Computer und IT
Human Proxies in Cryptographic Networks
Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. And, Human Proxies raise questions that were neither answered by science, journalists nor the public. Regular Proxies on a network are forwarding Internet requests, e.g., to download a webpage. Also, in political and social settings a Proxy as an intermediate, deputy or representative with a similar function is given. Human Proxies now enable within the Encryption and Messenger Application Spot-On to choose a friend as a Human Proxy. The Spot-On program is a most modern and elaborated encryption suite available for several operation systems and provides many innovations in applied cryptography. It builds based on the Echo Protocol a cryptographic network, that is beyond Cryptographic Routing. With Human Proxies now a friend from the Messenger friends list sends out the chat message instead of the original sender. The construct of the "Inner Envelope" behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. The essay in this book discusses some related aspects of Human Proxies and their referring's to encryption, networking, graph theory and comparable social and political processes of Proxies. This leads to a further general approach: Endpoints in Encryption are equipped by the application Spot-On with the vision of interoperability of endpoints in communications. | English & German language. Uni Nurf: Uni Nurf is author of the essay "Human Proxies in Cryptographic Networks - Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol".
Automatisiertes Fahren 2024
Automatisiertes Fahren hilft Unfälle zu vermeiden. KI-unterstützte Roboterautos sind aber auch Grundlage für datengetriebene Geschäftsmodelle der OEMs. Konzepte zukünftiger Mobilitätslösungen müssen aus der Perspektive der Nutzer, der urbanen sowie der ländlichen Region und zielführender Geschäftsmodelle entwickelt werden, um erfolgreich zu sein. Im Fokus stehen dabei Verkehrssicherheit und Leistungsfähigkeit ebenso wie ökologische, ökonomische und soziale Nachhaltigkeit. Die internationale Konferenz „Automatisiertes Fahren“ widmet sich als Informations- und Kommunikationsplattform den zentralen Aspekten des Mobilitätswandels. Um die zentralen Herausforderungen künftiger ADAS-Systeme zu erfüllen, müssen Bereiche wie Sensorfusion, Rechnertechnik, KI oder V2X-Kommunikation optimiert werden, um die dafür notwendigen System-of-Systems-Architekturen entwickeln zu können. Die seit Jahren etablierte internationale ATZlive-Fachkonferenz "Automatisiertes Fahren" wird daher um die Themen DevOps, Tooling, Algorithmenentwicklung, Programmierung sowie SDW und E/E-Architektur erweitert. ADAS-Systeme werden fortlaufend weiterentwickelt, um Nutzerinnen und Nutzer nachhaltig zu unterstützen. Dabei ist es wichtig, sowohl die Verkehrssicherheit zu steigern als auch die Verfügbarkeit zu verbessern sowie die Akzeptanz der Systeme im Markt zu erreichen. Dafür müssen Bereiche wie Sensorfunktion, Umfeldmodellierung, Situationsprädiktion, Trajektorenplanung und Entscheidungsfindung auf der einen Seite und die Rechnertechnik und die V2X-Kommunikation auf der anderen Seite – unterstützt durch KI – optimiert werden, um die dafür notwendigen System-of-Systems-Architekturen entwickeln zu können. Die 9. Internationale ATZ-Tagung „Automatisiertes Fahren“ ist ein Forum für Entwicklungsmethodik, Technologiestacks und Security. Sie steht für Engineering AVF Level 2X und diskutiert Engineering und Technologien für das automatisierte Fahren ab Level 2+. Architekturen und Standardisierung.- Versicherungsthemen.- Manöverplanung.- Neue Fahrzeug- und Innenraumkonzepte.- Testverfahren und Absicherung.- Datengenerierung und Datensicherheit.- Verkehrsplanung und Geschäftsmodelle.- HMI und Fahrzeugmonitoring.
Programming PIC Microcontrollers with XC8
Are you tired of copying and pasting code into your embedded projects? Do you want to write your own code from scratch for microcontrollers and understand what your code is doing without all the frills and math? This book uses a practical approach to show you how to develop embedded systems with 8-bit PIC microcontrollers using the XC8 compiler.Written for those who want more than an Arduino, but less than the more complex microcontrollers on the market, this new edition is fully updated and covers embedded design principles such as foreground-background loops and event driven programming. You’ll learn how to interface with things like Motors, PID loop control and writing a browser-based monitoring system! This book is heavy on code, schematics, and images and focuses less on the theoretical aspects of using microcontrollers.Coverage includes writing a display driver, using the DAC for a multitude of waveform generation techniques, and building 8-bit IoT systems, real time telemetry, a countdown timer, and new peripherals. These topics are important if you want to learn more about PIC microcontroller devices as a whole. You'll also see the advantage that MPLAB X offers by running on Windows, Mac and Linux environments. You don't need to be a command line expert to work with PIC microcontrollers, so you can focus less on setting up your environment and more on your application.If you want to move beyond the Arduino, _Programming PIC Microcontrollers with XC8 _is your complete guide to understanding modern PIC microcontrollers.WHAT YOU’LL LEARN* Set up the MPLAB X and XC8 compilers for microcontroller development* Use GPIO and PPS* Review EUSART and Software UART communications* Use the eXtreme Low Power (XLP) options of PIC microcontrollers* Explore wireless communications with WiFi and BluetoothWHO THIS BOOK IS FORThose with basic electronic device and electronic equipment experience and some knowledge of the C programming and digital electronics. Also targeted towards students wanting a practical overview of microcontrollers outside of the classroom.ARMSTRONG SUBERO began learning electronics at the age of 8. One of the happiest memories in his childhood was when he finally figured out how to make a light bulb. It took off from there as he taught himself more advanced topics in electronics, before delving into computer architecture, and eventually discovering the joys of microcontrollers and FPGAs. From there he honed his C programming skills and learned a myriad of languages and technologies.Armstong currently works for the Ministry of National Security in Trinidad and Tobago, and writes software, design circuits, courses, robots, and software for embedded systems at angelstemlabs.com. He is also a contributing author to Free Code Camp and has degrees in Computer Science and Liberal Arts and Sciences from Thomas Edison State University where he also studies Mathematics and Natural Science. He is the author of _Programming PIC Microcontrollers in XC8_, _Codeless Data Structures and Algorithms_, and _Programming Microcontrollers with Python_ published by Apress Media LLC.Chapter 1: Preparing For Development.- Chapter 2: The C Programming Language.- Chapter 3: Basic Electronics for Embedded Systems.- Chapter 4: PIC® Microcontrollers..- Chapter 5: Input and Output.- Chapter 6: Interfacing Actuators.- Chapter 7: Interrupts, Timers, Counters and PWM.- Chapter 8: USART, SPI and I2C.- Chapter 9: Interfacing Displays.- Chapter 10: ADC and DAC.- Chapter 11: CLC, NCO, Comparator and FVR.- Chapter 12: Wi-Fi and Bluetooth.- Chapter 13: Watchdog Timer and Low Power.- Chapter 14: PIC® Microcontroller Projects.
Learning Analytics und Künstliche Intelligenz in Studium und Lehre
In dem Sammelband werden die Ergebnisse aus dem Projekt „KI:edu.nrw - Didaktik, Ethik und Technik von Learning Analytics und KI in der Hochschulbildung“ im Zeitraum 2020-2023 vorgestellt. Ziel des Projekts war es, sowohl an der im Schwerpunkt geförderten Ruhr-Universität Bochum als auch an der partnerschaftlich verbundenen RWTH Aachen exemplarisch zu erarbeiten, wie Regeln, Konzepte, Prozesse und Technik für den Einsatz von Learning Analytics und KI in Studium und Lehre ausgestaltet werden können. Die Besonderheit: Alle lehrbezogenen Akteurinnen und Akteure wurden in einem umfassenden Ansatz einbezogen, um zu verstehen, wie Hochschulen sich als Gesamtorganisationen auf die kommenden Herausforderungen in diesem Bereich einstellen müssen. Der Band zeigt damit Wege in eine zukünftige Hochschulwelt, die nicht mehr in allzu weiter Ferne liegt.
Online Machine Learning
Dieses Buch beschreibt Theorie und Anwendungen aus dem Bereich des Online Maschine Learnings (OML), wobei der Fokus auf Verfahren des überwachten Lernens liegt. Es werden Verfahren zur Drifterkennung und -behandlung beschrieben. Verfahren zur nachträglichen Aktualisierung der Modelle sowie Methoden zur Modellbewertung werden dargestellt. Besondere Anforderungen aus der amtlichen Statistik (unbalancierte Daten, Interpretierbarkeit, etc.) werden berücksichtigt. Aktuelle und mögliche Anwendungen werden aufgelistet. Ein Überblick über die verfügbaren Software-Tools wird gegeben. Anhand von zwei Studien (“simulierten Anwendungen”) werden Vor- und Nachteile des OML-Einsatz in der Praxis experimentell analysiert.PROF. DR. THOMAS BARTZ-BEIELSTEIN ist ein Experte für KI mit über 30 Jahren Erfahrung. Als Professor für Angewandte Mathematik an der TH Köln und Leiter des Instituts für Data Science, Engineering und Analytics (IDE+A) hat er sich auf die Forschung in den Bereichen KI, maschinelles Lernen, Simulation und Optimierung spezialisiert. Seine Arbeit umfasst eine Vielzahl von Themen aus der angewandten Mathematik und Statistik, Versuchsplanung, simulationsbasierter Optimierung und Anwendungen in Bereichen wie Wasserwirtschaft, Aufzugssteuerung und Maschinenbau.EVA BARTZ ist auf KI und Datenschutz spezialisierte Juristin. Seit 2014 führt sie die angesehene Unternehmensberatung Bartz & Bartz GmbH. Diese bietet KI-basierte Lösungen für die Praxis in industriellen Anwendungen an.Die herausragende Arbeit der Unternehmensberatung führte zur Erstellung einer Expertise für das Statistische Bundesamt, aus der schließlich dieses wegweisende Buch entstand.Einleitung: Theorie und Anwendungen von Online Machine Learning.-Supervised Learning: Klassifikation und Regression.- Drifterkennung und -behandlung.- Initiale Auswahl und nachträgliche Aktualisierung von OML-Modellen.- Evaluation, Performance-Messung.- Besondere Anforderungen.- Anwendungen.- Software.- Simulierte Anwendungen.- Zusammenfassung und Ausblick.
