapping the likely long-term impacts on business, economics, culture and society this potent technology will have.This book will serve as a guide to those dangers — as well as highlighting the technology's transformative potential — and will pinpoint concrete steps that should be taken to regulate generative AI.Jeremy Kahn is a veteran technology and business journalist who has covered artificial intelligence for more than seven years, first at Bloomberg and then at Fortune.
Mediengestaltung
Du bist Mediengestalter bzw. Mediengestalterin in der Ausbildung und suchst Hilfe bei der Vorbereitung auf die Zwischen- oder Abschlussprüfung? Dieses Handbuch ist übersichtlich gestaltet, gut zu lesen, auf dem aktuellen Stand und bringt die Themen auf den Punkt, die du beherrschen musst: Angefangen bei Kommunikationstechnologien über Typografie, Layout und Reinzeichnung bis hin zu Druckvorstufe und Druck und Webdesign, EDV-Wissen und Informationstechnik. Das geballte Mediengestalterwissen – so gehst du top vorbereitet in die Prüfung. Aus dem Inhalt: Das Berufsbild Mediengestalter*inEDV-GrundlagenGestaltungsgrundlagen, Layout, Typografie, Farbe, BilderGestaltungsprojekte (Plakat, Flyer, Broschüre, Buchgestaltung), Corporate Design, Logodesign, InfografikDigitale Druckvorstufe, Bildbearbeitung, Druck, Papier, WeiterverarbeitungApp-Design, E-Books, Video, Digitale FotografieSocial Media, Marketing für die MediengestaltungGrundlagen der Programmierung, Objektorientierte ProgrammierungInternet, Webprogrammierung, Programmiersprachen, Server-Technologien, DatenbankenResponsive Webdesign, User Experience, WebgestaltungInformationstechnik, Netzwerke, SicherheitMedienrecht TEIL I Grundwissen Printprodukte ... 29 1. Gestaltungsgrundlagen ... 31 1.1 ... Gestaltgesetze der Wahrnehmung ... 32 1.2 ... Grundelemente der Gestaltung ... 35 1.3 ... Gestaltungsparameter ... 37 2. Typografie ... 43 2.1 ... Grundbegriffe der Typografie ... 43 2.2 ... Wort und Zeile ... 52 2.3 ... Satzarten ... 58 2.4 ... Ziffern und Zahlen ... 60 2.5 ... Geschichte der Schrift ... 62 2.6 ... Schriftklassifikation ... 66 2.7 ... Schriftwahl und Schriftwirkung ... 71 2.8 ... Orthotypografie ... 78 2.9 ... Fonts -- OpenType, TrueType, PostScript, Web ... 80 3. Das Layout ... 83 3.1 ... Seitenformate und Seitenverhältnis ... 83 3.2 ... Satzspiegel ... 87 3.3 ... Gestaltungsraster ... 91 3.4 ... Hilfsmittel für ein gutes Layout ... 94 4. Farbgestaltung ... 99 4.1 ... Grundlagen ... 99 4.2 ... Farbgestaltung ... 105 5. Bildgestaltung ... 113 5.1 ... Die Bildauswahl ... 113 5.2 ... Bildmotive ... 114 5.3 ... Aspekte der Gestaltung von Bildern ... 117 5.4 ... Bilderstellung mit künstlicher Intelligenz ... 125 TEIL II Printprodukte konzipieren und gestalten ... 129 6. Technische Grundlagen für Printprodukte ... 131 6.1 ... Daten für den crossmedialen Einsatz vorbereiten ... 131 6.2 ... Eigenschaften von digitalen Bildern ... 132 6.3 ... Farbmodi ... 139 6.4 ... Farbtiefe bzw. Datentiefe ... 145 6.5 ... Dateiformate -- Ein Überblick ... 146 6.6 ... Welche Dateiformate und Farbräume wo einsetzen? ... 151 6.7 ... Bildgröße, Seitenverhältnis und Auflösung korrekt einstellen ... 157 6.8 ... Metadaten von Bildern ... 160 7. Bearbeiten von Bildern und Grafiken ... 165 7.1 ... Analoge Bilder scannen ... 165 7.2 ... Pixeldaten vektorisieren ... 168 7.3 ... Grundlegende Vorgehensweisen bei der Bildbearbeitung ... 169 7.4 ... Werkzeuge für Bildkorrekturen und Optimierungen ... 171 7.5 ... Künstliche Intelligenz bei der Bildverarbeitung ... 185 7.6 ... Bilderverwaltung und Stapelverarbeitung ... 185 8. Der Ablauf eines Designprojekts ... 187 8.1 ... Der Aufbau eines Designprojekts ... 187 8.2 ... Die Phasen eines Designprojekts ... 188 9. Corporate Identity und Corporate Design ... 201 9.1 ... Grundbegriffe ... 201 9.2 ... Corporate Design ... 203 9.3 ... Das Logo ... 205 9.4 ... Corporate Fonts ... 214 9.5 ... Corporate Colors ... 216 9.6 ... Bildsprache ... 218 9.7 ... Gestaltungsraster im Corporate Design ... 221 9.8 ... Corporate-Design-Manual ... 222 10. Gestaltungsprojekte ... 225 10.1 ... Geschäftsdrucksachen ... 225 10.2 ... Plakate ... 231 10.3 ... Flyer ... 235 10.4 ... Broschüren ... 237 10.5 ... Buchgestaltung ... 244 10.6 ... Infografik ... 249 TEIL III Printprodukte realisieren: Druckvorstufe und Druck ... 257 11. Digitale Druckvorstufe ... 259 11.1 ... Das Colormanagement ... 260 11.2 ... Farbräume für Fortgeschrittene ... 264 11.3 ... Sonderfarben ... 271 11.4 ... Separation: bunt oder unbunt? ... 274 11.5 ... Reinzeichnung ... 277 11.6 ... Der Preflight ... 284 11.7 ... PDF ... 288 12. In der Druckerei ... 295 12.1 ... Druckdaten proofen ... 295 12.2 ... Druckraster ... 298 12.3 ... Ausschießen ... 304 12.4 ... Druckformerstellung ... 308 12.5 ... Prüfen der Drucke in der Druckerei ... 310 13. Der Druck ... 315 13.1 ... Entstehung und Entwicklung des Drucks ... 315 13.2 ... Die verschiedenen Druckverfahren ... 317 14. Papier ... 333 14.1 ... Geschichte des Papiers ... 333 14.2 ... Papierherstellung ... 334 14.3 ... Papiereigenschaften ... 337 14.4 ... Papierberechnung ... 343 14.5 ... Papierveredelungen ... 347 14.6 ... Papierwahl ... 350 14.7 ... Andere Bedruckstoffe ... 351 15. Druckweiterverarbeitung ... 353 15.1 ... Arten der Weiterverarbeitung ... 353 15.2 ... Schneiden ... 354 15.3 ... Falzen ... 356 15.4 ... Nuten und Rillen ... 359 15.5 ... Einstecken und Zusammentragen ... 360 15.6 ... Binden und Heften ... 362 15.7 ... Produktionsprozess eines Buches im Überblick ... 365 15.8 ... Druckveredelung ... 367 16. Nachhaltigkeit im Druck ... 369 16.1 ... Eine nachhaltige Druckerei finden ... 369 16.2 ... Druckfarben und Umweltfreundlichkeit ... 371 16.3 ... Papier und Nachhaltigkeit ... 372 16.4 ... Nachhaltigkeit bei Veredelungen ... 376 TEIL IV Grundwissen Digitale Medienprodukte ... 377 17. EDV-Grundlagen ... 379 17.1 ... Daten ... 379 17.2 ... Datenbanken ... 