Allgemein
A Roadmap for Enabling Industry 4.0 by Artificial Intelligence
A ROADMAP FOR ENABLING INDUSTRY 4.0 BY ARTIFICAIAL INTELLIGENCETHE BOOK PRESENTS COMPREHENSIVE AND UP-TO-DATE TECHNOLOGICAL SOLUTIONS TO THE MAIN ASPECTS REGARDING THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE TO INDUSTRY 4.0. The industry 4.0 vision has been discussed for quite a while and the enabling technologies are now mature enough to turn this vision into a grand reality sooner rather than later. The fourth industrial revolution, or Industry 4.0, involves the infusion of technology-enabled deeper and decisive automation into manufacturing processes and activities. Several information and communication technologies (ICT) are being integrated and used towards attaining manufacturing process acceleration and augmentation. This book explores and educates the recent advancements in blockchain technology, artificial intelligence, supply chains in manufacturing, cryptocurrencies, and their crucial impact on realizing the Industry 4.0 goals. The book thus provides a conceptual framework and roadmap for decision-makers for implementing this transformation. AUDIENCEComputer and artificial intelligence scientists, information and communication technology specialists, and engineers in electronics and industrial manufacturing will find this book very useful. JYOTIR MOY CHATTERJEE is an assistant professor in the Information Technology department at Lord Buddha Education Foundation (LBEF), Kathmandu, Nepal. He has published more than 60 research papers in international publications, three conference papers, three authored books, 10 edited books, 16 book chapters, two Master’s theses converted into books, and one patent. HARISH GARG, PHD, is an associate professor at Thapar Institute of Engineering & Technology, Deemed University, Patiala, Punjab, India. His research interests include soft computing, decision-making, aggregation operators, evolutionary algorithm, expert systems, and decision support systems. He has published more than 300 papers published in refereed international journals. Dr. Garg is the Editor-in-Chief of Annals of Optimization Theory and Practice.R N THAKUR, PHD, is a senior lecturer in the Information Technology Department, Lord Buddha Education Foundation (LBEF), Kathmandu, Nepal. He has published about 20 research articles in various journals. Preface xv1 ARTIFICIAL INTELLIGENCE—THE DRIVING FORCE OF INDUSTRY 4.0 1Hesham Magd, Henry Jonathan, Shad Ahmad Khan and Mohamed El Geddawy1.1 Introduction 21.2 Methodology 21.3 Scope of AI in Global Economy and Industry 4.0 31.3.1 Artificial Intelligence—Evolution and Implications 41.3.2 Artificial Intelligence and Industry 4.0—Investments and Returns on Economy 51.3.3 The Driving Forces for Industry 4.0 71.4 Artificial Intelligence—Manufacturing Sector 81.4.1 AI Diversity—Applications to Manufacturing Sector 91.4.2 Future Roadmap of AI—Prospects to Manufacturing Sector in Industry 4.0 121.5 Conclusion 13References 142 INDUSTRY 4.0, INTELLIGENT MANUFACTURING, INTERNET OF THINGS, CLOUD COMPUTING: AN OVERVIEW 17Sachi Pandey, Vijay Laxmi and Rajendra Prasad Mahapatra2.1 Introduction 172.2 Industrial Transformation/Value Chain Transformation 182.2.1 First Scenario: Reducing Waste and Increasing Productivity Using IIoT 192.2.2 Second Scenario: Selling Outcome (User Demand)– Based Services Using IIoT 202.3 IIoT Reference Architecture 202.4 IIoT Technical Concepts 222.5 IIoT and Cloud Computing 262.6 IIoT and Security 27References 293 ARTIFICIAL INTELLIGENCE OF THINGS (AIOT) AND INDUSTRY 4.0– BASED SUPPLY CHAIN (FMCG INDUSTRY) 31Seyyed Esmaeil Najafi, Hamed Nozari and S. A. Edalatpanah3.1 Introduction 323.2 Concepts 333.2.1 Internet of Things 333.2.2 The Industrial Internet of Things (IIoT) 343.2.3 Artificial Intelligence of Things (AIoT) 353.3 AIoT-Based Supply Chain 363.4 Conclusion 40References 404 APPLICATION OF ARTIFICIAL INTELLIGENCE IN FORECASTING THE DEMAND FOR SUPPLY CHAINS CONSIDERING INDUSTRY 4.0 43Alireza Goli, Amir-Mohammad Golmohammadi and S. A. Edalatpanah4.1 Introduction 444.2 Literature Review 454.2.1 Summary of the First Three Industrial Revolutions 454.2.2 Emergence of Industry 4.0 454.2.3 Some of the Challenges of Industry 4.0 474.3 Application of Artificial Intelligence in Supply Chain Demand Forecasting 484.4 Proposed Approach 504.4.1 Mathematical Model 504.4.2 Advantages of the Proposed Model 514.5 Discussion and Conclusion 52References 535 INTEGRATING IOT AND DEEP LEARNING—THE DRIVING FORCE OF INDUSTRY 4.0 57Muhammad Farrukh Shahid, Tariq Jamil Saifullah Khanzada and Muhammad Hassan Tanveer5.1 Motivation and Background 585.2 Bringing Intelligence Into IoT Devices 605.3 The Foundation of CR-IoT Network 625.3.1 Various AI Technique in CR-IoT Network 635.3.2 Artificial Neural Network (ANN) 635.3.3 Metaheuristic Technique 645.3.4 Rule-Based System 645.3.5 Ontology-Based System 655.3.6 Probabilistic Models 655.4 The Principles of Deep Learning and Its Implementation in CR-IoT Network 655.5 Realization of CR-IoT Network in Daily Life Examples 695.6 AI-Enabled Agriculture and Smart Irrigation System—Case Study 705.7 Conclusion 75References 756 A SYSTEMATIC REVIEW ON BLOCKCHAIN SECURITY TECHNOLOGY AND BIG DATA EMPLOYED IN CLOUD ENVIRONMENT 79Mahendra Prasad Nath, Sushree Bibhuprada B. Priyadarshini, Debahuti Mishra and Brojo Kishore Mishra6.1 Introduction 806.2 Overview of Blockchain 836.3 Components of Blockchain 856.3.1 Data Block 856.3.2 Smart Contracts 876.3.3 Consensus Algorithms 876.4 Safety Issues in Blockchain Technology 886.5 Usage of Big Data Framework in Dynamic Supply Chain System 916.6 Machine Learning and Big Data 946.6.1 Overview of Shallow Models 956.6.1.1 Support Vector Machine (SVM) 956.6.1.2 Artificial Neural Network (ANN) 956.6.1.3 K-Nearest Neighbor (KNN) 956.6.1.4 Clustering 966.6.1.5 Decision Tree 966.7 Advantages of Using Big Data for Supply Chain and Blockchain Systems 966.7.1 Replenishment Planning 966.7.2 Optimizing Orders 976.7.3 Arranging and Organizing 976.7.4 Enhanced Demand Structuring 976.7.5 Real-Time Management of the Supply Chain 976.7.6 Enhanced Reaction 986.7.7 Planning and Growth of Inventories 986.8 IoT-Enabled Blockchains 986.8.1 Securing IoT Applications by Utilizing Blockchain 996.8.2 Blockchain Based on Permission 1016.8.3 Blockchain Improvements in IoT 1016.8.3.1 Blockchain Can Store Information Coming from IoT Devices 1016.8.3.2 Secure Data Storage with Blockchain Distribution 1016.8.3.3 Data Encryption via Hash Key and Tested by the Miners 1026.8.3.4 Spoofing Attacks and Data Loss Prevention 1026.8.3.5 Unauthorized Access Prevention Using Blockchain 1036.8.3.6 Exclusion of Centralized Cloud Servers 1036.9 Conclusions 103References 1047 DEEP LEARNING APPROACH TO INDUSTRIAL ENERGY SECTOR AND ENERGY FORECASTING WITH PROPHET 111Yash Gupta, Shilpi Sharma, Naveen Rajan P. and Nadia Mohamed Kunhi7.1 Introduction 1127.2 Related Work 1137.3 Methodology 1147.3.1 Splitting of Data (Test/Train) 1167.3.2 Prophet Model 1167.3.3 Data Cleaning 1197.3.4 Model Implementation 1197.4 Results 1207.4.1 Comparing Forecast to Actuals 1217.4.2 Adding Holidays 1227.4.3 Comparing Forecast to Actuals with the Cleaned Data 1227.5 Conclusion and Future Scope 122References 1258 APPLICATION OF NOVEL AI MECHANISM FOR MINIMIZING PRIVATE DATA RELEASE IN CYBER-PHYSICAL SYSTEMS 127Manas Kumar Yogi and A.S.N. Chakravarthy8.1 Introduction 1288.2 Related Work 1318.3 Proposed Mechanism 1338.4 Experimental Results 1358.5 Future Directions 1378.6 Conclusion 138References 1389 ENVIRONMENTAL AND INDUSTRIAL APPLICATIONS USING INTERNET OF THINGS (IOT) 141Manal Fawzy, Alaa El Din Mahmoud and Ahmed M. Abdelfatah9.1 Introduction 1429.2 IoT-Based Environmental Applications 1469.3 Smart Environmental Monitoring 1479.3.1 Air Quality Assessment 1479.3.2 Water Quality Assessment 1489.3.3 Soil Quality Assessment 1509.3.4 Environmental Health-Related to COVID- 19Monitoring 1509.4 Applications of Sensors Network in Agro-Industrial System 1519.5 Applications of IoT in Industry 1539.5.1 Application of IoT in the Autonomous Field 1539.5.2 Applications of IoT in Software Industries 1559.5.3 Sensors in Industry 1569.6 Challenges of IoT Applications in Environmental and Industrial Applications 1579.7 Conclusions and Recommendations 159Acknowledgments 159References 15910 AN INTRODUCTION TO SECURITY IN INTERNET OF THINGS (IOT) AND BIG DATA 169Sushree Bibhuprada B. Priyadarshini, Suraj Kumar Dash, Amrit Sahani, Brojo Kishore Mishra and Mahendra Prasad Nath10.1 Introduction 17010.2 Allusion Design of IoT 17210.2.1 Stage 1—Edge Tool 17210.2.2 Stage 2—Connectivity 17210.2.3 Stage 