Allgemein
Practical Numerical C Programming
Master the C code appropriate for numerical methods and computational modeling, including syntax, loops, subroutines, and files. Then, this hands-on book dives into financial applications using regression models, product moment correlation coefficients, and asset pricing.Next, Practical Numerical C Programming covers applications for engineering/business such as supermarket stock reordering simulation as well as flight information boards at airports and controlling a power plant. Finally, the book concludes with some physics including building simulation models for energy and pendulum motion. Along the way, you’ll learn center-of-mass calculations, Brownian motion, and more.After reading and using this book, you'll come away with pragmatic case studies of actual applications using C code at work. Source code is freely available and includes the latest C20 standard release.WHAT YOU WILL LEARN* Apply regression techniques to find the pattern for depreciation of the value of cars over a period of years* Work with the product moment correlation coefficient technique to illustrate the accuracy (or otherwise) of regression techniques* Use the past stock values of an asset to predict what its future values may be using Monte Carlo methods* Simulate the buying of supermarket stock by shoppers and check the remaining stock: if it is too low print a message to reorder the stock* Create a file of arrivals for an airport and send data to the airport’s display boards to show the current situation for the incoming flights* Simulate the patterns of particles moving in gases or solids WHO THIS BOOK IS FORProgrammers and computational modelers with at least some prior experience with programming in C as well as programming in general.Philip Joyce has 28 years experience as a software engineer – working on control of steel production, control of oil refineries, communications software (pre-Internet), office products (server software), and computer control of airports. Programming in Assembler, COBOL, Coral66, C, and C++. Mentor to new graduates in the company. He also has a MSc in computational physics (including augmented matrix techniques and Monte Carlo techniques using Fortran) - Salford University 1996. Chartered scientist, chartered physicist, member of the Institute of Physics (member of the higher education group).Chapter 1 Review of CReview of C and SDK with reference to the topics in this book.Reminds the reader of C syntax.Use loops, subroutines, file access.Create typical programs in C using SDK ExercisesPART 1 – FINANCIAL APPLICATIONSChapter 2 Regression:Use regression techniques to find the pattern for depreciation of the value of cars over a period of years.Program written will create graphical displays to illustrate the topic.ExercisesChapter 3 Product Moment Correlation Coefficient (PMCC):Use this technique to illustrate the accuracy (or otherwise) of regression techniques.ExercisesChapter 4 : Asset PricingUse the past stock values of an Asset to predict what its future values may be using Monte Carlo methods.Graphics displays to illustrate the topic.ExercisesPART 2 – ENGINEERING/INDUSTRIAL/COMMERCIAL APPLICATIONSChapter 5: Supermarket Stock Reordering SimulationCreate a file of stock for a supermarket. Simulate the buying of stock by shoppers. Check the remaining stock. If it is too low print a message to reorder the stock.ExercisesChapter 6: Flight Information Boards at AirportsCreate a file of arrivals for an airport. Send data to the airport’s display boards to show the current situation for the incoming flights. Update a flight and refresh the information to the display boards.ExercisesChapter 6 : Power Plant ControlProgram receives messages about pressures, temperatures, flow rates etc for a power plant. The program checks for values outside safety ranges and acts upon any problem values by sending messages to both the gauges and the managers responsible for them.ExercisesPART 3 – PHYSICS APPLICATIONSChapter 8 Potential Energy and Kinetic Energy SimulationUse formulas for Potential Energy and Kinetic Energy to show how one falls at the same rate as the other rises.ExercisesChapter 9 Pendulum Simulation Use formulas for the motion of a pendulum to create a graph to illustrate the mathematical relationship on a graph .ExercisesChapter 10: Centre of Mass CalculationCalculate the centre of mass of unusually-shaped objects.ExercisesChapter 11 : Brownian MotionSimulate the patterns of particles moving in gases or solids.Graphical displays to illustrate the topic.ExercisesChapter 12 Vacancy Model of Atoms Moving in SolidsDemonstrate the Vacancy Model of atoms moving in solids where they can move into empty sites within the solid. Graphical displays will show the movement of the atoms within a 2D site.ExercisesAPPENDICESA. C Programming Code GuideB. Answers to exercisesThese could be contained in an included CD which could also contain some data files the students could use in their examples
Hands-on Time Series Analysis with Python
Learn the concepts of time series from traditional to bleeding-edge techniques. This book uses comprehensive examples to clearly illustrate statistical approaches and methods of analyzing time series data and its utilization in the real world. All the code is available in Jupyter notebooks.You'll begin by reviewing time series fundamentals, the structure of time series data, pre-processing, and how to craft the features through data wrangling. Next, you'll look at traditional time series techniques like ARMA, SARIMAX, VAR, and VARMA using trending framework like StatsModels and pmdarima.The book also explains building classification models using sktime, and covers advanced deep learning-based techniques like ANN, CNN, RNN, LSTM, GRU and Autoencoder to solve time series problem using Tensorflow. It concludes by explaining the popular framework fbprophet for modeling time series analysis. After reading Hands -On Time Series Analysis with Python, you'll be able to apply these new techniques in industries, such as oil and gas, robotics, manufacturing, government, banking, retail, healthcare, and more.WHAT YOU'LL LEARN:· Explains basics to advanced concepts of time series· How to design, develop, train, and validate time-series methodologies· What are smoothing, ARMA, ARIMA, SARIMA,SRIMAX, VAR, VARMA techniques in time series and how to optimally tune parameters to yield best results· Learn how to leverage bleeding-edge techniques such as ANN, CNN, RNN, LSTM, GRU, Autoencoder to solve both Univariate and multivariate problems by using two types of data preparation methods for time series.· Univariate and multivariate problem solving using fbprophet.WHO THIS BOOK IS FORData scientists, data analysts, financial analysts, and stock market researchersVISHWAS B V is a Data Scientist, AI researcher and Sr. AI Consultant, Currently living in Bengaluru(INDIA). His highest qualification is Master of Technology in Software Engineering from Birla Institute of Technology & Science, Pilani, and his primary focus and inspiration is Data Warehousing, Big Data, Data Science (Machine Learning, Deep Learning, Timeseries, Natural Language Processing, Reinforcement Learning, and Operation Research). He has over seven years of IT experience currently working at Infosys as Data Scientist & Sr. AI Consultant. He has also worked on Data Migration, Data Profiling, ETL & ELT, OWB, Python, PL/SQL, Unix Shell Scripting, Azure ML Studio, Azure Cognitive Services, and AWS.ASHISH PATEL is a Senior Data Scientist, AI researcher, and AI Consultant with over seven years of experience in the field of AI, Currently living in Ahmedabad(INDIA). He has a Master of Engineering Degree from Gujarat Technological University and his keen interest and ambition to research in the following domains such as (Machine Learning, Deep Learning, Time series, Natural Language Processing, Reinforcement Learning, Audio Analytics, Signal Processing, Sensor Technology, IoT, Computer Vision). He is currently working as Senior Data Scientist for Cynet infotech Pvt Ltd. He has published more than 15 + Research papers in the field of Data Science with Reputed Publications such as IEEE. He holds Rank 3 as a kernel master in Kaggle. Ashish has immense experience working on cross-domain projects involving a wide variety of data, platforms, and technologiesChapter 1: Time Series and its CharacteristicsChapter 2: Data Wrangling and Preparation for Time SeriesChapter 3: Smoothing MethodsChapter 4: Regression Extension Techniques for Time SeriesChapter 5: Bleeding Edge TechniquesChapter 6: Bleeding Edge Techniques for Univariate Time SeriesChapter 7: Bleeding Edge Techniques for Multivariate Time SeriesChapter 8: Prophet
Practical Test Automation
Learn the principles behind test-driven development (TDD) and behavior-driven development (BDD) and see how Jasmine, RSpec and Cucumber can be used to your advantage. This book examines some of the leading technologies used for testing.You'll see how to use Jasmine’s features to work with a JavaScript application. You will learn how to use Mini Test and RSpec with Ruby and Rubymine. Finally, you’ll use Cucumber to develop your software using a BDD approach.Understanding test automation is a vital skill for any web developer. Practical Test Automation breaks down for you some of the important TDD and BDD technologies on the modern web.WHAT YOU'LL LEARN* Test an example JavaScript application with Jasmine* Use Jasmine with JS Bin* Work with Minitest for test-driven development* Test an example Ruby project with RSpec* Use Cucumber and Gherkin for behavior-driven development* Integrate Cucumber with RSpec WHO THIS BOOK IS FORThis book is for anyone who wants to learn test automation and more about test-driven development and behavior-driven development.PANOS MATSINOPOULOS loves developing programs, both for web browsers and for mobile apps. He has been doing that for the past 25 years and has developed numerous applications. He also loves writing books, blogging and teaching computer programming. He has organized a lot of programming classes for kids, adults and elderly people. You can read find him on Twitter @pmatsino.PRACTICAL TEST AUTOMATIONChapter 1. Introduction to JasmineChapter 2. Advanced JasmineChapter 3. Using MinitestChapter 4. Introduction to RSpecChapter 5. Useful RSpec ToolsChapter 6. Introduction to CucumberChapter 7. Advanced Cucumber
Hacking of Computer Networks
The objective of the book is to summarize to the user with main topics in computer networking hacking.The book consists of the following parts:Part 1: Lab SetupPart2: Foot printing and ReconnaissancePart 3: Scanning MethodologyPart 4: EnumerationPart 5:System HackingPart 6: Trojans and Backdoors and VirusesPart 7: Sniffer and Phishing HackingPart 8: Hacking Web ServersPart 9:Hacking Windows and Linux SystemsPart 10: Wireless HackingPart 11: Hacking Mobile ApplicationsI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Digitale Transformation und neue Führungspositionen. Wie Chief Digital Officers die digitale Transformation von Unternehmen erfolgreich steuern