385 17.3 ... Datenkompression ... 390 17.4 ... Verschlüsselung ... 393 18. Informationstechnik ... 401 18.1 ... Computerhardware ... 401 18.2 ... Betriebssysteme ... 407 18.3 ... Schnittstellen ... 409 18.4 ... Ausgabeeinheiten ... 415 18.5 ... Speichermedien ... 421 19. Netzwerke ... 431 19.1 ... Aufgaben von Netzen: ISO/OSI-Referenzmodell ... 431 19.2 ... Grundlegende Eigenschaften von Netzwerken ... 433 19.3 ... Netzwerkkomponenten ... 436 19.4 ... Netzwerktechnologien ... 437 19.5 ... Mobilfunknetze ... 448 20. Internet ... 451 20.1 ... TCP/IP ... 451 20.2 ... IP-Routing ... 454 20.3 ... URLs ... 460 20.4 ... DNS ... 461 20.5 ... World Wide Web ... 464 20.6 ... E-Mail ... 466 20.7 ... File Transfer Protocol ... 470 20.8 ... Suchhilfen im Internet ... 471 21. Sicherheit von Computern, Daten und Netzwerken ... 475 21.1 ... Malware ... 475 21.2 ... Passwörter ... 479 21.3 ... Spam ... 482 21.4 ... Entwenden von Datensätzen ... 483 22. Grundlagen der Programmierung ... 485 22.1 ... Konzepte der Programmierung ... 485 22.2 ... Objektorientierte Programmierung ... 490 22.3 ... Reguläre Ausdrücke ... 494 23. Webstandards ... 501 23.1 ... Kerntechnologien ... 501 23.2 ... HTML ... 503 23.3 ... CSS ... 512 23.4 ... JavaScript ... 524 23.5 ... Ajax ... 555 23.6 ... Die Fetch-API ... 557 24. Servertechnologien ... 563 24.1 ... XAMPP oder MAMP installieren ... 563 24.2 ... PHP ... 565 24.3 ... Cookies ... 582 24.4 ... Sessions ... 586 24.5 ... Apache-Server-Konfiguration mit .htaccess ... 593 25. Datenbanken und Datenpräsentationen ... 597 25.1 ... MySQL und MariaDB ... 597 25.2 ... Datenbank mit phpMyAdmin verwalten ... 599 25.3 ... Syntax von SQL ... 606 25.4 ... Mit PHP auf eine Datenbank zugreifen ... 613 25.5 ... Datenaustauschformate JSON und XML ... 616 TEIL V Digitale Medienprodukte konzipieren, gestalten und realisieren ... 627 26. Digitale Medienprodukte konzipieren ... 629 26.1 ... Konzeption und Ideengenerierung ... 629 26.2 ... Projektplanung ... 633 26.3 ... Der Designprozess ... 634 26.4 ... Modular gestalten: Designsysteme, Pattern Libraries und Styleguides ... 637 27. User Experience von Websites ... 639 27.1 ... Usability und User Experience ... 639 27.2 ... Accessibility ... 645 27.3 ... Nachhaltigkeit ... 648 27.4 ... Informationsarchitektur ... 649 27.5 ... Navigations- und Interaktionsdesign ... 651 28. Responsive Webdesign ... 663 28.1 ... Grundlagen ... 664 28.2 ... Meta-Viewport-Element ... 665 28.3 ... Media Queries und Breakpoints ... 665 28.4 ... Mobile First und Desktop First ... 667 29. Web-Layout ... 669 29.1 ... CSS Box Model ... 669 29.2 ... Layouttechnologien auf Basis von CSS ... 674 29.3 ... Layout im responsiven Web ... 688 29.4 ... Raster ... 689 30. Gestaltung im Web ... 693 30.1 ... Web-Typografie ... 693 30.2 ... Farben im Web ... 700 30.3 ... Bilder ... 705 30.4 ... Tabellen ... 723 30.5 ... Formulare ... 726 30.6 ... Video und Audio ... 732 30.7 ... Animationen ... 734 31. Die Bereitstellung von Websites ... 739 31.1 ... Webhosting ... 739 31.2 ... Domain-Registrierung ... 743 31.3 ... Content-Management-Systeme ... 744 31.4 ... Security ... 751 32. Entwicklung von Apps ... 755 32.1 ... Einführung in die smarte Welt ... 755 32.2 ... App-Nutzung und -Vermarktung ... 760 32.3 ... Entwicklung von Apps ... 766 32.4 ... User-Interface- und Interaktionsdesign für Apps ... 771 32.5 ... Informationsarchitektur, Navigation und Layout ... 778 32.6 ... User Interfaces auf iOS ... 784 32.7 ... User Interfaces auf Android ... 789 32.8 ... Touch-Bedienung ... 794 32.9 ... Icons für Apps ... 796 32.10 ... Gestaltung von Apps ... 799 32.11 ... Conversational User Interfaces ... 802 32.12 ... Virtual Reality und Augmented Reality ... 804 33. E-Books ... 807 33.1 ... Grundlagen und Nutzungsrecht ... 807 33.2 ... E-Book-Formate ... 809 33.3 ... Erstellen von E-Books im ePUB-Format ... 811 33.4 ... Technologie ... 816 33.5 ... Distribution von E-Books ... 818 34. Grundlagen der Foto- und Videotechnik ... 823 34.1 ... Fernsehtechnik ... 823 34.2 ... Hintergrundwissen: Videosignale ... 826 34.3 ... Video-Codecs und Videoformate ... 829 34.4 ... Streaming Media ... 833 34.5 ... Tonsysteme und Tonformate ... 835 34.6 ... Kameratechnik für Foto und Video ... 836 34.7 ... Grundlegende Einstellungen ... 844 34.8 ... Erstellen von Videos und Fotos ... 850 34.9 ... Videoschnitt ... 860 TEIL VI Marketing, Social Media und Medienrecht ... 863 35. Marketing ... 865 35.1 ... Marketing und Mediengestaltung als Dreamteam ... 865 35.2 ... Die vier Entwicklungsstufen des Marketings ... 866 35.3 ... Der Marketingprozess ... 867 35.4 ... Situationsanalyse ... 869 35.5 ... Marketingziele formulieren ... 871 35.6 ... Zielgruppenforschung ... 874 35.7 ... Marketingmaßnahmen ... 877 35.8 ... Marketinginstrumente -- der Marketingmix ... 881 35.9 ... Überwachung und Bewertung mit den Werbewirksamkeitsmodellen ... 883 36. Einführung in Social Media ... 887 36.1 ... Bedeutung von Social Media ... 888 36.2 ... Hauptplattformen und ihre Zielgruppen ... 890 36.3 ... Die Content-Erstellung ... 892 36.4 ... Storytelling für Social Media ... 897 36.5 ... Monitoring und Analytics ... 900 37. Medienrecht ... 905 37.1 ... Das Urheberrecht als Dreh- und Angelpunkt ... 906 37.2 ... Das Recht am eigenen Bild ... 916 37.3 ... Die zentralen Informationspflichten im World Wide Web ... 919 A Anhang ... 927 A.1 ... DIN-Formate (DIN Norm 476) ... 929 A.2 ... Korrekturzeichen nach DIN 16511 ... 930 A.3 ... Tastaturkürzel ... 930 A.4 ... Papierformate und Papierbezeichnung ... 933 A.5 ... Orthotypografie ... 936 A.6 ... Umrechnungstabellen ... 938 A.7 ... Glossar ... 939 Index ... 949 Die Autoren ... 978
Integrating Metaheuristics in Computer Vision for Real-World Optimization Problems
