Computer und IT
Lean UX
DAS STANDARDWERK FÜR AGILE UX-TEAMS * Die erfolgreichen Methoden von Lean Startup im UX-Design einsetzen * Von den Lean-UX-Prinzipien bis zur Integration der -Praktiken im Team und Unternehmen * Für UX-Designer*innen, Scrum Master und Manager*innen Lean UX ist ein Synonym für modernes Produktdesign und -entwicklung. Durch die Kombination von menschenzentriertem Design, agilen Arbeitsweisen und einem ausgeprägten Geschäftssinn machen Designer*innen, Produktmanager*innen, Entwickler*innen und Scrum Master auf der ganzen Welt Lean UX heute zum führenden Ansatz für digitale Produktteams. In der dritten Auflage dieses preisgekrönten Buches helfen Ihnen die Autoren Jeff Gothelf und Josh Seiden, sich auf das Produkterlebnis und nicht auf die Ergebnisse zu konzentrieren. Sie lernen Taktiken für die Integration von User Experience Design, Produktentdeckung, agilen Methoden und Produktmanagement kennen. Und Sie erfahren, wie Sie Ihr Design in kurzen, iterativen Zyklen vorantreiben können, um zu ermitteln, was für Unternehmen und Benutzer*innen am besten funktioniert. Lean UX führt Sie durch diesen Wandel – zum Besseren. - Erleichtern Sie Ihrem Team den Lean-UX-Prozess mit dem Lean-UX-Canvas. - Stellen Sie sicher, dass jedes Projekt mit klaren kundenzentrierten Erfolgskriterien beginnt. - Verstehen Sie die Rolle des Designers in einem agilen Team. - Stellen Sie sicher, dass die Designarbeit in jedem Sprint stattfindet. - Bauen Sie Produktentdeckung in die "Geschwindigkeit" Ihres Teams ein.
Das DevOps-Handbuch (2. Auflage)
Teams, Tools und Infrastrukturen erfolgreich umgestaltenDie IT ist heute das Herzstück eines jeden Unternehmens, unabhängig vom Geschäftsmodell oder Produkt. DevOps-Praktiken werden daher immer häufiger nicht nur in der IT-Abteilung genutzt, sondern im gesamten Unternehmen eingeführt. Diese Entwicklung veranschaulichen auch die zahlreichen neuen Fallstudien beispielsweise von Adidas oder American Airlines, um die die Neuauflage dieses Standardwerks erweitert wurde.Das DevOps-Handbuch – jetzt aktualisiert und durch neueste Erkenntnisse und Methoden ergänzt – erläutert, wie die DevOps-Philosopie praktisch implementiert wird: Sie lernen konkrete Tools und Techniken kennen, die Ihnen helfen, Software schneller und sicherer zu produzieren. Zudem stellt das Autorenteam Ihnen Maßnahmen vor, die die Zusammenarbeit aller Abteilungen optimieren, die Arbeitskultur verbessern und die Profitabilität Ihres Unternehmens steigern.Die 2. Auflage wurde vollständig aktualisiert und durch die neuesten Forschungsergebnisse und 15 neue Case Studies erweitert.Themen des Buchs sind: Die Drei Wege: Die obersten Prinzipien, von denen alle DevOps-Maßnahmen abgeleitet werdenEinen Ausgangspunkt finden: Eine Strategie für die DevOps-Transformation entwickeln, Wertketten und Veränderungsmuster kennenlernen, Teams schützen und fördernFlow beschleunigen: Den schnellen Fluss der Arbeit von Dev hin zu Ops ermöglichen durch eine optimale Deployment-Pipeline, automatisierte Tests, Continuous Integration und Continuous DeliveryFeedback verstärken: Feedback-Schleifen verkürzen und vertiefen, Telemetriedaten erzeugen und Informationen unternehmensweit sichtbar machenKontinuierliches Lernen ermöglichen: Eine »Just Culture« aufbauen und ausreichend Zeit reservieren, um das firmenweite Lernen zu fördern
Blockchain Security from the Bottom Up
THE GOLD STANDARD IN UP-TO-DATE BLOCKCHAIN CYBERSECURITY HANDBOOKSIn Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology’s ecosystem. You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution. You’ll also find:* Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem* Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts* Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of workA can’t-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations. HOWARD E. POSTON III is an independent blockchain consultant, educator, and content creator who has developed and taught over a dozen courses covering cybersecurity topics. He holds a master’s degree in Cybersecurity from the Air Force Institute of Technology and is a Certified Ethical Hacker. He has developed and facilitated blockchain security courses for major companies.CHAPTER 1 INTRODUCTION TO BLOCKCHAIN SECURITY 1The Goals of Blockchain Technology 2Anonymity 2Decentralization 2Fault Tolerance 2Immutability 3Transparency 3Trustless 3Structure of the Blockchain 3The Blockchain Network 5The Blockchain Node 5A Blockchain Block 6A Blockchain Transaction 7Inside the Blockchain Ecosystem 8Fundamentals 8Primitives 9Data Structures 9Protocols 9Consensus 9Block Creation 10Infrastructure 10Nodes 10Network 11Advanced 11Smart Contracts 11Extensions 11Threat Modeling for the Blockchain 12Threat Modeling with STRIDE 12Spoofing 12Tampering 12Repudiation 13Information Disclosure 13Denial of Service 13Elevation of Privilege 13Applying STRIDE to Blockchain 14Conclusion 14CHAPTER 2 FUNDAMENTALS 15Cryptographic Primitives 15Public Key Cryptography 16Introducing “Hard” Mathematical Problems 16Building Cryptography with “Hard” Problems 18How the Blockchain Uses Public Key Cryptography 19Security Assumptions of Public Key Cryptography 20Attacking Public Key Cryptography 20Hash Functions 25Security Assumptions of Hash Functions 25Additional Security Requirements 27How the Blockchain Uses Hash Functions 28Attacking Hash Functions 31Threat Modeling for Cryptographic Algorithms 32Data Structures 33Transactions 33What’s In a Transaction? 33Inside the Life Cycle of a Transaction 34Attacking Transactions 34Blocks 37Inside a Block 37Attacking Blockchain Blocks 38Threat Modeling for Data Structures 39Conclusion 39CHAPTER 3 PROTOCOLS 43Consensus 43Key Concepts in Blockchain Consensus 44Byzantine Generals Problem 44Security via Scarcity 45The Longest Chain Rule 46Proof of Work 46Introduction to Proof of Work 47Security of Proof of Work 48Proof of Stake 53Introduction to Proof of Stake 53Variants of Proof of Stake 54Security of Proof of Stake 54Threat Modeling for Consensus 59Block Creation 59Stages of Block Creation 60Transaction Transmission 60Block Creator Selection (Consensus) 60Block Building 61Block Transmission 61Block Validation 61Attacking Block Creation 62Denial of Service 62Frontrunning 63SPV Mining 65Threat Modeling for Block Creation 65Conclusion 65CHAPTER 4 INFRASTRUCTURE 67Nodes 67Inside a Blockchain Node 68Attacking Blockchain Nodes 68Blockchain- Specific Malware 69Denial-of-Service Attacks 70Failure to Update 71Malicious Inputs 72Software Misconfigurations 73Threat Modeling for Blockchain Nodes 74Networks 74Attacking the Blockchain Network 75Denial-of-service Attacks 75Eclipse/Routing Attacks 76Sybil Attacks 78Threat Modeling for Blockchain Networks 80Conclusion 80CHAPTER 5 ADVANCED 83Smart Contracts 83Smart Contract Vulnerabilities 84General Programming Vulnerabilities 85Blockchain- Specific Vulnerabilities 94Platform-Specific Vulnerabilities 103Application- Specific Vulnerabilities 119Threat Modeling for Smart Contracts 128Blockchain Extensions 128State Channels 129State Channel Security Considerations 129Sidechains 130Sidechain Security Considerations 131Threat Modeling for Blockchain Extensions 132Conclusion 133CHAPTER 6 CONSIDERATIONS FOR SECURE BLOCKCHAIN DESIGN 137Blockchain Type 137Public vs. Private 138Benefits of Public vs. Private Blockchains 138Open vs. Permissioned 139Benefits of Open vs. Permissioned Blockchains 139Choosing a Blockchain Architecture 140Privacy and Security Enhancements 140Zero-Knowledge Proofs 140Stealth Addresses 141Ring Signatures 141Legal and Regulatory Compliance 142Designing Secure Blockchains for the Future 143Index 145
Roadmapping Extended Reality
ROADMAPPING EXTENDED REALITYTHIS BOOK OFFERS A COMPREHENSIVE OVERVIEW OF THE TECHNOLOGICAL ASPECTS OF EXTENDED REALITIES (XR) AND DISCUSSES THE MAIN CHALLENGES AND FUTURE DIRECTIONS IN THE FIELD.This book is important and timely – XR technologies have overcome the 3 main aspects that were holding it back from mainstream adoption: cost, cables, and size. However, there are many aspects of XR technologies that are now going to be explored and developed that still need urgent research in terms of security, privacy, health and safety, long-term effects, addiction risks, and age-related developmental concerns, and the aim of the book is to inform all readers of these open issues and challenges. There are currently a great number of interdisciplinary researchers and developers working in the XR R&D field. Recently, XR technologies moved from the Gartner Hype Cycle onto the Plateau of Productivity on the Gartner Hype Cycle signaling that the fundamental XR technologies are now deemed mature technologies and ready for deployment in a wide variety of application areas. Corroborated by the fact that XR technologies are part of the future Metaverse, a concept that went rapidly mainstream during the time of writing of this book. Roadmapping Extended Reality is divided into two parts: (1) fundamentals and (2) applications. The first part covers the main technological aspects of XR. The chapters in this section review and discuss relevant fundamental concepts of XR, the actual state-of-the-art, and future challenges. The second part of the book focuses on covering a wide range of applications of XR including a future roadmap. All in all, the book offers a snapshot of the state-of-the-art in XR and addresses the needs of a multidisciplinary audience working in both academia and the industry, as well as stakeholders at government agencies and non-profit organizations. AUDIENCEThis book is aimed at academic and industrial developers, exploring and developing applications in the XR, VR, AR, AI, smart IoT, 4th Industrial Revolution space, including those that are solving technology requirements, human factors, evaluation methodology advances, and ROI investigations. MARIANO ALCAÑIZ, PHD, is the founding director of the Immersive Neurotechnologies Lab (LabLENI) as well as a Full Professor of Biomedical Engineering at the Polytechnic University of Valencia, Spain. He has published more than 350 academic papers in interdisciplinary journals such as Scientific Reports and PLoS One, as well as domain-specific journals in the fields of biomedical engineering, computer science, psychology, marketing, management, psychology, and education.MARCO SACCO, PHD, is a Senior Researcher, head of CNR-STIIMA Lecco subsidiary, and head of the division, Enterprise Engineering, and Virtual Applications. President of EuroXR (European Association of Extended Reality). He has more than 160 publications including papers in academic journals and conference proceedings. JOLANDA G. TROMP, PHD, is a consultant to the EuroXR association for the Delphi consensus study; Director Center for Visualization & Simulation (CVS), Duy Tan University, Da Nang, Viet Nam; founding CIO spinout company for Visualization & Simulation, Viet Nam; visiting research professor XR lab Grupo DIANA, University of Malaga, Spain, and XR R&D Study Abroad internships Adjunct Instructor HCI Master and XR curriculum R&D, State University of New York in Oswego, NY, USA, and Duy Tan University, Viet Nam.
Lean UX (3. Auflage)
Mit agilen Teams erfolgreiche Produkte designen Lean UX ist ein Synonym für modernes Produktdesign und -entwicklung. Durch die Kombination von menschenzentriertem Design, agilen Arbeitsweisen und einem ausgeprägten Geschäftssinn machen Designer:innen, Produktmanager:innen, Entwickler:innen und Scrum Master auf der ganzen Welt Lean UX heute zum führenden Ansatz für digitale Produktteams.In der dritten Auflage dieses preisgekrönten Buches helfen Ihnen die Autoren Jeff Gothelf und Josh Seiden, sich auf das Produkterlebnis und nicht auf die Ergebnisse zu konzentrieren. Sie lernen Taktiken für die Integration von User Experience Design, Produktentdeckung, agilen Methoden und Produktmanagement kennen. Und Sie erfahren, wie Sie Ihr Design in kurzen, iterativen Zyklen vorantreiben können, um zu ermitteln, was für Unternehmen und Benutzer:innen am besten funktioniert. Lean UX führt Sie durch diesen Wandel – zum Besseren.Erleichtern Sie Ihrem Team den Lean-UX-Prozess mit dem Lean-UX-Canvas.Stellen Sie sicher, dass jedes Projekt mit klaren kundenzentrierten Erfolgskriterien beginnt.Verstehen Sie die Rolle der Designer:innen in einem agilen Team.Stellen Sie sicher, dass die Designarbeit in jedem Sprint stattfindet.Bauen Sie Produktentdeckung in die »Geschwindigkeit« Ihres Teams ein.Zielgruppe: UX-/Produktdesigner*innenProduktmanager*innenScrum MasterManager*innen von UX-TeamsAutoren: Jeff Gothelf unterstützt Unternehmen bei der Entwicklung besserer Produkte und Führungskräfte bei der Entwicklung einer Kultur, die bessere Produkte hervorbringt. Er begann als Software-Designer und arbeitet heute als Coach, Berater und Keynote-Speaker, der Unternehmen dabei hilft, die Lücken zwischen geschäftlicher Agilität, digitaler Transformation, Produktmanagement und menschenzentriertem Design zu schließen.Josh Seiden ist Designer, Autor und Coach. Er hilft Teams dabei, echte Probleme für Kunden zu lösen und Mehrwert für Unternehmen zu schaffen. Als Coach hilft er Teams, ihre Arbeitsweise zu verbessern, eine effektivere Zusammenarbeit aufzubauen und die Reise der Produktentwicklung zu genießen.