Die fortschreitende Digitalisierung verändert Wirtschaft und Unternehmen enorm. Durch technologische Innovationen und den damit verbundenen Konkurrenzdruck müssen Unternehmen neue Führungsmodelle und Geschäftsstrukturen entwickeln. Eine Möglichkeit, die digitale Transformation von Unternehmen zu steuern, ist der Einsatz eines Chief Digital Officers. Was sind die Aufgaben eines Chief Digital Officers? Über welche Kompetenzen sollte dieser verfügen? Und welche Rolle spielt ein Chief Digital Officer bei der digitalen Transformation eines Unternehmens? Die Autorin Vivien Wika klärt die wichtigsten Fragen zur Führungsposition des Chief Digital Officers und hebt dessen Bedeutung für die digitale Transformation eines Unternehmens hervor. Wika erläutert die weltweite Verteilung von Chief Digital Officers und wirft einen Blick in die Zukunft dieser Führungskräfte. Aus dem Inhalt: - Big Data; - Künstliche Intelligenz; - Design-Thinking; - Digitalisierungsstrategie; - Change-Management
Tribe of Hackers Blue Team
BLUE TEAM DEFENSIVE ADVICE FROM THE BIGGEST NAMES IN CYBERSECURITYThe Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity.Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.* Discover what it takes to get started building blue team skills* Learn how you can defend against physical and technical penetration testing* Understand the techniques that advanced red teamers use against high-value targets* Identify the most important tools to master as a blue teamer* Explore ways to harden systems against red team attacks* Stand out from the competition as you work to advance your cybersecurity careerAuthored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.MARCUS J. CAREY is a cybersecurity researcher and inventor with patents in cryptography and cybersecurity and more than 25 years of experience in protecting the public, private, and government sectors. He was the Founder and CEO of Threatcare, which was acquired by ReliaQuest. Follow Marcus on Twitter at @marcusjcarey. JENNIFER JIN graduated from the University of Texas at Austin in 2017 and started her first job at Threatcare soon after. She became Threatcare's Head of Communications and Marketing before Threatcare was acquired by ReliaQuest. Jennifer helped host the very first Tribe of Hackers Summit and is the co-author of Tribe of Hackers. Follow Jennifer on Twitter at @jen_jin. Acknowledgments viiForeword ixIntroduction xi01 Marcus J. Carey 102 Danny Akacki 603 Ricky Banda 904 William Bengtson 1405 Amanda Berlin 2006 O’Shea Bowens 2707 John Breth 3108 Lee Brotherston 3809 Ronald Bushar 4710 Christopher Caruso 5611 Eddie Clark 6612 Mark Clayton 7413 Ayman Elsawah 8014 Sahan Fernando 9115 Stephen Hilt 9616 Bea Hughes 10117 Terence Jackson 10918 Tanya Janca 11319 Ruth Juma 11920 Brendon Kelley 12321 Shawn Kirkland 12922 Sami Laiho 13923 Kat Maddox 14324 Jeffrey Man 14725 April Mardock 15426 Bright Gameli Mawudor 15927 Duncan McAlynn 16428 Frank McGovern 17029 Donald McFarlane 17230 Nathan McNulty 18031 James Medlock 18732 Daniel Miessler 19233 Alyssa Miller 19634 Maggie Morganti 20535 Justin Moss 21136 Mark Orlando 21837 Mitch Parker 22438 Stuart Peck 23139 Carlos Perez 23640 Quiessence Phillips 24241 Lauren Proehl 24842 Josh Rickard 25543 Megan Roddie 26644 Jason Schorr 27045 Chris Sistrunk 27446 Jayson E. Street 28047 Michael Tanji 28648 Ronnie Tokazowski 29449 Ashley Tolbert 29850 Ismael Valenzuela 30451 Dave Venable 32152 Robert "TProphet" Walker 32653 Jake Williams 33454 Robert Willis 340
Practical Entity Framework
Determine your object relational mapper (ORM) of choice for enterprise applications using .NET Framework, and especially .NET Framework Core 3.1 and higher. Real-world examples and considerations are presented in this book to help you create robust and efficient database solutions. Throughout the text, actual problems, questions, and common pitfalls are provided to help you recognize optimal solutions for maximum success in the different application scenarios you might encounter.PRACTICAL ENTITY FRAMEWORK begins with a simple overview of the two most common approaches to working with databases—database first and code first—and then focuses on working in a code first manner. Taking the code first approach allows the entire database to be built and maintained in code so there is never a situation in which you cannot restore the database schema. Additionally, the code first approach creates an entirely transparent record of changes to the database that is easily tracked in source control. Emphasis throughout the book is on leaving you well positioned to architect and lead data development efforts for your organization.WHAT YOU WILL LEARN* Build robust and maintainable databases using a code first approach* Create and execute stored procedures, triggers, and functions* Analyze and optimize performance of database queries* Ensure data integrity through keys, constraints, and relationshipsWHO THIS BOOK IS FOR.NET developers who work with enterprise-level applications and need to interact with data structures and data within the back end data store, developers who want to take a code first approach to building database applications to prevent conflicts and optimize efficiency, and those who are moving into full-stack roles, or into senior and architectural roles, and will be responsible for database design and implementationBRIAN GORMAN is a developer, computer science instructor, and trainer, and has been working in .NET technologies as long as they have existed. He was originally MCSD certified in .NET 1 and has recently re-certified with MCSA: Web Apps and MCSD: App Builder certifications. Additionally, he became an MCT as of April 2019, and is focusing in on developing and training developers with full-stack web solutions with .NET Core and Azure. In addition to working with .NET technologies, Brian also teaches computer science for Franklin University, where his courses taught have included data structures, algorithms, design patterns, and, more recently, full-stack solutions in the capstone practicum course. IntroductionPART I. GETTING STARTED1. Introduction to Entity Framework2. Working with an Existing Database3. Entity Framework: Code FirstPART II. BUILDING THE DATA SOLUTION4. Models and the Data Context5. Constraints, Keys, and Relationships6. Data Access (Create, Read, Update, Delete)7. Stored Procedures, Views, and Functions8. Sorting, Filtering, and PagingPART III. ENHANCING THE DATA SOLUTION9. LINQ for Queries and Projections10. Encryption of Data11. Repository and Unit of Work Patterns12. Unit Testing, Integration Testing, and Mocking13. Alternatives to Entity Framework: Dapper14. Asynchronous Data Operations and Multiple Database ContextsPART IV. RECIPES FOR SUCCESS15. .NET 5 and Entity Framework16. Appendix A: Troubleshooting
Decoding Blockchain for Business
Business professionals looking to understand the impact, future, and limitations of blockchain need look no further. This revolutionary technology has impacted business and the economy in unprecedented ways within the past decade, and it is only continuing to grow. As a leader in your organization, it is vital that you decode blockchain and optimize all the ways in which it can improve your business.Author of Decoding Blockchain for Business, Stijn Van Hijfte, expertly emphasizes the imperative of professionals in any sector of industry to understand the core concepts and implications of blockchain technology. Cryptocurrencies, cryptotrading, and constantly-changing tax structures for financial systems using blockchain technologies are covered in detail. The lasting effects of blockchain across specific industries such as media, real estate, finance, and regulatory bodies are addressed with an insightful eye from Van Hijfte.If not properly implemented with care and a foundation of knowledge, blockchain brings risks and uncertainties to a company. Know your technology to be ready for the present and the future, and stay ahead of the curve. Blockchain is here to stay, and Decoding Blockchain for Business is your professional roadmap.WHAT YOU WILL LEARN* Discover the risks associated with blockchain if not properly implemented* Gain insights on how blockchain technology affects other booming topics such as AI, IoT, and RPA* Look at the regulations surrounding Blockchain in different countriesWHO THIS BOOK IS FORBusiness professionals looking to understand the impact, future, and limitations of Blockchain and how individuals and companies should prepare for this technology.Stijn Van Hijfte has experience as a consultant, lecturer, and an innovation officer and has worked over the years with cloud, AI, automation, and blockchain technology. Since 2015 he has been experimenting and exploring the blockchain space, gaining deeper insight into the entire ecosystem. This insight ranges from setting up nodes and writing smart contracts, to the legal implications of GDPR, ICOs, and cryptocurrencies. Among others, he holds degrees in economics, IT, and data science. He currently works at Deloitte as a senior consultant.
Ganzheitliche Businessmodell-Transformation
In diesem Buch wird der regelkreisorientierte Changemanagementprozess zur Implementierung eines digitalen Businessmodells über das ganzheitliche Organisation 4.0-MITO-Konfigurationsmanagement beschrieben. Die inhaltliche Kapitelstruktur dieses MITO-Buches mit der Beschreibung der unterschiedlichen Transformations-Gestaltungssichten orientiert sich an dem übergeordneten betrieblichen Regelkreisprinzip innerhalb der in Abbildung 1 gezeigten MITO-Modellsegmente. Wobei das Managementsegment (M) noch vorgabeseitig in das prozessbezogene Führungssegment und rückmeldeseitig in das sachbezogene Leitungssegment unterteilt ist. Das darauf aufsetzende MITO-Businessmodell ergänzt die 5 Modellsegmente um das nachgelagerte Kunden- und vorgelagerte Lieferantensegment und integriert in die MITO-Modelldarstellung das hierarchische Prozessebenenmodell für die Konzeption des prozessorientierten Ziel-, Führungs- und Leitungssystems.Hartmut F. Binner war von 1978 - 2009 hauptamtlicher Professor an der Hochschule Hannover im Fachbereich Maschinenbau. Im Rahmen seiner Doktorarbeit entwickelte er die Swimlane-Darstellung, heute wesentliches BPMN 2.0-Strukturelement.Von 1999 - 2003 war er Präsident des REFA e.V., von 2007-2017 Vorstandsvorsitzender der Gesellschaft für Organisation.Innerhalb der letzten 20 Jahre schrieb er Beiträge in über 500 Zeitschriften und mehr als 18 Grundlagenwerke zum Thema Organisations- und Prozessgestaltung. Seit Dezember 2015 ist er der Vice Chairman der iTA (IT Automotive Service Partner e.V.).