3—Fog Computing 17310.2.4 Stage 4—Data Collection 17310.2.5 Stage 5—Data Abstraction 17310.2.6 Stage 6—Applications 17310.2.7 Stage 7—Cooperation and Processes 17410.3 Vulnerabilities of IoT 17410.3.1 The Properties and Relationships of Various IoT Networks 17410.3.2 Device Attacks 17510.3.3 Attacks on Network 17510.3.4 Some Other Issues 17510.3.4.1 Customer Delivery Value 17510.3.4.2 Compatibility Problems With Equipment 17610.3.4.3 Compatibility and Maintenance 17610.3.4.4 Connectivity Issues in the Field of Data 17610.3.4.5 Incorrect Data Collection and Difficulties 17710.3.4.6 Security Concern 17710.3.4.7 Problems in Computer Confidentiality 17710.4 Challenges in Technology 17810.4.1 Skepticism of Consumers 17810.5 Analysis of IoT Security 17910.5.1 Sensing Layer Security Threats 18010.5.1.1 Node Capturing 18010.5.1.2 Malicious Attack by Code Injection 18010.5.1.3 Attack by Fake Data Injection 18010.5.1.4 Sidelines Assaults 18110.5.1.5 Attacks During Booting Process 18110.5.2 Network Layer Safety Issues 18110.5.2.1 Attack on Phishing Page 18110.5.2.2 Attacks on Access 18210.5.2.3 Attacks on Data Transmission 18210.5.2.4 Attacks on Routing 18210.5.3 Middleware Layer Safety Issues 18210.5.3.1 Attack by SQL Injection 18310.5.3.2 Attack by Signature Wrapping 18310.5.3.3 Cloud Attack Injection with Malware 18310.5.3.4 Cloud Flooding Attack 18310.5.4 Gateways Safety Issues 18410.5.4.1 On-Boarding Safely 18410.5.4.2 Additional Interfaces 18410.5.4.3 Encrypting End-to-End 18410.5.5 Application Layer Safety Issues 18510.5.5.1 Theft of Data 18510.5.5.2 Attacks at Interruption in Service 18510.5.5.3 Malicious Code Injection Attack 18510.6 Improvements and Enhancements Needed for IoT Applications in the Future 18610.7 Upcoming Future Research Challenges with Intrusion Detection Systems (IDS) 18910.8 Conclusion 192References 19311 POTENTIAL, SCOPE, AND CHALLENGES OF INDUSTRY 4.0 201Roshan Raman and Aayush Kumar11.1 Introduction 20211.2 Key Aspects for a Successful Production 20211.3 Opportunities with Industry 4.0 20411.4 Issues in Implementation of Industry 4.0 20611.5 Potential Tools Utilized in Industry 4.0 20711.6 Conclusion 210References 21012 INDUSTRY 4.0 AND MANUFACTURING TECHNIQUES: OPPORTUNITIES AND CHALLENGES 215Roshan Raman and Aditya Ranjan12.1 Introduction 21612.2 Changing Market Demands 21712.2.1 Individualization 21812.2.2 Volatility 21812.2.3 Efficiency in Terms of Energy Resources 21812.3 Recent Technological Advancements 21912.4 Industrial Revolution 4.0 22112.5 Challenges to Industry 4.0 22412.6 Conclusion 225References 22613 THE ROLE OF MULTIAGENT SYSTEM IN INDUSTRY 4.0 227Jagjit Singh Dhatterwal, Kuldeep Singh Kaswan and Rudra Pratap Ojha13.1 Introduction 22813.2 Characteristics and Goals of Industry 4.0 Conception 22813.3 Artificial Intelligence 23113.3.1 Knowledge-Based Systems 23213.4 Multiagent Systems 23413.4.1 Agent Architectures 23413.4.2 Jade 23813.4.3 System Requirements Definition 23913.4.4 HMI Development 24013.5 Developing Software of Controllers Multiagent Environment Behavior Patterns 24013.5.1 Agent Supervision 24013.5.2 Documents Dispatching Agents 24113.5.3 Agent Rescheduling 24213.5.4 Agent of Executive 24213.5.5 Primary Roles of High-Availability Agent 24313.6 Conclusion 244References 24414 AN OVERVIEW OF ENHANCING ENCRYPTION STANDARDS FOR MULTIMEDIA IN EXPLAINABLE ARTIFICIAL INTELLIGENCE USING RESIDUE NUMBER SYSTEMS FOR SECURITY 247Akeem Femi Kadri, Micheal Olaolu Arowolo, Ayisat Wuraola Yusuf-Asaju, Kafayat Odunayo Tajudeen and Kazeem Alagbe Gbolagade14.1 Introduction 24814.2 Reviews of Related Works 25014.3 Materials and Methods 25814.3.1 Multimedia 25814.3.2 Artificial Intelligence and Explainable Artificial Intelligence 26114.3.3 Cryptography 26214.3.4 Encryption and Decryption 26514.3.5 Residue Number System 26614.4 Discussion and Conclusion 268References 26815 MARKET TRENDS WITH CRYPTOCURRENCY TRADING IN INDUSTRY 4.0 275Varun Khemka, Sagar Bafna, Ayush Gupta, Somya Goyal and Vivek Kumar Verma15.1 Introduction 27615.2 Industry Overview 27615.2.1 History (From Barter to Cryptocurrency) 27615.2.2 In the Beginning Was Bitcoin 27815.3 Cryptocurrency Market 27915.3.1 Blockchain 27915.3.1.1 Introduction to Blockchain Technology 27915.3.1.2 Mining 28015.3.1.3 From Blockchain to Cryptocurrency 28115.3.2 Introduction to Cryptocurrency Market 28115.3.2.1 What is a Cryptocurrency? 28115.3.2.2 Cryptocurrency Exchanges 28315.4 Cryptocurrency Trading 28315.4.1 Definition 28315.4.2 Advantages 28315.4.3 Disadvantages 28415.5 In-Depth Analysis of Fee Structures and Carbon Footprint in Blockchain 28515.5.1 Need for a Fee-Driven System 28515.5.2 Ethereum Structure 28615.5.3 How is the Gas Fee Calculated? 28715.5.3.1 Why are Ethereum Gas Prices so High? 28715.5.3.2 Carbon Neutrality 28715.6 Conclusion 291References 29216 BLOCKCHAIN AND ITS APPLICATIONS IN INDUSTRY 4.0 295Ajay Sudhir Bale, Tarun Praveen Purohit, Muhammed Furqaan Hashim and Suyog Navale16.1 Introduction 29616.2 About Cryptocurrency 29616.3 History of Blockchain and Cryptocurrency 29816.4 Background of Industrial Revolution 30016.4.1 The First Industrial Revolution 30116.4.2 The Second Industrial Revolution 30116.4.3 The Third Industrial Revolution 30216.4.4 The Fourth Industrial Revolution 30216.5 Trends of Blockchain 30316.6 Applications of Blockchain in Industry 4.0 30416.6.1 Blockchain and the Government 30416.6.2 Blockchain in the Healthcare Sector 30416.6.3 Blockchain in Logistics and Supply Chain 30616.6.4 Blockchain in the Automotive Sector 30716.6.5 Blockchain in the Education Sector 30816.7 Conclusion 309References 310Index 315
Programming for Absolute Beginners
New programmers start here...this book introduces students or aspiring professionals to the world of computer programming using JavaScript and related technologies. This book doesn't just teach the basics of programming, but also all of the tools that new programmers need to get started, including the basics of making web pages and how the Internet works.Programming for Absolute Beginners offers practice problems, activities, and a host of resources to get new programmers started, plus a large glossary of terms introduced in the book and that a new programmer might encounter when learning on their own. No special software is required; this book will help you regardless of what your computer setup is, and source code will be freely available via GitHub.WHAT YOU WILL LEARN* How computers work* How computers communicate over networks* How web pages are built with HTML and CSS* How JavaScript works* How JavaScript interacts with web pages* Intermediate JavaScript topics such as recursion and scoping* Using JavaScript for network communicationWHO THIS BOOK IS FORAnyone wanting to begin computer programming, including students who need to learn the fundamentals and early professionals who want to go back and revisit the basics.JONATHAN BARTLETT is a software developer, researcher, and writer. His first book, Programming from the Ground Up, has been required reading in computer science programs from DeVry to Princeton. He has been the sole or lead author for eight books on topics ranging from computer programming to calculus. He is a technical lead for ITX, where his specialty is getting stuck projects unstuck. He is a senior software developer for McElroy Manufacturing, spearheading projects in web, mobile, and embedded software. He is now the author of several Apress books including Electronics for Beginners and more.Chapter 1: Introduction.-Part I: Computers, Data, and Communication.-Chapter 2: A Short History of Computers.-Chapter 3: How Computers Communicate.-Chapter 4: How a Computer Looks at Data.-Chapter 5: How Computers Work.- Part II: Basic Ingredients for Web Programming.-Chapter 6: The HTML File Format.-Chapter 7: Introduction to Cascading Style Sheets.-Chapter 8: Your First JavaScript Program.-Part III: JavaScript Fundamentals.-9: Basic JavaScript Syntax.-Chapter 10: Introducing Functions and Scope.-Chapter 11: Grouping Values Together with Objects and Arrays.-Chapter 12: Interacting with Web Pages.-Part IV: Intermediate JavaScript.-Chapter 13: Recursive Functions and the Stack.-Chapter 14: Manipulating Functions and Scopes.-Chapter 15: Intermediate Objects.-Part V: Programming Applications.-Chapter 16: Modernizing JavaScript.-Chapter 17: Working With Remote Services (APIs).-Chapter 18: Writing Server-Side JavaScript.-Chapter 19: Conclusion.-Appendix A: Glossary.-Appendix B: Operating System and Browser Specifics.-Appendix C: The JavaScript Toolbox on Docker.-Appendix D: Character Encoding Issues.-Appendix E: Additional Machine Language Programs.