Machine Learning and Data Science
MACHINE LEARNING AND DATA SCIENCEWRITTEN AND EDITED BY A TEAM OF EXPERTS IN THE FIELD, THIS COLLECTION OF PAPERS REFLECTS THE MOST UP-TO-DATE AND COMPREHENSIVE CURRENT STATE OF MACHINE LEARNING AND DATA SCIENCE FOR INDUSTRY, GOVERNMENT, AND ACADEMIA.Machine learning (ML) and data science (DS) are very active topics with an extensive scope, both in terms of theory and applications. They have been established as an important emergent scientific field and paradigm driving research evolution in such disciplines as statistics, computing science and intelligence science, and practical transformation in such domains as science, engineering, the public sector, business, social science, and lifestyle. Simultaneously, their applications provide important challenges that can often be addressed only with innovative machine learning and data science algorithms. These algorithms encompass the larger areas of artificial intelligence, data analytics, machine learning, pattern recognition, natural language understanding, and big data manipulation. They also tackle related new scientific challenges, ranging from data capture, creation, storage, retrieval, sharing, analysis, optimization, and visualization, to integrative analysis across heterogeneous and interdependent complex resources for better decision-making, collaboration, and, ultimately, value creation. PRATEEK AGRAWAL, PHD, completed his BTech in computer science engineering from Uttar Pradesh Technical University, Lucknow, India and MTech from ABV-IIITM, Gwalior, India. He also received his PhD from IKG-Punjab Technical University, Punjab, India. He has more than ten years of research and teaching experience. He has worked as a post-doctoral researcher at the department of ITEC, University of Klagenfurt, Austria and also serves as an associate professor in the school of computer science engineering, Lovely Professional University, India. He has authored more than 50 research papers in various peer reviewed journals and conferences. He is a life member of IET research society. He is a reviewer and editorial member of many journals of high repute. He also served as technical program committee member of many international conferences.CHARU GUPTA, PHD, graduated with her BE and MTech in computer science and engineering, with honors. She completed her doctoral degree at the Department of Computer Science, Banasthali Vidyapith, Rajasthan, India. Presently serving as assistant professor at Bhagwan Parshuram Institute of Technology, she has over 10 years of teaching experience. She is a faculty coordinator (Delhi Section) of Free and Open Source Cell (FOSS cell) from the International Centre for Free and Open Source Software (ICFOSS), Govt. of Kerala, India. She is also the faculty co-ordinator of the e-Yantra Lab setup initiative (eLSI) in collaboration with IIT Bombay in the Department of Computer Science and Engineering, BPIT. She also has numerous papers in scientific and scholarly journals to her credit. VISHU MADAAN, PHD, received her BTech and MTech degrees in computer science engineering from Lovely Professional University, Phagwara, India and earned her PhD in computer science from IKG-Punjab Technical University, Punjab. She is an assistant professor with Lovely Professional University and has more than eight years of teaching and research experience. She has authored more than 30 research articles in peer-reviewed conferences and journals. She is also a member of IEEE and is a reviewer for many international conferences and technical journals. ANAND SHARMA, PHD, received his PhD in engineering from MUST, Lakshmangarh, his MTech from ABV-IIITM, Gwalior and BE from RGPV, Bhopal. He has been working with Mody University of Science and Technology, Lakshmangarh for over 10 years and has more than 14 years of experience of teaching and research. He has pioneered research in the areas of information systems, information security, IoT, knowledge management and machine learning. He is the Vice-Chairman of CSI-Lakshmangarh Chapter and Student Branch Coordinator of CSI-MUST, student branch. He has authored or edited five books and has more than 70 papers in scientific and scholarly journals and conferences. He has organized more than 15 conferences, seminars, and workshops and is serving on the editorial boards of several journals as and is on the program committees of several international conferences. NISHEETH JOSHI, PHD, is an associate professor at Banasthali Vidyapith, India. He did his PhD in the area of natural language processing and is the recipient of the prestigious ISTE-U.P. Government National Award for Outstanding Work Done in Specified Areas of Engineering and Technology. He has authored several papers in scientific and technical journals and conferences. He has also been a mentor and consultant to various start-ups working in the areas of cognitive computing, natural language processing, speech processing, multimodal information retrieval and machine translation. He was also a consultant to C-DAC Pune where he developed the evaluation methodology for the Mantra Machine Translation System. This Machine Translation System is being used by Rajya Sabha, the Upper House of Parliament of India and Department of Official Languages, with the Government of India. In addition, he has two technology transfers and four copyrights to his credit. Preface xiiiBook Description xv1 MACHINE LEARNING: AN INTRODUCTION TO REINFORCEMENT LEARNING 1Sheikh Amir Fayaz, Dr. S Jahangeer Sidiq, Dr. Majid Zaman and Dr. Muheet Ahmed Butt1.1 Introduction 21.2 Reinforcement Learning Paradigm: Characteristics 111.3 Reinforcement Learning Problem 121.4 Applications of Reinforcement Learning 152 DATA ANALYSIS USING MACHINE LEARNING: AN EXPERIMENTAL STUDY ON UFC 23Prashant Varshney, Charu Gupta, Palak Girdhar, Anand Mohan, Prateek Agrawal and Vishu Madaan2.1 Introduction 232.2 Proposed Methodology 252.3 Experimental Evaluation and Visualization 312.4 Conclusion 443 DAWN OF BIG DATA WITH HADOOP AND MACHINE LEARNING 47Balraj Singh and Harsh Kumar Verma3.1 Introduction 483.2 Big Data 483.3 Machine Learning 533.4 Hadoop 553.5 Studies Representing Applications of Machine Learning Techniques with Hadoop 573.6 Conclusion 614 INDUSTRY 4.0: SMART MANUFACTURING IN INDUSTRIES -- THE FUTURE 67Dr. K. Bhavana Raj4.1 Introduction 675 COVID-19 CURVE EXPLORATION USING TIME SERIES DATA FOR INDIA 75Apeksha Rustagi, Divyata, Deepali Virmani, Ashok Kumar, Charu Gupta, Prateek Agrawal and Vishu Madaan5.1 Introduction 765.2 Materials Methods 775.3 Concl usion and Future Work 866 A CASE STUDY ON CLUSTER BASED APPLICATION MAPPING METHOD FOR POWER OPTIMIZATION IN 2D NOC 89Aravindhan Alagarsamy and Sundarakannan Mahilmaran6.1 Introduction 906.2 Concept Graph Theory and NOC 916.3 Related Work 946.4 Proposed Methodology 976.5 Experimental Results and Discussion 1006.6 Conclusion 1057 HEALTHCARE CASE STUDY: COVID-19 DETECTION, PREVENTION MEASURES, AND PREDICTION USING MACHINE LEARNING & DEEP LEARNING ALGORITHMS 109Devesh Kumar Srivastava, Mansi Chouhan and Amit Kumar Sharma7.1 Introduction 1107.2 Literature Review 1117.3 Coronavirus (Covid19) 1127.4 Proposed Working Model 1187.5 Experimental Evaluation 1307.6 Conclusion and Future Work 1328 ANALYSIS AND IMPACT OF CLIMATIC CONDITIONS ON COVID-19 USING MACHINE LEARNING 135Prasenjit Das, Shaily Jain, Shankar Shambhu and Chetan Sharma8.1 Introduction 1368.2 COVID-19 1388.3 Experimental Setup 1418.4 Proposed Methodology 1428.5 Results Discussion 1438.6 Conclusion and Future Work 1439 APPLICATION OF HADOOP IN DATA SCIENCE 147Balraj Singh and Harsh K. Verma9.1 Introduction 1489.2 Hadoop Distributed Processing 1539.3 Using Hadoop with Data Science 1609.4 Conclusion 16410 NETWORKING TECHNOLOGIES AND CHALLENGES FOR GREEN IOT APPLICATIONS IN URBAN CLIMATE 169Saikat Samanta, Achyuth Sarkar and Aditi Sharma10.1 Introduction 17010.2 Background 17010.3 Green Internet of Things 17310.4 Different Energy--Efficient Implementation of Green IOT 17710.5 Recycling Principal for Green IOT 17810.6 Green IOT Architecture of Urban Climate 17910.7 Challenges of Green IOT in Urban Climate 18110.8 Discussion & Future Research Directions 18110.9 Conclusion 18211 ANALYSIS OF HUMAN ACTIVITY RECOGNITION ALGORITHMS USING TRIMMED VIDEO DATASETS 185Disha G. Deotale, Madhushi Verma, P. Suresh, Divya Srivastava, Manish Kumar and Sunil Kumar Jangir11.1 Introduction 18611.2 Contributions in the Field of Activity Recognition from Video Sequences 19011.3 Conclusion 21212 SOLVING DIRECTION SENSE BASED REASONING PROBLEMS USING NATURAL LANGUAGE PROCESSING 215Vishu Madaan, Komal Sood, Prateek Agrawal, Ashok Kumar, Charu Gupta, Anand Sharma and Awadhesh Kumar Shukla12.1 Introduction 21612.2 Methodology 21712.3 Description of Position 22212.4 Results and Discussion 22412.5 Graphical User Interface 22513 DROWSINESS DETECTION USING DIGITAL IMAGE PROCESSING 231G. Ramesh Babu, Chinthagada Naveen Kumar and Maradana Harish13.1 Introduction 23113.2 Literature Review 23213.3 Proposed System 23313.4 The Dataset 23413.5 Working Principle 23513.6 Convolutional Neural Networks 23913.6.1 CNN Design for Decisive State of the Eye 23913.7 Performance Evaluation 24013.8 Conclusion 242References 242Index 245
Beginning MicroPython with the Raspberry Pi Pico
Program the Raspberry Pi Pico, the latest microcontroller board from raspberrypi.org, with MicroPython. This book will take you on a tour of the Raspberry Pi Pico, including how to get started using the microcontroller, seeing which alternative microcontrollers are available, and how to connect and run simple code examples.You’ll program example projects in MicroPython using Python on your PC as a learning platform. Then build your hardware skillset working with electronics and breadboard circuits. You'll implement example projects with all steps explained, including hardware connections and executing the project. Then apply them to real-world, approachable projects using the accessible Raspberry Pi Pico!The book shows how the cloud is used for IoT data and find out what popular cloud systems currently exist for IoT. Finally, you'll use ThingSpeak for hosting IoT data including connecting your Pico to the Internet.Beginning MicroPython with the Raspberry Pi Pico allows you to build up your skills to more advanced IoT projects and Cloud systems!WHAT YOU WILL LEARN* Build valuable programming skills with MicroPython* Explore the Raspberry Pi Pico and similar boards* Develop your own electronics and IOT projects* Incorporate the Grove component system with the Raspberry Pi PicoWHO THIS BOOK IS FORBeginners interested in learning to work with the Raspberry Pi Pico using MicroPython on microcontrollers with little to no experience in programming, hardware, or electronics. The book should also appeal to those who wanting to gain experience with building electronic solutions with microcontrollers.CHARLES BELL conducts research in emerging technologies. He is a member of the Oracle MySQL Development team and is one of the principal developers for the MySQL Database Service (MDS) team supporting MySQL as a service in the Oracle Cloud Infrastructure (OCI). He lives in a small town in rural Virginia with his loving wife. He received his Doctor of Philosophy in Engineering from Virginia Commonwealth University in 2005. Dr. Bell is an expert in the database field and has extensive knowledge and experience in software development and systems engineering. His research interests include 3D printers, microcontrollers, three-dimensional printing, database systems, cloud systems, software engineering, Internet of Things, and sensor networks. He spends his limited free time as a practicing Maker focusing on microcontroller projects and refinement of three-dimensional printers.Chapter 1: Introducing the Raspberry Pi Pico· What is a Microcontroller?· A tour of the Raspberry Pi Pico· Getting Started with the PicoChapter 2: Introducing MicroPython· Getting Started· How it Works· Off and Running with PythonChapter 3: How to Program in MicroPython· Basic Concepts· Variables and Statements· Loops· Methods and Classes· MicroPython LibrariesChapter 4: Low-Level Hardware Support· Interrupts· Communication· Using Breakout BoardsChapter 5: Electronics for Beginners· The Basics· Electronic Components· Using a Breadboard to Build Circuits· What are Sensors?Chapter 6: Project: Hello, World! MicroPython Style· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 7: Project: Pedestrian Crossing· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 8: Project: Soil Moisture Monitor· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 9: Introducing Grove; Electronics Made Easy· Overview· Components Available· Using the Components with your PicoChapter 10: Project: Sound Activated Lights· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 11: Project: Simon Game· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 12: Project: Weather Station· Overview· Required Components· Setup the Hardware· Write the Code· ExecuteChapter 13. Introducing IoT for the Cloud· Overview· IoT Cloud SystemsChapter 14. Using ThingSpeak· Getting Started· How to add ThingSpeak to your Projects· Example: IoT Weather StationAppendixA combined shopping list for components used in the book.Audience: Beginner
Cloud Attack Vectors