Enterprise AI For Dummies
MASTER THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN YOUR ENTERPRISE WITH THE BOOK SERIES TRUSTED BY MILLIONSIn Enterprise AI For Dummies, author Zachary Jarvinen simplifies and explains to readers the complicated world of artificial intelligence for business. Using practical examples, concrete applications, and straightforward prose, the author breaks down the fundamental and advanced topics that form the core of business AI.Written for executives, managers, employees, consultants, and students with an interest in the business applications of artificial intelligence, Enterprise AI For Dummies demystifies the sometimes confusing topic of artificial intelligence. No longer will you lag behind your colleagues and friends when discussing the benefits of AI and business.The book includes discussions of AI applications, including:* Streamlining business operations* Improving decision making* Increasing automation* Maximizing revenueThe For Dummies series makes topics understandable, and as such, this book is written in an easily understood style that's perfect for anyone who seeks an introduction to a usually unforgiving topic.ZACHARY JARVINEN, MBA/MSC is a product & marketing executive and sought-after author and speaker in the Enterprise AI space. Over the course of his career, he's headed up Technology Strategy for Artificial Intelligence and Analytics at OpenText, expanded markets for Epson, worked at the U.S. State Department, and was a member of the 2008 Obama Campaign Digital Team. Presently, Zachary is focused on helping organizations get tangible benefits from AI. INTRODUCTION 1About This Book 2Strong, Weak, General, and Narrow 2Foolish Assumptions 3Icons Used in This Book 4Beyond the Book 4Where to Go from Here 5PART 1: EXPLORING PRACTICAL AI AND HOW IT WORKS 7CHAPTER 1: DEMYSTIFYING ARTIFICIAL INTELLIGENCE 9Understanding the Demand for AI 11Converting big data into actionable information 11Relieving global cost pressure 13Accelerating product development and delivery 14Facilitating mass customization 14Identifying the Enabling Technology 14Processing 15Algorithms 15Data 16Storage18Discovering How It Works 18Semantic networks and symbolic reasoning 19Text and data mining 20Machine learning 22Auto-classification 24Predictive analysis 25Deep learning 26Sentiment analysis 27CHAPTER 2: LOOKING AT USES FOR PRACTICAL AI 29Recognizing AI When You See It 30ELIZA 30Grammar check 30Virtual assistants 30Chatbots 31Recommendations 31Medical diagnosis 32Network intrusion detection and prevention 33Fraud protection and prevention 34Benefits of AI for Your Enterprise 34Healthcare 35Manufacturing 36Energy 36Banking and investments 37Insurance 37Retail 38Legal 39Human resources 39Supply chain 40Transportation and travel 40Telecom 41Public sector 41Professional services 42Marketing 43Media and entertainment 43CHAPTER 3: PREPARING FOR PRACTICAL AI 45Democratizing AI 46Visualizing Results 46Comparison 46Composition 47Distribution 48Relationship 48Digesting Data 50Identifying data sources 52Cleaning the data 52Defining Use Cases 54A → B 55Good use cases 55Bad use cases 56Reducing bias 58Choosing a Model 59Unsupervised learning 59Supervised learning 60Deep learning 60Reinforcement learning 61CHAPTER 4: IMPLEMENTING PRACTICAL AI 63The AI Competency Hierarchy 63Data collection 63Data flow 64Explore and transform 64Business intelligence and analytics 64Machine learning and benchmarking 65Artificial intelligence 65Scoping, Setting Up, and Running an Enterprise AI Project 65Define the task 67Collect the data 68Prepare the data 69Build the model 70Test and evaluate the model 72Deploy and integrate the model 72Maintain the model 72Creating a High-Performing Data Science Team 73The Critical Role of Internal and External Partnerships 74Internal partnerships 74External partnerships 75The importance of executive buy-in 75Weighing Your Options: Build versus Buy 75When you should do it yourself 75When you should partner with a provider 77Hosting in the Cloud versus On Premises 77What the cloud providers say 78What the hardware vendors say 78The truth in the middle 78PART 2: EXPLORING VERTICAL MARKET APPLICATIONS 81CHAPTER 5: HEALTHCARE/HMOS: STREAMLINING OPERATIONS 83Surfing the Data Tsunami 84Breaking the Iron Triangle with Data 84Matching Algorithms to Benefits 86Examining the Use Cases 87Delivering lab documents electronically 87Taming fax 88Automating redaction 88Improving patient outcomes 89Optimizing for a consumer mindset 89CHAPTER 6: BIOTECH/PHARMA: TAMING THE COMPLEXITY 91Navigating the Compliance Minefield 92Weaponizing the Medical, Legal, and Regulatory Review 93MLR review for product development 93MLR review for sales and marketing 94Enlisting Algorithms for the Cause 95Examining the Use Cases 96Product discovery 96Clinical trials 96Product development 96Quality control 97Predictive maintenance 97Manufacturing logistics 97Regulatory compliance 98Product commercialization 98Accounting and finance 98CHAPTER 7: MANUFACTURING: MAXIMIZING VISIBILITY 99Peering through the Data Fog 100Finding ways to reduce costs 100Handling zettabytes of data 101Clearing the Fog 101Connected supply chain 102Proactive replenishment103Predictive maintenance 104Pervasive visibility 104Clarifying the Connection to the Code 106Optimize inventory 106Optimize maintenance 106Optimize supply chain106Improve quality 106Automate repetitive tasks 107Examining the Use Cases 107Minimize risk 107Maintain product quality107Streamline database queries 108Outsource predictive maintenance 108Customize products 109Expand revenue streams 109Save the planet 109Delegate design 110CHAPTER 8: OIL AND GAS: FINDING OPPORTUNITY IN CHAOS 111Wrestling with Volatility 111Pouring Data on Troubled Waters 112Deriving meaningful insights 113Regaining control over your data 113Wrangling Algorithms for Fun and Profit 114Examining the Use Cases 115Achieving predictive maintenance 115Enhancing maintenance instructions 115Optimizing asset performance 116Exploring new projects 116CHAPTER 9: GOVERNMENT AND NONPROFITS: DOING WELL BY DOING GOOD 119Battling the Budget 120Government 120Nonprofit 122Fraud 122Optimizing Past the Obstacles 123Digital transformation 123The future of work 124Data security 125Operational costs 125Fraud 125Engagement 126Connecting the Tools to the Job 128Examining the Use Cases 129Enhance citizen services 129Provide a global voice of the citizen 130Make your city smarter 130Boost employee productivity and engagement 131Find the right employees (and volunteers) 131Improve cybersecurity 132CHAPTER 10: UTILITIES: RENEWING THE BUSINESS 133Coping with the Consumer Mindset 134Utilizing Big Data 135The smart grid 135Empowering the organization 136Connecting Algorithms to Goals 136Examining the Use Cases 137Optimizing equipment performance and maintenance 137Enhancing the customer experience 137Providing better support 138Streamlining back-office operations 138Managing demand 139CHAPTER 11: BANKING AND FINANCIAL SERVICES: MAKING IT PERSONAL 141Finding the Bottom Line in the Data 142Moving to “open banking” 142Dealing with regulation and privacy 143Offering speedier service 144Leveraging Big Data 144Restructuring with Algorithms 145Examining the Use Cases 146Improving personalization 146Enhancing customer service 146Strengthening compliance and security 147CHAPTER 12: RETAIL: READING THE CUSTOMER’S MIND 149Looking for a Crystal Ball 150Omnichanneling 150Personalizing 151Reading the Customer’s Mail 152A fluid omnichannel experience 153Enhanced personalization 153Accurate forecasting 153Looking Behind the Curtain 154Examining the Use Cases 155Voice of the customer 155Personalized recommendations 155AI-powered inventory 156CHAPTER 13: TRANSPORTATION AND TRAVEL: TUNING UP YOUR RIDE 157Avoiding the Bumps in the Road 158Planning the Route 159Checking Your Tools 161Examining the Use Cases 162Autonomous vehicles 162Predictive maintenance 162Asset performance optimization 163Enhanced driver and passenger experiences 164CHAPTER 14: TELECOMMUNICATIONS: CONNECTING WITH YOUR CUSTOMERS 167Listening Past the Static 168Finding the Signal in the Noise 168Looking Inside the Box 169Examining the Use Cases 170Achieve predictive maintenance and network optimization 170Enhance customer service with chatbots 170Improve business decisions 171CHAPTER 15: LEGAL SERVICES: CUTTING THROUGH THE RED TAPE 173Climbing the Paper Mountain 173Reading and writing 174And arithmetic 175Foot in mouth disease 175Planting Your Flag at the Summit 175Linking Algorithms with Results 177Examining the Use Cases 178Discovery and review 178Predicting cost and fit 179Analyzing data to support litigation 180Automating patent and trademark searches 180Analyzing costs for competitive billing 180CHAPTER 16: PROFESSIONAL SERVICES: INCREASING VALUE TO THE CUSTOMER 181Exploring the AI Pyramid 182Climbing the AI Pyramid 183Unearthing the Algorithmic Treasures 184Healthcare 184Content management 184Compliance 185Law 185Manufacturing 186Oil and gas 186Utilities 186Examining the Use Cases 187Document intake, acceptance, digitization, maintenance, and management 187Auditing, fraud detection, and prevention187Risk analysis and mitigation 187Regulatory compliance management 188Claims processing 188Inventory management 188Resume processing and candidate evaluation 188CHAPTER 17: MEDIA AND ENTERTAINMENT: BEATING THE GOLD RUSH 189Mining for Content 190Asset management 190Metadata 191Distribution 191Silos 192Content compliance 192Striking It Rich 193Metadata 193Digital distribution 193Digital asset management 194Assaying the Algorithms 194Examining the Use Cases 195Search optimization 195Workflow optimization 196Globalization 196PART 3: EXPLORING HORIZONTAL MARKET APPLICATIONS 197CHAPTER 18: VOICE OF THE CUSTOMER/CITIZEN: FINDING COHERENCE IN THE CACOPHONY 199Hearing the Message in the Media 200Delivering What They Really Want 201Answering the Right Questions 203Examining Key Industries 204Consumer packaged goods 205Public and nonprofit organizations 205CHAPTER 19: ASSET PERFORMANCE OPTIMIZATION: INCREASING VALUE BY EXTENDING LIFESPANS 207Spying on Your Machines 208Fixing It Before It Breaks 209Learning from the Future 210Data collection 210Analysis 211Putting insights to use 212Examining the Use Cases 212Production automation and quality control 213Preventive maintenance 213Process optimization 215CHAPTER 20: INTELLIGENT RECOMMENDATIONS: GETTING PERSONAL 217Making Friends by the Millions 218Listening to social media 218Mining data exhaust 219Reading Minds 219Knowing Which Buttons to Push 219Popular product recommendation 220Market-basket analysis 220Propensity modelling 220Data and text mining 222Collaborative filtering (CF) 223Content-based filtering (CBF) 224Cross-validation 224Data visualization 225Examining Key Industries 226Finance 226Credit card offers 227Retail 228CHAPTER 21: CONTENT MANAGEMENT: FINDING WHAT YOU WANT, WHEN YOU WANT IT 231Introducing the Square Peg to the Round Hole 232Categorizing and organizing content 232Automating with AI 233Finding Content at the Speed of AI 233Expanding Your Toolbox 235Access the content 235Extract concepts and entities 235Categorize and classify content 236Automate or recommend next best actions 236Examining the Use Cases 236Legal discovery process 237Content migration 237PII detection 237CHAPTER 22: AI-ENHANCED CONTENT CAPTURE: GATHERING ALL YOUR EGGS INTO THE SAME BASKET 239Counting All the Chickens, Hatched and Otherwise 240Tracing the history of capture technology 240Moving capture technology forward 241Monetizing All the Piggies, Little and Otherwise 241Streamline back-office operations 242Improve compliance 242Reduce risk of human error 243Support business transformation 243Improve operational knowledge 243Getting All Your Ducks in a Row 244Capture 244Digitize where needed 244Process, classify, and extract 244Validate edge cases 245Manage 246Visualize 246Examining Key Industries 246Financial services 246State government 247Healthcare 247CHAPTER 23: REGULATORY COMPLIANCE AND LEGAL RISK REDUCTION: HITTING THE BULLSEYE ON A MOVING TARGET 249Dodging Bullets 250Fines 250Increasing regulation 252Data privacy 254Strategy 254Shooting Back 255Make better decisions 255Increase customer confidence 256Win more business 257Boost the bottom line 257Building an Arsenal 258Examining the Use Cases 259Manage third-party risk 259Manage operational risk 259Monitor compliance risk 260Monitor changes in regulations 261Maintain data privacy 261Maintain data security 262Detect fraud and money laundering 262Optimize workflow 263CHAPTER 24: KNOWLEDGE ASSISTANTS AND CHATBOTS: MONETIZING THE NEEDLE IN THE HAYSTACK 265Missing the Trees for the Forest 266Recognizing the problem 266Defining terms 267Hearing the Tree Fall 268Making Trees from Acorns 269Examining the Use Cases 270Customer support 270Legal practice 271Enterprise search 272Compliance management 272Academic research 272Fact checking 273CHAPTER 25: AI-ENHANCED SECURITY: STAYING AHEAD BY WATCHING YOUR BACK 275Closing the Barn Door 276The story in the statistics 276The state of current solutions 278Locking the Barn Door 279Knowing Which Key to Use 281Examining the Use Cases 283Detecting threats by matching a known threat marker 284Detecting breaches by identifying suspicious behaviour 284Remediating attacks 286PART 4: THE PART OF TENS 287CHAPTER 26: TEN WAYS AI WILL INFLUENCE THE NEXT DECADE 289Proliferation of AI in the Enterprise 290AI Will Reach Across Functions 291AI R&D Will Span the Globe 291The Data Privacy Iceberg Will Emerge 292More Transparency in AI Applications 292Augmented Analytics Will Make It Easier 293Rise of Intelligent Text Mining 293Chatbots for Everyone 294Ethics Will Emerge for the AI Generation 294Rise of Smart Cities through AI 294CHAPTER 27: TEN REASONS WHY AI IS NOT A PANACEA 297AI is Not Human 298Pattern Recognition is Not the Same As Understanding 299AI Cannot Anticipate Black Swan Events 300AI Might Be Democratized, but Data is Not 302AI is Susceptible to Inherent Bias in the Data 302#RacialBias 303#GenderBias 303#EthnicBias 303Collection bias 304Proxy bias 304AI is Susceptible to Poor Problem Framing 305AI is Blind to Data Ambiguity 306AI Will Not, or Cannot, Explain Its Own Results 307AI sends you to jail 307AI cuts your medical benefits 308AI and the black box 308AI diagnoses your latent schizophrenia309AI can be fooled 310AI is Not Immune to the Law of Unintended Consequences 311Index