Taming Your Dragon
Technical debt is an often-overlooked problem that the software industry needs to take more seriously. All organizations are impacted by it, most wish that they had less of it, but need help in understanding the nature of the beast. This book aims to clear up any misconceptions and show you how to implement a sound technical debt management program to suit your company’s needs.You’ll learn the greatest challenge in solving the technical debt dilemma is not to find solutions to it, but rather to find solutions to the human and organizational issues that lead to that debt. For example, convincing senior stakeholders of the importance of addressing technical debt, getting stakeholders to acknowledge how their actions lead to unintentional debt, and enabling teams to prioritize technical debt over short-term goals.Therefore, this book is divided into three parts: defining technical debt, understanding technical debt, and tackling technical debt. It begins by explaining why technical debt should not be considered a technical problem, but rather a problem of how trade-off decisions are made. You’ll then examine how making decisions using the affect heuristic, more commonly known as a “gut feeling,” can lead to unnecessary technical debt, followed by some techniques for combating your vulnerability to this trap.Reducing your organization’s level of technical debt is not easy. _Taming Your Dragon_ will show you how to implement a technical debt management program.WHAT YOU WILL LEARN* Review a new paradigm based on technical debt being a combination of trade-off problems and system problems* Understand the many ways that technical debt adversely affects an organization’s ability to deliver IT change* Create an effective process for addressing technical debt* See why analogies are importantWHO THIS BOOK IS FORSoftware teams supporting DevOps, managers, and other business stakeholderslooking to implement a technical debt management program.Andrew Richard Brown has worked in the software industry since 1999. He started as an SAP programmer fixing Y2K bugs, although he admits that he sometimes inadvertently replaced them with Y-2050 bugs. Later, he realized that the biggest problems in software development were not technical but human. What’s more, nobody had yet figured out what to do about them! Since then, he has helped teams improve their performance through understanding and addressing these problems.Andrew also coaches organizations on software development, quality engineering, and addressing issues driven by human factors. He is particularly active in addressing long-standing issues, like technical debt, risk in complex systems, and project underestimation. He investigates how software development problems are driven by cognitive biases, plus how to address them using behavioral science techniques.His research has led to new and counterintuitive insights into the true causes of software development problems, as well as fresh approaches to solving them. He is a regular speaker at international software conferences and has a growing YouTube channel dedicated to understanding these problems.Part 1: Exploring Technical Debt.- Chapter 1 What is technical debt?.- Chapter 2: Why you need to address technical debt.- Chapter 3: Why has technical debt proved so resistant to solutions?.- Part 2: Understanding the Technical Debt Problem.- Chapter 4: The broken analogy.- Chapter 5: Technical debt as a trade-off problem.- Chapter 6: Technical debt as a systems problem.- Chapter 7: Technical debt as an economics problem.- Chapter 8: Technical debt as a wicked problem.- Chapter 9: Common technical debt anti-patterns.- Part 3: Tackling Technical Debt.- Chapter 10: Convincing everyone.- Chapter 11: Modelling technical debt with system modelling tools.- Chapter 12: A program to address technical debt.- Chapter 13: Preliminary information gathering.- Chapter 14: Workshops for problem understanding.- Chapter 15: Additional information gathering.- Chapter 16: Workshops for solution development.- Chapter 17: Pilot solutions.- Chapter 18: Rollout and stabilization.- Appendix.
Mastering REST APIs
Embark on a transformative journey into the nuances of API design and implementation. This comprehensive guide will equip you with the prowess to craft APIs that exemplify excellence, optimize performance, fortify security, and elevate user experience.From grasping the core tenets of REST architecture to navigating diverse frameworks like Node.js with Express, Ruby on Rails, Django, Laravel with PHP, ASP.NET Core with C#, and Spring Boot with Java, this compendium empowers you to create APIs that set new industry benchmarks. In-depth tutorials will empower you to master data serialization, robust authentication protocols, and impervious security measures. This book also delves into the more advanced topics encompassing API governance, meticulous versioning strategies, cross-origin resource sharing (CORS) considerations, real-time capabilities, and microservices communication intricacies.You'll gain insights into vigilant monitoring, astute analytics, and optimization techniques that truly differentiate your APIs. Moreover, this book navigates the ever-evolving legal and privacy landscape confidently, ensuring compliance and upholding user trust, and provides the expertise needed to craft more efficient APIs that stand at the forefront of modern digital innovation.Presenting real-world case studies, comprehensive explanations, and practical illustrations, _Mastering REST APIs_ is your compass to navigate the complex world of web development.WHAT YOU'LL LEARN* REST architectures and how it shapes modern API development.* Effectively develop and build APIs using a diverse set of web development frameworks* Dive into advanced topics such as API governance, real-time features, microservices communication.* Review real-world case studies and hands-on examples, helping you to actively design, implement and optimize APIs.WHO THIS BOOK IS FORExperienced web developers, software engineers, and tech enthusiasts who are looking to supercharge their API development knowledge and take it to the next levelSIVA SELVARAJ work focuses on modern technologies and industry best practices. These topics include frontend development techniques using HTML5, CSS3, and JavaScript frameworks; implementing responsive web design and optimizing user experience across devices; building dynamic web applications with server-side languages such as PHP, WordPress, and Laravel; and Database management and integration using SQL and MySQL databases He loves to share his extensive knowledge and experience to empower readers to tackle complex challenges and create highly functional and visually appealing websites.1. Introduction to REST APIs.- 2. Building REST APIs with Node.js and Express.- 3. Building REST APIs with Ruby on Rails.- 4. Building REST APIs with Django.- 5. Building REST APIs with Laravel.- 6. Building REST APIs with ASP.NET Core.- 7. Building REST APIs with Spring Boot.- 8. Building REST APIs with Serverless Cloud Platforms.- 9. Advanced Topics and Case Studies.- 10. Advanced API Design Patterns and Future Trends.
Mastering GitHub Enterprise Management and Administration
This book is a comprehensive guide to GitHub Enterprise Cloud and provides a detailed overview of how to set up, manage, administer, and configure GitHub for organizations. In addition to this, you will also learn identity management and the CI/CD pipeline.The book starts with a thorough introduction to GitHub administration and its benefits. You will then learn how to set up and manage a GitHub Enterprise account and organization, guiding administrators through each step. Next, you will go through GitHub Repository Secure Management and Best Practices along with an understanding of how to manage access to GitHub using SAML SSO. GitHub enterprise support strategies and their usage and adoption are discussed next in detail. Moving ahead, you will learn about GitHub Action and Packages followed by GitHub Copilot management. How to automate repetitive tasks and workflows using GitHub Actions and enhancing productivity is discussed in detail with the help of case studies. Towards the end, you will demonstrate securing the software development lifecycle through advanced security and use GitHub Actions for automating business processes.After reading this book, you will be able to leverage the full potential of GitHub Enterprise Cloud for your software development needs.WHAT WILL YOU LEARN* How to set up and configure GitHub Enterprise for optimal collaboration, security, and scalability in an enterprise environment.* Best practices for managing organizations, repositories, and user access permissions effectively to foster efficient teamwork and code collaboration.* Strategies to implement robust CI/CD pipelines using GitHub Actions, automating build, testing, and deployment processes for faster and more reliable software delivery.* Proven techniques for ensuring top-notch security and compliance, including authentication methods, access controls, and vulnerability scanning, to protect code repositories and sensitive data.WHO IS THIS BOOK FORSoftware Development teams, DevOps engineers, and IT professionals who are looking to use GitHub Enterprise Cloud for code collaboration, management, and deployment.BALU ILAG is a Microsoft Certified Trainer (MCT), Microsoft 365 Certified Teams Administrator Associate, and Microsoft Certified Solutions Expert (MCSE) for communication and productivity. He has written several blog posts on unified communication and collaboration technologies including subjects ranging from a how-to guide to best practices and troubleshooting.He is currently working as an Office 365 and collaboration specialist at Juniper networks. Balu has over 13 years' experience in messaging, telecom and unified communications and collaboration and is focused on Microsoft Teams and Microsoft Office 365 collaboration. His role is a combination of product administration, product development, and strategic guidance for enterprise customers.Chapter 1: Introduction to GitHub Administration.- Chapter 2: GitHub Enterprise Account and Organization Setup and Administration.- Chapter 3: GitHub Repository Secure Management and Best Practices.- Chapter 4: GitHub Identity Access Management (SAML SSO and Enterprise Managed User) with User Onboarding and Offboarding.- Chapter 5: GitHub Enterprise Support and Adoption.- Chapter 6: GitHub Usage and Adoption.- Chapter 7: GitHub Action and GitHub Packages Management.- Chapter 8: GitHub Copilot Management.- Chapter 9: GitHub Monitoring and Reporting.- Chapter 10: Automate Development Tasks and Workflows with GitHub Actions.- Chapter 11: Secure Software Development Lifecycle through GitHub Advanced Security.- Chapter 12: Use GitHub Actions for Automating Business Processes.