A COMPREHENSIVE BOOK PROVIDING HIGH-QUALITY RESEARCH ADDRESSING CHALLENGES IN THEORETICAL AND APPLICATION ASPECTS OF SOFT COMPUTING AND MACHINE LEARNING IN IMAGE PROCESSING AND COMPUTER VISION.Researchers are working to create new algorithms that combine the methods provided by CI approaches to solve the problems of image processing and computer vision such as image size, noise, illumination, and security. The 19 chapters in this book examine computational intelligence (CI) approaches as alternative solutions for automatic computer vision and image processing systems in a wide range of applications, using machine learning and soft computing. Applications highlighted in the book include:* diagnostic and therapeutic techniques for ischemic stroke, object detection, tracking face detection and recognition;* computational-based strategies for drug repositioning and improving performance with feature selection, extraction, and learning;* methods capable of retrieving photometric and geometric transformed images;* concepts of trading the cryptocurrency market based on smart price action strategies; comparative evaluation and prediction of exoplanets using machine learning methods; the risk of using failure rate with the help of MTTF and MTBF to calculate reliability; a detailed description of various techniques using edge detection algorithms;* machine learning in smart houses; the strengths and limitations of swarm intelligence and computation; how to use bidirectional LSTM for heart arrhythmia detection;* a comprehensive study of content-based image-retrieval techniques for feature extraction;* machine learning approaches to understanding angiogenesis;* handwritten image enhancement based on neutroscopic-fuzzy.AUDIENCEThe book has been designed for researchers, engineers, graduate, and post-graduate students wanting to learn more about the theoretical and application aspects of soft computing and machine learning in image processing and computer vision. SHUBHAM MAHAJAN, PHD, is an assistant professor in the School of Engineering at Ajeekya D Y Patil University, Pune, Maharashtra, India. He has eight Indian, one Australian, and one German patent to his credit in artificial intelligence and image processing. He has authored/co-authored more than 50 publications including peer-reviewed journals and conferences. His main research interests include image processing, video compression, image segmentation, fuzzy entropy, nature-inspired computing methods with applications in optimization, data mining, machine learning, robotics, and optical communication. KAPIL JOSHI, PHD, is an assistant professor in the Computer Science & Engineering Department, Uttaranchal Institute of Technology in Dehradun, India. His doctorate was on image quality enhancement using fusion techniques. He has 8 years of academic experience and has published patents, research papers, and two books. In 2021, he was awarded the ‘Best Young Researcher’ Award in Global Education and Corporate Leadership received by Life Way Tech India Pvt. Ltd. AMIT KANT PANDIT, PHD, is an associate professor in the School of Electronics & Communication Engineering Shri Mata Vaishno Devi University, India. He has authored/co-authored more than 60 publications including peer-reviewed journals and conferences. He has two Indian and one Australian patent to his credit in artificial intelligence and image processing. His main research interests are image processing, video compression, image segmentation, fuzzy entropy, and nature-inspired computing methods with applications in optimization. NITISH PATHAK, PHD, is an associate professor in the Department of Information Technology, Bhagwan Parshuram Institute of Technology, New Delhi, India. He has 17 years of engineering education experience and has published more than 80 journal articles, in peer-reviewed journals as well as book chapters, patents, and conference papers. His research areas include intelligent computing techniques, empirical software engineering, and artificial intelligence. Preface xv1 ADVANCEMENT IN DIAGNOSTIC AND THERAPEUTIC TECHNIQUES FOR ISCHEMIC STROKE 1Mukul Jain, Divya Patil, Shubham Gupta and Shubham Mahajan1.1 Introduction 21.2 Diagnostic Tools of Ischemic Stroke 41.3 Artificial Intelligence–Based Diagnostic Tools 71.4 Blood-Based Protein Biomarker for Stroke 81.5 Markers for Endothelial Damage 81.6 Markers of Brain Injury 91.7 Therapeutic Advances in Ischemic Stroke 91.8 Nanoparticles 111.9 Conclusion 132 OBJECT DETECTION AND TRACKING FACE DETECTION AND RECOGNITION 25Varsha K. Patil, Pawan Nawade, Rudra Nagarkar and Paresh Kadale2.1 Introduction 252.2 Motivation 302.3 The Basics of Computer Vision 312.4 Face Detection 342.5 Facial Expression 382.6 Object Detection 412.7 Face Detection and Identification in Practical Situations 442.8 Future Direction in Object Detection and Tracking 472.9 Conclusion 523 PRINTING ORGANS WITH 3D TECHNOLOGY 55Shaik Aminabee3.1 Introduction 553.2 Bioprinting in Three Dimensions (3D) 563.3 3D Printing Types 573.4 Applications for 3D Printing in Cells 603.5 New Developments 653.6 Progress in India 663.7 Limitation 673.8 A Future Point of View 673.9 Conclusion 684 COMPARATIVE EVALUATION OF MACHINE LEARNING ALGORITHMS FOR BANK FRAUD DETECTION 71Kiran Jot Singh, Divneet Singh Kapoor, Kunal Ranjan Singh, Chirag Kalucha, Gatik Alagh, Khushal Thakur and Anshul Sharma4.1 Introduction 714.2 Proposed Framework 734.3 Results 744.4 Concluding Remarks and Future Scope 775 AN OVERVIEW OF COMPUTATIONAL-BASED STRATEGIES FOR DRUG REPOSITIONING 81Shalu Verma, Nidhi Nainwal, Alka Singh, Gauree Kukreti and Kiran Dobhal5.1 Introduction 815.2 Drug Repositioning 825.3 Challenges and Opportunities for Drug Repurposing 935.4 Conclusion 946 IMPROVING PERFORMANCE WITH FEATURE SELECTION, EXTRACTION, AND LEARNING 99Varsha K. Patil, Vrinda Shinde, Ritika Singh and Vipul Singh6.1 Introduction 996.2 Feature Selection 1006.3 Feature Extraction 1106.4 Feature Learning 1156.5 Future Research and Development 1236.6 Future Scope 1246.7 