Rational Cybersecurity for Business
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team.Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this.Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges.This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included.WHAT YOU WILL LEARN* Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy* Develop a consistent accountability model, information risk taxonomy, and risk management framework* Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend* Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets* Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more* Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities* Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger* Integrate your learnings from this book into a quick-hitting rational cybersecurity success planWHO THIS BOOK IS FORChief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your businessDan Blum is an internationally recognized cybersecurity and risk management strategist. He is a former Golden Quill Award-winning VP, Distinguished Analyst at Gartner, Inc., and has served as the de facto head of security for startups and consulting companies. He's advised hundreds of corporations, universities, and government organizations, and currently partners with top media, analyst firms, and clients to produce cybersecurity thought leadership research and to deliver cybersecurity workshops and coaching for security leaders.INTRODUCTIONExplain the book’s focus, audience, organization, and contents.CHAPTER 1: RATIONALIZE CYBERSECURITY FOR YOUR BUSINESS LANDSCAPEDescribes the six cybersecurity priority focus areas.CHAPTER 2: IDENTIFY AND EMPOWER SECURITY-RELATED ROLESExplains how the people in the business each contribute to the secure operation of the business and its digital systems.CHAPTER 3: ESTABLISH A CONTROL BASELINECombs through control frameworks such as ISO 27001 and the NIST Cybersecurity Framework to select controls providing a minimum viable program (MVP) for many businesses. It also details how to align people, process, and technology for these controls; how to scale the implementation for different types of businesses; and how to sure share responsibility for delivering the controls with third parties.CHAPTER 4: SIMPLIFY AND RATIONALIZE IT AND SECURITYArgues that security leaders have a stake in developing an effective IT strategy, what that strategy might look like, and how security leaders – who don’t own IT - can still engage IT functions to help develop and deliver on the strategy.CHAPTER 5: MANAGE RISK IN THE LANGUAGE OF BUSINESSClarifies why risk management literally must be the brains of the security program. It must analyze, monitor, and communicate what potential losses or circumstances constitute the business’s top risk scenarios. An effective tiered risk analysis process can efficiently address the myriad secondary risk issues that arise through processes and prioritize controls or other risk treatments.CHAPTER 6: CREATE A STRONG SECURITY CULTUREBrings the cultural subtext that can make or break a cybersecurity environment into the foreground. It analyzes the components of security culture and provides guidance on how to devise a security culture improvement process and measure its effectiveness. User awareness, training, and appropriate day to day engagement with the business can all play a part in forging a constructive security culture.CHAPTER 7: PUT THE RIGHT GOVERNANCE MODEL IN PLACEContrasts basic security governance structures that businesses can use, and provides guidance on how to select one and make it work. It describes core elements of the security program such as steering committees and security policy life cycle management. It also offers guidance on where the CISO should report in an organization.CHAPTER 8: CONTROL ACCESS WITH MINIMAL DRAG ON THE BUSINESSExplains why access is the critical balance beam for the business, compliance mandates, and the security program. It addresses the need for information classification, data protection, and identity and access management (IAM) controls to implement access restrictions as required to reduce risk or attain regulatory compliance but do so in a way that enables appropriate digital relationships and data sharing with internal and external users.CHAPTER 9: INSTITUTE RESILIENCE, DETECTION, AND RESPONSEGuides readers on how to formulate contingency plans and strategies for detection, response, and recovery which together comprise cyber-resilience.CHAPTER 10: PUTTING THE PIECES TOGETHERSummarizes guidance given throughout the book in the “keys” for aligning with the business. It reiterates guidance on how to scale security programs and the way they align to the business based on business size, complexity, and other factors.
KI-Kompass für Entscheider
So setzen Sie Künstliche Intelligenz gewinnbringend in Ihrem Unternehmen einEndlich ist die Künstliche Intelligenz reif für die Nutzung in industriellen Prozessen, Produkten und Diensten. Die Potenziale sind enorm, doch eine erfolgreiche Integration von KI-Anwendungen kann nur gelingen, wenn man das Thema zur Chefsache macht. Dieser Leitfaden wendet sich an Entscheidungsträger, die ihr Unternehmen fit für den Einsatz industrieller KI machen wollen.Folgende Themen erwarten Sie:- Kompakter Einstieg in die KI-Technik: Data Science, Machine Learning, Künstliche Neuronale Netze- Das Zusammenspiel von KI, Industrie 4.0 und IoT- KI in der Industrie: Einsatzszenarien in Produktentwicklung und Produktion sowie für produktbasierende Dienste, KI in der (Edge-)Cloud und auf dem Chip- Die Rolle der Industrieplattformen: B2B-Angebote für KI-Apps, Managed Services, Cloud Infrastructure as a Service- Fragen der Datensicherheit und EthikWertvolle Einblicke in die Strategien, Angebote und Use Cases führender Unternehmen und Forschungseinrichtungen auf dem Gebiet der industriellen KI, wie ABB, Dassault Systèmes, Siemens, it’s OWL und das Werkzeugmaschinenlabor der RWTH Aachen, runden den Inhalt ab.Systemvoraussetzungen für E-Book inside: Internet-Verbindung und Adobe-Reader oder Ebook-Reader bzw. Adobe Digital Editions Dipl.-Ing. (FH) Ulrich Sendler (www.ulrichsendler.de) ist Feinwerktechnik-Ingenieur, Werkzeugmacher und NC-Programmierer. Seit Ende der Achtzigerjahre ist er als freier Fachjournalist, Buchautor, Technologieanalyst, Redner und Moderator im Umfeld der virtuellen Produktentwicklung und Digitalisierung tätig. Er ist Gründer und Organisator des sendler\circle, einer Interessengemeinschaft der Anbieter von Software und Services für die Industrie, und betreibt ein Nachrichtenportal zu Digitalisierung, Industrie 4.0 und PLM (www.plmportal.org).
Letters to a New Developer
Learn what you need to succeed as a developer beyond the code. The lessons in this book will supercharge your career by sharing lessons and mistakes from real developers.Wouldn’t it be nice to learn from others’ career mistakes? “Soft” skills are crucial to success, but are haphazardly picked up on the job or, worse, never learned. Understanding these competencies and how to improve them will make you a more effective team member and a more attractive hire.This book will teach you the key skills you need, including how to ask questions, how and when to use common tools, and how to interact with other team members. Each will be presented in context and from multiple perspectives so you’ll be able to integrate them and apply them to your own career quickly.WHAT YOU'LL LEARN* Know when the best code is no code* Understand what to do in the first month of your job* See the surprising number of developers who can’t program* Avoid the pitfalls of working aloneWHO THIS BOOK IS FORAnyone who is curious about software development as a career choice. You have zero to five years of software development experience and want to learn non-technical skills that can help your career. It is also suitable for teachers and mentors who want to provide guidance to their students and/or mentees.DAN MOORE has over 20 years of experience as a developer. His roles have included employee, contractor, community member, engineering manager, and CTO. He currently leads developer advocacy at FusionAuth, a Denver company, building software to handle authentication, authorization, and user management for any app. In 2018, Dan started a blog exclusively focused on helping new developers “level up” and has published over 150 posts to help them improve their skills and avoid common mistakes. He resides in Boulder, CO. You can find him on Twitter at @mooreds.1. Your First Month2. Questions3. Writing4. Tools to Learn5. Practices6. Understanding the Business7. Learning8. Mistakes9. Your Career10. Community
Datengetriebenes Marketing
Wir leben in einer Zeit, in der Daten immer mehr Relevanz besitzen, und zwar sowohl für die Geschäftsmodelle von Unternehmen im Gesamten als auch für einzelne Funktionsbereiche. Insbesondere im Marketing besitzen Daten eine hohe Relevanz, denn sie helfen, den Kunden zu verstehen und geeignete Maßnahmen abzuleiten. Doch viele Unternehmen tun sich schwer, einen Einstieg in das datengetriebene Marketing zu finden. Jonas Rashedi stellt mit diesem Buch einen Orientierungs- und Handlungsrahmen vor, der Unternehmen bei der Umsetzung und organisatorischen Verankerung eines datengetriebenen Marketings unterstützt. Der vorgestellte Prozess ist unabhängig von aktuell vorhandenen technologischen Lösungen gestaltet, sodass er für Unternehmen längerfristig Gültigkeit besitzt.
Basic Linux Terminal Tips and Tricks
Learn command line tricks, programs, and hacks you can use day to day as a Linux user, programmer, and system administrator. When you interact with the digital world, you can’t go far without interacting with Linux systems. This book shows you how to leverage its power to serve your needs.Many users know "top" is installed on almost all Linux machines, but did you know with a few keystrokes you can customize it specifically for your needs? Stuck using `cd` and `ls` commands for navigating file systems? This book looks at how you can use Ranger to quickly navigate through multiple levels of folders, and quickly run bash commands without ever leaving the terminal. We also suggest programs that can be used for common tasks such as finding which programs are using the most processing, data download/upload, and file space.You’ll know how to quickly connect to remote machines and run your commonly needed jobs in a keystroke or even on auto-pilot. With Basic Linux Terminal Tips and Tricks you'll be equipped with a wide range of tools that can be used for daily work and maintenance on all sorts of Linux systems including servers, desktops, and even embedded devices.WHAT YOU WILL LEARN* Work with common tools on your local network.* Techniques for efficient use of command line.* Easily manipulate text files for processing.* Monitor the state of a system with a handful of popular programs.* Combine programs to create useful processes.WHO THIS BOOK IS FORAnyone who is interested in Linux and Unix based operating systems as a hobby or for work.PHILIP KIRKBRIDE has been developing software for over 10 years. After college he worked as a contractor developing websites and mobile apps in Southern Ontario, Canada. He has since worked at several software and hardware startups, and contributed to open-source projects. He is currently maintaining applications for a handful of clients while completing his masters. When he is not working on tech, he enjoys spending time being outdoors. He can be reached at kirkins@gmail.com.1. Linux Primer2. File/Folder Navigation3. History and Shortcuts4. Scripts and Pipes5. Using SSH6. File Transfer7. Network Scanning8. System Monitoring9. Hardware Details and /dev10. Parsing Text11. systemd12. Vim13. Emacs14. Configure Bash15. Tmux Workflow16. Work with Images and Video17. Extras17. Cheat Sheets
Gut gepackt - Kein Bit zu viel
Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten nach wie vor ein immens wichtiger Aspekt bei Datenübertragung und -speicherung. Dieses essential erläutert ohne theoretischen Überbau und mit elementaren mathematischen und informatischen Methoden die wichtigsten Kompressionsverfahren, so unter anderem die Entropiecodierungen von Shannon-Fano und von Huffman, sowie die Wörterbuchcodierungen der Lempel-Ziv-Familie. Ausführlich eingegangen wird auch auf Irrelevanzreduktion und die Quantisierung bei optischen und akustischen Signalen, die die Unzulänglichkeiten des menschlichen Auges und Ohres zur Datenkompression ausnutzen. Illustriert wird das Ganze anhand gängiger Praxisanwendungen aus dem alltäglichen Umfeld. Die Aufbereitung erlaubt den Einsatz beispielsweise in Arbeitsgruppen an MINT-Schulen, bei Einführungskursen an Hochschulen und ist auch für interessierte Laien geeignet.