CompTIA DataX Study Guide
DEMONSTRATE YOUR DATA SCIENCE SKILLS BY EARNING THE BRAND-NEW COMPTIA DATAX CREDENTIALIn CompTIA DataX Study Guide: Exam DY0-001, data scientist and analytics professor, Fred Nwanganga, delivers a practical, hands-on guide to establishing your credentials as a data science practitioner and succeeding on the CompTIA DataX certification exam. In this book, you'll explore all the domains covered by the new credential, which include key concepts in mathematics and statistics; techniques for modeling, analysis and evaluating outcomes; foundations of machine learning; data science operations and processes; and specialized applications of data science. This up-to-date Study Guide walks you through the new, advanced-level data science certification offered by CompTIA and includes hundreds of practice questions and electronic flashcards that help you to retain and remember the knowledge you need to succeed on the exam and at your next (or current) professional data science role. You'll find:* Chapter review questions that validate and measure your readiness for the challenging certification exam* Complimentary access to the intuitive Sybex online learning environment, complete with practice questions and a glossary of frequently used industry terminology* Material you need to learn and shore up job-critical skills, like data processing and cleaning, machine learning model-selection, and foundational math and modeling conceptsPerfect for aspiring and current data science professionals, CompTIA DataX Study Guide is a must-have resource for anyone preparing for the DataX certification exam (DY0-001) and seeking a better, more reliable, and faster way to succeed on the test. ABOUT THE AUTHORFRED NWANGANGA is a technology professional and professor in the IT, Analytics, and Operations Department within the University of Notre Dame – Mendoza College of Business. He teaches undergraduate and graduate courses in Python for Data Analytics, Machine Learning, and Unstructured Data Analytics. He has over 20 years of experience in technology management and analytics. He is the author of several LinkedIn Learning machine learning courses and the founder of the Early Bridges to Data Science Program in the Notre Dame Lucy Family Institute for Data & Society. Introduction xxiiiChapter 1 What Is Data Science? 1Chapter 2 Mathematics and Statistical Methods 25Chapter 3 Data Collection and Storage 63Chapter 4 Data Exploration and Analysis 97Chapter 5 Data Processing and Preparation 131Chapter 6 Modeling and Evaluation 167Chapter 7 Model Validation and Deployment 195Chapter 8 Unsupervised Machine Learning 225Chapter 9 Supervised Machine Learning 249Chapter 10 Neural Networks and Deep Learning 271Chapter 11 Natural Language Processing 293Chapter 12 Specialized Applications of Data Science 315APPENDIX ANSWERS TO REVIEW QUESTIONS 337Chapter 1: What Is Data Science? 338Chapter 2: Mathematics and Statistical Methods 339Chapter 3: Data Collection and Storage 341Chapter 4: Data Exploration and Analysis 343Chapter 5: Data Processing and Preparation 345Chapter 6: Modeling and Evaluation 346Chapter 7: Model Validation and Deployment 347Chapter 8: Unsupervised Machine Learning 349Chapter 9: Supervised Machine Learning 350Chapter 10: Neural Networks and Deep Learning 352Chapter 11: Natural Language Processing 353Chapter 12: Specialized Applications of Data Science 355Index 357
Next Generation Digital: Digitalisierung & KI strategisch einsetzen
Information, Anfragen, Daten, Kommunikation, Krisen werden rasch weiter zunehmen. Bei stark steigenden Anforderungen und gleichzeitigem Arbeitskräftemangel reicht es nicht, wenn wir jedes Jahr einfach nur schneller arbeiten. Wir müssen anders arbeiten.Zum InhaltEin Buch für Executives und IT-Professionals, die Digitalisierung und KI strategisch einsetzen wollen.Übersicht der für digitale Tools und KI relevanten Compliance, mit der wiederum digitale Tools und KI helfen können: NIS 2, EU AI Act, Digital Services Act, Product Liability Directive u.v.m.Scouting einer Auswahl der für betrieblichen Einsatz relevantesten Technologien und Bewertung von Nutzen und Einsatzmöglichkeiten.Strategie, wie sie sein soll, legt fest, WIE wir gewinnen werden. Das Buch führt von der systematischen Bedarfsfeststellung zur Toolwahl.Best Practice Cases runden das Werk ab.Die Abkehr von der Beliebigkeit.Die für ihre konsequent systematischen Konzepte und Strategien be-kannte Autorin wurde bereits als Top CIO des Jahres ausgezeichnet und ist in einer Reihe von nationalen und internationalen Digitalisierungs- und KI-Beiräten im Einsatz. Isabella Mader lehrt seit 15 Jahren IT-Strategie. Sie legt mit diesem Werk ein praktisches Arbeitsbuch vor, das entlang aktueller Herausforderungen zu einer rasch umsetzbaren Strategie führt.
Master Vue.js in 6 Days
Prepare for an exciting journey into the world of Vue.js. Organized into six days of learning Vue.js, this book will guide you through the key concepts needed to become a proficient developer with this versatile framework.Backed by clear explanations, concrete examples, hands-on exercises, and development tips, you’ll examine the main ingredients needed to build web user interfaces. From creating components to handling events, delving into HTTP requests, and custom directives, each day promises a new skill and practical knowledge that you can immediately apply to your projects.Whether it's for creating professional web applications or simply expanding your horizons in web development, this book will equip you with the necessary skills to excel in with Vue.js. So, dive into this adventure and become a Vue.js master in just six days!WHAT YOU’LL LEARN* Understand key Vue.js principles and concepts. * Create Reactive user interfaces.* Acquire a comprehensive understanding of the Vue.js framework.WHO THIS BOOK IS FORWeb Developers, programmers, students, and teachers who are looking to learn or brush up on Vue.jsERIC SARRION is a trainer, web developer, and an independent consultant. He has been involved in all kinds of IT projects for over 30 years. He is also a long-time author of web development technologies and is renowned for the clarity of his explanations and examples. He resides in Paris, France. Some of his recent publications include _Master React in 5 Days_ (Apress), _ChatGPT for Beginners_ (Apress), and _JavaScript from Frontend to Backend _(Packt)Chapter 1. Day 1: Mastering Components in Vue.js.- Chapter 2. Day 2: Mastering Directives in Vue.js.- Chapter 3. Day 3: Mastering Events in Vue.js.- Chapter 4. Day 4: Mastering HTTP Requests in Vue.js.- Chapter 5. Day 5: Mastering the Creation of Directives in Vue.js.- Chapter 6. Day 6: Mastering the Creation of Composables in Vue.js.- Chapter 7. JavaScript Reminders.- Chapter 8. Book Summary.
Künstliche Intelligenz im Consulting
Dieses Buch befasst sich mit den aktuellen und zukünftigen Einflüssen von künstlicher Intelligenz auf die Branche und den Beruf der Unternehmensberatung. Im Fokus stehen dabei die Möglichkeiten der Delegation von Aufgaben an KI-Anwendungen sowie die Auswirkungen von KI auf die Anforderungen und Tätigkeiten in der Beratung. Abgerundet wird die Darstellung durch konkrete Handlungsempfehlungen für heutige und zukünftige Berater im Hinblick auf den eigenen Umgang und die Positionierung im Themenfeld KI. Der Inhalt KI-Grundlagen für UnternehmensberaterAuswirkungen von KI auf den Beruf und die Branche der UnternehmensberatungHandlungsempfehlungen für Unternehmensberater für den Umgang mit KI Die Zielgruppe Heutige und zukünftige Unternehmensberater Die Autoren Prof. Dr. Markus H. Dahm (MBA) ist Berater für Strategie und Digitale Transformation. Ferner lehrt und forscht er an der FOM Hochschule für Oekonomie & Management in den Themenfeldern künstliche Intelligenz, Business Consulting und agile Organisationsgestaltung. Er publiziert regelmäßig in wissenschaftlichen Fachmagazinen, Blogs und Online-Magazinen sowie der Wirtschaftspresse. Er ist Autor und Herausgeber zahlreicher Bücher. Benedikt Schulz (M.Sc.) ist Unternehmensberater und Digitalisierungsexperte mit einem starken thematischen Fokus auf die Welt der künstlichen Intelligenz. Neben seiner Tätigkeit für ein Schweizer Beratungs- und Softwareunternehmen forscht und publiziert er im Themenfeld der KI und beschäftigt sich insbesondere mit den Auswirkungen von künstlicher Intelligenz auf die Arbeitswelt. Dieses Buch befasst sich mit den aktuellen und zukünftigen Einflüssen von künstlicher Intelligenz auf die Branche und den Beruf der Unternehmensberatung. Im Fokus stehen dabei die Möglichkeiten der Delegation von Aufgaben an KI-Anwendungen sowie die Auswirkungen von KI auf die Anforderungen und Tätigkeiten in der Beratung. Abgerundet wird die Darstellung durch konkrete Handlungsempfehlungen für heutige und zukünftige Berater im Hinblick auf den eigenen Umgang und die Positionierung im Themenfeld KI. Prof. Dr. Markus H. Dahm (MBA) ist Berater für Strategie und Digitale Transformation. Ferner lehrt und forscht er an der FOM Hochschule für Oekonomie & Management in den Themenfeldern künstliche Intelligenz, Business Consulting und agile Organisationsgestaltung. Er publiziert regelmäßig in wissenschaftlichen Fachmagazinen, Blogs und Online-Magazinen sowie der Wirtschaftspresse. Er ist Autor und Herausgeber zahlreicher Bücher. Benedikt Schulz (M.Sc.) ist Unternehmensberater und Digitalisierungsexperte mit einem starken thematischen Fokus auf die Welt der künstlichen Intelligenz. Neben seiner Tätigkeit für ein Schweizer Beratungs- und Softwareunternehmen forscht und publiziert er im Themenfeld der KI und beschäftigt sich insbesondere mit den Auswirkungen von künstlicher Intelligenz auf die Arbeitswelt.