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned their efforts, focusing on remaining undetected, monetization after exploitation, and publicly shaming organizations after a breach.New, innovative, and useful products continue to emerge and offer some cloud protection, but they also have distinct limitations. No single, standalone solution or strategy can effectively protect against all cloud attack vectors or identify all malicious activity. The simple fact is that the cloud is based on a company’s assets being offered as services. As a result, the best security any organization can achieve is to establish controls and procedures in conjunction with services that are licensed in the cloud.Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity.WHAT YOU’LL LEARN* Know the key definitions pertaining to cloud technologies, threats, and cybersecurity solutions* Understand how entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment* Implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments* Develop a comprehensive model for documenting risk, compliance, and reporting based on your cloud implementationWHO THIS BOOK IS FORNew security professionals, entry-level cloud security engineers, managers embarking on digital transformation, and auditors looking to understand security and compliance risks associated with the cloud MOREY J. HABER is Chief Technology Officer at BeyondTrust. He has more than 20 years of IT industry experience and is author of the book Privileged Attack Vectors and Asset Attack Vectors. Morey joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology for vulnerability, privileged, and remote access management solutions. In 2004, Morey joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Morey began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.BRIAN CHAPPELL is Chief Security Strategist for Beyond Trust, EMEA & APAC, and is a multi-skilled individual with a passion for delivering best practice solutions that help customers run their businesses more effectively and securely. His specialties include: cybersecurity solutions, IT strategy and implementation, project management, global IT operations management, sales engineering, software development, and enterprise and solutions architecture.CHRISTOPHER HILLS is a Security Strategist focused on Privileged Access Management (PAM) and Identity and Access Management (IAM). He is Security Strategist for BeyondTrust's Privileged Access Management Solutions, enforcing Privileged Password Management and Privileged Session Management, Privileged Endpoint Management, and Secure Remote Access which utilizes a single pane of glass for all management aspects, including Automated Account Discovery, Privileged Management and Elevation, Audit and Compliance, and Behavior & Reporting. His responsibilities include: IAM/PAM focus, strategy, mentoring, leadership, customer and prospect liaison, thought leadership, background reference, business development, customer-facing GRC, and working closely with global sales and marketing organizations to help support GTM efforts while assisting with critical sales opportunities and key marketing events.FORWARDINTRODUCTIONCHAPTER 1. CLOUD COMPUTINGSoftware as a ServicePlatform as a ServiceInfrastructure as a ServiceFunction as a ServiceX as a ServiceDesktop as a ServiceData Center as a ServiceManaged Software as a ServiceBackend as a ServiceCHAPTER 2. CLOUD PROVIDERSAmazon Web ServicesMicrosoft AzureGoogle Cloud PlatformOracle CloudAlibabaOther ServicesCHAPTER 3. CLOUD DEFINITIONSIdentitiesAccountsEntitlementsPrivilegesRightsPermissionsContainersSegmentationMicrosegmentationInstancesChapter 4. Asset ManagementDiscoveryCHAPTER 5. ATTACK VECTORSEntitlementsVulnerabilitiesHardeningConfigurationsCredentialsS3 BucketsIdentitiesEntitlementsAPIAuthenticationCertificatesPhishingRemote AccessSupply Chain – 3rd Party MSP/MSSPChapter 6. MitigationsHardeningPatch ManagementPAMCIEMCIAMCWPPChapter 7. Regulatory ComplianceSecurity QuestionnairesSOCType IType IIType IIICloud Security AllianceCCMCAIQCIS ControlsPCI DSSISONISTFedRampChapter 8. ArchitecturesZero TrustCloud-NativeHybridEphemeral ImplementationsAccountsInstancesPrivilegesCHAPTER 9. Imposter SyndromeCHAPTER 10. RECOMMENDATIONSCHAPTER 11. CONCLUSION
Linux for Small Business Owners
Learn how you can take complete control and run your small business with powerful, free open source software (FOSS). This book introduces small business owners to the power and security of Linux and other FOSS tools to manage any small business as well as the many advantages it has over expensive, proprietary software. While exploring the reasons for using Free Open Source Software, you'll investigate the assertion that, “The value of any software lies in its usefulness not in its price,” set forth by Linux Torvalds, the creator of Linux.This book examines the use of Linux and also the other Free Open Source Software you need to meet your business challenges including the usual accounting, Email, web browsing, word-processing tasks. You will be introduced to advanced tools such as those that enable you to create audio and video clips you can use to promote your business or that can even be your primary product, such as how-to instruction.Most small business owners perform many tasks including that of administering their computers. This book shows you how to find and install new software you need to run your business and keep it up to date using the tools already provided by Linux and the secure, trusted repositories available online. It also explores how to decide which tasks to do in-house and which you might want to sub out to external resources such as advertising and contact services to attract and keep customers.Linux for Small Business Owners provides some logic, reason, and explanation for each of the steps that are needed and the tools used to implement Linux in your small business.It is a detailed guide to removing Windows from your computers and installing Linux and some commonly used open source software like the LibreOffice suite of programs, accounting, and other software useful to many small businesses. It also provides the information and tools necessary to manage and maintain Linux and applications up-to-date and secure.WHAT YOU'LL LEARN* Understand what the term "free/open source" means and how you can apply it to your business.* Look at the operational and financial advantages of using Free Open Source Software instead of expensive, proprietary software.* See why you will never need to pay for anti-virus and anti-malware software again.* Replace expensive software like Microsoft Office with open source tools such as LibreOffice * Review the factors required to make an informed decision about switching to Linux.* Install new applications, updates to Linux, and the application software.* Explore why backups are critical, how to create them, and how to use them to restore lost data.WHO THIS BOOK IS FORIdeal for small business owners and owner-operated small businesses looking to streamline operations, save money, time and energy managing the common problems associated with using more popular operating systems.DAVID BOTH is an Open Source Software and GNU/Linux advocate, trainer, writer, and speaker. He has been working with Linux and Open Source Software for more than 25 years and has been working with computers for over 50 years. He is a strong proponent of and evangelist for the "Linux Philosophy for System Administrators." David has been in the IT industry for over forty years.David prefers to purchase the components and build his own computers from scratch to ensure that each new computer meets his exacting specifications.He has written articles for magazines including, Linux Magazine, Linux Journal, and OS/2 Magazine back when there was such a thing. His article "Complete Kickstart," co-authored with a colleague at Cisco, was ranked 9th in the Linux Magazine Top Ten Best System Administration Articles list for 2008. He currently writes for OpenSource.com and Enable SysAdmin, both of which are supported by Red Hat. He particularly enjoys learning new things while researching his articles.David has published four books with Apress, “The Linux Philosophy for SysAdmins,” August 2018, and a three volume self-study training course, “Using and Administering Linux — From Zero to SysAdmin,” released in December, 2019David currently lives in Raleigh, NC, with his very supportive wife and a strange rescue dog that is mostly Jack Russell. David also likes reading, travel, the beach, and spending time with his two children, their spouses, and four grand-children.David can be reached at LinuxGeek46@both.org or on Twitter @LinuxGeek46.CYNDI BULKA is a Health Coach and Yoga Specialist and currently owns and operates Zakti Health, a small business offering therapeutic Yoga, Yoga teacher training, Yoga and wellness retreats and health/wellness individual and group coaching programs.Prior to Zakti Health, she was the owner operator of Moving Mantra Yoga Studio in Raleigh, NC. She has been teaching Yoga for more than 25 years. Cyndi has traveled the world to obtain multiple trainings as a teacher, qualifying at the highest recognized level of certification. She obtained her Health Coaching training at Duke University's Integrative Health Center in Durham, NC in 2014.Cyndi is a creative writer and poet, a lover of nature, an avid traveler, dedicated Yogi and passionate teacher. She enjoys hiking, gardening, music festivals and cooking. As the mother of two adult children and one rescue dog, grandmother to 4 precious grandchildren, and dedicated partner to a wonderfully supportive man, she stays happily busy. She currently resides in Raleigh, NC.Cyndi can be reached at cyndi@zaktihealth.com or via her website www.zaktihealth.com1. Using Linux – The Personal Case2. A Bit of History – Becoming Linux3. Using Linux – The Business Case Objectives4. Choosing Hardware5. Take Linux for a Test Drive6. Finding Software7. Making the Decision8. Preparing for the Switch9. Installing Linux10. Getting started11. Easy File Management12. Restoring Your Data13. Software Management14. Backups15. Upgrades16. Printing17. Security18. Automation19. Finding Help20. Where Do I Go from Here?21. Appendix A. About Files22. Appendix B. Introduction to the Command Line
Artificial Intelligence for Renewable Energy and Climate Change
ARTIFICIAL INTELLIGENCE FOR RENEWABLE ENERGY AND CLIMATE CHANGEWRITTEN AND EDITED BY A GLOBAL TEAM OF EXPERTS IN THE FIELD, THIS GROUNDBREAKING NEW VOLUME PRESENTS THE CONCEPTS AND FUNDAMENTALS OF USING ARTIFICIAL INTELLIGENCE IN RENEWABLE ENERGY AND CLIMATE CHANGE, WHILE ALSO COVERING THE PRACTICAL APPLICATIONS THAT CAN BE UTILIZED ACROSS MULTIPLE DISCIPLINES AND INDUSTRIES, FOR THE ENGINEER, THE STUDENT, AND OTHER PROFESSIONALS AND SCIENTISTS.Renewable energy and climate change are two of the most important and difficult issues facing the world today. The state of the art in these areas is changing rapidly, with new techniques and theories coming online seemingly every day. It is important for scientists, engineers, and other professionals working in these areas to stay abreast of developments, advances, and practical applications, and this volume is an outstanding reference and tool for this purpose. The paradigm in renewable energy and climate change shifts constantly. In today’s international and competitive environment, lean and green practices are important determinants to increase performance. Corresponding production philosophies and techniques help companies diminish lead times and costs of manufacturing, improve delivery on time and quality, and at the same time become more ecological by reducing material use and waste, and by recycling and reusing. Those lean and green activities enhance productivity, lower carbon footprint and improve consumer satisfaction, which in reverse makes firms competitive and sustainable. This practical, new groundbreaking volume:* Features coverage on a wide range of topics such as classical and nature-inspired optimization and optimal control, hybrid and stochastic systems* Is ideally designed for engineers, scientists, industrialist, academicians, researchers, computer and information technologists, sustainable developers, managers, environmentalists, government leaders, research officers, policy makers, business leaders and students* Is useful as a practical tool for practitioners in the fields of sustainable and renewable energy sustainability* Includes wide coverage of how artificial intelligence can be used to impact the struggle against global warming and climate changePANDIAN VASANT, PHD, is Editor-in-Chief of the International Journal of Energy Optimization and Engineering and senior research associate at MERLIN Research Centre of Ton Duc Thang University, HCMC, Vietnam. He has 31 years of teaching experience and has co-authored over 300 publications, including research articles in journals, conference proceedings, presentations and book chapters. He has also been a guest editor for various scientific and technical journals.GERHARD-WILHELM WEBER, PHD, is a professor at Poznan University of Technology, Poznan, Poland. He received his PhD in mathematics, and economics / business administration, from RWTH Aachen. He held professorships by proxy at University of Cologne, and TU Chemnitz, Germany. J. JOSHUA THOMAS, PHD, has been a senior lecturer at KDU Penang University College, Malaysia since 2008. He obtained his PhD in intelligent systems techniques in 2015 from University Sains Malaysia, Penang, and is an editorial board member for the International Journal of Energy Optimization and Engineering. He has also published more than 30 papers in leading international conference proceedings and peer reviewed journals. JOSE A. MARMOLEJO SAUCEDO, PHD, is a professor at Pan-American University, Mexico. He received his PhD in operations research at the National Autonomous University of Mexico and has co-authored numerous research articles in scientific and scholarly journals, conference proceedings, presentations, books, and book chapters. ROMAN RODRIGUEZ-AGUILAR, PHD, is a professor in the School of Economic and Business Sciences of the “Universidad Panamericana” in Mexico. He received his PhD at the School of Economics at the National Polytechnic Institute, Mexico and has co-authored multiple research articles in scientific and scholarly journals, conference proceedings, presentations, and book chapters. Preface xvSECTION I: RENEWABLE ENERGY 11 ARTIFICIAL INTELLIGENCE FOR SUSTAINABILITY: OPPORTUNITIES AND CHALLENGES 3Amany Alshawi1.1 Introduction 31.2 History of AI for Sustainability and Smart Energy Practices 41.3 Energy and Resources Scenarios on the Global Scale 51.4 Statistical Basis of AI in Sustainability Practices 61.4.1 General Statistics 61.4.2 Environmental Stress–Based Statistics 81.4.2.1 Climate Change 91.4.2.2 Biodiversity 101.4.2.3 Deforestation 101.4.2.4 Changes in Chemistry of Oceans 101.4.2.5 Nitrogen Cycle 101.4.2.6 Water Crisis 111.4.2.7 Air Pollution 111.5 Major Challenges Faced by AI in Sustainability 111.5.1 Concentration of Wealth 111.5.2 Talent-Related and Business-Related Challenges of AI 121.5.3 Dependence on Machine Learning 141.5.4 Cybersecurity Risks 151.5.5 Carbon Footprint of AI 161.5.6 Issues in Performance Measurement 161.6 Major Opportunities of AI in Sustainability 171.6.1 AI and Water-Related Hazards Management 171.6.2 AI and Smart Cities 181.6.3 AI and Climate Change 211.6.4 AI and Environmental Sustainability 231.6.5 Impacts of AI in Transportation 241.6.6 Opportunities in Disaster Forecasting and Deforestation Forecasting 251.6.7 Opportunities in the Energy Sector 261.7 Conclusion and Future Direction 26References 272 RECENT APPLICATIONS OF MACHINE LEARNING IN SOLAR ENERGY PREDICTION 33N. Kapilan, R.P. Reddy and Vidhya P.2.1 Introduction 342.2 Solar Energy 342.3 AI, ML and DL 362.4 Data Preprocessing Techniques 382.5 