Datensicherheit
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein untrennbarer Teil des Datenschutzes, der mehr und mehr in unserer Gesellschaft an Bedeutung gewinnt. Er kann nur dann wirksam umgesetzt werden, wenn ein Verständnis für technische Zusammenhänge und Gefährdungen gegeben ist. Dabei erstreckt sich die Datensicherheit auf weit mehr Informationen als nur auf Daten mit Personenbezug. Sie sichert sämtliche Daten und damit den Fortbestand von Unternehmen und Organisationen.DR. THOMAS H. LENHARD ist international anerkannter Experte für Informationstechnologie und Datenschutz. Er greift auf einen umfangreichen Erfahrungsschatz aus drei Jahrzehnten Datenschutz und Datensicherheit zurück.Datenschutz und Datensicherheit – Wie Computer miteinander kommunizieren – Was Datenbeständen zustoßen kann – Technische Bedrohungen – Gefährliche Software – Gefahren durch mobile Datenträger und Geräte – Telefonanlage als Gefahrenquelle – Zerstörung von Daten – Sicherung von Daten – Verschlüsselung – Sicherheit von Webseiten – Häufige Bedrohungen der IT-Sicherheit – Identifikation von Computern und IP-Adressen – Firewalls – Router – Konfiguration von Schutzsystemen – Die Demilitarisierte Zone – Organisatorischer Datenschutz
Big Data und Data Science in der strategischen Beschaffung
Big Data und Data Science sind Trends, die sowohl in der Wissenschaft als auch in Unternehmen auf großes Interesse stoßen. Dieses essential zeigt einen konzeptionellen Rahmen auf, um die Grundlagen von Big Data und Data Science besser zu verstehen. Einkaufsentscheider und Einkaufsorganisationen können dann aufbauend auf der Beschaffungsdigitalisierung sowie weiteren Datenquellen ein Big Data Warehouse konzipieren, welches die Voraussetzung schafft, um wichtige Beschaffungsprobleme zu lösen. Analytische Methoden werden genauso beleuchtet, wie neue Fähigkeiten in bereichsübergreifenden Teams. Abschließend werden 30 konkrete Anwendungsfälle von Big Data für die strategische Beschaffung vorgestellt.
Practical Hexo
Leverage the power of Hexo to quickly produce static blog sites that are efficient and fast. This project-oriented book simplifies the process of setting up Hexo and manipulating content, using little more than a text editor and free software. It will equip you with a starting toolset that you can use to develop future projects, incorporate into your existing workflow and allow you to take your websites to the next level.Hexo is based on JavaScript and Node.js, two of the biggest tools available for developers: you can enhance, extend, and configure Hexo as requirements dictate. With Hexo the art of possible is only limited by the extent of your imagination and the power of JavaScript and Node.js.Practical Hexo gets you quickly acquainted with creating and manipulating blogs using a static site generator approach. You will understand how to use the Hexo framework to rapidly create and deploy blogs that are performant, with the minimum of fuss, then extend and customize your content using plugins and themes. You will work through some practical projects to help solidify your skills, and put them into practice.WHAT YOU'LL LEARN* Implement the Hexo framework in a project* Customize and extend content* Consider maintenance requirements and how they compare to other blog systems* Apply skills to practical, real-world projects* Create themes and build plugins* Make changes using other tools and libraries.WHO THIS BOOK IS FORWebsite developers who are already familiar with JavaScript and keen to learn how to leverage the Hexo framework.Agile development team members, where time is of the essence to deliver results quickly.Developers who want to focus on simplicity, to produce efficient and properly optimized content in modern browsers using tools already in their possession.ALEX LIBBY is a front-end engineer and seasoned computer book author, who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development, and has been hooked ever since. His daily work involves extensive use of JavaScript, HTML and CSS to manipulate existing website content; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library, and enjoys writing about Open Source technologies, principally for front end UI development. You can find him on LinkedIn: https://www.linkedin.com/in/alexlibby1/.1. Getting Started2. Manipulating Content and Media3. Creating Themes4. Developing Themes5. Working with the API6. Building Plugins7. Deployment and Publishing8. Improving our Workflow and Blog9. Localizing Content10. Creating an eCommerce Site11. Migrating to Hexo
Ontology-Based Information Retrieval for Healthcare Systems
With the advancements of semantic web, ontology has become the crucial mechanism for representing concepts in various domains. For research and dispersal of customized healthcare services, a major challenge is to efficiently retrieve and analyze individual patient data from a large volume of heterogeneous data over a long time span. This requirement demands effective ontology-based information retrieval approaches for clinical information systems so that the pertinent information can be mined from large amount of distributed data.This unique and groundbreaking book highlights the key advances in ontology-based information retrieval techniques being applied in the healthcare domain and covers the following areas:* Semantic data integration in e-health care systems* Keyword-based medical information retrieval* Ontology-based query retrieval support for e-health implementation* Ontologies as a database management system technology for medical information retrieval* Information integration using contextual knowledge and ontology merging* Collaborative ontology-based information indexing and retrieval in health informatics* An ontology-based text mining framework for vulnerability assessment in health and social care* An ontology-based multi-agent system for matchmaking patient healthcare monitoring* A multi-agent system for querying heterogeneous data sources with ontologies for reducing cost of customized healthcare systems* A methodology for ontology based multi agent systems development* Ontology based systems for clinical systems: validity, ethics and regulationVISHAL JAIN is an associate professor at Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi, India. He has more than 350 research citation indices with Google Scholar (h-index score 9 and i-10 index 9). He has authored more than 70 research papers in reputed conferences and journals indexed by Web of Science and Scopus, as well as authored and edited more than 10 books with various international publishers. His research areas include information retrieval, semantic web, ontology engineering, data mining, adhoc networks, and sensor networks. RITIKA WASON is currently working as an associate professor at Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi. She completed her PhD degree in Computer Science from Sharda University. She has more than 10 years of teaching experience and has authored as well as edited several books in computer science and has been a recipient of many awards and honors. JYOTIR MOY CHATTERJEE is currently an assistant professor in the IT department at Lord Buddha Education Foundation (Asia Pacific University of Technology & Innovation), Kathmandu, Nepal. He has completed M. Tech from Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha and B. Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute, Chennai. His research interests include the cloud computing, big data, privacy preservation, data mining, Internet of Things, machine learning. DAC-NHUONG LE, PhD is the Head-Deputy of Faculty of Information Technology, Haiphong University, Vietnam. He has a total academic teaching experience of 10 years with many publications in reputed international conferences, journals and online book chapter contributions. He researches interests span the optimization and algorithmic mathematics underpinnings of network communication, security and vulnerability, network performance analysis, and cloud computing. Preface xixAcknowledgment xxiii1 ROLE OF ONTOLOGY IN HEALTH CARE 1Sonia Singla1.1 Introduction 21.2 Ontology in Diabetes 31.2.1 Ontology Process 41.2.2 Impediments of the Present Investigation 51.3 Role of Ontology in Cardiovascular Diseases 61.4 Role of Ontology in Parkinson Diseases 81.4.1 The Spread of Disease With Age and Onset of Disease 101.4.2 Cost of PD for Health Care, Household 111.4.3 Treatment and Medicines 111.5 Role of Ontology in Depression 131.6 Conclusion 151.7 Future Scope 15References 152 A STUDY ON BASAL GANGLIA CIRCUIT AND ITS RELATION WITH MOVEMENT DISORDERS 19Dinesh Bhatia2.1 Introduction 192.2 Anatomy and Functioning of Basal Ganglia 212.2.1 The Striatum-Major Entrance to Basal Ganglia Circuitry 222.2.2 Direct and Indirect Striatofugal Projections 232.2.3 The STN: Another Entrance to Basal Ganglia Circuitry 252.3 Movement Disorders 262.3.1 Parkinson Disease 262.3.2 Dyskinetic Disorder 272.3.3 Dystonia 282.4 Effect of Basal Ganglia Dysfunctioning on Movement Disorders 292.5 Conclusion and Future Scope 31References 313 EXTRACTION OF SIGNIFICANT ASSOCIATION RULES USING PRE- AND POST-MINING TECHNIQUES—AN ANALYSIS 37M. Nandhini and S. N. Sivanandam3.1 Introduction 383.2 Background 393.2.1 Interestingness Measures 393.2.2 Pre-Mining Techniques 403.2.2.1 Candidate Set Reduction Schemes 403.2.2.2 Optimal Threshold Computation Schemes 413.2.2.3 Weight-Based Mining Schemes 423.2.3 Post-Mining Techniques 423.2.3.1 Rule Pruning Schemes 433.2.3.2 Schemes Using Knowledge Base 433.3 Methodology 443.3.1 Data Preprocessing 443.3.2 Pre-Mining 463.3.2.1 Pre-Mining Technique 1: Optimal Support and Confidence Threshold Value Computation Using PSO 463.3.2.2 Pre-Mining Technique 2: Attribute Weight Computation Using IG Measure 483.3.3 Association Rule Generation 503.3.3.1 ARM Preliminaries 503.3.3.2 WARM Preliminaries 523.3.4 Post-Mining 563.3.4.1 Filters 563.3.4.2 Operators 583.3.4.3 Rule Schemas 583.4 Experiments and Results 593.4.1 Parameter Settings for PSO-Based Pre-Mining Technique 603.4.2 Parameter Settings for PAW-Based Pre-Mining Technique 603.5 Conclusions 63References 654 ONTOLOGY IN MEDICINE AS A DATABASE MANAGEMENT SYSTEM 69Shobowale K. O.4.1 Introduction 704.1.1 Ontology Engineering and Development Methodology 724.2 Literature Review on Medical Data Processing 724.3 Information on Medical Ontology 754.3.1 Types of Medical Ontology 754.3.2 Knowledge Representation 764.3.3 Methodology of Developing Medical Ontology 764.3.4 Medical Ontology Standards 774.4 Ontologies as a Knowledge-Based