Asymmetric Cryptography
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves.Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange.After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.DAVID POINTCHEVAL obtained a PhD in Computer Science and has since worked on the Cryptography Team at the École Normale Supérieure in France. His research focuses on provable security of cryptographic primitives and protocols.Foreword xiDavid POINTCHEVALCHAPTER 1 PUBLIC-KEY ENCRYPTION AND SECURITY NOTIONS 1Nuttapong ATTRAPADUNG and Takahiro MATSUDA1.1. Basic definitions for PKE 21.1.1. Basic notation 21.1.2. Public-key encryption 21.1.3. IND-CPA and IND-CCA security 21.1.4. Other basic security notions and relations 41.2. Basic PKE schemes 51.2.1. Game-based proofs 51.2.2. ElGamal encryption 61.2.3. Simplified CS encryption 81.2.4. Cramer–Shoup encryption 111.2.5. Other specific PKE schemes 141.3. Generic constructions for IND-CCA secure PKE 161.3.1. Hybrid encryption 171.3.2. Naor–Yung construction and extensions 191.3.3. Fujisaki–Okamoto and other transforms in the RO model 211.3.4. Other generic constructions for IND-CCA secure PKE 231.4. Advanced topics 251.4.1. Intermediate notions related to CCA 251.4.2. IND-CCA security in multi-user setting and tight security 261.4.3. Key-dependent message security 281.4.4. More topics on PKE 301.5. References 31CHAPTER 2 SIGNATURES AND SECURITY NOTIONS 47Marc FISCHLIN2.1. Signature schemes 472.1.1. Definition 472.1.2. Examples of practical schemes 492.2. Unforgeability 512.2.1. Discussion 512.2.2. Existential unforgeability under chosen-message attacks 532.2.3. Unforgeability of practical schemes 542.3. Strong unforgeability 562.3.1. Discussion 562.3.2. Strong existential unforgeability under chosen-message attacks 572.3.3. Strong unforgeability of practical schemes 582.3.4. Building strongly unforgeable schemes 592.4. Summary 602.5. References 60CHAPTER 3 ZERO-KNOWLEDGE PROOFS 63Ivan VISCONTI3.1. Introduction 633.2. Notation 643.3. Classical zero-knowledge proofs 643.3.1. Zero knowledge 653.4. How to build a zero-knowledge proof system 683.4.1 ZK proofs for all NP 703.4.2. Round complexity 713.5. Relaxed security in proof systems 723.5.1. Honest-verifier ZK 723.5.2. Witness hiding/indistinguishability 733.5.3. Σ-Protocols 743.6. Non-black-box zero knowledge 753.7. Advanced notions 753.7.1. Publicly verifiable zero knowledge 763.7.2. Concurrent ZK and more 773.7.3. ZK with stateless players 783.7.4. Delayed-input proof systems 793.8. Conclusion 803.9. References 80CHAPTER 4 SECURE MULTIPARTY COMPUTATION 85Yehuda LINDELL4.1. Introduction 854.1.1. A note on terminology 874.2. Security of MPC 874.2.1. The definitional paradigm 874.2.2. Additional definitional parameters 894.2.3. Adversarial power 894.2.4. Modular sequential and concurrent composition 914.2.5. Important definitional implications 924.2.6. The ideal model and using MPC in practice 924.2.7. Any inputs are allowed 924.2.8. MPC secures the process, but not the output 924.3. Feasibility of MPC 934.4. Techniques 944.4.1. Shamir secret sharing 944.4.2. Honest-majority MPC with secret sharing 954.4.3. Private set intersection 974.4.4. Threshold cryptography 994.4.5. Dishonest-majority MPC 1004.4.6. Efficient and practical MPC 1004.5. MPC use cases 1014.5.1. Boston wage gap (Lapets et al. 2018) 1014.5.2. Advertising conversion (Ion et al. 2017) 1014.5.3. MPC for cryptographic key protection (Unbound Security; Sepior; Curv) 1014.5.4. Government collaboration (Sharemind) 1024.5.5. Privacy-preserving analytics (Duality) 1024.6. Discussion 1024.7. References 103CHAPTER 5 PAIRING-BASED CRYPTOGRAPHY 107Olivier BLAZY5.1. Introduction 1085.1.1. Notations 1085.1.2. Generalities 1085.2. One small step for man, one giant leap for cryptography 1095.2.1. Opening Pandora’s box, demystifying the magic 1105.2.2. A new world of assumptions 1125.3. A new world of cryptographic protocols at your fingertips 1165.3.1. Identity-based encryption made easy 1175.3.2. Efficient deterministic compact signature 1185.4. References 119CHAPTER 6 BROADCAST ENCRYPTION AND TRAITOR TRACING 121Duong HIEU PHAN6.1. Introduction 1216.2. Security notions for broadcast encryption and TT 1236.3. Overview of broadcast encryption and TT 1256.4. Tree-based methods 1296.5. Code-based TT 1326.6. Algebraic schemes 1356.7. Lattice-based approach with post-quantum security 1426.8. References 143CHAPTER 7 ATTRIBUTE-BASED ENCRYPTION 151Romain GAY7.1. Introduction 1517.2. Pairing groups 1527.2.1. Cyclic groups 1527.2.2. Pairing groups 1527.3. Predicate encodings 1537.3.1. Definition 1537.3.2. Constructions 1547.4. Attribute-based encryption 1567.4.1. Definition 1567.4.2. A modular construction 1587.5. References 165CHAPTER 8 ADVANCED SIGNATURES 167Olivier SANDERS8.1. Introduction 1678.2. Some constructions 1698.2.1. The case of scalar messages 1698.2.2. The case of non-scalar messages 1718.3. Applications 1738.3.1. Anonymous credentials 1738.3.2. Group signatures 1768.3.3. Direct anonymous attestations 1808.4. References 184CHAPTER 9 KEY EXCHANGE 187Colin BOYD9.1. Key exchange fundamentals 1879.1.1. Key exchange parties 1889.1.2. Key exchange messages 1899.1.3. Key derivation functions 1899.2. Unauthenticated key exchange 1919.2.1. Formal definitions and security models 1919.2.2. Constructions and examples 1929.3. Authenticated key exchange 1949.3.1. Non-interactive key exchange 1959.3.2. AKE security models 1969.3.3. Constructions and examples 2009.4. Conclusion 2069.5. References 207CHAPTER 10 PASSWORD AUTHENTICATED KEY EXCHANGE: PROTOCOLS AND SECURITY MODELS 213Stanislaw JARECKI10.1. Introduction 21310.2. First PAKE: EKE 21510.3. Game-based model of PAKE security 21810.3.1. The BPR security model 21810.3.2. Implicit versus explicit authentication 22110.3.3. Limitations of the BPR model 22110.3.4. EKE instantiated with Diffie–Hellman KE 22310.3.5. Implementing ideal cipher on arbitrary groups 22410.4. Simulation-based model of PAKE security 22510.4.1. The BMP security model 22510.4.2. Advantages of BMP definition: arbitrary passwords, tight security 22910.4.3. EKE using RO-derived one-time pad encryption 23010.4.4. BMP model for PAKE with explicit authentication (pake-ea) 23110.5. Universally composable model of PAKE security 23210.6. PAKE protocols in the standard model 23610.7. PAKE efficiency optimizations 23910.8. Asymmetric PAKE: PAKE for the client-server setting 24210.9. Threshold PAKE 24410.10. References 246CHAPTER 11 VERIFIABLE COMPUTATION AND SUCCINCT ARGUMENTS FOR NP 257Dario FIORE11.1. Introduction 25711.1.1. Background 25811.2. Preliminaries 25911.3. Verifiable computation 26011.4. Constructing VC 26111.4.1. VC for circuits in three steps 26111.4.2. Succinct non-interactive arguments for non-deterministic computation 26311.4.3. Verifiable computation from SNARG 26411.5. A modular construction of SNARGs 26411.5.1. Algebraic non-interactive linear proofs 26511.5.2. Bilinear groups 26711.5.3. SNARGs from algebraic NILPs with degree-2 verifiers using bilinear groups 26911.6. Constructing algebraic NILPs for arithmetic circuits 27111.6.1. Arithmetic circuits 27111.6.2. Quadratic arithmetic programs 27111.6.3. Algebraic NILP for QAPs 27411.7. Conclusion 27911.8. References 279List of Authors 283Index 285
Solving Identity Management in Modern Applications
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.SOLVING IDENTITY AND ACCESS MANAGEMENT IN MODERN APPLICATIONS gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)―the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).WHAT YOU’LL LEARN• Understand key identity management concepts• Incorporate essential design principles• Design authentication and access control for a modern application• Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0)• Review historical failures and know how to avoid themWHO THIS BOOK IS FORDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solutionYVONNE WILSON is co-founder and Chief Strategy Officer for XploitDefense. She has had many roles in the software industry related to security and identity management as a security and identity architect; enterprise architect; director of developer success working with identity customers; sr. director of security governance, risk, and compliance (GRC); Chief Strategy Officer; and founder of cloud identity services. Yvonne was responsible for IT security strategy and architecture at Sun Microsystems, founded and designed the identity management services offered through Oracle Managed Cloud Services, created a GRC team at Auth0 and founded a world-wide developer success team for Auth0, working with customers and overseeing the creation of an identity management training program for customer-facing support and professional services engineers. Yvonne is currently Chief Strategy Officer at XploitDefense.In working with business teams at Sun, designing and deploying identity systems for customers at Oracle, and while founding a developer success team at Auth0, Yvonne had the opportunity of working with many customers, from small startups to large enterprises. Her experience spans the implementation of SSO, identity federation, directory services, adaptive knowledge-based authentication, and identity provisioning as well as multilevel authentication systems with certificate-based authentication. She has worked with OIDC, SAML 2.0, WS-Fed, OAuth2.0/2.1, and OpenID. From this depth of experience, Yvonne realized the growing need for a basic overview of identity management concepts that is understandable to business application owners as well as architects and developers.ABHISHEK HINGNIKAR is at Okta, the identity provider for the internet. He has several years of experience designing and demonstrating Identity Management solutions to customers using Auth0 using OAuth 2.0/2.1, OpenID Connect and SAML 2.0. His current focus areas involve Consumer IoT, Device Based Identity and designing solutions that explore web based identity in peripheral domains.
Pro Encryption in SQL Server 2022
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Always Encrypted to encrypt data also in memory and be protected even from users with the highest levels of access to the database. The book demonstrates actions you can take today to start protecting your data without changing any code in your applications, and the steps you can subsequently take to modify your applications to support implementing a gold standard in data protection.The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your data and meeting regulatory requirements. The book teaches you how to work with the encryption technologies in SQL Server with the express goal of helping you understand those technologies on an intuitive level. You’ll come away with a deep level of understanding that allows you to answer questions and speak as an expert. The book’s aim is to make you as comfortable in deploying encryption in SQL Server as you would be in driving your car to buy groceries.Those with a data security mindset will appreciate the discussion of how each feature protects you and what it protects you from, as well as how to implement things in the most secure manner. Database administrators will appreciate the high level of detail around managing encryption over time and the effect of encryption on database performance. All readers will appreciate the advice on how to avoid common pitfalls, ensuring that your projects to implement encryption run smoothly.WHAT YOU WILL LEARN* Architect an effective encryption strategy for new applications* Retrofit encryption into your existing applications* Encrypt data at rest, in memory, and in transit* Manage key and certificate life cycles, including backup and restore* Recover encrypted databases in case of server failure* Work with encryption in cloud-based scenariosWHO THIS BOOK IS FORDatabase developers, architects, and administrators who want to work with encryption in SQL Server; those who want to maintain encryption whether data is at rest or being transmitted over the network; and those who wish to encrypt their data even when in the server’s own memory. Readers should be familiar with SQL Server, but no existing knowledge of encryption is assumed.MATTHEW MCGIFFEN is a Data Architect with over 20 years’ experience working on SQL Server and associated technologies. Matthew has also had the opportunity to collaborate with Microsoft during the development of some of the latest enhancements in encryption. He is the author of a popular blog on SQL Server and has written articles for SQL Server Central. In his spare time, Matthew is an amateur chess player and pianist. IntroductionPART I. UNDERSTANDING THE LANDSCAPE1. Purpose of Encryption and Available Tools.PART II. TRANSPARENT DATA ENCRYPTION (TDE)2. Introducing Transparent Data Encryption3. Setting Up TDE4. Managing TDE5. Backup EncryptionPART III. ALWAYS ENCRYPTED6. What Is Always Encrypted?7. Setting Up Always Encrypted8. Executing Queries Using Always Encrypted9. Encrypting Existing Data with Always Encrypted10. Limitations with Always Encrypted11. Key Rotation with Always Encrypted12. Considerations When Implementing Always EncryptedPART IV. ALWAYS ENCRYPTED WITH ENCLAVES13. Introducing Always Encrypted With Enclaves14. Setting Up Always Encrypted With Enclaves15. In-Place Encryption With Always EncryptedPART V. COMPLETING THE PICTURE16. Rich Querying With Always Encrypted Enclaves17. Setting Up TPM Attestation18. Encryption In Transit Using Transport Level Security19. Hashing and Salting of Passwords20. Extensible Key Management (EKM)APPENDIXESA. Glossary of TermsB. Encryption in the CloudC. Encryption Algorithms.