Conclusion 1257 FUSION OF PHASE AND LOCAL FEATURES FOR CBIR 129Pooja Sharma7.1 Introduction 1297.2 Overview of the Proposed System 1327.3 Proposed Hybrid-Shape Descriptors 1327.4 Similarity Measurement 1377.5 Experimental Study and Performance Evaluation 1397.6 Conclusions 1478 TRADING BOT FOR CRYPTOCURRENCY MARKET BASED ON SMART PRICE ACTION STRATEGIES 151Divneet Singh Kapoor, Kiran Jot Singh, Anshoom Jain, Rhythm Chauhan, Khushal Thakur and Anshul Sharma8.1 Introduction 1518.2 Background 1548.3 Proposed Framework 1568.4 Results 1588.5 Conclusion and Future Scope 1619 COMPARATIVE EVALUATION AND PREDICTION OF EXOPLANETS USING MACHINE LEARNING METHODS 163Divneet Singh Kapoor, Kiran Jot Singh, Ashirvad Singh, Benarji Mulakala, Karan Singh, Prashant, Ramanjeet Singh and Shubham Mahajan9.1 Introduction 1649.2 Background 1679.3 Proposed Framework 1699.4 Results 1719.5 Conclusion and Future Scope 18210 THE RISK OF USING FAILURE RATE WITH THE HELP OF MTTF AND MTBF TO CALCULATE RELIABILITY 185Harpreet Kaur and Shiv Kumar Sharma10.1 Introduction 18510.2 Failure 18610.3 Conclusion 19111 A DETAILED DESCRIPTION ON VARIOUS TECHNIQUES OF EDGE DETECTION ALGORITHMS 193Pritha A. and G. Fathima11.1 Introduction 19311.2 Edge Detection Techniques 19411.3 Experimental Results 20311.4 Comparative Results 20311.5 Conclusion 20311.6 Future Work 20412 ADVANCEMENT OF ML IN SMART HOUSE 207Gokula Udhayan V., K. Mahaeshwari and N. Vinoth Kumar12.1 Objective 20712.2 Introduction 20712.3 Smart House System With IoT 20812.4 Future Scope 22312.5 Conclusion 22313 MULTI-ROBOT NAVIGATION: A BIOLOGICALLY INSPIRED FRAMEWORK 225Imran Mir and Faiza Gul13.1 Introduction 22513.2 Optimization Algorithms 22613.3 Algorithms and Self-Organization 23613.4 Future Research Directions 23813.5 Conclusion 23914 BIDIRECTIONAL LSTM FOR HEART ARRHYTHMIA DETECTION 243Nikhil M. Agrawal, H. D. Bhanu Cheitanya, Abhishek Kumar Rai and Shubham Mahajan14.1 Introduction 24314.2 About the Dataset 24514.3 Flow of the Model 24614.4 Results 24814.5 Conclusion 24815 STUDY ON CONTENT-BASED IMAGE RETRIEVAL 253Thanga Subha Devi M., R. Suji Pramila and Tibbie Pon Symon15.1 Introduction 25415.2 Related Works 25615.3 Extraction of Features 26115.4 User Interactions for CBIR System 26615.5 Conclusions 26916 MACHINE LEARNING AND ANGIOGENESIS IN CANCER 273Dharambir Kashyap, Riya Sharma, Neelam Goel and Vivek Kumar Garg16.1 Introduction 27316.2 History of Angiogenesis Discovery 27416.3 Overview of Angiogenesis 27416.4 Angiogenesis in Carcinogenesis 27516.5 Molecular Mechanisms of Angiogenesis Formation 27616.6 Angiogenesis as a Target in Cancer Therapy 27616.7 Machine Learning Approaches in Angiogenesis 27716.8 Conclusion 27817 HANDWRITTEN IMAGE ENHANCEMENT BASED ON NEUTROSCOPIC-FUZZY AND K-MEAN CLUSTERING 283Jaspreet Kaur, Divya Gupta, Simarjeet Kaur and Amrinder Singh17.1 Introduction 28417.2 Application of Image Processing 28617.3 Enhancement of Handwritten Document 28717.4 Clustering Techniques 28817.5 Performance Parameters 29017.6 Results and Discussion 29317.7 Conclusion 29518 A TEXTURE CLASSIFICATION SYSTEM BASED ON AN ADAPTIVE HISTOGRAM EQUALIZED SHEARLET TRANSFORM 299K. Gopalakrishnan, V. Karthikeyan and P.T. Vanathi18.1 Introduction 29918.2 Literature Survey 30318.3 Materials and Methods 30518.4 Proposed Methodology 30918.5 Result and Discussion 31118.6 Conclusion 32019 A THYROID NODULE DETECTION USING L1-NORM INCEPTION DEEP NEURAL NETWORK 323Saranya G.19.1 Introduction 32319.2 Related Work 32419.3 Methodology 32519.4 Results and Discussion 32919.5 Conclusion 336References 337Index 339
Machine Learning for Industrial Applications
THE MAIN GOAL OF THE BOOK IS TO PROVIDE A COMPREHENSIVE AND ACCESSIBLE GUIDE THAT EMPOWERS READERS TO UNDERSTAND, APPLY, AND LEVERAGE MACHINE LEARNING ALGORITHMS AND TECHNIQUES EFFECTIVELY IN REAL-WORLD SCENARIOS.Welcome to the exciting world of machine learning! In recent years, machine learning has rapidly transformed from a niche field within computer science to a fundamental technology shaping various aspects of our lives. Whether you realize it or not, machine learning algorithms are at work behind the scenes, powering recommendation systems, autonomous vehicles, virtual assistants, medical diagnostics, and much more. This book is designed to serve as your comprehensive guide to understanding the principles, algorithms, and applications of machine learning. Whether a student diving into this field for the first time, a seasoned professional looking to broaden your skillset, or an enthusiast eager to explore cutting-edge advancements, this book has something for you. The primary goal of Machine Learning for Industrial Applications is to demystify machine learning and make it accessible to a wide audience. It provides a solid foundation in the fundamental concepts of machine learning, covering both the theoretical underpinnings and practical applications. Whether you’re interested in supervised learning, unsupervised learning, reinforcement learning, or innovative techniques like deep learning, you’ll find comprehensive coverage here. Throughout the book, a hands-on approach is emphasized. As the best way to learn machine learning is by doing, the book includes numerous examples, exercises, and real-world case studies to reinforce your understanding and practical skills. AUDIENCEThe book will enjoy a wide readership as it will appeal to all researchers, students, and technology enthusiasts wanting a hands-on guide to the new advances in machine learning. KOLLA BHANU PRAKASH, PHD, is a professor and associate dean and R & D head for A.I. & Data Science Research Group at K L University, Vijayawada, Andhra Pradesh, India. He is also an adjunct professor at Taylors University, Malaysia. He has published 150+ research papers in international and national journals and conferences. He has authored two and edited 12 books as well as published 15 patents. His research interests include deep learning, data science, and quantum computing. He has received the ‘Best Researcher Award’ 4 times. Preface xix1 Overview of Machine Learning 12 Machine Learning Building Blocks 213 Multilayer Perceptron (in Neural Networks) 514 Kernel Machines 635 Linear and Rule-Based Models 736 Distance-Based Models 877 Model Ensembles 1038 Binary and Beyond Binary Classification 1179 Model Selection 12710 Support Vector Machines 14911 Clustering 17712 Reinforcement Learning 20513 Recommender Systems 22514 Advancements in Deep Learning 24515 Advanced Deep Learning Using Julia Programming 27716 Machine Learning for Industrial Applications 297Index 317