Privacy in the Age of Innovation
This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security.The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it gives you important information about the basics of AI, machine learning, and deep learning in simple terms. It also talks about the ethics of using AI in privacy and security, making sure you understand the power and responsibility that come with AI. Next, it takes you through the complex world of information security and data privacy. It covers everything from the current state of security to how AI can detect threats and protect privacy. Additionally, it delves into ethical considerations to ensure the responsible use of AI in managing data privacy. Later chapters discuss strategies and future trends in using AI for data security, finding the right balance between security and privacy, and giving useful advice for organizations.In the end, this book examines the current landscape and foresees the future, underscoring the vital importance of maintaining a balance between innovation and privacy in AI-powered security.What you will learn:* How AI is being used to detect and prevent cyberattacks in real-time* What are the AI-powered techniques for anonymizing and de-identifying data,* What are the latest advancements in AI-powered privacy-enhancing technologies (PETs)* How to find the right balance between security and privacyWho this book is for:Information security professionals, data scientists, and software developers seeking to gain an understanding of the latest trends and techniques in AI for information securityRANADEEP REDDY PALLE has over 12 years of experience and specializes in the development of distributed and scalable Microservices. His proficiency extends to deploying these Microservices on major cloud platforms like AWS and Azure, always prioritizing strict adherence to privacy and cybersecurity standards. Ranadeep has contributed extensively to journals, particularly in critical domains such as machine learning, AI, Cloud Computing, and data analytics. Holding diverse certifications in both Amazon Web Services (AWS) and Microsoft Azure, he currently serves as a Senior Software Engineer at Zoom in Austin, TX. In this role, he leads a team in implementing cutting-edge solutions and plays a crucial part in the design and development of Microservices for Consent Management, ensuring compliance with global privacy regulations. Ranadeep holds a Master's degree in Computer Science from the University of Houston, Texas.KRISHNA CHAITANYA RAO KATHALA is a prominent researcher in the field of Data Science, Analytics, Machine Learning, and AI, a Ph.D Candidate at the University of Massachusetts Amherst. With over 8 years of specialized experience in AI, Krishna's expertise covers a wide range of topics within Artificial Intelligence, including Generative AI, Ethics, Bias, Fairness, and Safe/Secure AI. He is a prolific scholar, having co-authored 2 books and secured more than 5 international patents. Additionally, Krishna has authored over 8 research papers published in prestigious journals. His influence in the academic and professional realms is widespread, often serving as a judge at more than 10 national and international events, including research symposiums and hackathons. Krishna also contributes actively to the academic community through roles on editorial boards, reviews, and program committees at various conferences. Krishna's merit in the field has led to invitations to speak at distinguished international forums such as the United Nations, the Ministry of Foreign Affairs Ukraine, UNESCO, UNDP, United Nations Women, the Office of the United Nations High Commissioner for Human Rights, and the Talent AI Foundation. His research excellence has been recognized with numerous significant awards and scholarships, highlighting his impactful contributions to AI and technology. He currently holds a leadership position as a Co-Chair at the Northeastern Educational Research Association, Inc., based in Boston, Massachusetts.Krishna is also an active member of the International Society for Technology in Education (ISTE) and the International Association of Engineers - Hong Kong. Beyond his research and professional activities, Krishna is deeply committed to mentoring, particularly focused on supporting first-generation, under-represented, and marginalized students in STEM fields. His dedication to fostering inclusivity and diversity within the tech community underscores his commitment to using his expertise to make a positive societal impact. Krishna holds a Masters degree in Data Science from University of Massachusetts Amherst.1. INTRODUCTION.- 2. UNDERSTANDING AI AND ETHICS.- 3. INFORMATION SECURITY AND DATA PRIVACY LANDSCAPE.- 4. AI FOR THREAT DETECTION AND PREVENTION.- 5. PRIVACY-PRESERVING AI TECHNIQUES.- 6. DATA PROTECTION AND COMPLIANCE.- 7. SECURING AI MODELS.- 8. CASE STUDIES.- 9. AI IN DATA PRIVACY AND ETHICS.- 10. AI AND DATA SECURITY.- 11. BALANCE BETWEEN SECURITY AND PRIVACY.- 12. BEST PRACTICES AND RECOMMENDATIONS.- 13. FUTURE TRENDS AND CHALLENGES.
Generative Artificial Intelligence
This book explains the field of Generative Artificial Intelligence (AI), focusing on its potential and applications, and aims to provide you with an understanding of the underlying principles, techniques, and practical use cases of Generative AI models.The book begins with an introduction to the foundations of Generative AI, including an overview of the field, its evolution, and its significance in today’s AI landscape. It focuses on generative visual models, exploring the exciting field of transforming text into images and videos. A chapter covering text-to-video generation provides insights into synthesizing videos from textual descriptions, opening up new possibilities for creative content generation. A chapter covers generative audio models and prompt-to-audio synthesis using Text-to-Speech (TTS) techniques. Then the book switch gears to dive into generative text models, exploring the concepts of Large Language Models (LLMs), natural language generation (NLG), fine-tuning, prompt tuning, and reinforcement learning. The book explores techniques for fixing LLMs and making them grounded and indestructible, along with practical applications in enterprise-grade applications such as question answering, summarization, and knowledge-based generation.By the end of this book, you will understand Generative text, and audio and visual models, and have the knowledge and tools necessary to harness the creative and transformative capabilities of Generative AI.WHAT YOU WILL LEARN* What is Generative Artificial Intelligence?* What are text-to-image synthesis techniques and conditional image generation?* What is prompt-to-audio synthesis using Text-to-Speech (TTS) techniques?* What are text-to-video models and how do you tune them?* What are large language models, and how do you tune them?WHO THIS BOOK IS FORThose with intermediate to advanced technical knowledge in artificial intelligence and machine learningSHIVAM SOLANKI is an accomplished Senior Advisory Data Scientist leading the AI team for a worldwide partner ecosystem to solve challenging problems using Artificial Intelligence (AI). Shivam holds a master’s degree from Texas A&M University with major coursework in Applied Statistics. Throughout his career, he has delved into various AI fields, including Machine Learning, Deep Learning, and Natural Language Processing (NLP). His expertise extends to Generative AI, where his practical experience and in-depth knowledge empower him to navigate its intricacies. As a researcher in Artificial Intelligence, Shivam has filed two patents for Machine Learning and Natural Language Processing (NLP), co-authored a book on Deep Learning, and published a paper in Generative AI.DRUPAD KHUBLANI is a skilled Senior Data Scientist and part of the revenue management team in a real estate company. His leadership in partnering with teams across marketing, call center operations, product management, customer experience, and operations has cultivated a wealth of experience, empowering him to extract actionable insights and co-create innovative solutions Drupad completed his graduate and postgraduate studies from the Indian Institute of Technology (Indian School of Mines) and Texas A&M University. Collaborating with Dr. Jean-Francois Chamberland on the development of technology to identify obstacles and gauge distances using only a monocular camera highlights Drupad's inventive approach and dedication to real-world applications, alongside his accomplishments in both the commercial and academic arenas.Chapter 1: Introduction to Generative AI.- Chapter 2: Text-to-Image Generation.- Chapter 3: From Script to Screen: Unveiling Text-to-Video Generation .- Chapter 4: Bridging Text and Audio in Generative AI.- Chapter 5: Introduction to Language Models (LLMs).- Chapter 6: Generative LLMs.- Chapter 7: Advanced Techniques for LLMs.- Chapter 8: Building Demo Applications using LLMs.- Chapter 9: Enterprise-Grade Apps using LLMs.