Introduction to Infrastructure as Code
Get inspired to explore the depths of the DevOps field. In today’s rapidly transforming world, Infrastructure as Code (IaC) has emerged as an effective approach to maintain, scale, and deploy software systems. This book offers a mixture of foundational IaC concepts and practical examples to give you hands-on experience.You will first gain an understanding of DevOps culture as well as how to adapt to IaC. Introduction to Infrastructure as Code begins by reviewing the innovative features that DevOps in general, and IaC in particular, have to offer for adoption and growth for different verticals. With this solid base established, you will then learn the importance, processes, and outcome of building infrastructure solutions.Authors Sneh Pandya and Riya Guha Thakurta then provide hands-on examples utilizing IaC platforms, open source tools, and essential considerations such as security, scalability, and deployments. Each chapter focuses on one vertical (i.e., foundations, architecture patterns, securing infrastructure, preparing for deployment), how it impacts the DevOps toolchain in a holistic manner, and how it can be used to build solutions specific to that vertical, with a detailed walkthrough of code, environments, and other tools.After completing this book, you’ll have launched your own infrastructure solution through an open source stack consisting of platforms and tools such as Terraform, Chef, and Puppet.WHAT YOU WILL LEARN* Understand the fundamentals of DevOps and Infrastructure as Code* Prepare for the ever-evolving ecosystem of modular infrastructure and the needs of the future* Avoid potential pitfalls and breakdowns while working with infrastructure* Build scalable and efficient IaC solutions that work at a small, medium, and large scale in a real-life environment* Understand and be responsibly aware of security concerns related to the domain, and how to address themWHO IS THIS BOOK FORBeginners interested in building a career in DevOps as well as professionals looking to gain expertise and advance their career with greater knowledge of IaC. including Technical Product Managers, and Architects.SNEH PANDYA is an emerging Product Management leader with specialization in strategic leadership. He advocates for product strategy, digital transformation, and sustainable innovation.His qualifications and certifications include a bachelor's degree in Computer Science and Engineering and further studies with majors in Strategy Management and Leadership from The Wharton School, University of Pennsylvania.Sneh is also a Developer Community Leader at Google Developers Group Baroda and has given public talks at several worldwide developer conferences. He is a co-founder of the NinjaTalks podcast, which brings together experiences from the world's leaders, changemakers, and innovators to make knowledge accessible to all.With extensive experience in the field of technology, including mobile and web software applications, DevOps, Cloud, infrastructure automation, and software architecture, he has articles published in various technology publications.RIYA GUHA THAKURTA is a graduate student in Computer Information Systems at Boston University. Her undergraduate education includes a bachelor's degree in Computer Science Application from the Institute of Engineering and Management.She was formerly a Scrum Master in the realm of technology management, and her previous experiences with Johnson Controls include technology development across several business products and software verticals. Riya also leads Women Techmakers Kolkata, a diversity, equality, and inclusion community that encourages women in technology. She is also an Intel Software Innovator for the Internet of Things.She is also a co-founder of the NinjaTalks podcast, which seeks to share experiences from the world's most prominent leaders, changemakers, and innovators in order to make knowledge accessible to all.Her diverse interests include technology and project management, sustainability, public speaking, and Research & Development.PART 1: CONCEPTSChapter 1: Introduction to Infrastructure as CodeChapter Goal: Understand DevOps culture and fundamentals of Infrastructure as CodeChapter 2: Patterns and Principles of IaCChapter Goal: Learn about every layer of Infrastructure as Code stackChapter 3: Infrastructure ManagementChapter Goal: Explains management of infrastructure in a holistic mannerChapter 4: Production Complexity ManagementChapter Goal: Learn how to maintain, deploy, and scale infrastructure with respect to various environmentsChapter 5: Business SolutionsChapter Goal: Helps you familiarize and understand business aspects and future scope of IaCPART 2: HANDS-ON EXPERIENCEChapter 6: Hands-on IaC with Hashicorp TerraformChapter Goal: Helps you gain hands-on experience with popular open-source IaC platform - Hashicorp's TerraformChapter 7: Hands-on IaC with PuppetChapter Goal: Take you through with another popular open-source IaC tool - PuppetChapter 8: Hands-on IoC with ChefChapter Goal: Helps you with hands-on experience with another popular open-source IaC tool - Chef
Pro Freeware and Open Source Solutions for Business
This book will point the way to numerous free, low-cost, and open-source software solutions that could provide viable alternatives to their paid counterparts. Pro Freeware and Open Source Solutions for Business is now in its Second Edition; it has been thoroughly revised and updated. This book covers the most up-to-date software versions. Software described in the First Edition that is no longer available has been replaced with comparable titles when possible.The book starts with an office productivity tool known as OfficeLibre and goes on to explain CRM and compression software. You will then learn about desktop publishing, illustration, 3D modeling, and photo editing software. As we progress further, you will learn more about audio-video capture and editing software along with Openshot, an easy-to-use free video editor. You will also learn about available project planning and time tracking software, and much more. By the end of the book, you will have also gained knowledge about security programs, as well as how to use Linux on Windows and MacOS.With the challenging economic times we find ourselves in, this book may be more important than ever to help small business owners eliminate and reduce costs, and keep more money in their business. .WHAT YOU WILL LEARN* Understand the important differences between freeware and open-source software.* Discern which paid commercial software the free version replaces (when applicable).* Gain insight into how organizations and municipalities around the world adopting open-source software to save money on licensing fees.WHO THIS BOOK IS FORPrimarily small business owners, solo entrepreneurs or freelancers on a budget, and cost efficiency experts. PHILLIP W. WHITT is a professional digital retoucher,restoration artist, and author. . As a small business owner, he’s had a good deal of experience in seeking out and using free or inexpensive alternatives to expensive, paid software in his business (starting with his discovery of Open Office in 2009). Even now, most of his work is accomplished using free programs such as LibreOffice for document creation, GIMP or Paint.NET for editing images, and Inkscape for vector drawing. Mr. Whitt has authored several books pertaining to image editing using free software for Apress Publishing. He’s also produced several video tutorials for Apress as well.CHAPTER 1: OFFICE PRODUCTIVITY, NOTE TAKING, ACCOUNTING, AND PDF CREATIONLIBREOFFICE: THE POWERFUL FREE OFFICE SUITELibreOffice ModulesWriterCalcImpressBaseDrawLibreOffice SupportGOOGLE DOCS: CREATE DOCUMENTS AND COLLABORATE ONLINEGoogle DocsGoogle SheetsGoogle SlidesGoogle FormsMoreGoogle Docs SupportGOOGLE KEEP: CREATE, SYNC, AND SHARE NOTESFeature HighlightsGoogle Keep SupportZIM: OPEN-SOURCE NOTE TAKINGFeature HighlightsZim SupportGNUCASH: OPEN-SOURCE ACCOUNTING SOFTWAREFeature HighlightsGnuCash SupportMANAGER: FREE SMALL BUSINESS ACCOUNTING SOFTWAREFeature HighlightsManager SupportPDF REDIRECT: BASIC PDF CREATION FREEWAREFeature HighlightsPDF reDirect SupportChapter SummaryCHAPTER 2: POINT-OF-SALE, CRM, BACKUP, AND COMPRESSION SOFTWAREIMONGO (FREE VERSION): A POINT-OF-SALE UTILITY FOR THE SMALL SHOP OR BOUTIQUEFeature HighlightsImonggo SupportPOS/CASH REGISTER: TURN YOUR OLD PC INTO A CASH REGISTERFeature HighlightsPOS/Cash Register SupportBITRX24 (FREE OPTION): BASIC CRM FOR SMALL BUSINESSFeature HighlightsBitrx24 SupportFBACKUP (FREE OPTION): A FREE BASIC BACKUP UTILITYFeature HighlightsFBackup SupportZZIP: AN OPEN-SOURCE ALTERNATIVE TO WINZIPFeature Highlights7Zip SupportChapter SummaryCHAPTER 3: DESKTOP PUBLISHING, ILLUSTRATION, PAINTING, AND 3D MODELINGGOOGLE DOCS: EASY, BASIC DESKTOP PUBLISHINGFeature HighlightsGoogle Docs SupportSCRIBUS: THE POWERFUL, PROFESSIONAL, OPEN-SOURCE DESKTOP PUBLISHING PROGRAMFeature HighlightsDesign CapabilitiesScribus SupportVECTR:A FREE, BASIC ON-LINE VECTOR DRAWING PROGRAMFeature HighlightsDesign CapabilitiesVectr SupportINKSCAPE: PRO-QUALITY OPEN-SOURCE VECTOR DRAWING SOFTWAREFeature HighlightsGraphics CreationInkscape SupportKRITA: THE POWERFUL OPEN SOURCE DIGITAL DRAWING AND PAINTING PROGRAMFeature HighlightsDocument CreationBrush PresetsKrita