Blockchain, IoT, and AI Technologies for Supply Chain Management
Examine the synergistic possibilities of combining blockchain, IoT, and AI technologies in supply chain management. This book will address the difficulties and possibilities of integrating these technologies and offer helpful implementation advice.The current state of supply chain management involves several challenges, including lack of transparency, limited visibility into product movements, inefficient inventory management, and difficulty in tracking and tracing products. Blockchain, IoT, and AI can potentially address some of these challenges and improve supply chain management.To help illustrate this, case studies and actual instances of businesses implementing or experimenting with blockchain, IoT, and AI technology in their supply chains are included in the book. You’ll review helpful advice on implementation and highlight successful deployments, lessons learned, and the impact of these technologies on supply chain visibility, agility, sustainability, and customer experience. This book further elaborates the fundamental concepts of AI and ML algorithms and demonstrates how AI can process enormous volumes of supply chain data to produce actionable insights, improve inventory control, forecast demand, and increase forecasting precision.This collective work will serve as a comprehensive guide for supply chain professionals, researchers, and technology enthusiasts interested in understanding the potential of blockchain, IoT, and AI technologies in revolutionizing supply chain management practices.WHAT YOU WILL LEARN* Discuss the evolving landscape of technology, potential advancements, and how Blockchain, IoT, and AI can shape the future of supply chains* Gain Insight into upcoming developments and prepare for changing dynamics of the industry* Understand intricate details of blockchain, IoT, and AI Technologies in real-life scenariosWHO IS THIS BOOK FORIndustry Professionals working in the domain of supply chain management who would be interested in understanding how these technologies can enhance efficiency, transparency, and optimization in their supply chains.DR. VEENA GROVER is a Professor in Department of Management at Noida Institute of Engineering & Technology, India. Her interests include Micro Finance, Sustainability, Macro Economic Variables, and Innovation Strategy. She has published multiple articles in various journals and presented papers in various conferences. At present, she is guiding four research scholars and serves as an Editor of International Journal of Advanced Trends in Technology, Management & Applied Science.DR. BALAMURUGAN BALUSAMY is currently working as Associate Dean–Student Engagement in Shiv Nadar University, India. He has 15 years of experience in the field of computer science. His areas of interest are Internet of Things, Big data, Networking. He has published more than 100 papers and contributed multiple book chapters.PROF. SEIFEDINE KADRY focuses on Data Science, education using technology, system prognostics, stochastic systems, and applied mathematics. He is an ABET program evaluator for computing and ABET program evaluator for Engineering Tech. He is a Fellow of IET, Fellow of IETE, and Fellow of IACSIT. He is a distinguish speaker of IEEE Computer Society.DR. A. YOVAN FELIX has mentored students in the project areas of Big Data, Deep Learning, and Data Mining. He has published technical papers in national and international journals. He has over 17 years of experience and expertise in data analytics, smart prediction systems, and deep learning algorithms. He also coordinated in organizing several events at both national and international levels.Chapter 1: Supply Chain Management Strategy and Practices: Traditional Vs Advanced.- Chapter 2: Convergence of IoT, Artificial Intelligence and Blockchain Approaches for Applications in Supply Chain Management.- Chapter 3: Value Creation in Blockchain-Driven Supply Chain Financing Opportunities.- Chapter 4: Artificial Intelligence Applications for Demand Forecasting & Optimization.- Chapter 5: AI-Enabled Supply Chain Planning and Execution: A Pathway to Sustainability.- Chapter 6: Leveraging IOT In Supply Chain Sustainability: A Provenance Perspective.- Chapter 7: AI And Machine Learning in Supply Chain Optimization: Mapping the Territory.- Chapter 8: Blockchain and IoT Integration Based Transparency of Supply Chain Social Sustainability.- Chapter 9: Integration of Blockchain, IoT, And AI In Supply Chain Management: A New Paradigm for Supply Chain Integration and Collaboration.- Chapter 10: Challenges of Supply Chain Management Post COVID-19: Mitigation Strategies and Practical Lessons Learned.- Chapter 11: Supply Chain 4.0: Autonomous Vehicles and Delivery Robots in Supply Chain Management.- Chapter 12: Blockchain for the Future of Sustainable Supply Chain Management in Industry 4.0.- Chapter 13: Managing the Dynamics of New Technologies in The Global Supply Chain.- Chapter 14: Future Trends and Challenges in Supply Chain Technology.- Chapter 15: Real-World Applications of Generative AI for Data Augmentation.- Chapter 16: Case Studies and Best Practices in Supply Chain Management.