System 784.4.1 Domain Ontology in Medicine 794.4.2 Brief Introduction of Some Medical Standards 814.4.2.1 Medical Subject Headings (MeSH) 814.4.2.2 Medical Dictionary for Regulatory Activities (MedDRA) 814.4.2.3 Medical Entities Dictionary (MED) 814.4.3 Reusing Medical Ontology 824.4.4 Ontology Evaluation 854.5 Conclusion 864.6 Future Scope 86References 875 USING IOT AND SEMANTIC WEB TECHNOLOGIES FOR HEALTHCARE AND MEDICAL SECTOR 91Nikita Malik and Sanjay Kumar Malik5.1 Introduction 925.1.1 Significance of Healthcare and Medical Sector and Its Digitization 925.1.2 e-Health and m-Health 925.1.3 Internet of Things and Its Use 945.1.4 Semantic Web and Its Technologies 965.2 Use of IoT in Healthcare and Medical Domain 985.2.1 Scope of IoT in Healthcare and Medical Sector 985.2.2 Benefits of IoT in Healthcare and Medical Systems 1005.2.3 IoT Healthcare Challenges and Open Issues 1005.3 Role of SWTs in Healthcare Services 1015.3.1 Scope and Benefits of Incorporating Semantics in Healthcare 1015.3.2 Ontologies and Datasets for Healthcare and Medical Domain 1035.3.3 Challenges in the Use of SWTs in Healthcare Sector 1045.4 Incorporating IoT and/or SWTs in Healthcare and Medical Sector 1065.4.1 Proposed Architecture or Framework or Model 1065.4.2 Access Mechanisms or Approaches 1085.4.3 Applications or Systems 1095.5 Healthcare Data Analytics Using Data Mining and Machine Learning 1105.6 Conclusion 1125.7 Future Work 113References 1136 AN ONTOLOGICAL MODEL, DESIGN, AND IMPLEMENTATION OF CSPF FOR HEALTHCARE 117Pooja Mohan6.1 Introduction 1176.2 Related Work 1196.3 Mathematical Representation of CSPF Model 1226.3.1 Basic Sets of CSPF Model 1236.3.2 Conditional Contextual Security and Privacy Constraints 1236.3.3 CSPF Model States CsetofStates 1246.3.4 Permission Cpermission 1246.3.5 Security Evaluation Function (SEFcontexts) 1246.3.6 Secure State 1256.3.7 CSPF Model Operations 1256.3.7.1 Administrative Operations 1256.3.7.2 Users’ Operations 1276.4 Ontological Model 1276.4.1 Development of Class Hierarchy 1276.4.1.1 Object Properties of Sensor Class 1296.4.1.2 Data Properties 1296.4.1.3 The Individuals 1296.5 The Design of Context-Aware Security and Privacy Model for Wireless Sensor Network 1296.6 Implementation 1336.7 Analysis and Results 1356.7.1 Inference Time/Latency/Query Response Time vs. No. of Policies 1356.7.2 Average Inference Time vs. Contexts 1366.8 Conclusion and Future Scope 137References 1387 ONTOLOGY-BASED QUERY RETRIEVAL SUPPORT FOR E-HEALTH IMPLEMENTATION 143Aatif Ahmad Khan and Sanjay Kumar Malik7.1 Introduction 1437.1.1 Health Care Record Management 1447.1.1.1 Electronic Health Record 1447.1.1.2 Electronic Medical Record 1457.1.1.3 Picture Archiving and Communication System 1457.1.1.4 Pharmacy Systems 1457.1.2 Information Retrieval 1457.1.3 Ontology 1467.2 Ontology-Based Query Retrieval Support 1467.3 E-Health 1507.3.1 Objectives and Scope 1507.3.2 Benefits of E-Health 1517.3.3 E-Health Implementation 1517.4 Ontology-Driven Information Retrieval for E-Health 1547.4.1 Ontology for E-Heath Implementation 1557.4.2 Frameworks for Information Retrieval Using Ontology for E-Health 1577.4.3 Applications of Ontology-Driven Information Retrieval in Health Care 1587.4.4 Benefits and Limitations 1607.5 Discussion 1607.6 Conclusion 164References 1648 ONTOLOGY-BASED CASE RETRIEVAL IN AN E-MENTAL HEALTH INTELLIGENT INFORMATION SYSTEM 167Georgia Kaoura, Konstantinos Kovas and Basilis Boutsinas8.1 Introduction 1678.2 Literature Survey 1708.3 Problem Identified 1738.4 Proposed Solution 1748.4.1 The PAVEFS Ontology 1748.4.2 Knowledge Base 1798.4.3 Reasoning 1808.4.4 User Interaction 1828.5 Pros and Cons of Solution 1838.5.1 Evaluation Methodology and Results 1838.5.2 Evaluation Methodology 1858.5.2.1 Evaluation Tools 1868.5.2.2 Results 1878.6 Conclusions 1898.7 Future Scope 190References 1909 ONTOLOGY ENGINEERING APPLICATIONS IN MEDICAL DOMAIN 193Mariam Gawich and Marco Alfonse9.1 Introduction 1939.2 Ontology Activities 1959.2.1 Ontology Learning 1959.2.2 Ontology Matching 1959.2.3 Ontology Merging (Unification) 1959.2.4 Ontology Validation 1969.2.5 Ontology Verification 1969.2.6 Ontology Alignment 1969.2.7 Ontology Annotation 1969.2.8 Ontology Evaluation 1969.2.9 Ontology Evolution 1969.3 Ontology Development Methodologies 1979.3.1 TOVE 1979.3.2 Methontology 1989.3.3 Brusa et al. Methodology 1989.3.4 UPON Methodology 1999.3.5 Uschold and King Methodology 2009.4 Ontology Languages 2039.4.1 RDF-RDF Schema 2039.4.2 OWL 2059.4.3 OWL 2 2059.5 Ontology Tools 2089.5.1 Apollo 2089.5.2 NeON 2099.5.3 Protégé 2109.6 Ontology Engineering Applications in Medical Domain 2129.6.1 Ontology-Based Decision Support System (DSS) 2139.6.1.1 OntoDiabetic 2139.6.1.2 Ontology-Based CDSS for Diabetes Diagnosis 2149.6.1.3 Ontology-Based Medical DSS within E-Care Telemonitoring Platform 2159.6.2 Medical Ontology in the Dynamic Healthcare Environment 2169.6.3 Knowledge Management Systems 2179.6.3.1 Ontology-Based System for Cancer Diseases 2179.6.3.2 Personalized Care System for Chronic Patients at Home 2189.7 Ontology Engineering Applications in Other Domains 2199.7.1 Ontology Engineering Applications in E-Commerce 2199.7.1.1 Automated Approach to Product Taxonomy Mapping in E-Commerce 2199.7.1.2 LexOnt Matching Approach 2219.7.2 Ontology Engineering Applications in Social Media Domain 2229.7.2.1 Emotive Ontology Approach 2229.7.2.2 Ontology-Based Approach for Social Media Analysis 2249.7.2.3 Methodological Framework for Semantic Comparison of Emotional Values 225References 22610 ONTOLOGIES ON BIOMEDICAL INFORMATICS 233Marco Alfonse and Mariam Gawich10.1 Introduction 23310.2 Defining Ontology 23410.3 Biomedical Ontologies and Ontology-Based Systems 23510.3.1 MetaMap 23510.3.2 GALEN 23610.3.3 NIH-CDE 23610.3.4 LOINC 23710.3.5 Current Procedural Terminology (CPT) 23810.3.6 Medline Plus Connect 23810.3.7 Gene Ontology 23910.3.8 UMLS 24010.3.9 SNOMED-CT 24010.3.10 OBO Foundry 24010.3.11 Textpresso 24010.3.12 National Cancer Institute Thesaurus 241References 24111 MACHINE LEARNING TECHNIQUES BEST FOR LARGE DATA PREDICTION: A CASE STUDY OF BREAST CANCER CATEGORICAL DATA: K-NEAREST NEIGHBORS 245Yagyanath Rimal11.1 Introduction 24611.2 R Programming 25011.3 Conclusion 255References 25512 NEED OF ONTOLOGY-BASED SYSTEMS IN HEALTHCARE SYSTEM 257Tshepiso Larona Mokgetse12.1 Introduction 25812.2 What is Ontology? 25912.3 Need for Ontology in Healthcare Systems 26012.3.1 Primary Healthcare 26212.3.1.1 Semantic Web System 26212.3.2 Emergency Services 26312.3.2.1 Service-Oriented Architecture 26312.3.2.2 IOT Ontology 26412.3.3 Public Healthcare 26512.3.3.1 IOT Data Model 26512.3.4 Chronic Disease Healthcare 26612.3.4.1 Clinical Reminder System 26612.3.4.2 Chronic Care Model 26712.3.5 Specialized Healthcare 26812.3.5.1 E-Health Record System 26812.3.5.2 Maternal and Child Health 26912.3.6 Cardiovascular System 27012.3.6.1 Distributed Healthcare System 27012.3.6.2 Records Management System 27012.3.7 Stroke Rehabilitation 27112.3.7.1 Patient Information System 27112.3.7.2 Toronto Virtual System 27112.4 Conclusion 272References 27213 EXPLORATION OF INFORMATION RETRIEVAL APPROACHES WITH FOCUS ON MEDICAL INFORMATION RETRIEVAL 275Mamata Rath and Jyotir Moy Chatterjee13.1 Introduction 27613.1.1 Machine Learning-Based Medical Information System 27813.1.2 Cognitive Information Retrieval 27813.2 Review of Literature 27913.3 Cognitive Methods of IR 28113.4 Cognitive and Interactive IR Systems 28613.5 Conclusion 288References 28914 ONTOLOGY AS A TOOL TO ENABLE HEALTH INTERNET OF THINGS VIABLE 5G COMMUNICATION NETWORKS 293Nidhi Sharma and R. K. Aggarwal14.1 Introduction 29314.2 From Concept Representations to Medical Ontologies 29514.2.1 Current Medical Research Trends 29614.2.2 Ontology as a Paradigm Shift in Health Informatics 29614.3 Primer Literature Review 29714.3.1 Remote Health Monitoring 29814.3.2 Collecting and Understanding Medical Data 29814.3.3 Patient Monitoring 29814.3.4 Tele-Health 29914.3.5 Advanced Human Services Records Frameworks 29914.3.6 Applied Autonomy and Healthcare Mechanization 30014.3.7 IoT Powers the Preventive Healthcare 30114.3.8 Hospital Statistics Control System (HSCS) 30114.3.9 End-to-End Accessibility and Moderateness 30114.3.10 Information Mixing and Assessment 30214.3.11 Following and Alerts 30214.3.12 Remote Remedial Assistance 30214.4 Establishments of Health IoT 30314.4.1 Technological Challenges 30414.4.2 Probable Solutions 30614.4.3 Bit-by-Bit Action Statements 30714.5 Incubation of IoT in Health Industry 30714.5.1 Hearables 30814.5.2 Ingestible Sensors 30814.5.3 Moodables 30814.5.4 PC Vision Innovation 30814.5.5 Social Insurance Outlining 30814.6 Concluding Remarks 309References 30915 TOOLS AND TECHNIQUES FOR STREAMING DATA: AN OVERVIEW 313K. Saranya, S. Chellammal and Pethuru Raj Chelliah15.1 Introduction 31415.2 Traditional Techniques 31515.2.1 Random Sampling 31515.2.2 Histograms 31615.2.3 Sliding Window 31615.2.4 Sketches 31715.2.4.1 Bloom Filters 31715.2.4.2 Count-Min Sketch 31715.3 Data Mining Techniques 31715.3.1 Clustering 31815.3.1.1 STREAM 31815.3.1.2 BRICH 31815.3.1.3 CLUSTREAM 31915.3.2 Classification 31915.3.2.1 Naïve Bayesian 31915.3.2.2 Hoeffding 32015.3.2.3 Very Fast Decision Tree 32015.3.2.4 Concept Adaptive Very Fast Decision Tree 32015.4 Big Data Platforms 32015.4.1 Apache Storm 32115.4.2 Apache Spark 32115.4.2.1 Apache Spark Core 32115.4.2.2 Spark SQL 32215.4.2.3 Machine Learning Library 32215.4.2.4 Streaming Data API 32215.4.2.5 GraphX 32315.4.3 Apache Flume 32315.4.4 Apache Kafka 32315.4.5 Apache Flink 32615.5 Conclusion 327References 32816 AN ONTOLOGY-BASED IR FOR HEALTH CARE 331J. P. Patra, Gurudatta Verma and Sumitra Samal16.1 Introduction 33116.2 General Definition of Information Retrieval Model 33316.3 Information Retrieval Model Based on Ontology 33416.4 Literature Survey 33616.5 Methodolgy for IR 339References 344
Role of Edge Analytics in Sustainable Smart City Development