SupportFREECAD: OPEN-SOURCE PARAMETRIC 3D MODELING SOFTWAREFeature HighlightsDrafting CapabilitiesFreeCAD SupportBLENDER: THE ULTIMATE OPEN-SOURCE 3D CREATION SOFTWAREFeature HighlightsRendering CapabilitiesBlender SupportChapter SummaryCHAPTER 4: PHOTO EDITING SOFTWAREPHOTOSCAPE: AN EASY-TO-USE PHOTO EDITOR FOR BEGINNERSFeature HighlightsToolsFiltersObjectsPhotoScape SupportPAINT.NET: BASIC IMAGE EDITING FOR WINDOWSFeature HighlightsEditing CapabilitiesGraphics CreationPaint.NET SupportGIMP: THE PREMIER OPEN-SOURCE IMAGE EDITORFeature HighlightsEditing CapabilitiesGraphics CreationGIMP SupportPIXLR: WEB-BASED AND MOBILE DEVICE PHOTO EDITINGFeature HighlightsEditing CapabilitiesDARKTABLE: AN OPEN-SOURCE PHOTOGRAPHY WORKFLOW PROGRAMFeature HighlightsEditing Capabilitiesdarktable SupportFOTOSKETCHER: AUTOMATICALLY TURN PHOTOS INTO DIGITAL ARTFeature HighlightsEditing CapabilitiesFotoSketcher Support SupportChapter SummaryCHAPTER 5: AUDIO-VIDEO CAPTURE, CONVERSION, AND EDITING SOFTWAREFRE:AC: (FREE AUDIO CONVERTER)AN OPEN-SOURCE AUDIO CONVERTER AND CD RIPPERFeature Highlightsfre:ac SupportAUDACITYⓇ: A POWERFUL OPEN-SOURCE AUDIO EDITORFeature HighlightsEditing CapabilitiesAudacityⓇ SupportMPEG STREAMCLIP: A HANDY FREE VIDEO CONVERSION TOOLFeature HighlightsEditing CapabilitiesMPEG Streamclip SupportVIRTUALDUB: OPEN-SOURCE VIDEO PROCESSING FOR WINDOWSFeature HighlightsEditing CapabilitiesVirtualDubSupportOPENSHOT: A SIMPLE, POWERFUL FREE VIDEO EDITORFeature HighlightsEditing CapabilitiesOpenShot SupportKDENLIVE: OPEN-SOURCE VIDEO EDITING FROM BASIC TO PROFeature HighlightsEditing CapabilitiesKdenlive SupportChapter SummaryCHAPTER 6: PROJECT PLANNING, INVENTORY MANAGEMENT, AND TIME TRACKING SOFTWAREPROJECTLIBRE AN OPEN SOURCE ALTERNATIVE TO MICROSOFT PROJECTFeature HighlightsProjectLibre SupportMONDAY.COM: FREE BASIC PROJECT MANAGEMENT SOFTWAREFeature Highlightsmonday.com SupportABC INVENTORY: A FREE OPTION FOR SMALL AND MID-SIZED BUSINESSFeature HighlightsABC Inventory SupportHOMEBASE: FREE ONLINE SCHEDULING AND HR SOFTWAREFeature HighlightsHomebase SupportChapter SummaryCHAPTER 7: WEBSITE CREATION SOFTWARE AND WEB BROWSERSWORDPRESS: FREE, OPEN-SOURCE TOOL AND CONTENT MANAGEMENT SYSTEMFeature HighlightsMulti-Use and Multi-BloggingWordPress SupportWIX: BUILD A BASIC SITE FOR FREEFeature HighlightsWix SupportAVG SECURE BROWSER:BROWSE MORE SECURELY AND PRIVATELYFeature HighlightsFIREFOX: THE BROWSER THAT RESPECTS PRIVACYFeature HighlightsChapter SummaryCHAPTER 8: CONTENT MANAGEMENT SOLUTIONSDRUPAL: AN OPEN-SOURCE, COMMUNITY BASED ALTERNATIVEFeature HighlightsDrupal SupportCONCRETECMS (FORMERLY CONCRETE5): AN OPEN SOURCE CONTENT MANAGEMENT SYSTEMFeature Highlights Concrete CMS SupportGETSIMPLE CMS: A SIMPLE, OPEN-SOURCE CONTENT MANAGEMENT SYSTEMFeature Highlights GetSimple CMS SupportChapter SummaryCHAPTER 9: SECURITY PROGRAMSADVANCED IP SCANNER: FREE SCANNER FOR IP ADDRESSESFeature Highlights Advanced IP Scanner SupportKEEPASS: A FREE AND OPEN-SOURCE PASSWORD MANAGERFeature HighlightsKeepass SupportTCPDUMP: A POWERFUL COMMAND LINE PACKET ANALYZERFeature Highlightstcpdump SupportAVIRA: POWERFUL, FREE ANTIVIRUS PROTECTION FOR PERSONAL PCS AND MACSFeature HighlightsAvira SupportCLAMAV: AN OPEN-SOURCE CROSS PLATFORM ANTI-VIRUS PROGRAMFeature HighlightsClamAV SupportSIGNAL (FORMERLY OPEN WHISPER SYSTEMS): OPEN-SOURCE SECURITY FOR MOBILE DEVICESFeature HighlightsSignal SupportChapter SummaryCHAPTER 10: LINUX: THE FREE ALTERNATIVE TO WINDOWS AND MAC OSWhat is Linux?A Brief History of LinuxThe Advantages of Using LinuxUBUNTU: POWERING MILLIONS OF LAPTOP AND DESKTOP COMPUTERS AROUND THE WORLDEase of UseUbuntu Dashboard and DesktopDownloading and Installing UbuntuUbuntu Software and Software CenterRunning Windows Applications on WINESecurityAccessory CompatibilityUbuntu SupportZORIN OS: ESPECIALLY FOR NEWCOMERS TO LINUXThe Look ChangerDownloading and Installing Zorin OSZorin OS SupportLINUX MINT: A MODERN, ELEGANT OPERATING SYSTEMDownloading and Installing Linux MintLinux Mint SupportChapter Summary
Creating Business Applications with Microsoft 365
Learn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You’ll work with an extended example that shows how to use Power Apps and SharePoint together to create your own help ticketing system.This book offers a deep dive into Power BI, including working with JSON, XML, and Yes/No data, as well as visualizing learning data and using it to detect inconsistencies between Excel files. You’ll also see how to connect to Remedy and to the help system you will have created. Under author Jeffrey Rhodes’s guidance, you’ll delve into the Power Apps collection to learn how to avoid dreaded "delegation" issues with larger data sets. Back on applications, you will create a training class sign-up solution to only allow users to choose classes with available seats. Digging deeper into Teams, you’ll learn how to send chats, posts, and "adaptive cards" from Power Automate. Rounding things out, you’ll save Forms attachments to SharePoint with Power Automate, create your own "Employee Recognition" app with all of the Power Platform and Teams, add or edit weekly status reports, and learn how to create reservation and scoring applications.After reading the book, you will be able to build powerful applications using Power Apps, Power Automate, Power BI, SharePoint, Forms, and Teams.WHAT YOU WILL LEARN* Create productivity-enhancing applications with Power Apps, Power Automate, SharePoint, Forms, and/or Teams* Transform and visualize data with Power BI to include custom columns, measures, and pivots* Avoid delegation issues and tackle complicated Power Apps issues like complex columns, filtering, and ForAll loops* Build scheduled or triggered Power Automate flows to schedule Teams Meetings, send emails, launch approvals, and much moreWHO THIS BOOK IS FORBusiness and application developers. JEFFREY RHODES is a founder and Chief Technical Officer of Platte Canyon Multimedia Software Corporation, a leader in developing commercial e-learning software. He graduated at the top of his class at the Air Force Academy, where he earned a bachelor's degree in electrical engineering. Jeff received a master’s degree in economics from the London School of Economics, which he attended under a British Marshall Scholarship. He is the author of Creating Business Applications with Office 365: Techniques in SharePoint, PowerApps, Power BI, and More, Programming for e-Learning Developers: ToolBook, Flash, JavaScript, and Silverlight, VBTrain.Net: Creating Computer and Web Based Training with Visual Basic .NET. He also co-wrote The ToolBook Companion. He lives in Colorado Springs with his wife Sue and is the proud father of his sons Derek and Michael.CHAPTER 1. PROGRAMMING IN THE POWER PLATFORMIn this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language.CHAPTER 2. UPDATING A SHAREPOINT LIST USING POWER APPSCHAPTER 3. CREATING AN APPROVAL PROCESS WITH POWER AUTOMATECHAPTER 4. CREATING A SURVEY RESPONSE DASHBOARD WITH MICROSOFT POWER BICHAPTER 5. CREATING A SURVEY SOLUTION WITH MICROSOFT FORMS, FLOW, SHAREPOINT, AND POWER BICHAPTER 6. POWER BI CHALLENGES WITH JSON, XML, AND YES/NO DATACHAPTER 7. POWER BI CASE STUDY: MONITORING BMC REMEDY HELP TICKETSCHAPTER 8. BUILDING A HELP TICKETING SYSTEM IN POWERAPPS AND SHAREPOINT – NEW TICKET FORMCHAPTER 9. CONTINUING THE HELP TICKETING SYSTEM – TECHNICIAN FORMCHAPTER 10. USING POWER BI FOR THE HELP TICKETING SYSTEMCHAPTER 11. OVERCOMING POWER APPS DELEGATION ISSUES WITH SHAREPOINT DATA SOURCESIn this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record.CHAPTER 12. CREATING A CLASS SIGN-UP SOLUTION IN SHAREPOINT AND POWER APPSCHAPTER 13. VISUALIZING LEARNING MANAGEMENT DATA FROM SQL SERVER USING POWER BIThis chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more.CHAPTER 14. DYNAMIC INFORMATION IN POWER APPS AND SENDING AN ADAPTIVE CARD TO TEAMS USING POWER AUTOMATEIn this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel.CHAPTER 15. DYNAMICALLY SETTING OBJECT PROPERTIES IN POWER APPS BASED ON A SHAREPOINT LISTIn this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps.CHAPTER 16. UPLOADING FILES FROM POWERAPPS TO SHAREPOINT AND EMAILING LINKS USING POWER AUTOMATEIn this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient.CHAPTER 17. WORKING WITH SHAREPOINT LOOKUP COLUMNS IN POWER BIIn this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type.CHAPTER 18. JOINING SHAREPOINT/EXCEL TABLES IN POWER BIThis chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query.CHAPTER 19. COPYING MICROSOFT FORMS ANSWERS TO SHAREPOINT USING POWER AUTOMATE AND THEN SHOWING THE MOST CURRENT SUBMISSION IN POWER BIIn this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering.CHAPTER 20. COPYING MICROSOFT FORMS ATTACHMENTS TO A SHAREPOINT LIST ITEM USING POWER AUTOMATEIn this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item.CHAPTER 21. CREATING AN EMPLOYEE RECOGNITION APP IN POWER APPS, POWER AUTOMATE, POWER BI, TEAMS, AND SHAREPOINTIn this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data.CHAPTER 22. CREATING A RESERVATIONS BOOKING SOLUTION IN POWER APPS AND SHAREPOINTIn this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf).CHAPTER 23. CREATING A SCORING APPLICATION IN POWER APPS AND SHAREPOINTIn this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.