Solar Radiation Estimation 382.6 Solar Power Prediction 432.7 Challenges and Opportunities 452.8 Future Research Directions 462.9 Conclusion 46Acknowledgement 47References 473 MATHEMATICAL ANALYSIS ON POWER GENERATION – PART I 53G. Udhaya Sankar, C. Ganesa Moorthy and C.T. Ramasamy3.1 Introduction 543.2 Methodology for Derivations 553.3 Energy Discussions 593.4 Data Analysis 63Acknowledgement 67References 67Supplementary 694 MATHEMATICAL ANALYSIS ON POWER GENERATION – PART II 87G. Udhaya Sankar, C. Ganesa Moorthy and C.T. Ramasamy4.1 Energy Analysis 884.2 Power Efficiency Method 894.3 Data Analysis 91Acknowledgement 96References 97Supplementary - II 1005 SUSTAINABLE ENERGY MATERIALS 117G. Udhaya Sankar5.1 Introduction 1175.2 Different Methods 1195.2.1 Co-Precipitation Method 1195.2.2 Microwave-Assisted Solvothermal Method 1205.2.3 Sol-Gel Method 1205.3 X-R ay Diffraction Analysis 1205.4 FTIR Analysis 1225.5 Raman Analysis 1245.6 UV Analysis 1255.7 SEM Analysis 1275.8 Energy Dispersive X-Ray Analysis 1275.9 Thermoelectric Application 1295.9.1 Thermal Conductivity 1295.9.2 Electrical Conductivity 1315.9.3 Seebeck Coefficient 1315.9.4 Power Factor 1325.9.5 Figure of Merit 1335.10 Limitations and Future Direction 1335.11 Conclusion 133Acknowledgement 134References 1346 SOFT COMPUTING TECHNIQUES FOR MAXIMUM POWER POINT TRACKING IN WIND ENERGY HARVESTING SYSTEM: A SURVEY 137TigiluMitikuDinku, Mukhdeep Singh Manshahia and Karanvir Singh Chahal6.1 Introduction 1376.1.1 Conventional MPPT Control Techniques 1386.2 Other MPPT Control Methods 1426.2.1 Proportional Integral Derivative Controllers 1426.2.2 Fuzzy Logic Controller 1446.2.2.1 Fuzzy Inference System 1506.2.2.2 Advantage and Disadvantages of Fuzzy Logic Controller 1516.2.3 Artificial Neural Network 1516.2.3.1 Biological Neural Networks 1526.2.3.2 Architectures of Artificial Neural Networks 1556.2.3.3 Training of Artificial Neural Networks 1576.2.3.4 Radial Basis Function 1586.2.4 Neuro-Fuzzy Inference Approach 1586.2.4.1 Adaptive Neuro-Fuzzy Approach 1616.2.4.2 Hybrid Training Algorithm 1616.3 Conclusion 167References 167SECTION II: CLIMATE CHANGE 1717 THE CONTRIBUTION OF AI-BASED APPROACHES IN THE DETERMINATION OF CO2 EMISSION GAS AMOUNTS OF VEHICLES, DETERMINATION OF CO2 EMISSION RATES YEARLY OF COUNTRIES, AIR QUALITY MEASUREMENT AND DETERMINATION OF SMART ELECTRIC GRIDS’ STABILITY 173Mesut Toğaçar7.1 Introduction 1747.2 Materials 1777.2.1 Classification of Air Quality Condition in Gas Concentration Measurement 1777.2.2 CO2 Emission of Vehicles 1787.2.3 Countries’ CO2 Emission Amount 1797.2.4 Stability Level in Electric Grids 1797.3 Artificial Intelligence Approaches 1817.3.1 Machine Learning Methods 1827.3.1.1 Support Vector Machine 1837.3.1.2 eXtreme Gradient Boosting (XG Boost) 1847.3.1.3 Gradient Boost 1857.3.1.4 Decision Tree 1867.3.1.5 Random Forest 1867.3.2 Deep Learning Methods 1887.3.2.1 Convolutional Neural Networks 1897.3.2.2 Long Short-Term Memory 1917.3.2.3 Bi-Directional LSTM and CNN 1927.3.2.4 Recurrent Neural Network 1937.3.3 Activation Functions 1957.3.3.1 Rectified Linear Unit 1957.3.3.2 Softmax Function 1967.4 Experimental Analysis 1967.5 Discussion 2107.6 Conclusion 211Funding 212Ethical Approval 212Conflicts of Interest 212References 2128 PERFORMANCE ANALYSIS AND EFFECTS OF DUST & TEMPERATURE ON SOLAR PV MODULE SYSTEM BY USING MULTIVARIATE LINEAR REGRESSION MODEL 217Sumit Sharma, J. Joshua Thomas and Pandian Vasant8.1 Introduction 2188.1.1 Indian Scenario of Renewable Energy 2188.1.2 Solar Radiation at Earth 2208.1.3 Solar Photovoltaic Technologies 2208.1.3.1 Types of SPV Systems 2218.1.3.2 Types of Solar Photovoltaic Cells 2228.1.3.3 Effects of Temperature 2238.1.3.4 Conversion Efficiency 2238.1.4 Losses in PV Systems 2248.1.5 Performance of Solar Power Plants 2248.2 Literature Review 2258.3 Experimental Setup 2288.3.1 Selection of Site and Development of Experimental Facilities 2298.3.2 Methodology 2298.3.3 Experimental Instrumentation 2308.3.3.1 Solar Photovoltaic Modules 2308.3.3.2 PV Grid-Connected Inverter 2328.3.3.3 Pyranometer 2328.3.3.4 Digital Thermometer 2348.3.3.5 Lightning Arrester 2358.3.3.6 Data Acquisition System 2368.3.4 Formula Used and Sample Calculations 2368.3.5 Assumptions and Limitations 2378.4 Results Discussion 2388.4.1 Phases of Data Collection 2388.4.2 Variation in Responses Evaluated During Phase I (From 1 Jan. to 27 Feb.) of Study 2388.4.2.1 Effect of Dust and Ambient Temperature on Conversion Efficiency 2388.4.2.2 Capacity Utilization Factor and Performance Ratio 2418.4.2.3 Evaluation of MLR Model 2428.4.3 Variation in Responses Evaluated During Phase II (From 1 March to 5 April) 2468.4.3.1 Influence of Dust and Ambient Temperature on Conversion Efficiency 2468.4.3.2 Capacity Utilization Factor and Performance Ratio 2468.4.3.3 Evaluation of MLR Model 2468.4.4 Variation in Responses Evaluated During Phase III (18 May to 25 June) 2528.4.4.1 Effect of Dust and Ambient Temperature on Conversion Efficiency 2528.4.4.2 Capacity Utilization Factor and Performance Ratio 2558.4.4.3 Evaluation of MLR Model 2568.4.5 Regression Analysis for the Whole Period 2588.4.6 Best Subsets Regression: Conversion Efficiency v/s Exposure Day, Ambient Temperature 2678.4.7 Regression Outputs Summary 2688.4.8 Comparison Between Measured Efficiency and Predicted Efficiency 2688.4.9 Losses Due to Dust Accumulation 2708.4.10 Economic Analysis 2708.5 Future Research Directions 2718.6 Conclusion 271References 2729 EVALUATION OF IN-HOUSE COMPACT BIOGAS PLANT THEREBY TESTING FOUR-STROKE SINGLE-CYLINDER DIESEL ENGINE 277Pradeep Kumar Meena, Sumit Sharma, Amit Pal and Samsher9.1 Introduction 2789.1.1 Benefits of the Use of Biogas as a Fuel in India 2789.1.2 Biogas Generators in India 2799.1.3 Biogas 2799.1.3.1 Process of Biogas Production 2809.2 Literature Review 2819.2.1 Wastes and Environment 2819.2.2 Economic and Environmental Considerations 2839.2.3 Factor Affecting Yield and Production of Biogas 2859.2.3.1 The Temperature 2859.2.3.2 PH and Buffering Systems 2879.2.3.3 C/N Ratio 2879.2.3.4 Substrate Type 2899.2.3.5 Retention Time 2899.2.3.6 Total Solids 2899.2.4 Advantages of Anaerobic Digestion to Society 2909.2.4.1 Electricity Generation 2909.2.4.2 Fertilizer Production 2909.2.4.3 Pathogen Reduction 2909.3 Methodology 2909.3.1 Set Up of Compact Biogas Plant and Equipments 2909.3.2 Assembling and Fabrication of Biogas Plant 2929.3.3 Design and Technology of Compact Biogas Plant 2949.3.4 Gas Quantity and Quality 2959.3.5 Calculation of Gas Quantity in Gas Holder 2959.4 Analysis of Compact Biogas Plant 2999.4.1 Experiment Result 2999.4.1.1 Testing on 50 Kg Animal Dung Along With 500 Ltrs Water 2999.4.1.2 Testing on Kitchen Waste 3009.4.1.3 Testing on Fruits Waste 3029.4.2 Comparison of Biogas by Different Substrate 3049.4.3 Production of Biogas Per Day at Different Waste 3049.4.4 Variation of PH Value 3079.4.5 Variation of Average pH Value 3079.4.6 Variation of Temperature 3089.4.7 Variation of Average Temperature With Respect to No. of Days for Animal Dung, Kitchen Waste, Fruits Waste and Sugar 3099.4.8 Variation of Biogas Production W.R.T. Quantity of Kitchen Waste and Fruits Waste 3119.5 Analysis of Single-Cylinder Diesel Engine on Dual Fuel 3139.5.1 Testing on 4-Stroke Single-Cylinder Diesel Engine 3139.5.2 Calculation 3169.5.3 Heat Balance Sheet 3229.5.4 Testing Result With Dual Fuel (Biogas and Diesel) on 4-Stroke Single-Cylinder Diesel Engine 3269.5.5 Calculation 3309.5.6 Heat Balance Sheet 3359.6 General Comments 3369.7 Conclusion 3399.8 Future Scope 340References 34010 LOW-TEMPERATURE COMBUSTION TECHNOLOGIES FOR EMISSION REDUCTION IN DIESEL ENGINES 345Amit Jhalani, Sumit Sharma, Pushpendra Kumar Sharma and Digambar SinghAbbreviations 34610.1 Introduction 34610.1.1 Global Scenario of Energy and Emissions 34710.1.2 Diesel Engine Emissions 34810.1.3 Mitigation of NOx and Particulate Matter 35010.1.4 Low-Temperature Combustion Engine Fuels 35010.2 Scope of the Current Article 35110.3 HCCI Technology 35210.3.1 Principle of HCCI 35310.3.2 Performance and Emissions with HCCI 35410.4 Partially Premixed Compression Ignition (PPCI) 35410.5 Exhaust Gas Recirculation (EGR) 35510.6 Reactivity Controlled Compression Ignition (RCCI) 35610.7 LTC Through Fuel Additives 35710.8 Emulsified Fuels (Water-in-Diesel Emulsion Fuel) 35810.8.1 Brake Thermal Efficiency (BTE) 35910.8.2 Nitrogen Oxide (NOx) 35910.8.3 Soot and Particulate Matter (PM) 36010.9 Conclusion and Future Scope 361Acknowledgement 361References 36111 EFFICIENCY OPTIMIZATION OF INDOOR AIR DISINFECTION BY RADIATION EXPOSURE FOR POULTRY BREEDING RATIONAL FOR MICROCLIMATE SYSTEMS MODERNIZATION FOR LIVESTOCK PREMISES 371Dovlatov Igor Mamedjarevich and Yurochka Sergey Sergeevich11.1 Introduction 37211.2 Materials and Methods 37411.3 Results 37911.4 Discussion 38211.5 Conclusions 385References 38612 IMPROVING THE EFFICIENCY OF PHOTOVOLTAIC INSTALLATIONS FOR SUSTAINABLE DEVELOPMENT OF THE URBAN ENVIRONMENT 389Pavel Kuznetsov, Leonid Yuferev and Dmitry Voronin12.1 Introduction 39012.2 Background 39212.3 Main Focus of the Chapter 40212.4 Solutions and Recommendations 417Acknowledgements 417References 41813 MONITORING SYSTEM BASED MICRO-CONTROLLER FOR BIOGAS DIGESTER 423Ahmed Abdelouareth and Mohamed Tamali13.1 Introduction 42313.2 Related Work 42413.3 Methods and Material 42513.3.1 Identification of Needs 42513.3.2 ADOLMS Software Setup 42513.3.3 ADOLMS Sensors 42613.3.4 ADOLMS Hardware Architecture 42813.4 Results 43013.5 Conclusion 432Acknowledgements 433References 43314 GREENHOUSE GAS STATISTICS AND METHODS OF COMBATING CLIMATE CHANGE 435Tatyana G. KrotovaIntroduction 435Methodology 436Findings 436Conclusion 454References 455About the Editors 457Index 459
Kubernetes Application Developer
Write efficient, smart, and optimized code for containerized applications on public and private clouds at a generic level. This book shows you how to set up microservices that are robust, scalable, and capable of running on GKE (Google Kubernetes Service), AKS (Azure Kubernetes Service), ECS (Elastic Container Service), or even on a vanilla K8S cluster.The book covers the nuts and bolts of container orchestration engines (COEs) and explains how to install and configure them. It also covers creation and deployment of a sample application on COEs. You will learn how to integrate different applications such as OAuth and how to test them and secure them using Istio Citadel. You also will be taught how to create HPA rules for microservices and scale only those microservices that require it, making your stack intelligent. In the concluding chapter, the book explains how to build a SaaS solution from scratch, running on the cloud with automated deployments accessed publicly via a secured ingress K8S controller.By the end of the book, you will have a good understanding of developing microservices and how to design and create a software solution on the cloud.WHAT YOU WILL LEARN* Build software on Kubernetes in the most optimized way* Interact with Kubernetes using client SDKs in Python, Go, nodejs, etc.* Create a testing and deployment CI/CD system for software stacks* Secure your application using Istio, without writing code* Access microservices using ingress controllers and scale them using HPA rulesWHO THIS BOOK IS FORSoftware and system engineers and developersPRATEEK KHUSHALANI is a Cloud Architect at Google and works as a full stack developer in developing cloud based accelerators. Prior to Google, he worked as software developer at IBM and worked as an individual contributor on the development of SDN networking of the IBM public cloud. He has worked across industries such as software, retail, and R&D prototypes, with a focus on cloud computing and machine learning. At Google, he contributes to the development of tools which help accelerate customer's migration journey to Google Cloud Platform. Prateek has strong expertise in developing and designing IaaS, PaaS, and SaaS solutions for both public and private clouds. He holds a bachelor's degree from Birla Institute of Technology, Mesra. He is an open-source contributor and is an active writer on tech blogs.•Chapter 1, Cloud Computing and KubernetesChapter Goal:o What is cloud computingo What is Kuberneteso Different distributions of Kuberneteso Setting up a K8S cluster- for workshop purposeso Common commands of K8So Place of Kubernetes from an architecture point of view.•Chapter 2, Creating Applications on KubernetesChapter Goal:o Create an Apache http servero Create a Java Tomcat war-based servero Create a gRPC API servero Create a Rest API servero Differences when creating applications on Kubernetes.o How will the application be actually called in a production based cluster.•Chapter 3, Testing of Applications on KubernetesChapter Goal:o Creating a CI system for testing.o Using of Pytest, go test, behave and other best testing tools based on programming language.o Adding a simple CD system stage.o Coverage of code and mock of applications to replicate real time scenarios.•Chapter 4, Security of ApplicationsChapter Goal:o Creating a book inventory application composed of UI, API and DBo Using cloud services instead of reinventing the wheelo Using and understand Istio for TLS Encryption and monitoring.o Understanding authentication/authorization and RBAC systems.o Leverage all the services available rather than developing things to secure all microservices.•Chapter 5, Networking of ApplicationsChapter Goal:o Understanding the basics of networking in Kubernetes.o How containers/pod reach each other via overlay networking.o Different ways networking is configured in Kubernetes cluster.o Using name-based DNS routing in applications rather than IP’so Understanding load balancers and the features provided by it.o Using Istio to create a service mesh of microservices and see the flow of traffic between them.o Configuring Kubernetes objects such as Ingress, Service, Endpoints.•Chapter 6, Scaling of Software SolutionChapter Goal:o Identify which microservice of the solution is becoming a bottlenecko Creating HPA rules in Kubernetes to scale specific microservice.o Use case and real-world problems and solutions to them via scaling.•Chapter 7, Building a SaaS SolutionChapter Goal:o Start with nothing but a simple k8s cluster.o Create microservice with your own hands one by one.o Identify what all services are required for building a sample SaaS e commerce solution.o Creating/Configuring a UI, API, DB, business logic, monitoring software stack.o Architecting the entire solution.o Bring the stack up and testing it against load and autoscaling the solution to support any number of requests.