Digital Presences of Organizations
Organizations communicate in complex and various ways, and the context is mainly characterized by the pervasiveness of the digital ecosystem, including the Web, social networks and the Internet of data. However, its information delivery cannot overlook the requirements of multicultural communications at a variety of levels.Digital Presences of Organizations highlights the communication roadblocks faced by organizations as they emerge, arising not only from issues encountered on their own websites, but also as they construct online narratives. This multi-faceted and multi-strategy digital presence of organizations is addressed via three main thematic axes.The first focuses on differentiated strategies (content, services, interaction) that can be observed depending on the types of organizations and their users. The second examines the cultural dimension of websites, ranging from the local to the global. Finally, the third focuses on the role of narration in organizations' online communication strategies.NATHALIE PINÈDE is Professor of Information and Communication Sciences at Bordeaux Montaigne University, France.LUC MASSOU is Professor of Information and Communication Sciences at the University of Lorraine, France.PATRICK MPONDO-DICKA is a lecturer in Information and Communication Sciences at the University of Toulouse – Jean-Jaurès, France.Foreword xiiiPeter STOCKINGERIntroduction xviiNathalie PINÈDE, Luc MASSOU and Patrick MPONDO-DICKAPART 1. WEBSITES AND ORGANIZATIONAL STRATEGIES 1CHAPTER 1. WEBSITES AND THE AGENCY OF CIRCULATING ENTITIES 3Mariannig LE BÉCHEC1.1. Introduction 31.2. From website analysis to website network analysis 41.3. The concept of digital territories of brands 71.4. Conclusion 161.5. References 16CHAPTER 2. DANONE'S "DID YOU KNOW?": NARRATIVE STRATEGY AND IDENTITY DIALOGUE 21Stela RAYTCHEVA, Thierry CÔME and Gilles ROUET2.1. Introduction 212.2. Culture, strategy and narratives 232.3. Danone: storytelling of a culture 292.4. Danone's history and the use of the "Did you know?" insets on Facebook 412.5. A coherent communication strategy 452.6. Conclusion 472.7. References 49CHAPTER 3. WEBSITE AND MEDIA ETHOS: A CASE STUDY OF PHOTOGRAPHIC EQUIPMENT MANUFACTURERS 51Marion ROLLANDIN3.1. Introduction 513.2. The communication situation induced by a photographic equipment manufacturer's website 533.3. Initiating the photographic equipment manufacturer's media ethos 593.4. Media ethos and discursive strategy 633.5. Media ethos and audience segmentation 733.6. Conclusion 803.7. References 82CHAPTER 4. ANALYSES OF DIGITAL COMMUNICATION STRATEGIES FOR FAMILY CAREGIVERS 83Sébastien ROUQUETTE and Christelle CHAUZAL-LARGUIER4.1. Introduction 834.2. Methodology 854.3. Analytical corpus 874.4. The central position of websites in digital communication strategies 904.5. Websites: advantages for associative actors 944.6 Conclusion 1054.7. Appendix 1074.8. References 109CHAPTER 5. ASSOCIATIONS' ONLINE COMMUNICATION AND DISCURSIVE STRATEGIES: A CASE STUDY. 111Marcy Delsione OVOUNDAGA5.1. Introduction 1115.2. Theoretical framework 1135.3. Methodological approach 1145.4. Digital social media at the heart of organizations' new communication strategy 1185.5. Online discursive strategies at the heart of associations' social marketing 1225.6. Conclusion 1355.7. References 136PART 2. WEBSITES AND CULTURAL DYNAMICS 139CHAPTER 6. WEBSITE LOCALIZATION AND THE CULTURAL DIMENSION: PROFESSIONAL SKILLS 141Alexander FRAME and Will NOONAN6.1. Introduction 1416.2. Field-testing cultural localization: from words to action 1436.3. From (intercultural) communication to localization services 1516.4. Attempts and experiments for a complex, non-essentialist approach to cultural localization 1556.5. Conclusion 1636.6. References 165CHAPTER 7. REPRESENTATIVITY OF INDIGENOUS MINORITIES AND CULTURAL IDENTITY ON THE WEB 171Cécile-Marie MARTIN7.1. Introduction 1717.2. "Indigenous minorities", a terminology to designate without discriminating 1727.3. Web access routes for indigenous minorities 1787.4. Access strategies, from consultation to contribution 1867.5. Conclusion 1937.6. References 193CHAPTER 8. CULTURAL AND POLITICAL ANCHORS OF ENVIRONMENTAL COMMUNICATION ON THE WEB 199Sandra MELLOT, Anh Ngoc HOANG, Magali PRODHOMME and Anaïs THEVIOT8.1. Introduction 1998.2. Methodological approach: analysis of the ecological ethos in a digital regime 2028.3. Ethos of action (Greenpeace) 2088.4. Ethos of the will (WWF) 2118.5. Ethos of justice (L'Affaire du Siècle) 2148.6. Ethos of belief 2188.7. Structuring an ecological homonoia on the Web: emergency, praise and blame 2238.8. Conclusion 2278.9. References 228CHAPTER 9. COVID-19 AND DIGITAL FUNDRAISING: ACTORS, STRATEGIES AND PERSPECTIVES 231Géraud AHOUANDJINOU, Ornheilia ZOUNON, Agnès BADOU and Ismène KPÉDJO9.1. Introduction 2319.2. Theoretical and methodological framework 2339.3. Results and discussion 2469.4. Conclusion 2579.5. References 258Part 3. Communication of Organizations and Online Narrative 261CHAPTER 10. COMMUNICATING THROUGH NARRATIVE: ORGANIZATIONS FACING THE CHALLENGE OF THEIR COLLECTIVE DIMENSION? 263Julien FALGAS10.1. Introduction 26310.2. Defining the act of narrating by the storytelling, narration and story triad 26410.3. Application to the Web page analysis: the analysis framework of the manufacturing of representations 26910.4. From the manufacturing of the narration to a critique of the narrative communication of organizations on digital social networking sites 28010.5. Conclusion 28310.6. References 285CHAPTER 11. TRANSMEDIA AND ONLINE STORYTELLING: FROM EPHEMERAL UNIVERSES TO ARCHIVES 289Mélanie BOURDAA11.1. Introduction 28911.2. New term, old creations: a quick historical overview 29111.3. Evolutionary transmedia websites: a progression of and in storytelling 29311.4. Apps and social media: an engaging transmedia strategy 29911.5. Fans' archives: preserving ephemeral devices 30311.6. Conclusion 30511.7. References 306CHAPTER 12. AUGMENTED STORYTELLING AND NETFLIX SERIES PROMOTION STRATEGY 309Frédéric AUBRUN and Thomas BIHAY12.1. Introduction 30912.2. Augmented storytelling from explicit, implicit and zero textures 31212.3. Unadvertization of promotional discourse of series 31612.4. Conclusion 32212.5. References 325List of Authors 327Index 331
Game Development with Unreal Engine 5 Volume 1
Dive into the heart of game development with Unreal Engine 5 (UE5), the latest revolution in creating immersive and visually stunning game worlds. Crafted to encourage your imaginative and inventive skills, Volume 1 of this two-part guide stands as a crucial tool in your journey towards developing incredible video games with UE5 and serves as a transition into the programming dimensions of game creation with C++ featured in Volume 2.Blending artistic mastery with technical prowess, you’ll journey from the basics of UE5’s environment to creating expansive landscapes with procedural content generation and combining materials for lifelike terrains. Discover the power of Quixel Bridge and Megascans to bring realistic textures and models into your projects, and master Nanite for rendering complex scenes with cinematic fidelity.You’ll also learn to create dynamic lighting and shadow effects with Lumen, enrich your game’s atmosphere with sophisticated particle systems using Niagara. Then integrate characters and adversaries into our worlds, making them come alive with interactive elements. From designing large open landscapes to implementing advanced visual effects, _Game Development with UE 5, Volume 1 _is your gateway to elevating the visual appeal and interactive experience of your game.WHAT YOU WILL LEARN* Sculpt vast, open worlds with UE5's advanced landscape tools and Heightmaps.* Construct highly detailed environments with Nanite, achieving unparalleled visual quality without sacrificing performance.* Introduce dynamic global illumination with Lumen, crafting stunning lighting and shadow effects that respond to changes in the game world in real-time.* Implement Real-Time Virtual Textures to significantly enhance texture streaming efficiency in large-scale environments.* Use Procedural Content Graph to populate your game worlds with dynamic, lifelike vegetation that adds depth and realism to your landscapes.* Explore Niagara's powerful visual effects system to create complex and captivating effects that elevate the aesthetic appeal of your game.WHO THIS BOOK IS FORGame developers who want to learn how to use Unreal Engine 5 would benefit from this book.Dr. Tiow Wee Tan is an Associate Professor at Department of Game Department, Inland Norway University of Applied Science (INN), Norway. He is also serves as the Course Co-ordinator for the Augmented and Virtual Reality Add-On Program at the Game School.Tiow Wee's interests revolve around the development of Extended Reality (XR) for cross-disciplinary enterprise application. He was actively participated in projects on Neural Networks and Artificial Intelligent (AI) for gaming. Some of his works focus on the utilization of AR & VR technology within games engine; the creation of hybrid version of AR and VR research application for healthcare, art, and tourism; and the exploration of cognitive aspects in human-computer interaction environments, integrated into neural network systems.Chapter 1. Getting Started with Unreal Engine 5.- Chapter 2. From Heightmap to Large Open World Landscape.- Chapter 3.- Auto-Blend Landscape Materials.- Chapter 4. Revitalizing Visuals: Asset Import and Procedural Creation.- Chapter 5. Enhancing Visual Realism with Realtime Virtual Textures and Material Blending.- Chapter 6. Mastering Lumen Global Illumination in Unreal Engine 5.- Chapter 7. Harnessing the Power of Niagara: Practical Examples in Unreal Engine 5.