Efficient Single Board Computers (SBCs) and advanced VLSI systems have resulted in edge analytics and faster decision making. The QoS parameters like energy, delay, reliability, security, and throughput should be improved on seeking better intelligent expert systems. The resource constraints in the Edge devices, challenges the researchers to meet the required QoS. Since these devices and components work in a remote unattended environment, an optimum methodology to improve its lifetime has become mandatory. Continuous monitoring of events is mandatory to avoid tragic situations; it can only be enabled by providing high QoS. The applications of IoT in digital twin development, health care, traffic analysis, home surveillance, intelligent agriculture monitoring, defense and all common day to day activities have resulted in pioneering embedded devices, which can offer high computational facility without much latency and delay. The book address industrial problems in designing expert system and IoT applications. It provides novel survey and case study report on recent industrial approach towards Smart City development.G. R. KANAGACHIDAMBARESAN received his PhD from Anna University Chennai in 2017. He is currently an associate professor in the Department of Computer Science Engineering, Veltech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India. His main research interests include Industry 4.0, smart city projects, Body Sensor Network and Fault Tolerant Wireless Sensor Network. He has published several articles in SCI journals and is an associate editor of Wireless Networks. Preface xv1 SMART HEALTH CARE DEVELOPMENT: CHALLENGES AND SOLUTIONS 1R. Sujatha, E.P. Ephzibah and S. Sree Dharinya1.1 Introduction 21.2 ICT Explosion 31.2.1 RFID 41.2.2 IoT and Big Data 51.2.3 Wearable Sensors—Head to Toe 71.2.4 Cloud Computing 81.3 Intelligent Healthcare 101.4 Home Healthcare 111.5 Data Analytics 111.6 Technologies—Data Cognitive 131.6.1 Machine Learning 131.6.2 Image Processing 141.6.3 Deep Learning 141.7 Adoption Technologies 151.8 Conclusion 15References 152 WORKING OF MOBILE INTELLIGENT AGENTS ON THE WEB—A SURVEY 21P.R. Joe Dhanith and B. Surendiran2.1 Introduction 212.2 Mobile Crawler 232.3 Comparative Study of the Mobile Crawlers 472.4 Conclusion 47References 473 POWER MANAGEMENT SCHEME FOR PHOTOVOLTAIC/BATTERY HYBRID SYSTEM IN SMART GRID 49T. Bharani Prakash and S. Nagakumararaj3.1 Power Management Scheme 503.2 Internal Power Flow Management 503.2.1 PI Controller 513.2.2 State of Charge 533.3 Voltage Source Control 543.3.1 Phase-Locked Loop 553.3.2 Space Vector Pulse Width Modulation 563.3.3 Park Transformation (abc to dq0) 573.4 Simulation Diagram and Results 583.4.1 Simulation Diagram 583.4.2 Simulation Results 63Conclusion 654 ANALYSIS: A NEURAL NETWORK EQUALIZER FOR CHANNEL EQUALIZATION BY PARTICLE SWARM OPTIMIZATION FOR VARIOUS CHANNEL MODELS 67M. Muthumari, D.C. Diana and C. Ambika Bhuvaneswari4.1 Introduction 684.2 Channel Equalization 724.2.1 Channel Models 734.2.1.1 Tapped Delay Line Model 744.2.1.2 Stanford University Interim (SUI) Channel Models 754.2.2 Artificial Neural Network 754.3 Functional Link Artificial Neural Network 764.4 Particle Swarm Optimization 764.5 Result and Discussion 774.5.1 Convergence Analysis 774.5.2 Comparison Between Different Parameters 794.5.3 Comparison Between Different Channel Models 804.6 Conclusion 81References 825 IMPLEMENTING HADOOP CONTAINER MIGRATIONS IN OPENNEBULA PRIVATE CLOUD ENVIRONMENT 85P. Kalyanaraman, K.R. Jothi, P. Balakrishnan, R.G. Navya, A. Shah and V. Pandey5.1 Introduction 865.1.1 Hadoop Architecture 865.1.2 Hadoop and Big Data 885.1.3 Hadoop and Virtualization 885.1.4 What is OpenNebula? 895.2 Literature Survey 905.2.1 Performance Analysis of Hadoop 905.2.2 Evaluating Map Reduce on Virtual Machines 915.2.3 Virtualizing Hadoop Containers 945.2.4 Optimization of Hadoop Cluster Using Cloud Platform 955.2.5 Heterogeneous Clusters in Cloud Computing 965.2.6 Performance Analysis and Optimization in Hadoop 975.2.7 Virtual Technologies 975.2.8 Scheduling 985.2.9 Scheduling of Hadoop VMs 985.3 Discussion 995.4 Conclusion 100References 1016 TRANSMISSION LINE INSPECTION USING UNMANNED AERIAL VEHICLE 105A. Mahaboob Subahani, M. Kathiresh and S. Sanjeev6.1 Introduction 1066.1.1 Unmanned Aerial Vehicle 1066.1.2 Quadcopter 1066.2 Literature Survey 1076.3 System Architecture 1086.4 ArduPilot 1096.5 Arduino Mega 1116.6 Brushless DC Motor 1116.7 Battery 1126.8 CMOS Camera 1136.9 Electronic Speed Control 1136.10 Power Module 1156.11 Display Shield 1166.12 Navigational LEDS 1166.13 Role of Sensors in the Proposed System 1186.13.1 Accelerometer and Gyroscope 1186.13.2 Magnetometer 1186.13.3 Barometric Pressure Sensor 1196.13.4 Global Positioning System 1196.14 Wireless Communication 1206.15 Radio Controller 1206.16 Telemetry Radio 1216.17 Camera Transmitter 1216.18 Results and Discussion 1216.19 Conclusion 124References 1257 SMART CITY INFRASTRUCTURE MANAGEMENT SYSTEM USING IOT 127S. Ramamoorthy, M. Kowsigan, P. Balasubramanie and P. John Paul7.1 Introduction 1287.2 Major Challenges in IoT-Based Technology 1297.2.1 Peer to Peer Communication Security 1297.2.2 Objective of Smart Infrastructure 1307.3 Internet of Things (IoT) 1317.3.1 Key Components of Components of IoT 1317.3.1.1 Network Gateway 1327.3.1.2 HTTP (HyperText Transfer Protocol) 1327.3.1.3 LoRaWan (Long Range Wide Area Network) 1337.3.1.4 Bluetooth 1337.3.1.5 ZigBee 1337.3.2 IoT Data Protocols 1337.3.2.1 Message Queue Telemetry Transport (MQTT) 1337.3.2.2 Constrained Application Protocol (CoAP) 1347.3.2.3 Advanced Message Queuing Protocol (AMQP) 1347.3.2.4 Data Analytics 1347.4 Machine Learning-Based Smart Decision-Making Process 1357.5 Cloud Computing 136References 1388 LIGHTWEIGHT CRYPTOGRAPHY ALGORITHMS FOR IOT RESOURCE-STARVING DEVICES 139S. Aruna, G. Usha, P. Madhavan and M.V. Ranjith Kumar8.1 Introduction 1398.1.1 Need of the Cryptography 1408.2 Challenges on Lightweight Cryptography 1418.3 Hashing Techniques on Lightweight Cryptography 1428.4 Applications on Lighweight Cryptography 1528.5 Conclusion 167References 1689 PRE-LEARNING-BASED SEMANTIC SEGMENTATION FOR LIDAR POINT CLOUD DATA USING SELF-ORGANIZED MAP 171K. Rajathi and P. Sarasu9.1 Introduction 1729.2 Related Work 1739.2.1 Semantic Segmentation for Images 1739.3 Semantic Segmentation for LiDAR Point Cloud 1739.4 Proposed Work 1759.4.1 Data Acquisition 1759.4.2 Our Approach 1759.4.3 Pre-Learning Processing 1799.5 Region of Interest (RoI) 1809.6 Registration of Point Cloud 1819.7 Semantic Segmentation 1819.8 Self-Organized Map (SOM) 1829.9 Experimental Result 1839.10 Conclusion 186References 18710 SMART LOAD BALANCING ALGORITHMS IN CLOUD COMPUTING—A REVIEW 189K.R. Jothi, S. Anto, M. Kohar, M. Chadha and P. Madhavan10.1 Introduction 18910.2 Research Challenges 19210.2.1 Security & Routing 19210.2.2 Storage/Replication 19210.2.3 Spatial Spread of the Cloud Nodes 19210.2.4 Fault Tolerance 19310.2.5 Algorithm Complexity 19310.3 Literature Survey 19310.4 Survey Table 20110.5 Discussion & Comparison 20210.6 Conclusion 202References 21611 A LOW-COST WEARABLE REMOTE HEALTHCARE MONITORING SYSTEM 219Konguvel Elango and Kannan Muniandi11.1 Introduction 21911.1.1 Problem Statement 22011.1.2 Objective of the Study 22111.2 Related Works 22211.2.1 Remote Healthcare Monitoring Systems 22211.2.2 Pulse Rate Detection 22411.2.3 Temperate Measurement 22511.2.4 Fall Detection 22511.3 Methodology 22611.3.1 NodeMCU 22611.3.2 Pulse Rate Detection System 22711.3.3 Fall Detection System 23011.3.4 Temperature Detection System 23111.3.5 LCD Specification 23411.3.6 ADC Specification 23411.4 Results and Discussions 23611.4.1 System Implementation 23611.4.2 Fall Detection Results 23611.4.3 ThingSpeak 23611.5 Conclusion 23911.6 Future Scope 240References 24112 IOT-BASED SECURE SMART INFRASTRUCTURE DATA MANAGEMENT 243R. Poorvadevi, M. Kowsigan, P. Balasubramanie and J. Rajeshkumar12.1 Introduction 24412.1.1 List of Security Threats Related to the Smart IoT Network 24412.1.2 Major Application Areas of IoT 24412.1.3 IoT Threats and Security Issues 24512.1.4 Unpatched Vulnerabilities 24512.1.5 Weak Authentication 24512.1.6 Vulnerable API’s 24512.2 Types of Threats to Users 24512.3 Internet of Things Security Management 24612.3.1 Managing IoT Devices 24612.3.2 Role of External Devices in IoT Platform 24712.3.3 Threats to Other Computer Networks 24812.4 Significance of IoT Security 24912.4.1 Aspects of Workplace Security 24912.4.2 Important IoT Security Breaches and IoT Attacks 25012.5 IoT Security Tools and Legislation 25012.6 Protection of IoT Systems and Devices 25112.6.1 IoT Issues and Security Challenges 25112.6.2 Providing Secured Connections 25212.7 Five Ways to Secure IoT Devices 25312.8 Conclusion 255References 25513 A STUDY OF ADDICTION BEHAVIOR FOR SMART PSYCHOLOGICAL HEALTH CARE SYSTEM 257V. Sabapathi and K.P. Vijayakumar13.1 Introduction 25813.2 Basic Criteria of Addiction 25813.3 Influencing Factors of Addiction Behavior 25913.3.1 Peers Influence 25913.3.2 Environment Influence 26013.3.3 Media Influence 26213.3.4 Family Group and Society 26213.4 Types of Addiction and Their Effects 26213.4.1 Gaming Addiction 26313.4.2 Pornography Addiction 26413.4.3 Smart Phone Addiction 26513.4.4 Gambling Addiction 26713.4.5 Food Addiction 26713.4.6 Sexual Addiction 26813.4.7 Cigarette and Alcohol Addiction 26813.4.8 Status Expressive Addiction 26913.4.9 Workaholic Addiction 26913.5 Conclusion 269References 27014 A CUSTOM CLUSTER DESIGN WITH RASPBERRY PI FOR PARALLEL PROGRAMMING AND DEPLOYMENT OF PRIVATE CLOUD 273Sukesh, B., Venkatesh, K. and Srinivas, L.N.B.14.1 Introduction 27414.2 Cluster Design with Raspberry Pi 27614.2.1 Assembling Materials for Implementing Cluster 27614.2.1.1 Raspberry Pi4 27714.2.1.2 RPi 4 Model B Specifications 27714.2.2 Setting Up Cluster 27814.2.2.1 Installing Raspbian and Configuring Master Node 27914.2.2.2 Installing MPICH and MPI4PY 27914.2.2.3 Cloning the Slave Nodes 27914.3 Parallel Computing and MPI on Raspberry Pi Cluster 27914.4 Deployment of Private Cloud on Raspberry Pi Cluster 28114.4.1 NextCloud Software 28114.5 Implementation 28114.5.1 NextCloud on RPi Cluster 28114.5.2 Parallel Computing on RPi Cluster 28214.6 Results and Discussions 28614.7 Conclusion 287References 28715 ENERGY EFFICIENT LOAD BALANCING TECHNIQUE FOR DISTRIBUTED DATA TRANSMISSION USING EDGE COMPUTING 289Karthikeyan, K. and Madhavan, P.15.1 Introduction 29015.2 Energy Efficiency Offloading Data Transmission 29015.2.1 Web-Based Offloading 29115.3 Energy Harvesting 29115.3.1 LODCO Algorithm 29215.4 User-Level Online Offloading Framework (ULOOF) 29315.5 Frequency Scaling 29415.6 Computation Offloading and Resource Allocation 29515.7 Communication Technology 29615.8 Ultra-Dense Network 29715.9 Conclusion 299References 29916 BLOCKCHAIN-BASED SDR SIGNATURE SCHEME WITH TIME-STAMP 303Swathi Singh, Divya Satish and Sree Rathna Lakshmi16.1 Introduction 30316.2 Literature Study 30416.2.1 Signatures With Hashes 30416.2.2 Signature Scheme With Server Support 30516.2.3 Signatures Scheme Based on Interaction 30516.3 Methodology 30616.3.1 Preliminaries 30616.3.1.1 Hash Trees 30616.3.1.2 Chains of Hashes 30616.3.2 Interactive Hash-Based Signature Scheme 30716.3.3 Significant Properties of Hash-Based Signature Scheme 30916.3.4 Proposed SDR Scheme Structure 31016.3.4.1 One-Time Keys 31016.3.4.2 Server Behavior Authentication 31016.3.4.3 Pre-Authentication by Repository 31116.4 SDR Signature Scheme 31116.4.1 Pre-Requisites 31116.4.2 Key Generation Algorithm 31216.4.2.1 Server 31316.4.3 Sign Algorithm 31316.4.3.1 Signer 31316.4.3.2 Server 31316.4.3.3 Repository 31416.4.4 Verification Algorithm 31416.5 Supportive Theory 31516.5.1 Signing Algorithm Supported by Server 31516.5.2 Repository Deployment 31616.5.3 SDR Signature Scheme Setup 31616.5.4 Results and Observation 31616.6 Conclusion 317References 317Index 321