Hands-on AIOps
Welcome to your hands-on guide to artificial intelligence for IT operations (AIOps). This book provides in-depth coverage, including operations and technical aspects. The fundamentals of machine learning (ML) and artificial intelligence (AI) that form the core of AIOps are explained as well as the implementation of multiple AIOps uses cases using ML algorithms.The book begins with an overview of AIOps, covering its relevance and benefits in the current IT operations landscape. The authors discuss the evolution of AIOps, its architecture, technologies, AIOps challenges, and various practical use cases to efficiently implement AIOps and continuously improve it. The book provides detailed guidance on the role of AIOps in site reliability engineering (SRE) and DevOps models and explains how AIOps enables key SRE principles.The book provides ready-to-use best practices for implementing AIOps in an enterprise. Each component of AIOps and ML using Python code and templates is explained and shows how ML can be used to deliver AIOps use cases for IT operations.WHAT YOU WILL LEARN* Know what AIOps is and the technologies involved* Understand AIOps relevance through use cases* Understand AIOps enablement in SRE and DevOps* Understand AI and ML technologies and algorithms* Use algorithms to implement AIOps use cases* Use best practices and processes to set up AIOps practices in an enterprise* Know the fundamentals of ML and deep learning* Study a hands-on use case on de-duplication in AIOps* Use regression techniques for automated baselining* Use anomaly detection techniques in AIOpsWHO THIS BOOK IS FORAIOps enthusiasts, monitoring and management consultants, observability engineers, site reliability engineers, infrastructure architects, cloud monitoring consultants, service management experts, DevOps architects, DevOps engineers, and DevSecOps expertsNAVIN SABHARWAL is currently Chief Architect and Head of Strategy for Autonomics, named "DRYiCE" at HCL technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL technologies. Navin is an innovator, thought leader, author, and a consultant in areas of AI and machine learning (ML), observability, AIOps, DevOps, DevSecOps, engineering, and R&D. He is responsible for IP development & service delivery in the areas of AI and ML, automation products, cloud computing, public cloud AWS, Microsoft Azure, VMWare private cloud, Microsoft private cloud, data center automation, analytics for IT operations, and IT service management.GAURAV BHARDWAJ is a seasoned IT professional and technology evangelist with expertise in service assurance, cloud computing, AI/ML-based software product development, engineering, and data analytics. He has international experience in developing and executing IT automation strategies and solutions that are aligned with business goals as well as heading multi-million USD services globally. Gaurav has a proven track record of achievements in roles of enterprise architect and consultant for large and complex global engagements (includes multiple Fortune 500 companies) leveraging automation as the pivot for business development as well as for transforming legacy environments/platforms into next-generation IT environments powered by cloud-native and containerized apps, SDI, and AIOps and DevOps methodologies.CHAPTER 1: WHAT IS AIOPS, NEED, AND BENEFITSChapter goal: This chapter talks about challenges that IT modernization and business digitalization are posing to IT business and how AIOPs can help in overcoming them as well as sustain and stay relevant in this post-pandemic economy.No of pages 15Sub -topics1. Impact of IT modernization and digitalization2. Challenges with ITOA3. What is artificial intelligence4. AIOPs - AI in information technology5. AIOPs businesses leversCHAPTER 2: AIOPS ARCHITECTURE, METHODOLOGY, CHALLENGESChapter goal: Explain technologies and components involved in AIOPs architecture along with its implementation methodology and challenges.No of pages: 12Sub - Topics1. AIOPs overview2. AIOPs architecture and components3. AIOPs implementation methodology4. AIOPs challengesCHAPTER 3: AIOPS SUPPORTING SITE RELIABILITY ENGINEERING AND DEVOPSChapter goal: Explain the use of AIOPs in SRE in keeping services up and running and the DevOps process of product development to operations.No of pages: 15Sub - Topics:1. Overview of SRE and DevOps model2. AIOPs for diverse personas - SRE & DevOps3. AIOPs for application development life cycle4. Aligning Dev and Ops via AIOPs.5. SRE principles and AIOPs6. AIOPs enabling visibility in SRE and DevOpsCHAPTER 4: FUNDAMENTALS OF MACHINE LEARNING AND AIChapter Goal: Explain the technology and concepts behind artificial intelligence and machine learning.No of pages: 12Sub - Topics:1. What is machine learning2. Why machine learning is important3. Types of machine learning4. Natural language processing5. Machine learning algorithmic tradeoff6. Principles of artificial intelligenceCHAPTER 5: AIOPS USE CASESChapter Goal: Explain practical scenarios or tasks which can be facilitated by AIOPs.No of pages: 8Sub - Topics:Monitoring of software systemsRoot cause analysis with AIOpsSecurity use casesCHAPTER 6: APPLYING MACHINE LEARNING FOR AIOPS:Chapter Goal: Provide No. of pages: 12Sub - Topics:1. Automated baselining2. Deduplication3. Anomaly detection4. ML-driven correlation5. Rule-based correlation6. AIOPs in detect-to-correct value chainCHAPTER 7: SETTING UP OF AIOPSChapter Goal: Provide best practices for AIOPs journey and guidance on setting up of AIOPs practic.No. of pages: 10Sub - Topics:1. AIOPs implementation framework.2. Define roadmap of AIOPs3. Setting up guardrails4. Teams enablement and engagement5. Visibility and governance6. Continous improvementCHAPTER 8: FUTURE OF AIOPSChapter Goal: Provide a blueprint of AIOPs future and its impact on the IT industry.No. of pages: 3Sub - Topics:1. Transition from domain-centric to domain-agnostic AIOPs2. AIOPs holds key To digital business transformation3. Unified Framework - AIOPs with SecOps and DevSecOps.
Machine Learning on Geographical Data Using Python
Get up and running with the basics of geographic information systems (GIS), geospatial analysis, and machine learning on spatial data in Python.This book starts with an introduction to geodata and covers topics such as GIS and common tools, standard formats of geographical data, and an overview of Python tools for geodata. Specifics and difficulties one may encounter when using geographical data are discussed: from coordinate systems and map projections to different geodata formats and types such as points, lines, polygons, and rasters. Analytics operations typically applied to geodata are explained such as clipping, intersecting, buffering, merging, dissolving, and erasing, with implementations in Python. Use cases and examples are included. The book also focuses on applying more advanced machine learning approaches to geographical data and presents interpolation, classification, regression, and clustering via examples and use cases.This book is your go-to resource for machine learning on geodata. It presents the basics of working with spatial data and advanced applications. Examples are presented using code (accessible at github.com/Apress/machine-learning-geographic-data-python) and facilitate learning by application.WHAT YOU WILL LEARN* Understand the fundamental concepts of working with geodata* Work with multiple geographical data types and file formats in Python* Create maps in Python* Apply machine learning on geographical dataWHO THIS BOOK IS FORReaders with a basic understanding of machine learning who wish to extend their skill set to analysis of and machine learning on spatial data while remaining in a common data science Python environmentJOOS KORSTANJE is a data scientist, with over five years of industry experience in developing machine learning tools. He has a double MSc in Applied Data Science and in Environmental Science and has extensive experience working with geodata use cases. He currently works at Disneyland Paris where he develops machine learning for a variety of tools. His experience in writing and teaching have motivated him to write this book on machine learning for geodata with Python. Chapter 1: Introduction to GeodataChapter Goal: Presenting what geodata is, how to represent it, its difficultiesNo of pages 20Sub -Topics1. Geodata definitions2. Geographical Information Systems and common tools3. Standard formats of geographical data4. Overview of Python tools for geodataChapter 2: Coordinate Systems and ProjectionsChapter Goal: Introduce coordinate systems and projectionsNo of pages: 20Sub - Topics1. Geographical coordinates2. Geographical coordinate systems3. Map projections4. Conversions between coordinate systemsChapter 3: Geodata Data Types: Points, Lines, Polygons, RasterChapter Goal: Explain the four main data types in geodataNo of pages : 20Sub - Topics:1. Points2. Lines3. Polygons4. RasterChapter 4: Creating MapsChapter Goal: Learn how to create maps in PythonNo of pages : 20Sub - Topics:1. Discover mapping libraries2. See how to create maps with different data typesChapter 5: Basic Operations 1: Clipping and Intersecting in PythonChapter Goal: Learn clipping and intersecting in PythonNo of pages: 20Sub - Topics:1. What is clipping?2. How to do clipping in Python?3. What is intersecting4. How to do intersecting in Python?Chapter 6: Basic Operations 2: Buffering in PythonChapter Goal: Learn how to create buffers in PythonNo of pages: 20Sub - Topics:1. What are buffers?2. How to create buffers in PythonChapter 7: Basic Operations 3: Merge and Dissolve in PythonChapter Goal: Learn how to merge and dissolve in PythonNo of pages: 20Sub - Topics:1. What is the merge operation?2. How to do the merge operation in Python?3. What is the dissolve operation?4. How to do the dissolve operation in Python?Chapter 8: Basic Operations 4: Erase in PythonChapter Goal: Learn how to do an erase in PythonNo of pages: 20Sub - Topics:1. What is the erase operation?2. How to apply the erase operation in PythonChapter 9: Machine Learning: InterpolationChapter Goal: Learn how to do interpolation PythonNo of pages: 20Sub - Topics:1.What is interpolation?2.How to do interpolation in Python3.Different methods for spatial interpolation in PythonChapter 10: Machine Learning: ClassificationChapter Goal: Learn how to do classification on geodata in PythonNo of pages: 20Sub - Topics:1.What is classification?2.How to do classification on geodata in Python?3.In depth example application of classification on geodata.Chapter 11: Machine Learning: RegressionChapter Goal: Learn how to do regression on geodata in PythonNo of pages: 20Sub - Topics:1.What is regression?2.How to do regression on geodata in Python?3.In depth example application of regression on geodata.Chapter 12: Machine Learning: ClusteringChapter Goal: Learn how to do clustering on geodata in PythonNo of pages: 20Sub - Topics:1.What is clustering?2.How to do clustering on geodata in Python?3.In depth example application of clustering on geodata.Chapter 13: ConclusionChapter Goal: Regroup all the knowledge togetherNo of pages: 10Sub - Topics:1.What have you learned?2.How to combine different practices together3. Other reflections for applying the topics in a real-world use case
Executive's Guide to Cyber Risk
A SOLID, NON-TECHNICAL FOUNDATION TO HELP EXECUTIVES AND BOARD MEMBERS UNDERSTAND CYBER RISKIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives tasked with making sound decisions regarding cyber risk management. The book offers non-technical, business-side executives with the key information they need to understand the nature of cyber risk and its impact on organizations and their growth.In the book, readers will find:* Strategies for leading with foresight (as opposed to hindsight) while maintaining the company’s vision and objectives* Focused, jargon-free explanations of cyber risk that liken it to any other business risk* Comprehensive discussions of the fundamentals of cyber risk that enable executive leadership to make well-informed choicesPerfect for chief executives in any functional area, the Executive’s Guide to Cyber Risk also belongs in the libraries of board members, directors, managers, and other business leaders seeking to mitigate the risks posed by malicious actors or from the failure of its information systems.ForewordPrefaceAcknowledgmentsAbout the AuthorChapter 1: Cyber Strategy Risk: The Strategy-Centric ApproachChapter 2: Cyber Value Risk: The Value-Centric ApproachChapter 3: Cyber Compliance Risk: The Compliance-Centric ApproachChapter 4: Cyber Culture Risk: The Human-Centric ApproachChapter 5: Cyber Resilience Risk: The Technology-Centric ApproachAppendix AAppendix BAppendix CAppendix DAppendix EIndex
Angewandte Ethik und Technikbewertung
Wie bilde ich mir ein ethisches Urteil, um Konflikten zu begegnen? Was ist Technik und wer ist verantwortlich, wenn sie versagt? Stehen Menschen noch im Mittelpunkt – obwohl oder gerade weil Maschinen immer „smarter“ werden? Fragen wie diese verlangen nach einer übersichtlichen und verständlichen Präsentation ethischer Methoden der Technikbewertung. Dabei rückt vorliegendes Buch die Auseinandersetzung mit den Folgen, Risiken und Nebeneffekten technischen Handelns in den Mittelpunkt. Diese reichen von ökologischen Fragen der Entsorgung über Zweckentfremdung bis hin zur individuellen und kollektiven Verantwortung von Ingenieur*innen. Aufbauend auf Grundlagen der angewandten Ethik wird in Bottom-up- und Top-down-Verfahren die Kasuistik sowie analogisch-vergleichende und logisch-ableitende Urteilsbildung eingeführt. Wesentliche Charakteristika technischen Handelns sowie Akteursrollen werden systematisch vorgestellt. Abbildungen, Beispiele und Aufgaben runden den verständlichen Aufbau ab. Als methodischer Grundriss richtet sich vorliegendes Buch an Ingenieurwissenschaftler*innen, Informatiker*innen und Geisteswissenschaftler*innen im Berufsalltag, aber auch an interessierte Lai*innen, die mehr über ethische Praxis erfahren wollen. Es bildet den zweiten, in sich abgerundeten Teil der Buchreihe Grundlagen der Technikethik.Haben wir die Technik, die wir brauchen, und brauchen wir die Technik, die wir haben?MICHAEL FUNK forscht und lehrt an der Universität Wien in den Bereichen Medien- und Technikphilosophie (Institut für Philosophie) sowie Cooperative Systems (Fakultät für Informatik). Grundlagen angewandter Ethik - Mittelpunkt Mensch – Methodisch-sprachkritische Anthropozentrik und leibliche Orientierung - Technik kritisch analysieren - Individuelle und kollektive Verantwortung
Getting Started with Ethereum