Workload Automation Using HWA
Apply best practices for deploying and administering HCL Workload automation (HWA) to meet the automation requirements of the digitally transformed platform. This book will provide detailed architecture and deployment options to achieve this goal.Workload automation focuses on real-time processing, predefined event-driven triggers, and situational dependencies. It offers centralized control of managing multiple tasks, making it possible to schedule enterprise-wide tasks. You'll see how it supports the timely completion of tasks and is beneficial for processes that need to happen at a specific time or need to occur as a result of another event.HWA increases efficiency, reduces the turnaround time for workflows, and reduces errors along with delays in end-to-end processes. You'll review proven ways to deliver batch optimization and modernization requirements, and see how solutions can be aligned with the DevSecOps delivery model. Workload Automation Using HWA presents information on how to use the tool and has numerous use cases and implementation procedures to guide every workload automation deployment requirement.WHAT YOU'LL LEARN* Automate and integrate your complex workload, workflow, and business processes across automation platforms, ERP systems, and business applications* Understand event-driven batch automation* Practice alignment of the workload automation solution with the DevSecOps principlesWHO THIS BOOK IS FORSolution Architects, Infrastructure Architects, Technical Architects, Enterprise Architects, Workload Automation Tool Administrators or SME’s, Schedulers, Application owners, Automation Specialists, Service Delivery ManagersNAVIN SABHARWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies. Navin is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.SUBRAMANI KASIVISWANATHAN is the Solution architect for Application Performance Management and Workload Automation Solutions, also leading the Engineering and R&D function, having overall 16 years of IT experience and 6 years of experience in Academics, currently working as Practice Lead in HCL DRYiCE, responsible for creating solutions catering to APM and Workload Automation, responsible and accountable for the Research and Development in autonomics platform.Chapter 1: Introduction to Workload AutomationSub –Topics1. Workload Automation Concepts2. Introduction to HCL Workload Automation3. HCL Workload Automation strengths4. Common HCL Workload Automation terminologyChapter 2: HCL Workload Automation ArchitectureSub –Topics1. HWA components2. HWA communication path3. Architecture TypesChapter 3: HCL Workload Automation DeploymentsSub - Topics1. Deployment Options4. Planning Deployments5. Stand-Alone Architecture6. High Availability Architecture7. Disaster Recovery Architecture8. Containerized deployments9. Deployment on Kubernetes clusters10. Workload Automation on HCL SofyChapter 4: Workload Design and Monitoring using DWC and CLIChapter 5: Use Case: HWA for managed file transfersChapter 6: Use Case: HWA integration with SAPChapter 7: Use Case: Automate job executions on Microsoft SQL serverChapter 8: Use Case: Working with RESTful Web ServicesChapter 9: Use Case: Submit, orchestrate and monitor jobs on a Kubernetes clusterChapter 10: Use Case: HWA Integration with Hadoop Distributed File SystemChapter 11: Use Case: HWA Integration with Apache SparkChapter 12: Use Case 1: HWA Integration with ServiceNow Use Case 2: Auto Remediation of Job failuresChapter 13: Tool Administration and best practicesChapter 14: Alerting and Troubleshooting issuesChapter 15: HWA ReportingChapter 16: HWA SecurityChapter 17: HWA tuning for best performanceChapter 18: Alignment of HWA with DevSecOps Delivery model.
Modern Full-Stack Development
Explore what React, Node, Python, Django, TypeScript, Webpack, and Docker have to offer individually, and how they all fit together in modern app development. This updated version will show you how to build apps with React, Node.js or Django, and TypeScript, and how Webpack can be used to optimize and organize your code for deployment.You’ll begin by building a solid foundation of knowledge and quickly expand it by constructing three different real-world apps. These aren’t just simple, contrived examples but real apps that you can choose to install on your servers and use for real. You’ll also understand how Docker can be used to run the apps you build in a clear and well-defined way, all of which will be able to springboard you into creating more advanced apps on your own.You'll see why React is one of the most popular web development tools available today, and why Node.js is also frequently used for server-side development. The fact that both utilize JavaScript is a big selling point, but there are shortcomings. Modern Full-Stack Development highlights how adding Django, Webpack, and Docker to the mix resolves any issues by creating a potent full development stack on which to build applications – two possible stacks, really!!WHAT YOU'LL LEARN:* Review the basics of TypeScript and writing both React and Node apps with it* Construct a project with NPM and Webpack, configuration and usage* Utilize client-side and server-side development* Employ REST APIs and database usage across two tech stacks, Node and Python/Django* Deploy apps using DockerWHO THIS BOOK IS FOR:Web developers and software architects.Frank Zammetti is a Principal Full-Stack Developer for a major financial firm with nearly 27 years of professional experience (plus almost 15 years of nonprofessional experience before that). He is an author of, including this one, 13 technical books for Apress. Frank has also authored over two dozen certification exams for SHL as well as several independent articles for various publications. He is also a fiction author (shameless plug: look him up on Amazon if you like sci-fi) and a musician of some renown (and here, “some” should be taken to mean very little). Frank has been married for 27 years (to the same woman even!) and they have two children together. When not doing any of the afermentioned things, Frank can be found sleeping, ‘cause that’s about all there’s time for after all that, and not nearly enough of it either!1. Server-Side Action: Node.js and NPM2. A Few More Words: Advanced Node and NPM3. Client-Side Adventures: React4. A Few More Words: Advanced React5. Building a Strong Foundation: TypeScript6. A Few More Words: Advanced TypeScript7. Tying it up in a Bow: Webpack8. Delivering the Goods: MailBag, the Server9. Delivering the Goods: MailBag, the Client10. Time for Fun: BattleJong, the Server11. Time for Fun: BattleJong, the Client12. Bringing the Dev Ship into Harbor: Docker13. Feed Your Face: Fooderator, The Server14. Feed Your Face: Fooderator, The Client
Künstliche Intelligenz heute
Künstliche Intelligenz wird schon heute in vielen Unternehmen angewendet. Und es werden immer mehr. Schon bald werden KI-Anwender starke Wettbewerbsvorteile erzielen, weil sie bessere Produkte anbieten, die haltbarer sind, effizienter produziert wurden und wahrscheinlich auch nachhaltiger sein werden. Diese Unternehmen haben also gleich mehrere Vorteile. Aber: Dies sind nur selten deutsche Unternehmen. Und es sind noch seltener deutsche Startups. In diesem Buch spricht Gunnar Brune mit Anwendern, Forschern und Investoren aus Wirtschaft, Medizin und Wissenschaft, um zu zeigen, wie Machine Learning und Künstliche Intelligenz erfolgreich und oft überraschend einfach zum Einsatz kommen (Applied AI). Die Lektüre bietet Informationen, Ansätze und Inspiration für den nutzbringenden Einsatz von Künstlicher Intelligenz heute.GUNNAR BRUNE ist Strategieberater und Autor für Wirtschaftsthemen. Gemeinsam mit dem Netzwerk AI.HAMBURG unterstützt er die Anwendung von Künstlicher Intelligenz in der Wirtschaft, damit deren strategische Chancen genutzt werden können.Einführung in die Welt aktueller Anwendungen Künstlicher Intelligenz.- Applied AI und das AI-Paradox.- Mit Künstlicher Intelligenz mehr Market Intelligence generieren.- Mehr Qualität, geringere Kosten, höhere Effizienz. KI in der Produktion von Nahrungsmitteln.- Mit Enthusiasmus für Daten kann jeder Mehrwert für Unternehmen und Mitarbeitende schaffen.- Mit Künstlicher Intelligenz besseren Content produzieren.- Künstliche Intelligenz und der Mensch – together forever.- Mit Künstlicher Intelligenz das Wissen der Chefärzte konservieren.- Mit KI-Unterstützung kann man Krebs spezifischer therapieren und Nebenwirkungen vermeiden.- Künstliche Intelligenz: Wir erkunden eine Terra Incognita für das Marketing.- In Fußball, Wirtschaft und Gesellschaft: Neue Algorithmen lösen Probleme, die man vorher auf diese Art nicht lösen konnte.- Der Umgang mit lernenden Maschinensystemen und Künstlicher Intelligenz ist eine wichtige Bildungsaufgabe.- Mit Künstlicher Intelligenz lassen sich wie nie zuvor technische Verfahren und Produkte optimieren.-Mehr Impact für Künstliche Intelligenz mit mehr KI-Startups aus Deutschland.- Künstliche Intelligenz anwenden. Jetzt.