Deep Reinforcement Learning with Python
Gain a theoretical understanding to the most popular libraries in deep reinforcement learning (deep RL). This new edition focuses on the latest advances in deep RL using a learn-by-coding approach, allowing readers to assimilate and replicate the latest research in this field.New agent environments ranging from games, and robotics to finance are explained to help you try different ways to apply reinforcement learning. A chapter on multi-agent reinforcement learning covers how multiple agents compete, while another chapter focuses on the widely used deep RL algorithm, proximal policy optimization (PPO). You'll see how reinforcement learning with human feedback (RLHF) has been used by chatbots, built using Large Language Models, e.g. ChatGPT to improve conversational capabilities.You'll also review the steps for using the code on multiple cloud systems and deploying models on platforms such as Hugging Face Hub. The code is in Jupyter Notebook, which canbe run on Google Colab, and other similar deep learning cloud platforms, allowing you to tailor the code to your own needs.Whether it’s for applications in gaming, robotics, or Generative AI, Deep Reinforcement Learning with Python will help keep you ahead of the curve.WHAT YOU'LL LEARN* Explore Python-based RL libraries, including StableBaselines3 and CleanRL * Work with diverse RL environments like Gymnasium, Pybullet, and Unity ML* Understand instruction finetuning of Large Language Models using RLHF and PPO* Study training and optimization techniques using HuggingFace, Weights and Biases, and Optuna WHO THIS BOOK IS FORSoftware engineers and machine learning developers eager to sharpen their understanding of deep RL and acquire practical skills in implementing RL algorithms fromscratch.Nimish is a seasoned entrepreneur and an angel investor, with a rich portfolio of tech ventures in SaaS Software and Automation with AI across India, the US and Singapore. He has over 30 years of work experience. Nimish ventured into entrepreneurship in 2006 after holding leadership roles at global corporations like PwC, IBM, and Oracle.Nimish holds an MBA from Indian Institute of Management, Ahmedabad, India (IIMA), and a Bachelor of Technology in Electrical Engineering from Indian Institute of Technology, Kanpur, India (IITK).Chapter 1: Introduction to Reinforcement Learning.- Chapter 2: The Foundation – Markov Decision Processes.- Chapter 3: Model Based Approaches.- Chapter 4: Model Free Approaches.- Chapter 5: Function Approximation and Deep Reinforcement Learning.- Chapter 6: Deep Q-Learning (DQN).- Chapter 7: Improvements to DQN.- Chapter 8: Policy Gradient Algorithms.- Chapter 9: Combining Policy Gradient and Q-Learning.- Chapter 10: Integrated Planning and Learning.- Chapter 11: Proximal Policy Optimization (PPO) and RLHF.- Chapter 12: Introduction to Multi Agent RL (MARL).- Chapter 13: Additional Topics and Recent Advances.
Exact and Approximate Solutions for Mathematical Models in Science and Engineering
On Spectroscopy of Sampled Signals Using the Hilbert Transform (Bodmann).- Approximation of Solution for Bending of an Elastic Plate: Interior vs Exterior Cases (Constanda).- A PDE method for modelling the soil temperature of cropfields with data fromWireless Sensor Networks (Fresneda-Portillo).- Extreme cases in boundary homogenization for the linear elasticity system (Perez-Martinez).- A Model of the Spread of a Disease Through a Population With Different Age Groups (Harris).- A survey on the boundary behavior of the double layer potential in Schauder spaces in the frame of an abstract approach (Cristoforis).- The Dirichlet Problem on Rough Domains and Herz Spaces (Mitrea).- Analytical Solution of Slug Low SalinityWaterflooding (Pires).- PN synthetic acceleration for the source iteration scheme in slab-geometry discrete ordinates transport calculations (Barros).- Dynamic iteration error analysis (Zubik-Kowal).
300 Keywords Generative KI
Von A wie Alignment bis Z wie Zensur: Dieses Nachschlagewerk bietet in mehr als 300 Einträgen einen Überblick über das Thema der generativen KI. Es klärt zahlreiche Fachbegriffe, stellt Anwendungsbereiche vor und diskutiert aktuelle Fragestellungen. Dabei spielen neben technischen und wirtschaftlichen Fragen insbesondere ethische und ästhetische eine Rolle. So wird nach der Schönheit von Artefakten gefragt, es wird die Stellung von Bildern zwischen Kunst und Kitsch ausgeleuchtet, und es wird eine Bias-Diskussion zu Text- und Bildgeneratoren geführt. Insgesamt steht der Nutzen der generativen KI im Vordergrund, und die Freude und Lust, sie zu benutzen. Das Buch richtet sich an ein breites Publikum, etwa Journalisten, Politiker und Bürger, aber auch an Wissenschaftler aller Bereiche.
Algorithmen kapieren
* VISUELLE ERLÄUTERUNGEN MIT ÜBER 400 ANSCHAULICHEN ILLUSTRATIONEN* MIT EINFACHEN BEISPIELEN AUS DEM ALLTAG UND ZAHLREICHEN ÜBUNGEN* AUSFÜHRLICH KOMMENTIERTER BEISPIELCODE IN PYTHONALGORITHMEN KAPIEREN OHNE GRAUE THEORIEAb sofort sind Algorithmen nicht mehr langweilig und trocken! Mit diesem Buch wird es dir leichtfallen, ihre Funktionsweise zu verstehen. Alle Algorithmen werden mithilfe von Beispielen aus dem täglichen Leben erläutert, z.B. der Unterschied zwischen Arrays und verketteten Listen anhand der Aufgabe, freie Plätze in einem Kinosaal zu finden.FÜR DEN EINSATZ IN DER PRAXISDu lernst die wichtigsten Algorithmen kennen, die dir dabei helfen, deine Programme zu beschleunigen, deinen Code zu vereinfachen und die gängigsten Aufgaben bei der Programmierung zu lösen. Dabei beginnst du mit einfachen Aufgaben wie Sortieren und Suchen. Mit diesen Grundlagen gerüstet kannst du auch schwierigere Aufgaben wie Datenkomprimierung oder künstliche Intelligenz in Angriff nehmen.VISUELL UND PRAXISNAHZu allen Erläuterungen findest du anschauliche Illustrationen und Diagramme sowie ausführlich kommentierten Beispielcode in Python. Übungsaufgaben mit Lösungen für jedes Kapitel helfen dir, dein Wissen zu testen und zu festigen.AUS DEM INHALT:* Such-, Sortier- und Graphenalgorithmen* Performance von Algorithmen analysieren (Landau-Notation)* Arrays, verkettete Listen und Hashtabellen* Bäume und balancierte Bäume* Rekursion und Stacks* Quicksort und das Teile-und-herrsche-Verfahren* Dijkstra-Algorithmus für die Ermittlung des kürzesten Pfads* Approximationsalgorithmen und NP-vollständige Probleme* Greedy-Algorithmen* Dynamische Programmierung* Klassifikation und Regression mit dem k-Nächste-Nachbarn-AlgorithmusSTIMMEN ZUM BUCH»Das Buch schafft das Unmögliche: Mathe macht Spaß und ist einfach.« (- Sander Rossel, COAS Software Systems)»Algorithmen sind nicht langweilig! Die Lektüre des Buchs hat mir und meinen Studenten Spaß gemacht und war lehrreich.« (- Christopher Haupt, Mobirobo, Inc.)»Heutzutage gibt es praktisch keinen Aspekt des Lebens, der nicht durch einen Algorithmus optimiert wird. Dieses Buch sollte Ihre erste Wahl sein, wenn Sie eine gut erklärte Einführung in dieses Thema suchen.« (- Amit Lamba, Tech Overture, LLC)Aditya Bhargava ist Softwareentwickler und beschäftigt sich nicht nur mit Informatik, sondern auch mit bildender Kunst. Er bloggt über Programmierung unter adit.io.