Beginning C
Learn how to program using C, beginning from first principles and progressing through step-by-step examples to become a competent, C-language programmer. All you need are this book and any of the widely available C compilers, and you'll soon be writing real C programs.You’ll discover that C is a foundation language that every programmer ought to know. Beginning C is written by renowned author Ivor Horton and expert programmer German Gonzalez-Morris. This book increases your programming expertise by guiding you through the development of fully working C applications that use what you've learned in a practical context. You’ll also be able to strike out on your own by trying the exercises included at the end of each chapter. At the end of the book you'll be confident in your skills with all facets of the widely-used and powerful C language.WHAT YOU WILL LEARN* Discover the C programming languageProgram using C starting with first steps, then making decisions * Use loops, arrays, strings, text, pointers, functions, I/O, and moreCode applications with strings and text * Structure your programs efficientlyWork with data, files, facilities, and moreWHO THIS BOOK IS FORThose new to C programming who may or may not have some prior programming experience.GERMAN GONZALEZ-MORRIS is a software architect/engineer working with C/C++, Java, and different application containers, in particular, with WebLogic Server. He has developed different applications including JEE/Spring/Python. His areas of expertise also include OOP, design patterns, Spring Core/MVC, and microservices.IVOR HORTON is self-employed in consultancy and writes programming tutorials. He worked for IBM for many years and holds a bachelor's degree, with honors, in mathematics. Horton's experience at IBM includes programming in most languages (such as assembler and high-level languages on a variety of machines), real-time programming, and designing and implementing real-time closed-loop industrial control systems. He has extensive experience teaching programming to engineers and scientists (Fortran, PL/1, APL, etc.). Horton is an expert in mechanical, process, and electronic CAD systems; mechanical CAM systems; and DNC/CNC systems.1. Programming in C2. First Steps in Programming3. Making Decisions4. Loops5. Arrays6. Applications with Strings and Text7. Pointers8. Structuring Your Programs9. More on Functions10. Essential Input and Output Operations11. Structuring Data12. Working with Files13. Supporting Facilities14. Advanced and Specialized TopicsA. Computer ArithmeticB. ASCII Character Code DefinitionsC. Reserved Words in CD. Input and Output Format SpecificationsE. Standard Library Headers
Krisen mit Social Media Intelligence bewältigen. Empfehlungen für den Einsatz sozialer Netzwerke im Katastrophenschutz
Der fortschreitende Klimawandel und dessen Auswirkungen werden dafür sorgen, dass die Zahl der Naturkatastrophen zunimmt. Daher ist es besonders für Menschen in Krisengebieten notwendig, sich durch umfassendes Katastrophen- und Krisenmanagement auf derartige Situationen vorzubereiten.Welche Informationssysteme zur Bevölkerungswarnung gibt es bereits? Welches Potenzial besitzen soziale Netzwerke in diesem Zusammenhang? Was verstehen wir unter Social Media Intelligence? inwieweit können sich freiwillige Helfer einbringen, um die Widerstandsfähigkeit in humanitären Notlagen zu steigern. Welche Herausforderungen können dabei auftreten?Der Autor untersucht den Mehrwert von Social Media bei der Krisenbewältigung. Er legt dar, wie Informationssysteme im Katastrophenschutz zum Einsatz kommen und geht insbesondere auf die Potenziale von sozialen Medien ein. Für die effektive Koordination von digitalen Freiwilligen und Vor-Ort-Helfern gibt er Handlungsempfehlungen.Aus dem Inhalt:- Digital Volunteers;- Vor-Ort-Helfer;- Facebook Disaster Maps;- Warn-Apps;- Big Data
VR Integrated Heritage Recreation
Create assets for history-based games. This book covers the fundamental principles required to understand and create architectural visualizations of historical locations using digital tools. You will explore aspects of 3D design visualization and VR integration using industry-preferred software.Some of the most popular video games in recent years have historical settings (Age of Empires, Call of Duty, etc.). Creating these games requires creating historically accurate game assets. You will use Blender to create VR-ready assets by modeling and unwrapping them. And you will use Substance Painter to texture the assets that you create.You will also learn how to use the Quixel Megascans library to acquire and implement physically accurate materials in the scenes. Finally, you will import the assets into Unreal Engine 4 and recreate a VR integrated heritage that can be explored in real time. Using VR technology and game engines, you can digitally recreate historical settings for games.WHAT YOU WILL LEARN* Create high-quality, optimized models suitable for any 3D game engine* Master the techniques of texturing assets using Substance Painter and Quixel Megascans* Keep assets historically accurate* Integrate assets with the game engine* Create visualizations with Unreal Engine 4WHO IS THIS BOOK FORGame developers with some experience who are eager to get into VR-based gamesDR. ABHISHEK KUMAR is Assistant Professor in the Department of Computer Science at the Institute of Science at Banaras Hindu University. He is an Apple Certified Associate, Adobe Education Trainer, and certified by Autodesk. He is actively involved in course development in animation and design engineering courses for various institutions and universities as they will be a future industry requirement.Dr. Kumar has published a number of research papers and covered a wide range of topics in various digital scientific areas (image analysis, visual identity, graphics, digital photography, motion graphics, 3D animation, visual effects, editing, composition). He holds two patents in the field of design and IoT.Dr. Kumar has completed professional studies related to animation, computer graphics, virtual reality, stereoscopy, filmmaking, visual effects, and photography from Norwich University of Arts, University of Edinburg, and Wizcraft MIME & FXPHD, Australia. He is passionate about the media and entertainment industry, and has directed two animation short films.Dr. Kumar has trained more than 50,000 students across the globe from 153 countries (top five: India, Germany, United States, Spain, Australia). His alumni have worked for national and international movies such as Ra-One, Krissh, Dhoom, Life of Pi, the Avengers series, the Iron Man series, GI Joe 3D, 300, Alvin and the Chipmunks, Prince of Persia, Titanic 3D, the Transformers series, Bahubali 1 & 2, London Has Fallen, Warcraft, Aquaman 3D, Alita, and more.CHAPTER 1: INTRODUCTION TO BOOKChapter Goal: In this chapter we will introduce the readers to the book and its concepts.Sub TopicsScope of this bookTopics coveredCHAPTER 2: INTRODUCTION TO SOFTWAREChapter Goal: In this chapter the readers will be introduced to the software applications that we will use throughout the book for creating our scene and everything related to it. Software that we will use are Blender, Substance Painter, Quixel Bridge and Unreal Engine 4.Sub TopicsBlenderSubstance PainterQuixel Bridge Unreal Engine 4CHAPTER 3: ACQUIRING RESOURCES FOR OUR PROJECTChapter Goal: In this chapter we will explore how we can acquire various resources that we will require for creating our project.Sub TopicsWebsites for getting texturesCollecting ReferencesCreating basic planCHAPTER 4: DESIGN VISUALIZATIONChapter Goal: We will learn the basic tools of the software which we are going to use for heritage recreation. After that we will create a white box level using Blender and UE4.Sub TopicsBasics of BlenderBasics of Substance PainterCreating White Box sceneCHAPTER 5: MODELLING OUR SCENEChapter Goal: In this chapter we will start modelling our scene. We will create optimized game ready models that can be used within any game engine.Sub TopicsModelling the TempleModelling the ground assets and stairsModelling additional assetsCHAPTER 6: UNWRAPPING THE MODELSChapter Goals: In this chapter we will create UV map for our models and explore in detail the UV editing tools provided by Blender.Sub TopicsUnwrapping the TempleUnwrapping the various ground assets and stairsUnwrapping the remaining smaller assetsCHAPTER 7: TEXTURING ASSETS USING SUBSTANCE PAINTERChapter Goal: We will now see how we can texture our assets using Substance Painter which is an industry standard tool for texturing.Sub TopicsA quick introduction Substance PainterTexturing our Larger structuresTexturing the smaller assetsCHAPTER 8: CREATING FOLIAGEChapter Goal: Here we will see how we can create game ready foliage like grasses, bushes and trees.Sub TopicsCreating grassCreating BushesCreating TreesCHAPTER 9: EXPORTING TO UNREAL ENGINE 4Chapter Goal: We will see in this chapter how to export assets to Unreal Engine 4.Sub TopicsBasics of Unreal Engine 4Creating lightmap UVsExporting models from BlenderExporting textures from Substance PainterCHAPTER 10: IMPORTING INTO UNREAL ENGINE 4Chapter Goal: In this chapter the readers will see how we can import assets into Unreal Engine 4 and set them up for use.Sub TopicsImport settingsExploring properties editorCHAPTER 11: MATERIAL SETUP IN UNREAL ENGINE 4Chapter Goal: Readers will now learn how to create materials with the imported textures that can then be applied to the meshes.Sub TopicsSimple material setupComplex material setupWorking with Master and Instanced materialsCHAPTER 12: INTEGRATION WITH VRChapter Goal: We will assemble the scene and write scripts for gameplay part of our scene. We will set up our scene to work with VR devices and bake everything into executable file.Sub TopicsCreating landscapeAssembling sceneCreating gameplay scriptsBuilding our scene into an executable