Practical GitLab Services
Learn all about GitLab administration, the open-source DevOps platform helping millions develop and deploy safe and secure software. This book__is designed to be your one-stop shop to get up and running with complete ease.Start with the basics like setting up a GitLab account and exploring user options before moving on to GitLab’s primary function as a source code management tool. From there, you’ll learn about one of the most unique features of GitLab: CI/CD configuration files. The next step on the journey is a discussion of how to organize code into projects and groups, along with defining access permissions using roles. You’ll also examine the various planning tools provided by GitLab.With the basic features out of the way, you’ll delve into more specialized services such as the built-in Docker image repository, the package registry, web page creation, and binary file storage. The book concludes with more advanced administrative topics such as working with GitLab’s REST and GraphQL APIs, setting up a proof-of-concept GitLab service using Amazon Web Services (AWS), and spinning up a production service that takes high availability and disaster recovery into account.With an abundance of information available for deploying secure software, selecting the right documentation can often be daunting. From planning to monitoring, _Practical GitLab Services_ eliminates the unknown in your DevOps lifecycle.WHAT YOU WILL LEARN* Use GitLab to manage source code files, track and plan issues, run builds and tests, and deploy software* See how administrators can support developers using GitLab* Set up your own standalone installation using AWSWHO THIS BOOK IS FORSoftware developers, potential GitLab administrators, supporting team members such as testers and project managers.JEFFREY PAINTER has spent the last 45 years in software development, working as a developer in various languages ranging from Fortran, C, C++, Java as well as Python and in a variety of roles from development to administration. The last seven years have been spent at Here Technologies as a system engineer first maintaining a farm of Jenkins servers for entire project teams and then prototyping and maintaining several self-managed GitLab servers.1. Only the Beginning.- 2. Just the Source.- 3. Working the Remote Life.- 4. Build, Test, Rinse and Repeat.- 5. Under One Condition.- 6. You Build It, You Keep It.- 7. Let's Get Organized.- 8. I Have an Issue with That.- 9. The Best Laid Plans.- 10. It's Nice to Share.- 11. There's an API for That.- 12. Well, Isn't That Special.- 13. I Can Do This on My Own.- 14. Things That Lurk in the Background.- 15. The Proof is in the Cloud.- 16. Working the Never-ending Queue.- 17. But Wait, There's More.- 18. It's an Admin's Life.- 19. Lights, Camera, Action.
Practical Cyber Intelligence
OVERVIEW OF THE LATEST TECHNIQUES AND PRACTICES USED IN DIGITAL FORENSICS AND HOW TO APPLY THEM TO THE INVESTIGATIVE PROCESSPractical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device. Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text. To get the most value from this book, readers should be familiar with how a computer operates (e.g., CPU, RAM, and disk), be comfortable interacting with both Windows and Linux operating systems as well as Bash and PowerShell commands and have a basic understanding of Python and how to execute Python scripts. Practical Cyber Intelligence includes detailed information on:* OSINT, the method of using a device’s information to find clues and link a digital avatar to a person, with information on search engines, profiling, and infrastructure mapping* Window forensics, covering the Windows registry, shell items, the event log and much more * Mobile forensics, understanding the difference between Android and iOS and where key evidence can be found on the device Focusing on methodology that is accessible to everyone without any special tools, Practical Cyber Intelligence is an essential introduction to the topic for all professionals looking to enter or advance in the field of cyber investigation, including cyber security practitioners and analysts and law enforcement agents who handle digital evidence. ADAM TILMAR JAKOBSEN works for the Danish National Police Agency’s special crime unit hunting down cyber criminals. Throughout his career he has worked on international cases with Europol and the FBI. Adam’s journey into cybersecurity and intelligence began in the Danish Army Intelligence, where he honed his skills in SIGINT, OSINT, HUMINT, and all-source intelligence. In this role, he executed a wide range of defense, intelligence, and attack missions. Transitioning to Bluewater Shipping, Adam initially served as a Solution Architect before pivoting towards information security, where he oversaw critical security operations. About the Author xviiiPreface xixAcknowledgments xxIntroduction xxi1 INTELLIGENCE ANALYSIS 11.1 Intelligence Life Cycle 11.2 Cyber Threat Intelligence Frameworks 101.3 Summary 132 DIGITAL FORENSICS 152.1 Device Collection 162.2 Preservation 172.3 Acquisition 182.4 Processing 192.5 Analysis 202.6 Documentation and Reporting 212.7 Summary 223 DISK FORENSICS 233.1 Acquisition 233.2 Preparation 253.3 Analysis 253.4 File and Data Carving 313.5 Summary 324 MEMORY FORENSICS 334.1 Acquisition 344.2 Analysis 354.3 Summary 385 SQLITE FORENSICS 395.1 Analyzing 405.2 Summary 436 WINDOWS FORENSICS 456.1 New Technology File System (NTFS) 456.2 Acquisition 516.3 Analysis 526.4 Evidence Location 606.5 Summary 937 MACOS FORENSICS 957.1 File System 957.2 Security 977.3 Acquisition 987.4 Analysis 1007.5 Evidence Location 1007.6 Summary 1048 LINUX FORENSICS 1058.1 File System 1058.2 Security 1078.3 Acquisition 1088.4 Analysis 1098.5 Evidence Location 1098.6 Summary 1159 IOS 1179.1 File System 1179.2 Security 1189.3 Applications 1199.4 Acquisition 1209.5 iCloud 1229.6 Analysis 1229.7 Evidence of Location 1249.8 Summary 13410 ANDROID 13710.1 File Systems 13710.2 Security 13710.3 Application 13810.4 Acquisition 13810.5 Analysis 14510.6 Evidence of Location 14611 NETWORK FORENSICS 15311.1 Acquisition 15311.2 Analysis 15811.3 Summary 16512 MALWARE ANALYSIS 16712.1 Acquiring Malware Samples 16812.2 Handling Malware Samples 16912.3 Analysis 17012.4 Summary 17413 OSINT 17713.1 Methodology 17813.2 Documentation 17913.3 Securing Yourself (OPSEC) 18013.4 Search Engines 18213.5 Profiling 18413.6 Hunt for Data 18913.7 Infrastructure Mapping 19413.8 Automation of OSINT Tasks 20813.9 Summary 20914 CASE STUDIES 21114.1 Case of “The Missing Author” 21114.2 The Insider Threat 21215 ENDING 21315.1 What’s the Next Step? 213Index 215
Meilensteine und Entwicklungen der KI
Dieses Buch bietet einen umfassenden Überblick über die Entstehung und den aktuellen Stand der KI. Der interdisziplinäre Ansatz erlaubt einen ganzheitlichen Blick auf das Thema. Die Autoren bilden die Entwicklung, die damit einhergehenden Schwierigkeiten und Erfolge sowie den Einfluss der technologischen Entwicklung auf die Realisierung von KI-Systemen ab. Im Fokus stehen nicht nur technologische Aspekte, sondern auch ethische, soziale und wirtschaftliche Fragestellungen rund um die KI. Die Leserinnen und Leser werden dazu angeregt, über diese Herausforderungen nachzudenken, um aktiv an der Diskussion über die Rolle der KI in unserer Gesellschaft teilnehmen zu können. Der Inhalt Aufbruch in die Welt der Künstlichen IntelligenzZeitleiste der Künstlichen IntelligenzTechnikKI-CommunityQuo vadis, KI? Die Autoren Prof. Dr. Markus H. Dahm ist Berater für Strategie, Digital Change & Transformation. Ferner lehrt und forscht er an der FOM Hochschule für Oekonomie & Management in den Themenfeldern Künstliche Intelligenz, Business Consulting und Digital Management. Carsten Hagemann ist selbständiger Unternehmensberater und Experte für Digitalisierung. Er beschäftigt sich regelmäßig mit dem Einsatz von KI-Systemen, deren Voraussetzungen und Auswirkungen. Dieses Buch bietet einen umfassenden Überblick über die Entstehung und den aktuellen Stand der KI. Der interdisziplinäre Ansatz erlaubt einen ganzheitlichen Blick auf das Thema. Die Autoren bilden die Entwicklung, die damit einhergehenden Schwierigkeiten und Erfolge sowie den Einfluss der technologischen Entwicklung auf die Realisierung von KI-Systemen ab. Im Fokus stehen nicht nur technologische Aspekte, sondern auch ethische, soziale und wirtschaftliche Fragestellungen rund um die KI. Die Leserinnen und Leser werden dazu angeregt, über diese Herausforderungen nachzudenken, um aktiv an der Diskussion über die Rolle der KI in unserer Gesellschaft teilnehmen zu können. Prof. Dr. Markus H. Dahm ist Berater für Strategie, Digital Change & Transformation. Ferner lehrt und forscht er an der FOM Hochschule für Oekonomie & Management in den Themenfeldern Künstliche Intelligenz, Business Consulting und Digital Management. Carsten Hagemann ist selbständiger Unternehmensberater und Experte für Digitalisierung. Er beschäftigt sich regelmäßig mit dem Einsatz von KI-Systemen, deren Voraussetzungen und Auswirkungen.