DevSecOps Adventures
Discover a groundbreaking approach to introducing DevSecOps. _DevSecOps Adventures_ uses three innovative games to help you to maximize engagement in your training and transform learners’ mindsets, turning even reluctant sceptics into supporters and advocates of the DevOps culture.The book’s first coaching game uses LEGO, Chocolate, and role cards to explore the roles and interdependencies of Dev, Ops, and Security. Readers will experience Aha! moments, expand their individual roles, develop T-shaped skills, and experiment with changing organizational culture. The simulations depict an end-to-end product delivery process, highlighting bottlenecks in the value delivery flow. Additionally, the book is updated with two new games, "Fear in the Workplace" and "Safety in the Workplace" which provide insights into safety culture, drawing inspiration from the works of Ron Westrum, William Kahn, Amy C. Edmondson, and Dr. David Rock. Through open conversations, participants learn to identify signs of a fear-ridden culture and apply safety-enhancing practices to foster a culture of experimentation and learning.This Second Edition is enhanced with real-life examples and includes the insights from important State of DevOps reports. The updated “Key Takeaway” chapter and the new FAQ chapter prepare trainers to deliver an impactful learning experience. It serves as a facilitation guide for gamified experiential learning, provides ideas for effective debriefing, and helps readers relate the issues highlighted in the coaching games to similar challenges they may face in their organizations.WHAT YOU WILL LEARN:* Gain fundamental understanding of DevOps, DevSecOps, and Safety Culture.* Develop the capability to prepare, facilitate, and effectively debrief these coaching games with your teams.* Showcase how playfulness can help teams bring down a "wall of confusion" between the different functional silos. WHO THIS BOOK IS FORProgrammers or system admins/project managers who are new to DevOps.DevOps trainers and Agile Coaches who are interested in offering a collaborative and engaging learning experience to their teams.DANA PYLAYEVA is a business games designer, trainer and DevOps Culture coach, who is known for infusing playfulness into the most serious workplaces. She offers a unique blend of expert-level knowledge, exceptional facilitation skills, professional coaching mindset, and a diverse technical background as a former Java Developer, DBA Manager and Application Architect.Dana is equally effective in coaching teams, coaching leaders, and navigating the complexity of enterprise transformations. She enjoys working with clients across diverse industries such as legal publishing, automotive, digital marketing, retail, fintech, music streaming, non-profits, etc. In her 25+ years of experience, she has collaborated with clients from the US, Canada, the UK, Ireland, France, India, Japan, Malaysia, and Australia. She speaks at conferences internationally and has led workshops at 80 conferences in 18 countries.Dana holds a Certified Enterprise Coach (CEC) designation from Scrum Alliance, Professional Certified Coach (PCC) credentials from the International Coaching Federation (ICF), and a Certified Professional Co-Active Coach (CPCC) certification from Co-Active Training Institute.Dana is passionate about helping others grow and supporting the Agile/Scrum community. Through the years, she has been involved in various community roles as a volunteer, reviewer, track chair, program chair and conference chair at Agile Alliance and Scrum Alliance organizations. She is the founder of the Big Apple Scrum Day conference in NYC, and a co-organizer of several local user groups.1. Introduction.- 2. About this Book.- 3. Brief History of DevOps and DevSecOps.- 4. What You Will Teach with LEGO and Chocolate Simulation.- 5. LEGO and Chocolate - Rules of the Game.- 6. Game Components.- 7. Setting the Space.- 8. Know Your Timebox.- 9. Be a Gamemaster.- 10. Fear in the Workplace Game.- 11. Safety in the Workplace Coaching Game.- 12. Master Your Debriefing.- 13. Key Takeaways.- 14. Frequently Asked Questions.- 15. Play History and Modifications - It's All About the Feedback!- 16. Kickstarting Transformations with Games - Field Stories.- Appendix.
Augmented Reality and Virtual Reality in Special Education
DISCOVER THE GROUNDBREAKING POTENTIAL OF AUGMENTED REALITY IN SPECIAL EDUCATION WITH THIS COMPREHENSIVE BOOK, WHICH FILLS A SIGNIFICANT RESEARCH GAP AND EXPLORES THE TRANSFORMATIVE IMPACT OF AR/VR ON TEACHING AND LEARNING EXPERIENCES FOR INDIVIDUALS WITH DISABILITIES.Millions of young people across the world have impairments. Because of their apparent problems, these young people have typically been marginalized or excluded from schools. Studies on augmented reality applications in education for special children are still in their early stages and there is a dearth of research on the effects and implications of augmented reality in education for special children or individuals with special needs, such as intellectual disabilities, autism spectrum disorder, attention deficit hyperactivity disorder, and physical disabilities. Technological advancements have enabled the creation of whole new learning environments, vastly expanding the breadth and sophistication of teaching and learning activities. For example, several studies have shown that virtual reality and augmented reality can help autistic people understand facial emotions and improve their social skills. By compiling a collection of conceptual and research chapters investigating the infiltration of AR/VR into teaching and learning practices and experiences for disabled people, this book will fill a significant gap in current research literature. V. AJANTHA DEVI, PhD is a research head at AP3 Solutions, Chennai, Tamil Nadu, India. She is a Microsoft Certified Application Developer (MCAD) and Microsoft Certified Technical Specialist (MCTS) with more than 35 papers in international journals and conference proceedings to her credit. She has written, co-authored, and edited several books in the field of computer and has five Australian patents and one Indian patent to her credit in the areas of artificial intelligence, image processing, and medical imaging. WILLIAMJEET SINGH, PhD is an assistant professor in the Department of Computer Science and Engineering at Punjabi University, Patiala, Punjab, India. He has over 12 years of teaching and research experience and is the author of many research papers and articles published in national and international journals and conferences of repute. He is working on techno-social projects, one of which was awarded to him by the Department of Science and Technology (DST), New Delhi, India. Most recently, his work includes developing a mobile app for hearing-impaired individuals called World of Indian Sign Language. YOGESH KUMAR, PhD is an associate professor in the Department of Computer Engineering, Indus University, Ahmedabad, Gujarat. He has more than 14 years of experience in research and teaching. He has published ten papers, six book chapters, 12 papers in international conferences, 28 articles in peer-reviewed journals, and has been granted four patents. Preface xiii1 Digital Learning Environments--Constructing Augmented and Virtual Reality in Educational Applications 1Kapil Mehta and Chamkaur Singh2 Role of AR and VR Technology in Transforming Education Ecology 33Gagandeep Kaur, Harpreet Kaur, Sonia Goyal, Veerpal Kaur and Prabhleen Kaur3 Enhancing Social Skills Development Through Augmented Reality (AR) and Virtual Reality (VR) in Special Education 65Ajantha Devi Vairamani4 Immersive Learning's Promise: The Educational Potential of Augmented and Virtual Reality 91Priya Trivedi5 Influence of Augmented Reality and Virtual Reality in Special Education in India 103Ravichandran K.6 Exploring the Untapped Potential of the Metaverse in Special Education: A Comprehensive Analysis of Applications and AI Integration 121K. B. Priya Iyer and Ajantha Devi Vairamani7 Fostering and Integrating Augmented Reality/Virtual Reality Experiences for Learners with Autism Spectrum Disorders (ASDs) 141Usha Nandhini R. and P. Senthamizh Pavai8 Impact of AR/VR in the Learning Process of Children with Dyslexia 161C.V. Suresh Babu and Vinutha S.9 Immersive Experience in the Education of Special Kids Using the Metaverse Platform 189Magesh Kasthuri10 Privacy and Security Concerns with Augmented Reality/Virtual Reality: A Systematic Review 209Sukhpreet Kaur, Saumya Rajvanshi and Gurleen KaurAcknowledgement 228Conflict of Interest Statement 228References 228Index 233
Bio-Inspired Optimization for Medical Data Mining