GameMaker Fundamentals
Master the fundamental programming skills needed to create your own computer games in GameMaker. This book shows how to use GameMaker to build and publish cross-platform games.Each chapter covers a certain programming element, including layers, variables, and so on. You will also learn how to design levels in your games, draw sprites to populate your virtual worlds, and build GUIs for your menus and game interfaces. GameMaker Fundamentals also provides a thorough introduction to the GameMaker Language (GML). Practical example projects reinforce the concept discussed in each chapter.On completing this book, you will have a thorough understanding of how to create games from scratch using game design and programming principles using GameMaker and GML.WHAT YOU WILL LEARN* Review core programming features required for sound knowledge of GameMaker* Master how to combine GML to orchestrate game actions* Utilize GameMaker's layers to create exciting games* Set up player controlWHO IS THIS BOOK FORThose new to GameMaker or game programming in general; it assumes no prior knowledge or skill set.BEN TYERS is an expert GameMaker user, developer, coder, and trainer. He has authored a number of books on GameMaker for game application developers.Chapter 1: Instance LayersSub - Topics● What are layers● Layer types● Layer orders● ProjectsChapter 2: VariablesSub –Topics● Built in variables● Drawing variables● Variable types● ProjectsChapter 3: ConditionalsSub - Topics● What are conditoinals● Examples● ProjectsChapter 4: Drawing ShapesSub - Topics:● Drawing shapes● ProjectsChapter 5: Drawing ContinuedSub - Topics:● Drawing variables● Using fonts● Formatting text● Drawing sprites● Formatting sprites● ProjectsChapter 6: Keyboard Input & Basic ControlsSub - Topics:● Keyboard input● Mouse input● Moving a player instance● ProjectsChapter 7: Objects & EventsSub - Topics:● Alarm event● Create event● Draw event● Step event● Input events● Collision event● Draw GUI event● ProjectsChapter 8: SpritesSub - Topics:● Importing sprites● Strip images● Formatting sprites● ProjectsChapter 9: Health & LivesSub - Topics:● Health● Lives● Score● ProjectsChapter 10: MouseSub - Topics:● Mouse Buttons● Interaction with mouse● ProjectsChapter 11: AlarmsSub - Topics:● Usage● Setting alarms● Example usage● ProjectsChapter 12: CollisionsSub - Topics:● Usage● Events● Collisions using code● Examples● ProjectsChapter 13: RoomsSub - Topics:● Setting a background● Views● ProjectsChapter 14: BackgroundsSub - Topics:● Moving backgrounds● ProjectsChapter 15: SoundsSub - Topics:● Importing audio● Playing sounds● Playing music● Audio control● ProjectsChapter 16: Splash Screens & MenusSub - Topics:● Why use a splash screen● Unlockable levels● ProjectsChapter 17: RandomizationSub - Topics:● Using random values● Random variables examples● ProjectsChapter 18: AISub - Topics: ● Moving towards the player● Bullets● ProjectsChapter 19: INI filesSub - Topics:● What are INI files● Writing data● Reading data● ProjectsChapter 20: EffectsSub - Topics:● Built in effects● Effect layers● ProjectsChapter 21: LoopsSub - Topics:● Types of loops● Effect layers● Projects● Examples● ProjectsChapter 22: ArraysSub - Topics:● Example usage● Two dimensional arrays● Drawing array data● Using for weapon control● ProjectsChapter 23: DS ListsSub - Topics:● Example usage● Adding data● Organizing data● ProjectsChapter 24: PathsSub - Topics:● Creating a path● Manipulating a path● ProjectsChapter 25: FunctionsSub - Topics:● Setting up● Examples● Projects
Beginning Spring Boot 3
Learn the Spring Boot 3 micro framework and build your first Java-based cloud-native applications and microservices. Spring Boot is the lightweight, nimbler cousin to the bigger Spring Framework, with plenty of "bells and whistles." This updated edition includes coverage of Spring Native, which will help you speed up your Spring Boot applications, as well as messaging with Spring Boot, Spring GraphQL, Spring Data JDBC and reactive relational database connectivity (R2DBC) with SQL.This new edition also covers enhancements to actuator endpoints, MongoDB 4.0 support, layered JAR and WAR support, support to build OCI images using Cloud Native Build Packs, changes to the DataSource initialization mechanism, and how bean validation support has moved to a separate spring-boot-validation-starter module. This book will teach you how to work with relational and NoSQL databases for data accessibility using Spring Boot with Spring Data, how to persist data with the Java Persistence APIs (JPA), MyBatis, and much more. You'll learn how to enhance your native cloud or web applications with other APIs such as REST and how to build reactive web applications using Spring Boot with WebFlux.Finally, you'll learn how to test applications using JUnit 5, as well as how to secure and deploy your application or service to cloud providers like Heroku. After reading Beginning Spring Boot 3, you'll have the skills needed to start building your own Spring Boot cloud-native, Java-based applications and microservices with confidence, and to take the next steps in your career.WHAT YOU WILL LEARN* Explore the Spring Boot 3 micro framework using Spring Native for faster, better performance* Build cloud-native Java applications and microservices with Spring Boot* Work with relational and NoSQL databases using Boot with Spring Data* Create reactive web applications using Spring's WebFlux* Secure, test, and deploy applications and servicesWHO THIS BOOK IS FORIT professionals such as cloud architects, infrastructure administrators, and network/cloud operatorsSIVA PRASAD REDDY KATAMAREDDY is a Software Architect with 16 years of experience in building scalable distributed enterprise applications. He has worked in banking and e-commerce domains using Java, Kotlin, GoLang, SpringBoot, JPA/Hibernate, MicroServices, REST APIs, SQL, and NoSQL Databases. His current technical focus is on modern architectures, including MicroServices, CI/CD, and DevOps, as well as infrastructure automation using Jenkins, Terraform, AWS CDK and Pulumi.SAI SUBRAMANYAM UPADHYAYULA is a passionate software engineer who likes to share his knowledge about Java and Spring Boot through his blog and YouTube Channel, "Programming Techie." He has experience working with a variety of technologies, including Java, Kotlin, Typescript, Spring Boot, JPA/Hibernate, MongoDB, Angular, and Golang. He also dabbles with DevOps-related activities by working with Jenkins and AWS.Chapter - 1: Introduction to Spring BootChapter - 2: Getting Started with Spring BootChapter - 3: Spring Boot EssentialsChapter - 4: Web Applications with Spring BootChapter - 5: Working with JDBCChapter - 6: Working with MyBatisChapter - 7: Working with JOOQChapter - 8: Working with JPAChapter - 9: Working with MongoDBChapter - 10: Building REST APIs Using Spring BootChapter - 11: Reactive Programming Using Spring WebFluxChapter - 12: Securing Web ApplicationsChapter - 13: Spring Boot ActuatorChapter - 14: Testing Spring Boot ApplicationsChapter - 15: GraphQL with Spring BootChapter - 16: Deploying Spring Boot ApplicationsChapter - 17: Spring Boot AutoconfigurationChapter - 18: Creating a Custom Spring Boot StarterChapter - 19: Spring Boot With Kotlin, Scala, and GroovyChapter - 20: Introducing JHipsterChapter - 21: Spring Native
A European Perspective on Crisis Informatics
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack – more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This book presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.ABOUT THE AUTHORCHRISTIAN REUTER holds a Ph.D. in Information Systems (University of Siegen) and another Ph.D. in the Politics of Safety and Security (Radboud University Nijmegen) and works as a Professor for Science and Technology for Peace and Security (PEASEC) at Technical University of Darmstadt. Introduction.- The State of the Art in Crisis Informatics.- Attitudes by Emergency Services Staff in Europe.- Citizens’ Perception of Social Media in Emergencies in Europe.- Tailorable Situation Assessment with Social Media.- Self-Organisation of Digital Volunteers across Social Media.- Discussion and Conclusion.- References.
Technology Touchpoints
Analyzes the influence of technology and social media on human development with parents and families in mind.This is a story about a family coming of age at the same time as smartphones and social media; a multiracial family coming into its own as windows into social injustice opened up before our very screens; and a multi-parent multi-professional family with children living differently depending on which house and which combination of family members happen to be home. While it is a story about a family, it is really the story of technological and global changes unfolding on our doorsteps.While many revile the ascendance of smartphones and social media and the way they suck us into the vortex of cyberspace, there are cultural touchpoints that reflect deeper human and technology development patterns, patterns which we would all do well to understand, no matter whether or how we choose to engage in the ever-innovating digital frontiers. Informed by research and interviews with leaders in policy, human development, ethics, and technology Loretta Brady helps readers understand the complex systemic challenges and findings related to technology and human development.We do not have to hate or fear technology. It is neither friend nor foe. But understanding its impact on our daily lives is paramount to cultivating a healthier relationship both with our digital lives and our real, lived ones.Loretta L.C. Brady, PhD, is a licensed clinical psychologist and Professor of psychology at Saint Anselm College where she directs Community Resilience and Social Equity Lab (CRSEL). She previously served as co-director for the Center for Teaching Excellence. She serves on the boards of several task forces and local non-profits including youth serving organizations and healthcare systems. She is the author of Bad Ass & Bold: A Transformative Approach to Planning with Your Loves, Dreams, and Realities in Mind (www.badassandbold.com). Her award-winning writing has been recognized by the New England Society of Children’s Book Writers & Illustrators, Jack Jones Literary Arts, and the New England Press Association. Her work has appeared in New Hampshire Business Review, Business NH Magazine, and she has been a source for the New York Times, USA Today, and the Washington Post. She lives in Manchester, NH, with her family and dog, Zelda.AcknowledgmentsIntroduction1 Parenting in the Age of Anti-Social Media2 Selfies, “Usies,” and Attachment3 Memes, Meaning, and Me4 The Good, the Bad, and the Ugly5 Sensitive Periods, Disparate Impact, and Sensitization6 Technology Touchpoints7 Bonding8 Befriending and Believing9 Becoming10 Building11 Bridging12 Value and Values13 Regulation, but Whose?14 Socializing Social Media15 Memory, Creativity, CourageNotesBibliographyIndexAbout the Author and Contributors
Ambient Intelligence and Internet of Things