Get started with blockchain development with this step-by-step guide. This book takes you all the way from installing requisite software through writing, testing, and deploying smart contracts.Getting Started with Ethereum delves into technologies most closely associated with Ethereum, such as IPFS, Filecoin, ENS, Chainlink, Truffle, Ganache, OpenZeppelin, Pinata, Fleek, Infura, Metamask, and Opensea. Author Davi Bauer walks you through project creation, how to compile projects and contracts, configure networks, and deploy smart contracts on blockchains. He then covers smart contracts, including deploying and verifying them. This book approaches blockchain in a way that allows you to focus on the topic that most interests you, covering Ethereum-related technologies broadly and not just focusing on Solidity.This hands-on guide offers a practical rather than conceptual approach get you coding. Upon completing this book, you will be able to confidently develop and deploy smart contracts on blockchains.Source code can be found at https://github.com/Apress/getting-started-ethereum.WHAT YOU WILL LEARN* Understand tokenization of assets, including NFTs, using Ethereum* Host censorship-resistant applications using IPFS* Deploy on second-layer blockchains using Polygon* Deploy smart contracts with multiple technologies around EthereumWHO IS THIS BOOK FOROff-chain developers who want to migrate to on-chain development starting with the Ethereum blockchain and the technologies around it. Prior programming knowledge and conceptual understanding of blockchain is necessary. Davi Pedro Bauer has over 20 years of experience in the IT sector with experience in analysis and systems development. He has been working with agile methods since 2009, where he participated in agile adoption programs in multidisciplinary teams, supporting the implementation of processes and practices such as Scrum and Kanban, as well as the launch of new digital products for web and mobile platforms. Since 2016, he has been studying topics related to Blockchain, such as cryptocurrencies, asset tokenization, smart contracts, and decentralized applications (DApps), and since 2019, he has been working with DevSecOps from code to infrastructure. ● Pre requirements○ Install Blockchain Dev Kit Extension on VS Code■ Installing the extension○ Install Truffle■ Installing Truffle■ Checking Truffle installation○ Install Ganache CLI■ Installing Ganache■ Starting Ganache locally○ Install DockerChapter 1: MetaMask○ Install and Setup MetaMask Wallet■ Installing the wallet■ Configuring the wallet■ Accessing your wallet■ Discovering your wallet addressChapter 2: Infura○ Create an account on Infura■ Creating a new account■ Setting up your Infura projectChapter 3: Solidity○ Get started with Solidity project on VS Code■ Creating a new project■ Compiling the project■ Deploying to development BlockchainChapter 4: ERC20 Tokens○ Write a simple ERC20 token using OpenZeppelin■ Preparing the environment■ Writing the contract■ Setting the Solidity compiler version■ Compiling the contract■ Verifying the result○ Deploy ERC20 token to ganache development Blockchain■ Preparing the migration■ Writing the contract■ Starting the Blockchain■ Configuring the Blockchain network■ Deploying the contract■ Adding the token to a wallet○ Create an ERC20 token with fixed supply■ Creating the project■ Writing the contract■ Starting Ganache development Blockchain■ Migrating the contract■ Configuring MetaMask■ Adding the token■ Transferring tokens between accounts○ Deploy ERC20 token to Testnet using Infura■ Installing the pre-requirements■ Setting up your Infura project■ Setting up your Smart Contract■ Configuring the private key■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on Etherscan○ Deploy ERC20 token to Polygon Testnet (Layer 2)■ Installing the pre-requirements■ Adding Polygon Mumbai to MetaMask networks■ Activating the Polygon add-on on Infura■ Setting up your Infura project■ Setting up your Smart Contract■ Configuring the network (using Matic endpoint)■ Configuring the network (using Infura endpoint)■ Configuring the private key■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on Polygan Scan○ Deploy ERC20 Token to Polygon Mainnet (Layer 2)■ Adding Polygon Mainnet to MetaMask networks■ Configuring the network (using Infura endpoint)■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on polyganscanChapter 5: Unit Tests for Smart Contracts○ Write Unit Tests for ERC20 Smart Contracts■ Creating a new unit test file■ Writing test for the contract total supply■ Writing test asserting for the contract balanceChapter 6: ERC721- Non-Fungible Tokens○ Create your art NFT using Ganache and OpenZeppelin■ Creating the project■ Configuring the wallet■ Configuring the network■ Configuring the solidity compiler■ Configuring the private key■ Creating the badge image■ Adding the badge to your local IPFS■ Pinning the badge to a remote IPFS node■ Creating the badge metadata■ Compiling the Smart Contract■ Migrating the Smart Contract■ Instantiate the Smart Contract■ Awarding badge to a wallet■ Checking badge on Etherscan■ Adding the NFT token to your wallet○ Sell your art NFT on Opensea■ Connecting to OpenSea■ Viewing your badge■ Listing your badge for sale■ Exploring listing detailsChapter 7: Faucets○ Get Test Ether From Faucet on Ropsten Network■ Accessing the faucet■ Waiting for the transaction○ Get Test Ether From Faucet on Rinkeby Testnet■ Preparing for funding■ Funding your wallet■ Checking your wallet○ Get Test MATIC From Faucet on Mumbai Testnet■ Preparing for funding■ Funding your wallet■ Checking your wallet○ Get Test MATIC From Faucet on Mainnet■ Preparing for funding■ Funding your wallet■ Checking your walletChapter 8: IPFS - InterPlanetary File System○ Create Your IPFS Node■ Installing the node■ Configuring the node■ Testing the node■ Exploring your IPFS node○ Add Files to IPFS■ Adding the file■ Viewing the file content on the console■ Checking the file in the web ui■ Viewing the file content in the browser○ Setup IPFS Browser Extension■ Installing the browser extension■ Configuring the node type■ Starting an external node■ Importing a file○ Pin and Unpin IPFS Files on Local Node■ Starting your local node■ Adding file to your node■ Checking the file was added■ Verifying your file was pinned■ Unpinning your file■ Pinning your file manually○ Pin and Unpin Files on Remote Node using Pinata■ Setting up API Keys on Pinata■ Setting up Pinata as a remove service on your terminal■ Adding a new file to your local IPFS node■ Pinning your file to the remote IPFS node■ Unpinning your file from the remote IPFS node○ Host Your Site on IPFS Using Fleek■ Login on Fleek■ Cloning your existing repository■ Installing Fleek■ Initializing Fleek■ Deploying your siteChapter 9: Filecoin○ How to preserve files on Filecoin local node■ Creating the project■ Configuring truffle■ Adding an image to be preserved■ Installing dependencies■ Starting local endpoints■ Preserving files to FilecoinChapter 10: ENS - Ethereum Name Service○ Register your ENS to Receive any Crypto, Token or NFT on Your Wallet■ Searching your domain name■ Request to register■ Managing your registration name■ Checking the name resolutionChapter 11: Chainlink○ Get Crypto Prices Inside Smart Contracts using Chainlink Oracles■ Creating the project■ Creating the Smart Contract■ Creating the migration■ Setting up your Infura project■ Configuring the wallet■ Configuring the network■ Configuring the solidity compiler■ Configuring the private key■ Compiling the Smart Contract■ Deploying the Smart Contract■ Getting the price information from the Smart ContractChapter 12: Nethereum○ Get Ether Balance using Nethereum■ Creating the project■ Installing web3■ Creating the method■ Getting the balance
Java EE to Jakarta EE 10 Recipes
Take a problem-solution approach for programming enterprise Java or Java EE applications and microservices for cloud-based solutions, enterprise database applications, and even small business web applications. _Java EE to Jakarta EE 10 Recipes_ provides effective, practical, and proven code snippets that you can immediately use to accomplish just about any task that you may encounter. You can feel confident using the reliable solutions that are demonstrated in this book in your personal or corporate environment.Java EE was made open source under the Eclipse Foundation, and Jakarta EE is the new name for what used to be termed the Java Platform, Enterprise Edition. This book helps you rejuvenate your Java expertise and put the platform’s latest capabilities to use for quickly developing robust applications. If you are new to Jakarta EE, this book will help you learn the features of the platform and benefit from one of the most widely used and powerful technologies available for cloud-native enterprise application development today.Examples in this book highlight Jakarta EE’s capabilities, helping you to build streamlined and reliable applications using the latest in Java technologies. The book takes a problem-solution approach in which each section introduces a common programming problem, showing you how to solve that problem in the best possible way using the latest features in Jakarta EE. Solutions in the form of working code examples are presented that you can download and use immediately in your own projects. Clear descriptions are provided to help you understand and learn to build further on the solutions provided.This is the ideal book for the code-focused programmer interested in keeping up with the future of enterprise development on the Java Platform.WHAT YOU WILL LEARN* Develop enterprise java applications using the latest open-source Jakarta EE platform* Create great-looking user interfaces using Jakarta Servlets, Jakarta Server Pages, Jakarta Server Faces and the Eclipse Krazo framework (an implementation of Jakarta MVC)* Build database applications using Jakarta NoSQL, Jakarta Persistence, and Jakarta Enterprise Beans.* Develop enterprise grade applications using Context & Dependency Injection, and Jakarta RESTFul web services* Automate testing through cohesive test suites built on Arquillian for Jakarta EE applications* Build loosely coupled distributed applications using Jakarta Messaging* Deploy microservices applications in cloud environments using Docker* Secure applications utilizing the Jakarta EE Security APIWHO THIS BOOK IS FORJava developers interested in quickly finding effective and proven solutions without reading through a lengthy manual and scrubbing for techniques.Josh Juneau is a professional application developer who enjoys working with database technology and learning new languages. He is a seasoned professional in Java SE and Java EE development, and brings strong database experience to the table as well. His interest in Java for developing web-based solutions has led to a passion of Java technology as a whole, including other languages on the JVM. In his spare time, Josh enjoys spending time with his wife and five wonderful children at his home in rural Illinois.Tarun Telang is an experienced Software Engineer with expertise in Web, Mobile & Cloud-based enterprise software solution development for world-renowned software companies including Microsoft, Oracle, SAP, BlackBerry, and Polycom. He is a hands-on technologist with 15+ years of IT industry experience with a strong business understanding and the ability to architect complex software solutions. He has been presenting in conferences related to software technology, writing technical articles and blogs since more than 10 years now. Tarun has also done 1 year of teaching for topics like Database Concepts, Data Structures & Programming Languages to Computer Science Engineering students. he has these certifications: Oracle Certified Programmer for Java 6.0 Platform, SAP Certified Development Consultant for NetWeaver 04 Java Web Application Development, SAP Certified Application Management Expert for End-to-End Root Cause Analysis - Solution Manager 4.0, and NASBA Certification on Remote Work.Revision Notes from AuthorBased on the book preview, below is the list of changes/updates I see relevant for the next revisions of this book - Jakarta EE 10 Recipes.----------------------------------Introduction:* Adding following details for Jakarta EE 9, 9.1 and 10 releases like timelines and theme.* Updating instructions for enabling Jakarta EE support using NetBeans IDE* Adding instructions for using the following IDE for building Jakarta EE applications.* Eclipse IDE* Visual Studio Code* Providing instructions for installing the following build tools for Jakarta EE* Maven* GradleAll Chapters:* Rename to chapter title Servlets and Jakarta Server Pages* Updating terminologies as below:* JavaServer Pages(JSP) to Jakarta Server Pages* JavaServer Faces(JSF) to Jakarta Faces,* JavaMail to Jakarta Mail* …* Reworking and verifying the code examples by performing the following modifications* Updating import statements in all code samples from javax.* to jakarta.*.* Updating code to make use of the latest Java 11 features* Updating instructions for enabling Jakarta EE support using NetBeans IDE* Adding instructions for using the following IDE as well for building Jakarta EE applications.* Eclipse IDE* Visual Studio Code* Ensuring the code can be executed in the latest releases of the following servers* Open Liberty, WildFly and GlassFish servers as are the flag bearers for Jakarta EE compliance.* Also verifying the code with other servers based on their availability with support for latest functionality like Payara or Apache TomEE or Oracle Weblogic and provide any specific instructions in case applicable.Note: As I would dig deeper into the content will be able to suggest more pointsChapter 1: Servlets and JavaServer Pages* Rename to chapter title Servlets1-8 (Adding content about - Improving performance with server push)* Adding a recipe for adding a user authentication to Servlets.* Adding a recipe for defining servlet behaviour based on user authorization* Adding more recipes for the following topics* session tracking andHandling cookies* HTTP Session handling* Servlet Filters / URL Redirections* . Move JSP related recipes to a separate chapterNew Chapter 2: Creating a New Chapter on Jakarta Server Pages* Adding recipes for the following topics* Handling file uploads* Add recipe for Implementing Internationalization* Managed Bean 2.0Chapter 2: JavaServer Faces Fundamentals* Rename to chapter title Jakarta Faces Fundamentals* Updating code as per Jakarta Faces 4.0 specification* Adding recipes for the following topics* Externalizing strings using resource bundlesChapter 3: Advanced JavaServer Faces* Rename to chapter title Advanced Jakarta FacesChapter 4: Eclipse Krazo* renaming it to Jakarta MVC and updating it with content for Jakarta MVC.Chapter 5: JDBC with Jakarta EE* Adding a Chapter with recipes on Jakarta TransactionsChapter 6: Object-Relational Mapping* Adding sections about migrating from Hibernate ORM 5.5 to Jakarta Persistence.Chapter 7: Jakarta NoSQL* Add recipes related to working with graph databases (like neo4j).Chapter 8: Enterprise JavaBeans* Updating recipes as Jakarta Enterprise Beans 4.0 specifications.Chapter 9: Java Persistence Query Language* Rename chapter title to Jakarta Persistence Query LanguageChapter 10: Bean Validation* Updating recipes as per Jakarta Bean validation 3.0 standard* Adding recipes about Migration from Hibernate ValidatorChapter 11: Contexts and Dependency Injection* Updates based on the latest CDI support* Adding recipes related to* Interceptor bindingsDecorators* Firing EventsChapter 12: Java Message ServiceRename to Jakarta MessagingUpdating recipes as per Jakarta Messaging 3.0Chapter 13: RESTful Web ServicesAdding a Chapter on migrating from Spring would also make sense as the upcoming release of Spring Framework 6 will align with Jakarta EE starting Q3 2021Add recipes for* Handling various status codes in HTTP responses.Chapter 14: WebSockets and JSONContent on WebSockets would be better suited after chapter* Restructuring sections on Web Sockets from Chapter 14 to Chapter 2 after HTTP/2 Server Push in Servlets changes* Adding a chapter on Jakarta ConcurrencyChapter 15: SecurityRename to Jakarta SecurityAdding recipes for* The authentication mechanism for Client-Cert and Digest* Support for OpenID, OAuth and JWTChapter 16: Concurrency and Batch* Updating recipes as per Jakarta Concurrency 3.0Chapter 17: Deploying to Containers* Adding topics related to running microservices targeted at smaller runtimes as per Jakarta Core Profile standard1. Servlets and Java Server Pages2. JavaServer Faces Fundamentals3. Advanced JavaServer Faces4. Eclipse Krazo5. JDBC With Jakarta EE6. Object-Relational Mapping7. Jakarta NoSQL8. Enterprise JavaBeans9. Java Persistence Query Language10. Bean Validation11. Contexts and Dependency Injection12. Java Message Service13. RESTful Web Services14. WebSockets and JSON15. Security16. Concurrency and Batch17. Deploying to Containers