Cloud Security in der Praxis
Cloud-typische Sicherheitsthemen verständlich und praxisnah erklärt - Strategien und Lösungsansätze für alle gängigen Cloud-Plattformen, u.a. AWS, Azure und IBM Cloud - Deckt das breite Spektrum der Security-Themen ab - Gezieltes Einarbeiten durch den modularen Aufbau; mithilfe von Übungen können Sie Ihren Wissensstand überprüfen - Experten-Autor: IBM Distinguished Engineer mit zahlreichen Zertifizierungen und 25 Jahren Branchenerfahrung In diesem Praxisbuch erfahren Sie alles Wichtige über bewährte Sicherheitsmethoden für die gängigen Multivendor-Cloud-Umgebungen – unabhängig davon, ob Ihr Unternehmen alte On-Premises-Projekte in die Cloud verlagern oder eine Infrastruktur von Grund auf neu aufbauen möchte. Entwicklerinnen, IT-Architekten und Sicherheitsexpertinnen lernen Cloud-spezifische Techniken zur sicheren Nutzung beliebter Plattformen wie Amazon Web Services, Microsoft Azure und IBM Cloud kennen. Sie erfahren, wie Sie Data Asset Management, Identity and Access Management (IAM), Vulnerability Management, Netzwerksicherheit und Incident Response effektiv in Ihrer Cloud-Umgebung umsetzen. - Informieren Sie sich über neueste Herausforderungen und Bedrohungen im Bereich der Cloud-Sicherheit - Managen Sie Cloud-Anbieter, die Daten speichern und verarbeiten oder administrative Kontrolle bereitstellen - Lernen Sie, wie Sie grundlegende Prinzipien und Konzepte wie Least Privilege und Defense in Depth in der Cloud anwenden - Verstehen Sie die entscheidende Rolle von IAM in der Cloud - Machen Sie sich mit bewährten Praktiken vertraut, um häufig auftretende Sicherheitszwischenfälle zu erkennen, zu bewältigen und den gewünschten Zustand wiederherzustellen - Erfahren Sie, wie Sie mit verschiedensten Sicherheitslücken, insbesondere solchen, die in Multi-Cloud- und Hybrid-Cloudarchitekturen auftreten, umgehen - Überwachen Sie PAM (Privileged Access Management) in Cloud-Umgebungen
High Performance with Java
Building high performance into your applications is key to creating an optimal user experience, although it is not the only consideration for the performant nature of your apps. High performance applications can lead to cost-effective resource utilization, especially when scalability and cloud computing are involved. They can also provide highly reliable systems that are easier to maintain.High Performance with Java begins by helping you explore the Java Virtual Machine (JVM) and understand how to push it to its limits to further optimize your programs. You’ll take a hands-on approach to go through memory optimization strategies, input/output operations, concurrency, networking, as well as frameworks and libraries focused on performance. You’ll also learn key strategies and best practices by using industry-relevant examples to architect scalable and resource-efficient applications. The concluding chapters provide valuable insights on optimizing your Java code when interacting with databases and show you how to leverage artificial intelligence (AI) for high performance Java applications.By the end of this book, you’ll grasp the importance of developing high performance Java applications and gain practical experience in implementing key strategies to help ensure your Java applications perform optimally.
Einführung in die moderne Assembler-Programmierung
Einführung in die moderne Assembler-Programmierung. RISC-V spielerisch und fundiert lernen.Wir nutzen dabei den offenen Prozessor-Standard RISC-V, der auch gezielt für Forschung und Lehre entwickelt wurde. Das macht die Sache für alle einfacher, denn der Kern-Befehlssatz, den wir hier vorstellen, umfasst weniger als 50 Instruktionen. Noch besser: Wer RISC-V lernt, lernt fürs Leben, denn der Befehlssatz ist »eingefroren« und ändert sich nicht mehr.Leseprobe (PDF-Link)Über den Autor:Scot W. Stevenson programmiert seit den Tagen von Acht-Bit-Prozessoren, wie dem 6502 in Assembler. Vom Bytegeschiebe konnten ihn weder sein Medizinstudium, ein Graduiertenkolleg Journalismus, mehr als zwei Jahrzehnte als Nachrichtenredakteur noch ein Blog über die USA abbringen. Er behauptet trotzdem, jederzeit damit aufhören zu können.Für alle, die speziell RISC-V-Assembler-Programmierung lernen wollen, gehen wir im Mittelteil den Aufbau des Prozessors durch, wobei der Schwerpunkt auf der Software liegt. Wir stellen die einzelnen Befehle vor, warnen vor Fallstricken und verraten Tricks. Die Schwachstellen des Standards werden beleuchtet und der Einsatz von KI als Hilfsmittel besprochen. Als offener, freier Standard wird RISC-V auch zunehmend für Hobby- und Studentenprojekte eingesetzt, wo der Compiler nur schlecht oder gar nicht an die Hardware angepasst ist, falls es überhaupt einen gibt.Der letzte Teil zeigt, dass dieses Buch auch aus schierer Begeisterung für Assembler heraus entstand. Wer sich diebisch über jedes eingesparte Byte freut, wird es lieben.