THIS BOOK IS A COMPREHENSIVE EXPLORATION OF BIO-INSPIRED OPTIMIZATION TECHNIQUES AND THEIR POTENTIAL APPLICATIONS IN HEALTHCARE.Bio-Inspired Optimization for Medical Data Mining is a groundbreaking book that delves into the convergence of nature’s ingenious algorithms and cutting-edge healthcare technology. Through a comprehensive exploration of state-of-the-art algorithms and practical case studies, readers gain unparalleled insights into optimizing medical data processing, enabling more precise diagnosis, optimizing treatment plans, and ultimately advancing the field of healthcare. Organized into 15 chapters, readers learn about the theoretical foundation of pragmatic implementation strategies and actionable advice. In addition, it addresses current developments in molecular subtyping and how they can enhance clinical care. By bridging the gap between cutting-edge technology and critical healthcare challenges, this book is a pivotal contribution, providing a roadmap for leveraging nature-inspired algorithms. In this book, the reader will discover* Cutting-edge bio-inspired algorithms designed to optimize medical data processing, providing efficient and accurate solutions for complex healthcare challenges;* How bio-inspired optimization can fine-tune diagnostic accuracy, leading to better patient outcomes and improved medical decision-making;* How bio-inspired optimization propels healthcare into a new era, unlocking transformative solutions for medical data analysis;* Practical insights and actionable advice on implementing bio-inspired optimization techniques and equipping effective real-world medical data scenarios;* Compelling case studies illustrating how bio-inspired optimization has made a significant impact in the medical field, inspiring similar success stories. AUDIENCEThis book is designed for a wide-ranging audience, including medical professionals, healthcare researchers, data scientists, and technology enthusiasts. SUMIT SRIVASTAVA, PHD, is the director of Information Technology at Manipal University, Jaipur, India. He obtained his doctorate in data mining from the University of Rajasthan, India. His areas of research involve algorithms, data science, knowledge, and engineering education. He has published more than 70 research papers in review journals.ABHINEET ANAND, PHD, is a professor in computer science and engineering at Chandigarh University, Mohali, Punjab. He is also the director of the institution. His research includes artificial intelligence, machine learning, cloud computing, optical fiber, etc. He has published in various international journals and conferences, along with four book chapters.ABHISHEK KUMAR, PHD, is an associate professor in the Computer Science & Engineering Department at Chandigarh University, Punjab, India, and is affiliated with the University of Castilla-La Mancha (UCLM), Toledo, Spain. His research areas include artificial intelligence, renewable energy, image processing, and machine learning. In total, he has more than 100 publications in peer-reviewed journals. Kumar is a keynote speaker and a member of various national and international societies in the field of engineering and research. He was awarded the CV Ramen National Award in 2018 in the young researcher and faculty category.BHAVNA SAINI, PHD, is an assistant professor at Central University, Rajasthan, India. His areas of research include face recognition and fingerprint recognition, data management systems, machine learning, and computer vision. He has numerous books and research papers at national and international levels.PRAMOD SINGH RATHORE is an assistant professor in the Department of Computer and Communication Engineering, Manipal University Jaipur, India. He has teaching experience of more than 10 years and has 45 publications in peer-reviewed national and international journals.Preface xv1 BIOINSPIRED ALGORITHMS: OPPORTUNITIES AND CHALLENGES 1Shweta Agarwal, Neetu Rani and Amit Vajpayee1.1 Introduction 21.2 Bioinspired Principles and Algorithms 31.3 Opportunities of Bioinspired Algorithms 71.4 Challenges of Bioinspired Algorithms 91.5 Prominent Bioinspired Algorithms 121.6 Applications of Bioinspired Algorithms 181.7 Future Research Directions 211.8 Conclusion 232 EVALUATION OF PHYTOCHEMICAL SCREENING AND IN VITRO ANTIUROLITHIATIC ACTIVITY OF MYRISTICA FRAGRANS BY TITRIMETRY METHOD USING MACHINE LEARNING 31G. Lalitha, S. Surya and M.P. Karthikeyan2.1 Introduction 322.2 Methodology 332.3 Result and Discussion 352.4 Conclusion 383 PARKINSON'S DISEASE DETECTION USING VOICE AND SPEECH--SYSTEMATIC LITERATURE REVIEW 41Ronak Khatwad, Suyash Tiwari, Yash Tripathi, Ajay Nehra and Ashish Sharma3.1 Introduction 423.2 Research Questions 433.3 Method 443.4 Algorithms 603.5 Features 633.6 Conclusion 674 TUMOR DETECTION AND CLASSIFICATION 75Hermehar P.S. Bedi, Sukhpreet Kaur and Saumya Rajvanshi4.1 Introduction 764.2 Methods Used for Detection of Tumors 774.3 Methods Used for Classification of Tumours 804.4 Machine Learning 844.5 Deep Learning (DL) 894.6 Performance Metrics 954.7 Method Wise Trend of Using Techniques for Detection of Brain Tumor 974.8 Conclusion 975 ADVANCEMENTS IN TUMOR DETECTION AND CLASSIFICATION 103Mayank Puri, Aman Garg and Lekha Rani5.1 Introduction 1045.2 Imaging Techniques Used in Tumor Detection and Classification 1055.3 Molecular Biology Techniques 1115.4 Machine Learning and Artificial Intelligence 1155.5 Tumor Classification 1215.6 Challenges and Future Directions 1256 CLASSIFICATION OF BRAIN TUMOR USING MACHINE LEARNING TECHNIQUES: A COMPARATIVE STUDY 129Gandla Shivakanth, Bhaskar Marapelli, A. Shivakumar Reddy, Dasari Manasa and Samtha Konda6.1 Introduction 1306.2 Related Work 1316.3 Datasets 1326.4 Experimental Setup 1336.5 Results and Discussion 1346.6 Conclusion 1367 EXPLORING THE POTENTIAL OF DINGO OPTIMIZER: A PROMISING NEW METAHEURISTIC APPROACH 141Anju Yadav and Vivek Kumar Varma7.1 Introduction 1417.2 Architecture of Dingo Optimizer 1427.3 Initialization Process 1447.4 Iteration Phase 1487.6 Other Optimization Techniques 1507.7 Conclusion 1518 BIOINSPIRED GENETIC ALGORITHM IN MEDICAL APPLICATIONS 155Krati Taksali, Arpit Kumar Sharma and Manish Rai8.1 Introduction 1568.2 The Genetic Algorithm 1578.3 Radiology 1588.4 Oncology 1608.5 Endocrinology 1618.6 Obstetrics and Gynecology 1628.7 Pediatrics 1628.8 Surgery 1638.9 Infectious Diseases 1648.10 Radiotherapy 1648.11 Rehabilitation Medicine 1658.12 Neurology 1658.13 Health Care Management 1668.14 Conclusion 1669 ARTIFICIAL IMMUNE SYSTEM ALGORITHMS FOR OPTIMIZING NANOPARTICLE DESIGN IN TARGETED DRUG DELIVERY 169Ashish Kumar and Vivek Verma9.1 Introduction 1709.2 Artificial Immune Cells 1719.3 The Artificial Immune System Architecture 17210 DIABETIC RETINOPATHY DETECTION BY RETINAL BLOOD VESSEL SEGMENTATION AND CLASSIFICATION USING ENSEMBLE MODEL 185Gandla Shivakanth, K. Aruna Bhaskar, Bechoo Lal, A. Shivakumar Reddy and D. Manasa10.1 Introduction 18610.2 Literature Review 18710.3 Proposed System 18810.4 Conclusion and Future Scope 19811 DIABETES PROGNOSIS MODEL USING VARIOUS MACHINE LEARNING TECHNIQUES 201Pawan Kumar Patidar, Manish Bhardwaj and Sumit Kumar11.1 Introduction 20211.2 Literature Review 20911.3 Proposed Model 21111.4 Experimental Results and Discussion 21311.5 Conclusion 22212 DIAGNOSIS OF NEUROLOGICAL DISEASE USING BIOINSPIRED ALGORITHMS 227Inam Ul Haq12.1 Introduction 22812.2 Neurological Disease Diagnosis 24412.3 Challenges and Future Directions 26012.4 Conclusion 26413 OPTIMIZING ARTIFICIAL NEURAL-NETWORK USING GENETIC ALGORITHM 269Bhavy Pratap and Sulabh Bansal13.1 Introduction 27013.2 Methodology 27813.3 Brief Study on Existing Implementations 28313.4 Comparative Study on Different Implementations 28514 BIOINSPIRED APPLICATIONS IN THE MEDICAL INDUSTRY: A CASE STUDY 289Alankrita Aggarwal and Mohit Lalit14.1 Introduction 29014.2 Overview of Bioinspired Algorithms 29114.3 Applications of Bioinspired Algorithms in Medical Field 29614.4 Review of the Case Studies 29714.5 Case Study 29714.6 Some Examples of the Case Studies Related to Medical Field and Can Be Solved with Bioinspired Algorithms 30014.7 Future Directions and Recommendations for Future Research 30214.8 Conclusion and Summary of Findings 306References 307Index 309
Praxisbuch ISO/IEC 27001
- Das umfassende Praxisbuch zum Management der Informationssicherheit- Enthält die vollständige Norm DIN EN ISO/IEC 27001:2024- Unentbehrlich für Betreiber kritischer Infrastrukturen (-> IT-Sicherheitsgesetz)- Mit 80 Prüfungsfragen zur Vorbereitung auf die Foundation-Zertifizierung- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesInformationen sind das wertvollste Kapital vieler Organisationen. Geraten sie in falsche Hände, kann sogar das Überleben eines Unternehmens gefährdet sein. Zur Informationssicherheit müssen alle ihren Beitrag leisten, von der Arbeitsebene bis zum Topmanagement. Die ISO / IEC 27001 stellt dabei die wichtigste internationale Norm dar, an der man praktisch in keiner Branche vorbeikommt. Ein dieser Norm entsprechendes Informationssicherheitsmanagementsystem (ISMS) ist zunehmend Voraussetzung für die Erfüllung von Kunden-Anforderungen sowie von gesetzlichen und behördlichen Vorgaben, u. a. im Rahmen des IT-Sicherheitsgesetzes.In diesem Buch erhalten Sie die optimale Unterstützung für den Aufbau eines wirksamen ISMS. Die Autoren vermitteln zunächst das notwendige Basiswissen zur ISO / IEC 27001 sowie zur übergeordneten Normenreihe und erklären anschaulich die Grundlagen. Im Hauptteil finden Sie alle wesentlichen Teile der deutschen Fassung der Norm, DIN EN ISO / IEC 27001, im Wortlaut. Hilfreiche Erläuterungen, wertvolle Praxistipps für Maßnahmen und Auditnachweise helfen Ihnen bei der Umsetzung der Norm. Ebenfalls enthalten sind Prüfungsfragen und -antworten, mit deren Hilfe Sie sich optimal auf Ihre persönliche Foundation-Zertifizierung vorbereiten können. Das Buch schließt mit einem Abdruck der kompletten Norm DIN EN ISO/ IEC 27001:2024.Die Autoren: Michael Brenner, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser und Thomas Schaaf arbeiten u. a. an der Ludwig-Maximilians-Universität München, der Universität der Bundeswehr München und am Leibniz-Rechenzentrum der Bayerischen Akademie der Wissenschaften. Als Mitglieder der Forschungsgruppe Munich Network Management Team (www.mnmteam.org) forschen und lehren sie alle zu den Themen Informationssicherheitsmanagement und IT-Service-Management.AUS DEM INHALT //- Einführung und Basiswissen- Die Standardfamilie ISO / IEC 27000 im Überblick- Grundlagen von Informationssicherheitsmanagementsystemen- ISO / IEC 27001- Spezifikationen und Mindestanforderungen- Maßnahmen im Rahmen des ISMS- Verwandte Standards und Rahmenwerke- Zertifizierungsmöglichkeiten und Begriffsbildung nach ISO/ IEC 27000- Abdruck der vollständigen DIN EN ISO / IEC 27001:2024- Vergleich der Normenfassungen von 2017 und 2024- Prüfungsfragen mit Antworten zur ISO / IEC 27000 Foundation