Learn API Testing
Explore software web application architecture, API testing, coding practices, and the standards for better API test automation development and management. This book focuses on aspiring software testing engineers currently working in API testing, and those starting their journey in the field of software testing.You’ll begin with an introduction to API testing and software web applications involving APIs. The book then moves on to the authentication standards used in the software industry, and the tools, the frameworks, and the libraries used in API testing. As the book progresses, you’ll learn about the test pyramid, how to test an API, what makes a good test script, and various coding guidelines. Finally, you get to write your own API test script.Learn API Testing is your pathway to understanding a typical software web application, its requests and responses, and the properties of a good test script.WHAT YOU’LL LEARN* Examine practices, standards, and guidelines for effective test automation* Work with different tools like RestAssured, Curl, and Postman* Understand API testing paradigm (internal/external APIs, CDCT)* Review a case study on the industrial software API testing process* Organize a test frameworkWHO THIS BOOK IS FORAPI testing aspirants, developers/architects, project managers, and non-technical team members who may want to understand how APIs are being tested.Jagdeep Jain has more than 15 years of experience in Software Quality Assurance and Testing working in various product development software companies. He holds a degree in Computer Science & Engineering. He is a firm believer and advocate of test automation. He has Co-Authored Pro Apache JMeter with Sai Matam.Chapter 1: Introduction to API TestingCHAPTER GOAL: HELP THE READER IDENTIFY THE PURPOSE OF THE BOOK, TARGET AUDIENCE AND SKILLS SET REQUIRED TO PERFORM API TESTINGNO OF PAGES -SUB -TOPICS1. What is API Testing2. Why We Need API Testing3. Types of API Testing4. AdvantagesChapter 2: Software ApplicationCHAPTER GOAL: GAIN KNOWLEDGE ABOUT SOFTWARE WEB APPLICATION STANDARDS WHICH INVOLVES APISNo of pages: -SUB - TOPICS1. REST Client/Server Architecture2. Monolithic Vs. Microservices based web application3. HTTP(s)4. Header(s)5. Request / Response6. Response CodesChapter 3: AuthenticationCHAPTER GOAL: STANDARD AUTHENTICATION USED IN INDUSTRYNo of pages : -SUB - TOPICS:1. Basic Authentication2. Session Based Authentication3. Token / JWT Based Authentication4. OAuth2 Based AuthenticationChapter 4: ToolsCHAPTER GOAL: UNDERSTANDING OF TOOLS USED FOR DOING API TESTINGNO OF PAGES: -SUB - TOPICS:1. Postman2. CURL3. RestAssured4. TestNG5. Log4j6. Java - Spring BootChapter 5: Test PyramidCHAPTER GOAL: TESTING TYPES AND HIERARCHY OF EACH TYPENO OF PAGES: -SUB - TOPICS:1. Black Box Testing2. Grey Box Testing3. Unit Testing4. Components of Test PyramidChapter 6: Testing The API· CHAPTER GOAL: API TESTING PARADIGM (INTERNAL/EXTERNAL APIS., CDCT)NO OF PAGES: -SUB - TOPICS:1. Manual Test Script/ Workflows/ Use Cases2. What to Testa. Schemab. Datac. Data Type3. Coverage Good / Bad4. Headers Testinga. Request Headeri. Correct Headerii. Missing Headeriii. Incorrect Headeriv. Unsupported Typeb. Response Headeri. Supported Typeii. Header Responseiii. Response Codes5. Request Bodya. Format Unsupportedb. Special Charactersc. Too long Stringd. Invalid valuee. Wrong data typef. Empty data/objectg. Required fieldsh. Nulli. Redundant fieldsj. DELETE already deleted entityk. Use PUT in place of POST etc.6. Response Bodya. Actual Data vs. Expected Datab. Limit7. Internal vs. External APIs8. CDCT – Consumer Driver Contract Testing9. Riska. Importance of Negative TestingChapter 7: A Good Test ScriptCHAPTER GOAL: PROPERTIES OF A GOOD TEST SCRIPTNO OF PAGES: -SUB - TOPICS:1. Components of a Good Test Script2. ExampleChapter 8: Coding GuidelinesChapter Goal: Using standard coding guidelines for better test management and review.NO OF PAGES: -SUB - TOPICS:1. Google Best Practices2. Test Naming Conventions3. Method Naming Convention4. OthersChapter 9: Organize Test FrameworkCHAPTER GOAL: ORGANIZE A TEST FRAMEWORK IN A WAY THAT IS USABLE ACROSS ANY TEAM / PROJECTNO OF PAGES: -SUB - TOPICS:1. Maven Project2. Dependencies3. Spring Boot4. Properties File/Environment Based5. End Points6. Authentication7. Request8. Response9. Test Dataa. JSONb. Filec. HashMapd. TestNG data provider10. LoggingChapter 10: First TestCHAPTER GOAL: WRITE FIRST TEST TO GET A FEEL OF API TESTINGNo of pages: -SUB - TOPICS:1. Developing First Test2. Executing First Test3. Check Results4. Check LoggingChapter 11: API DocumentationCHAPTER GOAL: API DOCUMENTATION IS A MANDATORY REQUIREMENT FOR WRITING API TESTS, SWAGGER IS THE TOOL THAT IS BEING USED, WE WILL SEE HOW TO READ THE SWAGGER API DOCUMENTATION FOR BETTER UNDERSTANDING ON THE END POINTS.NO OF PAGES: -SUB - TOPICS:1. Swagger2. Why We Need API Documentation3. Understanding the API DocumentationChapter 12: Case Study – Shopping Cart APIsCHAPTER GOAL: A SAMPLE APPLICATION IS USED TO DEMONSTRATE THE INDUSTRIAL WAY OF DOING API TESTING, THIS IS AN EQUIVALENT TO A WORKSHOP ON DOING API TESTING.NO OF PAGES: -SUB - TOPICS:1. Setting Up Application2. Goal Setting3. Test Environment (Docker Container)4. Test Data Preparation5. Agile Testing6. Shopping Cart API End Points7. Understanding Business Requirements8. Manual Tests Scripts9. Implementing Test Framework10. Writing Test11. Test Suite12. Execution13. Results14. Utilities
Computer Vision Projects with PyTorch
Design and develop end-to-end, production-grade computer vision projects for real-world industry problems. This book discusses computer vision algorithms and their applications using PyTorch.The book begins with the fundamentals of computer vision: convolutional neural nets, RESNET, YOLO, data augmentation, and other regularization techniques used in the industry. And then it gives you a quick overview of the PyTorch libraries used in the book. After that, it takes you through the implementation of image classification problems, object detection techniques, and transfer learning while training and running inference. The book covers image segmentation and an anomaly detection model. And it discusses the fundamentals of video processing for computer vision tasks putting images into videos. The book concludes with an explanation of the complete model building process for deep learning frameworks using optimized techniques with highlights on model AI explainability.After reading this book, you will be able to build your own computer vision projects using transfer learning and PyTorch.WHAT YOU WILL LEARN* Solve problems in computer vision with PyTorch.* Implement transfer learning and perform image classification, object detection, image segmentation, and other computer vision applications* Design and develop production-grade computer vision projects for real-world industry problems* Interpret computer vision models and solve business problemsWHO THIS BOOK IS FORData scientists and machine learning engineers interested in building computer vision projects and solving business problemsAKSHAY R KULKARNI is an AI and machine learning (ML) evangelist and a thought leader. He has consulted for Fortune 500 and global enterprises to drive AI and data science-led strategic transformations. He is currently the manager of data science & AI at Publicis Sapien. He is a Google developer and author of the book Natural Language Processing Recipes (Apress). He is a regular speaker at major AI and data science conferences (including Strata, O’Reilly AI Conf, and GIDS). Akshay is a visiting faculty member for some of the top graduate institutes in India. In 2019, he was featured as one of the top 40 under 40 Data Scientists in India. In his spare time, he enjoys reading, writing, coding, and helping aspiring data scientists. He lives in Bangalore with his family.ADARSHA SHIVANANDA is a senior data scientist on Indegene's product and technology team where he works on building machine learning and artificial intelligence (AI) capabilities for pharma products. He aims to build a pool of exceptional data scientists within and outside of the organization to solve problems through training programs, and always wants to stay ahead of the curve. Previously, he worked with Tredence Analytics and IQVIA. He has worked extensively in the pharma, healthcare, retail, and marketing domains. He lives in Bangalore and loves to read and teach data science.NITIN RANJAN SHARMA is a manager at Novartis, involved in leading a team to develop products using multi-modal techniques. He has been a consultant developing solutions for Fortune 500 companies, involved in solving complex business problems using machine learning and deep learning frameworks. His major focus area and core expertise are computer vision and solving some of the challenging business problems dealing with images and video data. Before Novartis, he was part of the data science team at Publicis Sapient, EY, and TekSystems Global Services. He is a regular speaker at data science communities and meet-ups and also an open-source contributor. He has also been training and mentoring data science enthusiasts.Chapter 1: Building Blocks of Computer VisionChapter Goal: The chapter will start with the basic concepts of Computer Vision. We will cover theoretical aspects that lays the foundation for the upcoming hands-on projects on Computer Vision.No of pages :35Sub -Topics1. Overview of Computer Vision2. Understanding AlexNET, Convolutional Neural Network and receptive fields3. Understanding advanced concepts like RESNETS and inception network4. Discuss how usage of batch normalization, drop outs, data augmentation techniques help solve data insufficiency in deep learning models5. Introduction to PyTorch for Computer Vision modelsChapter 2: Building Image Classification ModelChapter Goal: The chapter will discuss about image classification model along with data augmentation techniques.No of pages: 40Sub - Topics1. Data preparation for image classification problem2. Data augmentation techniques3. Setting up model architecture with explanation4. Train and run inference for the Image Classification model5. Discuss Grouped Convolution, Dilated Convolution and transposed convolution and their applicationChapter 3: Building Object Detection ModelChapter Goal: This chapter will explain the core difference between simple classification model to detecting objects in an image. We will understand optimizing loss function to get the final object localized and detected. The chapter will take through some concepts of the existing models and how to fine tune them.No of pages: 30Sub - Topics:1. Exploring Object Detection concepts like FastRCNN, YOLO2. Explaining annotations and examples of how annotations are used in Object Detection3. Explaining loss function components4. Building Object Detection model, using transfer learning technique5. Running inference on fine-tuned modelChapter 4: Building Image Segmentation ModelChapter Goal: The chapter will define how single or multiple images can be segmented in an image. How a user can define a loss function and develop a model to segregate image outlines.No of pages: 35Sub - Topics:1. Concepts on how segmentation works on Images2. Explaining custom pre trained models3. Defining and explaining loss functions4. Implementing & fine-tuning Image Segmentation modelChapter 5: Image Similarity & Image based SearchChapter Goal: The chapter deals with the explanation of how the image similarity works and how use cases move around this concept.No of pages: 25Sub - Topics:1. Defining Image similarity and anomaly problems for images2. Defining the datasets3. Defining the loss functions and methodologies4. Providing solutions for Detecting Image similaritiesChapter 6: Image Anomaly DetectionChapter Goal: The chapter deals with the explanation of how anomalies from images can be detected and use-cases around it.No of pages: 20Sub - Topics:1. Defining anomaly problems for images2. Defining the datasets3. Defining the loss functions and methodologies4. Detecting anomalies on imagesChapter 7: Video Processing Applications using PyTorchChapter Goal: This chapter deals with various mechanism of video processing techniques. This chapter will help one to deal with untangling the complexities of video with series of images placed in time sequence. Concepts of RNN/LSTM/GRU will be discussed to solve real time use-cases on videos.No of pages: 50Sub - Topics:1. Setting up concepts of time dependent feature set2. Extrapolating images to videos3. Setting up concepts for video processing using Convolutional Neural Networks4. Defining the dataset and the loss function5. Defining the model6. Training the model and run inferenceChapter 8: Super-resolution through Upscaling & GANChapter Goal: This chapter deals with foundations on Generative Adversarial Networks in the field of computer vision. The concepts will be extrapolated with an use-case to how it is being used in super resolution (Enhancing Image Quality)No of pages: 30Sub - Topics:1. Establish the concept of upscaling in images1. Foundations of VAE and GAN in images2. Setting up codes in GAN for super resolution3. Using the concept to understand data augmentation using GANChapter 9: Body Posture DetectionChapter Goal: This chapter will establish the concept of multiple body posture detection. It will have the code encompassed the detection and multiple methods around posture detection applications.No of pages: 30Sub - Topics:1. Discussing top-down and bottom-up approach to detect persons2. Discuss open pose detection model to establish body pose3. Use of segmentation technique to detect body poseChapter 10: Explainable AI for Computer Vision using GRADCAMChapter Goal: This chapter deals with foundations on how a deep learning model results can be explained. An overview of GRADCAM and how the concepts help someone explaining a Computer Vision model will be discussed in abundance.No of pages: 15Sub - Topics:1. Revisit the concepts of explain-able AI2. Deep learning explainers to CV classification model3. Setting up concepts of GRADCAM4. Implementing how Computer Vision models can be interpreted by GRADCAM
450 Keywords Digitalisierung
Von „Big Data“ über die „Künstliche Intelligenz“ bis hin zur „Sozialen Robotik“: Im Kontext der Digitalisierung gibt es unzählige Fachtermini. Das vorliegende Nachschlagewerk ist für alle geeignet, die einen schnellen Einstieg in das Gebiet der Digitalisierung suchen und sich für Fragen der Ethik interessieren. In 350 übersichtlichen Beiträgen werden die Grundlagen und Entwicklungen leicht verständlich erläutert.A.- B.- C.- D.- E.- F.- G.- H.- I - J - K.- L.- M.- N.- O - P.- Q.- R.- S.- T.- U.- V.- W - X - Y - Z.