Introducing Microsoft Copilot for Managers
Embark on an exhilarating journey through the digital landscape with Microsoft Copilots, a suite of AI-powered tools that help you create, edit, and optimize content, code, and data across various Microsoft platforms. This book will be your indispensable guide to harnessing the power of generative AI within the Microsoft ecosystem, introducing you to various copilots and their impact on your business processes. The book will guide you as a manager to leverage Microsoft Copilot to improve your personal productivity, your team's productivity, and achieve your business goals with success.This book is organized into five parts. The first part introduces you to Microsoft Copilot and its features and benefits. In the second part, you will get an overview of the integration of Microsoft Copilot with M365 tools. The third part teaches you about the maker copilot in Power Platform services followed by the business expert copilot for Sales and Service for Business Applications such as Dynamics 365 and Salesforce. The book also introduces you to Copilot Studio to help you extend the copilots or build your own.By the end of this book, you will have a solid understanding of Microsoft Copilot and how to use copilots effectively and efficiently with various transformation platforms. You will also have a collection of tips, tricks, and best practices to help you get the most out of Microsoft Copilot.WHAT WILL YOU LEARN* Set up and activate Microsoft Copilot on various Microsoft platforms* Use Microsoft Copilot to generate and enhance content, code, and data with M365, Power Platform, and Business Applications tools* Understand tips, tricks, and best practices to get the most out of Microsoft Copilot* Build your own copilot using your own organization dataWHO THIS BOOK IS FORManagers, team leaders, and business practitioners who want to improve their and their team's productivity and creativity with Microsoft platformsMOHAMMAD ADEEL KHAN is a distinguished Senior Technical Specialist at Microsoft, renowned for his expertise in driving enterprise-grade digital transformations. His nearly two decades of experience encompass a deep understanding of Cloud Solutions, AI & ML, and data management solution architectures that have consistently delivered customer success and profitability. Adeel's global professional journey has taken him across Pakistan, UAE, Malaysia, and Singapore, enriching his perspective and enhancing his ability to navigate complex technological landscapes. Adeel's academic achievements are notable, with an MBA from Coventry University and an AI certification from MIT. His multilingual fluency in English, Urdu, and Arabic complements his global leadership role. As an author and speaker, Adeel has shared his thought leadership at various regional and global events, inspiring audiences with his insights into the future of technology. In his role at Microsoft Operations in Singapore, Adeel has been recognized as an AI-Copilot Champion and has achieved the remarkable feat, helping fortune 500 organizations adopt and transform future of work.Section: ChapterPart I- Part I: Chapter 1- Introduction.- Part II- Part II: Chapter 2- Microsoft Copilot in Word.- Part II: Chapter 3- Microsoft Copilot in Power Point.- Part II: Chapter 4- Microsoft Copilot in Excel .- Part II: Chapter 5- Microsoft Copilot in Communication and Collaboration.- Chapter 6: Microsoft Copilot Chat.- Part III- Part III: Chapter 7- Microsoft Copilot for Power Apps.- Part III: Chapter 8- Microsoft Copilot for Power Automate.- Part III: Chapter 9- Microsoft Copilot for Power Pages.- Part III: Chapter 10- Microsoft Copilot for Power BI.- Part IV-Part IV: Chapter 11 - Microsoft Copilot for Sales.- Part IV: Chapter 12- Microsoft Copilot For Sales with Salesforce.- Part IV: Chapter 13- Microsoft Copilot For Sales with Dynamics 365 Sales.- Part IV: Chapter 14- Microsoft Copilot for Service.- Part IV: Chapter 15 - Microsoft Copilot For Service with Cloud Solutions.- Part IV: Chapter 16 - Microsoft Copilot For Service with Dynamics 365 Customer Service.- Part V-Part V: Chapter 17 - Copilot Studio.- Chapter 18- Copilot , Generative AI and Future of work.- Annex - A: Annex – A.
Empowering the Public Sector with Generative AI
This is your guide book to Generative AI (GenAI) and its application in addressing real-world challenges within the public sector. The book addresses a range of topics from GenAI concepts and strategy to public sector use cases, architecture patterns, and implementation best practices. With a general background in technology and the public sector, you will be able to understand the concepts in this book.The book will help you develop a deeper understanding of GenAI and learn how GenAI differs from traditional AI. You will explore best practices such as prompt engineering, and fine-tuning, and architectural patterns such as Retrieval Augmented Generation (RAG). And you will discover specific nuances, considerations, and strategies for implementation in a public sector organization.You will understand how to apply these concepts in a public sector setting and address industry-specific challenges and problems by studying a variety of use cases included in the book in the areas of content generation, chatbots, summarization, and program management.WHAT YOU WILL LEARN* GenAI concepts and how GenAI differs from traditional AI/ML * Prompt engineering, fine-tuning, RAG, and customizing foundation models* Strategy, methodologies, and frameworks for the public sector* Public sector use cases in the areas of content generation, summarization, and chatbots, plus program management, analytics, business intelligence, and reporting* Architecture and design patterns * Implementation, operations, and maintenance of GenAI applicationsWHO THIS BOOK IS FORTechnology and business leaders in the public sector who are new to AI/ML and are keen on exploring and harnessing the potential of Generative AI in their respective organizations.SANJEEV PULAPAKA is Principal Solutions Architect at Amazon Web Services (AWS). He leads the development of AI/ML and Generative AI solutions for the US Federal Civilian team. Sanjeev has extensive experience in leading, architecting, and implementing high-impact technology solutions that address diverse business needs in multiple sectors (including commercial, federal, and state and local governments). He has published numerous blogs and white papers on AI/ML and is an active speaker and panelist at various industry conferences, including AWS Public Sector Summit and AWS re:Invent. Sanjeev has an undergraduate degree in engineering from the Indian Institute of Technology and an MBA degree from the University of Notre Dame.SRINATH GODAVARTHI has over 20 years of experience serving public sector customers and he held leadership positions with global technology and consulting companies ,including Amazon and Accenture. In his previous roles, Srinath led cloud strategy, architecture, and digital transformation efforts for a number of federal, state, and local agencies. Srinath specializes in AI/ML technologies and has published over a dozen white papers and blogs on various topics (including AI, ML, and Healthcare). He has been a speaker at various industry conferences, including the AWS Public Sector Summit, AWS re:Invent, and the American Public Human Services Association. He holds a master’s degree in computer science from Temple University and completed a Chief Technology Officer program from the University of California, Berkeley.SHERRY DING is an artificial intelligence and machine learning (AI/ML) technologist and evangelist with 20 years of experience in AI/ML research and applications. She currently works at Amazon Web Services as an AI/ML Specialist Solutions Architect, serving public sector customers on their AI/ML related business challenges, and guiding them to build highly reliable and scalable AI/ML applications on the cloud. Sherry holds a PhD in computer science from Korea University. She has authored more than 30 publications (including journal articles, book chapters, white papers, conference proceedings, and blogs) on different topics related to AI/ML. She is an active public speaker who has presented at various academia and industry conferences such as IEEE conferences, AWS re:Invent, and AWS Summits.Chapter 1: Introduction to Generative AI.- Chapter 2: Generative AI in the Public Sector.- Chapter 3: Gen AI Strategy: A Blueprint for Successful Adoption.- Chapter 4: Building a Generative AI Application.- Chapter 5: Content Generation.- Chapter 6: Chatbots and Enterprise Search.- Chapter 7: Summarization.- Chapter 8: Program Management, Business Intelligence, and Reporting.- Chapter 9: Implementation Considerations.- Chapter 10: Conclusion.- Appendix A.- Appendix B.- Appendix C.- Appendix D.- Appendix E.