Neuronale Netze kompakt
Daten sind das neue Gold - und neuronale Netze haben bereits einigen Unternehmen geholfen, diesen Schatz auszugraben. Verschaffen Sie sich mit diesem Buch innerhalb kürzester Zeit einen soliden Überblick über neuronale Netze. Nach der Lektüre dieses Buches kennen Sie den historischen Werdegang dieser leistungsfähigen Approximatoren und Sie sind vertraut mit den aktuell wichtigsten Begriffen. Des Weiteren kennen Sie die Möglichkeiten sowie die Grenzen neuronaler Netze. Dieses Buch richtet sich in erster Linie an Praktiker, die einen schnellen Einstieg in das Thema suchen, ohne parallel einen Hochschulkurs in Mathematik und Statistik zu machen. DR. DANIEL SONNET lehrt an der Hochschule Fresenius in Hamburg die Fächer Mathematik, Statistik und Data Science. Seit über 15 Jahren analysiert er leidenschaftlich Daten für Unternehmen. Die vielfältigen Nutzungsmöglichkeiten sowie die Leistungsfähigkeit neuronaler Netze faszinierten ihn bereits während seines Studiums. Daniel Sonnet gründete zwei datengetriebene Unternehmen und berät Unternehmen zum Einsatz von Methoden des maschinellen Lernens.Der Start – das Perceptron.- Die Weiterentwicklung: Mehrschichtige neuronale Netze.- Heutiger Status Quo: Deep Learning.- Positive Beispiele zum Einsatz neuronaler Netze.- Grenzen neuronaler Netze.-Quickguide: Wie setze ich neuronale Netze ein.
A Government Librarian's Guide to Information Governance and Data Privacy
THIS BOOK PROVIDES A CONCISE AND USABLE OVERVIEW OF THE PRACTICAL IMPLICATIONS OF IMPORTANT PUBLIC SECTOR UNITED STATES FEDERAL, STATE, AND MUNICIPAL LAWS AND STANDARDS RELATED TO INFORMATION GOVERNANCE, AS THEY PERTAIN TO LIBRARIANS, RESEARCH STAFF, UNIVERSITIES, CORPORATE REGULATORY MANAGERS, AND PUBLIC-SECTOR INFORMATION GOVERNANCE PROFESSIONALS. It is the first in a series of two volumes addressing public sector information governance compliance matters from the perspective of our target audience.Topics addressed in the book include:* the evolving role of librarians and the need for librarians and legal researchers to understand the principles of information governance,* the importance of broad-based regulatory IG principles such as the Federal Records Act, the Paperwork Reduction Act of 1980 and 36 CFR Chapter XII, Subchapter B – Records Management, that have been promulgated by various federal government agencies in framing public-sector IG principles,* a survey of interpretive surveys from the Office of Management and Budget (OMB) that further elucidate the core IG principles applicable to public sector stakeholders,* case studies detailing the application of important IG principles by federal agencies and bodies, and* a survey of important IG issues facing state and local governments.
Pro Power BI Dashboard Creation
Produce high-quality, visually attractive analysis quickly and effectively with Microsoft’s key BI tool. This book teaches analysts, managers, power users, and developers how to harness the power of Microsoft’s self-service business intelligence flagship product to deliver compelling and interactive insight with remarkable ease. It then shows you the essential techniques needed to go from source data to dashboards that seize your audience’s attention and provide them with clear and accurate information.As well as producing elegant and visually arresting output, you learn how to enhance the user experience through adding polished interactivity. This book shows you how to make interactive dashboards that allow you to guide users through the meaning of the data that they are exploring. Drill down features are also covered that allow you and your audience to dig deeper and uncover new insights by exploring anomalous and interesting data points.Reading this book builds your skills around creating meaningful and elegant dashboards using a range of compelling visuals. It shows you how to apply simple techniques to convert data into business insight. The book covers tablet and smartphone layouts for delivering business value in today’s highly mobile world. You’ll learn about formatting for effect to make your data tell its story, and you’ll be a master at creating visually arresting output on multiple devices that grabs attention, builds influence, and drives change.WHAT YOU WILL LEARN* Produce designer output that will astound your bosses and peers* Make new insights as you chop and tweak your data as never before* Create high-quality analyses in record time* Create interdependent charts, maps, and tables* Deliver visually stunning information* Drill down through data to provide unique understandings* Outshine competing products and enhance existing skills* Adapt your dashboard delivery to mobile devicesWHO THIS BOOK IS FORFor any Power BI user who wants to strengthen their ability to deliver compelling analytics via Microsoft’s widely adopted analytics platform. For those new to Power BI who want to learn the full extent of what the platform is capable of. For power users such as BI analysts, data architects, IT managers, accountants, and C-suite members who want to drive change in their organizations.ADAM ASPIN is an independent Business Intelligence consultant based in the United Kingdom. He has worked with SQL Server for over 25 years. During this time, he has developed several dozen reporting and analytical systems based on the Microsoft data platform.A graduate of Oxford University, Adam began his career in publishing before moving into IT. Databases soon became a passion, and his experience in this arena ranges from dBase to Oracle, and Access to MySQL, with occasional sorties into the world of DB2. He is, however, most at home in the Microsoft universe when using the Microsoft data and analytics stack—both in Azure and on-premises.Business Intelligence has been Adam’s principal focus for the last 20 years. He has applied his skills for a range of clients in finance, banking, utilities, leisure, luxury goods, and pharmaceuticals. Adam is a frequent contributor to SQLServerCentral.com and Simple-Talk. He is a regular speaker at events such as SQL Saturdays and SQLBits. A fluent French speaker, Adam has worked in France and Switzerland for many years.Adam is the author of SQL Server Data Integration Recipes, Business Intelligence with SQL Server Reporting Services, High Impact Data Visualization in Excel with Power View, 3D Maps and Get and Transform, Data Mashup using Microsoft Excel using Power Query and M, and Pro Power BI Theme Creation—all with Apress.1. Dashboard Basics2. Table Visuals3. Advanced Table Visual Techniques4. Matrix Visuals5. Card Visual Types6. Charts in Power BI Desktop7. Advanced Chart Types8. Formatting Charts9. Other Types of Visuals10. Third Party Visuals11. Drilldown and Drillup12. Maps in Power BI Desktop13. Filtering Data14. Slicers and Cross-Filtering15. Enhancing Dashboards16. Multi-Page Dashboards17. Bookmarks and ButtonsA. Sample DataB. Visualization IconsC. Blank Visual Representations
The Azure Data Lakehouse Toolkit
Design and implement a modern data lakehouse on the Azure Data Platform using Delta Lake, Apache Spark, Azure Databricks, Azure Synapse Analytics, and Snowflake. This book teaches you the intricate details of the Data Lakehouse Paradigm and how to efficiently design a cloud-based data lakehouse using highly performant and cutting-edge Apache Spark capabilities using Azure Databricks, Azure Synapse Analytics, and Snowflake. You will learn to write efficient PySpark code for batch and streaming ELT jobs on Azure. And you will follow along with practical, scenario-based examples showing how to apply the capabilities of Delta Lake and Apache Spark to optimize performance, and secure, share, and manage a high volume, high velocity, and high variety of data in your lakehouse with ease.The patterns of success that you acquire from reading this book will help you hone your skills to build high-performing and scalable ACID-compliant lakehouses using flexible and cost-efficient decoupled storage and compute capabilities. Extensive coverage of Delta Lake ensures that you are aware of and can benefit from all that this new, open source storage layer can offer. In addition to the deep examples on Databricks in the book, there is coverage of alternative platforms such as Synapse Analytics and Snowflake so that you can make the right platform choice for your needs.After reading this book, you will be able to implement Delta Lake capabilities, including Schema Evolution, Change Feed, Live Tables, Sharing, and Clones to enable better business intelligence and advanced analytics on your data within the Azure Data Platform.WHAT YOU WILL LEARN* Implement the Data Lakehouse Paradigm on Microsoft’s Azure cloud platform* Benefit from the new Delta Lake open-source storage layer for data lakehouses * Take advantage of schema evolution, change feeds, live tables, and more* Write functional PySpark code for data lakehouse ELT jobs* Optimize Apache Spark performance through partitioning, indexing, and other tuning options* Choose between alternatives such as Databricks, Synapse Analytics, and SnowflakeWHO THIS BOOK IS FORData, analytics, and AI professionals at all levels, including data architect and data engineer practitioners. Also for data professionals seeking patterns of success by which to remain relevant as they learn to build scalable data lakehouses for their organizations and customers who are migrating into the modern Azure Data Platform.RON C. L’ESTEVE is a professional author, trusted technology leader, and digital innovation strategist residing in Chicago, IL, USA. He is well-known for his impactful books and award-winning article publications about Azure Data & AI Architecture and Engineering. He possesses deep technical skills and experience in designing, implementing, and delivering modern Azure Data & AI projects for numerous clients around the world.Having several Azure Data, AI, and Lakehouse certifications under his belt, Ron has been a go-to technical advisor for some of the largest and most impactful Azure implementation projects on the planet. He has been responsible for scaling key data architectures, defining the road map and strategy for the future of data and business intelligence needs, and challenging customers to grow by thoroughly understanding the fluid business opportunities and enabling change by translating them into high-quality and sustainable technical solutions that solve the most complex challenges and promote digital innovation and transformation.Ron is a gifted presenter and trainer, known for his innate ability to clearly articulate and explain complex topics to audiences of all skill levels. He applies a practical and business-oriented approach by taking transformational ideas from concept to scale. He is a true enabler of positive and impactful change by championing a growth mindset.IntroductionPART I. GETTING STARTED1. The Lakehouse Paradigm2. Mount Lakes to DatabricksPART II. LAKEHOUSE PLATFORMS3. Snowflake Data Warehouse4. Synapse Analytics Serverless Pools5. Databricks SQL AnalyticsPART III. APACHE SPARK6. PySpark7. Extract, Load, Transform JobsPART IV. DELTA LAKE8. Delta Schema Evolution9. Delta Change Feed10. Delta Clones11. Delta Live Tables12. Delta SharingPART V. OPTIMIZING PERFORMANCE13. Dynamic Partition Pruning for Querying Star Schemas14. Z-Ordering and Data Skipping15. Adaptive Query Execution16. Bloom Filter Index17. HyperspacePART VI. LAKEHOUSE CAPABILITIES18. Auto Loader Resource Management19. Advanced Schema Evolution with Auto Loader20. Python Wheels21. Security and Controls22. Unity Catalog