AMBIENT INTELLIGENCE AND INTERNET OF THINGSTHE BOOK EXPLORES LONG-TERM IMPLEMENTATION TECHNIQUES AND RESEARCH PATHS OF AMBIENT INTELLIGENCE AND THE INTERNET OF THINGS THAT MEET THE DESIGN AND APPLICATION REQUIREMENTS OF A VARIETY OF MODERN AND REAL-TIME APPLICATIONS.Working environments based on the emerging technologies of ambient intelligence (AmI) and the Internet of Things (IoT) are available for current and future use in the diverse field of applications. The AmI and IoT paradigms aim to help people achieve their daily goals by augmenting physical environments using networks of distributed devices, including sensors, actuators, and computational resources. Because AmI-IoT is the convergence of numerous technologies and associated research fields, it takes significant effort to integrate them to make our lives easier. It is asserted that Am I can successfully analyze the vast amounts of contextual data obtained from such embedded sensors by employing a variety of artificial intelligence (AI) techniques and that it will transparently and proactively change the environment to conform to the requirements of the user. Over time, the long-term research goals and implementation strategies could meet the design and application needs of a wide range of modern and real-time applications.The 13 chapters in Ambient Intelligence and Internet of Things: Convergent Technologies provide a comprehensive knowledge of the fundamental structure of innovative cutting-edge AmI and IoT technologies as well as practical applications.AUDIENCEThe book will appeal to researchers, industry engineers, and students in artificial and ambient intelligence, the Internet of Things, intelligent systems, electronics and communication, electronics instrumentations, and computer science.MD RASHID MAHMOOD, PHD, is a professor in the Department of Electronics and Communication Engineering, Guru Nanak Institutions Technical Campus, Hyderabad, India. He has published 50 research papers in international/national journals as well as 10 patents. ROHIT RAJA, PHD, is an associate professor & Head, IT Department, Guru Ghasidas, Vishwavidyalaya, Bilaspur, (CG), India. He has published 80 research papers in international/national journals as well as 13 patents. HARPREET KAUR, PHD, is an associate professor in the Department of Electronics and Communication Engineering, Guru Nanak Institutions Technical Campus, Hyderabad, India. Her research interests include vehicle detection and tracking in autonomous vehicles, and image processing. SANDEEP KUMAR, PHD, is a professor in the Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India. He has published 85 research papers in international/national journals as well as 9 patents. KAPIL KUMAR NAGWANSHI, PHD, is an associate professor at SoS E&T, Guru Ghasidas Vishwavidyalaya, Bilaspur, India. He has published more the 25 articles in SCI and Scopus-indexed Journals, and six patents were granted. His area of interest includes AI-ML, computer vision, and IoT. Preface xv1 AMBIENT INTELLIGENCE AND INTERNET OF THINGS: AN OVERVIEW 1Md Rashid Mahmood, Harpreet Kaur, Manpreet Kaur, Rohit Raja and Imran Ahmed Khan1.1 Introduction 21.2 Ambient Intelligent System 51.3 Characteristics of AmI Systems 61.4 Driving Force for Ambient Computing 91.5 Ambient Intelligence Contributing Technologies 91.6 Architecture Overview 111.7 The Internet of Things 141.8 IoT as the New Revolution 141.9 IoT Challenges 161.10 Role of Artificial Intelligence in the Internet of Things (IoT) 181.11 IoT in Various Domains 191.12 Healthcare 201.13 Home Automation 201.14 Smart City 211.15 Security 211.16 Industry 221.17 Education 231.18 Agriculture 241.19 Tourism 261.20 Environment Monitoring 271.21 Manufacturing and Retail 281.22 Logistics 281.23 Conclusion 29References 292 AN OVERVIEW OF INTERNET OF THINGS RELATED PROTOCOLS, TECHNOLOGIES, CHALLENGES AND APPLICATION 33Deevesh Chaudhary and Prakash Chandra Sharma2.1 Introduction 342.1.1 History of IoT 352.1.2 Definition of IoT 362.1.3 Characteristics of IoT 362.2 Messaging Protocols 372.2.1 Constrained Application Protocol 382.2.2 Message Queue Telemetry Transport 392.2.3 Extensible Messaging and Presence Protocol 412.2.4 Advance Message Queuing Protocol (AMQP) 412.3 Enabling Technologies 412.3.1 Wireless Sensor Network 412.3.2 Cloud Computing 422.3.3 Big Data Analytics 432.3.4 Embedded System 432.4 IoT Architecture 442.5 Applications Area 462.6 Challenges and Security Issues 492.7 Conclusion 50References 513 AMBIENT INTELLIGENCE HEALTH SERVICES USING IOT 53Pawan Whig, Ketan Gupta, Nasmin Jiwani and Arun Velu3.1 Introduction 543.2 Background of AML 553.2.1 What is AML? 553.3 AmI Future 583.4 Applications of Ambient Intelligence 603.4.1 Transforming Hospitals and Enhancing Patient Care With the Help of Ambient Intelligence 603.4.2 With Technology, Life After the COVID-19 Pandemic 613.5 Covid-19 633.5.1 Prevention 643.5.2 Symptoms 643.6 Coronavirus Worldwide 653.7 Proposed Framework for COVID- 19 673.8 Hardware and Software 693.8.1 Hardware 693.8.2 Heartbeat Sensor 703.8.3 Principle 703.8.4 Working 703.8.5 Temperature Sensor 713.8.6 Principle 713.8.7 Working 713.8.8 BP Sensor 723.8.9 Principle 723.8.10 Working 723.9 Mini Breadboard 733.10 Node MCU 733.11 Advantages 763.12 Conclusion 76References 764 SECURITY IN AMBIENT INTELLIGENCE AND INTERNET OF THINGS 81Salman Arafath Mohammed and Md Rashid Mahmood4.1 Introduction 824.2 Research Areas 844.3 Security Threats and Requirements 844.3.1 Ad Hoc Network Security Threats and Requirements 854.3.1.1 Availability 864.3.1.2 Confidentiality 864.3.1.3 Integrity 864.3.1.4 Key Management and Authorization 864.3.2 Security Threats and Requirements Due to Sensing Capability in the Network 874.3.2.1 Availability 874.3.2.2 Confidentiality 874.3.2.3 Integrity 874.3.2.4 Key Distribution and Management 874.3.2.5 Resilience to Node Capture 884.3.3 Security Threats and Requirements in AmI and IoT Based on Sensor Network 884.3.3.1 Availability 884.3.3.2 Confidentiality 894.3.3.3 Confidentiality of Location 894.3.3.4 Integrity 894.3.3.5 Nonrepudiation 904.3.3.6 Fabrication 904.3.3.7 Intrusion Detection 904.3.3.8 Confidentiality 914.3.3.9 Trust Management 924.4 Security Threats in Existing Routing Protocols that are Designed With No Focus on Security in AmI and IoT Based on Sensor Networks 924.4.1 Infrastructureless 944.4.1.1 Dissemination-Based Routing 944.4.1.2 Context-Based Routing 984.4.2 Infrastructure-Based 994.4.2.1 Network with Fixed Infrastructure 1004.4.2.2 New Routing Strategy for Wireless Sensor Networks to Ensure Source Location Privacy 1004.5 Protocols Designed for Security Keeping Focus on Security at Design Time for AmI and IoT Based on Sensor Network 1014.5.1 Secure Routing Algorithms 1014.5.1.1 Identity-Based Encryption (I.B.E.) Scheme 1014.5.1.2 Policy-Based Cryptography and Public Encryption with Keyword Search 1024.5.1.3 Secure Content-Based Routing 1024.5.1.4 Secure Content-Based Routing Using Local Key Management Scheme 1034.5.1.5 Trust Framework Using Mobile Traces 1034.5.1.6 Policy-Based Authority Evaluation Scheme 1034.5.1.7 Optimized Millionaire’s Problem 1044.5.1.8 Security in Military Operations 1044.5.1.9 A Security Framework Application Based on Wireless Sensor Networks 1044.5.1.10 Trust Evaluation Using Multifactor Method 1054.5.1.11 Prevention of Spoofing Attacks 1054.5.1.12 QoS Routing Protocol 1064.5.1.13 Network Security Virtualization 1064.5.2 Comparison of Routing Algorithms and Impact on Security 1064.5.3 Inducing Intelligence in IoT Networks Using Artificial Intelligence 1114.5.3.1 Fuzzy Logic- 1 1114.5.3.2 Fuzzy Logic- 2 1124.6 Introducing Hybrid Model in Military Application for Enhanced Security 1134.6.1 Overall System Architecture 1144.6.2 Best Candidate Selection 1144.6.3 Simulation Results in Omnet++ 1154.6 Conclusion 117References 1185 FUTURISTIC AI CONVERGENCE OF MEGATRENDS: IOT AND CLOUD COMPUTING 125Chanki Pandey, Yogesh Kumar Sahu, Nithiyananthan Kannan, Md Rashid Mahmood, Prabira Kumar Sethy and Santi Kumari Behera5.1 Introduction 1265.1.1 Our Contribution 1285.2 Methodology 1295.2.1 Statistical Information 1305.3 Artificial Intelligence of Things 1315.3.1 Application Areas of IoT Technologies 1325.3.1.1 Energy Management 1325.3.1.2 5G/Wireless Systems 1345.3.1.3 Risk Assessment 1365.3.1.4 Smart City 1385.3.1.5 Health Sectors 1395.4 AI Transforming Cloud Computing 1405.4.1 Application Areas of Cloud Computing 1525.4.2 Energy/Resource Management 1545.4.3 Edge Computing 1555.4.4 Distributed Edge Computing and Edge-of-Things (EoT) 1585.4.5 Fog Computing in Cloud Computing 1585.4.6 Soft Computing and Others 1615.5 Conclusion 174References 1746 ANALYSIS OF INTERNET OF THINGS ACCEPTANCE DIMENSIONS IN HOSPITALS 189Subhodeep Mukherjee, Manish Mohan Baral, Venkataiah Chittipaka and Sharad Chandra Srivastava6.1 Introduction 1906.2 Literature Review 1916.2.1 Overview of Internet of Things 1916.2.2 Internet of Things in Healthcare 1916.2.3 Research Hypothesis 1936.2.3.1 Technological Context (TC) 1936.2.3.2 Organizational Context (OC) 1946.2.3.3 Environmental Concerns (EC) 1956.3 Research Methodology 1956.3.1 Demographics of the Respondents 1966.4 Data Analysis 1966.4.1 Reliability and Validity 1966.4.1.1 Cronbach’s Alpha 1966.4.1.2 Composite Reliability 2016.4.2 Exploratory Factor Analysis (EFA) 2016.4.3 Confirmatory Factor Analysis Results 2016.4.3.1 Divergent or Discriminant Validity 2046.4.4 Structural Equation Modeling 2056.5 Discussion 2066.5.1 Technological Context 2066.5.2 Organizational Context 2076.5.3 Environmental Context 2086.6 Conclusion 209References 2097 ROLE OF IOT IN SUSTAINABLE HEALTHCARE SYSTEMS 215Amrita Rai, Ritesh Pratap Singh and Neha Jain7.1 Introduction 2167.2 Basic Structure of IoT Implementation in the Healthcare Field 2177.3 Different Technologies of IoT for the Healthcare Systems 2217.3.1 On the Basis of the Node Identification 2237.3.2 On the Basis of the Communication Method 2237.3.3 Depending on the Location of the Object 2247.4 Applications and Examples of IoT in the Healthcare Systems 2257.4.1 IoT-Based Healthcare System to Encounter COVID-19 Pandemic Situations 2257.4.2 Wearable Devices 2267.4.3 IoT-Enabled Patient Monitoring Devices From Remote Locations 2277.4.3.1 Pulse Rate Sensor 2277.4.3.2 Respiratory Rate Sensors 2297.4.3.3 Body Temperature Sensors 2317.4.3.4 Blood Pressure Sensing 2327.4.3.5 Pulse Oximetry Sensors 2337.5 Companies Associated With IoT and Healthcare Sector Worldwide 2347.6 Conclusion and Future Enhancement in the Healthcare System With IoT 237References 2388 FOG COMPUTING PARADIGM FOR INTERNET OF THINGS APPLICATIONS 243Upendra Verma and Diwakar Bhardwaj8.1 Introduction 2438.2 Challenges 2478.3 Fog Computing: The Emerging Era of Computing Paradigm 2488.3.1 Definition of Fog Computing 2488.3.2 Fog Computing Characteristic 2498.3.3 Comparison Between Cloud and Fog Computing Paradigm 2508.3.4 When to Use Fog Computing 2508.3.5 Fog Computing Architecture for Internet of Things 2518.3.6 Fog Assistance to Address the New IoT Challenges 2528.3.7 Devices Play a Role of Fog Computing Node 2538.4 Related Work 2548.5 Fog Computing Challenges 2548.6 Fog Supported IoT Applications 2628.7 Summary and Conclusion 265References 2659 APPLICATION OF INTERNET OF THINGS IN MARKETING MANAGEMENT 273Arshi Naim, Anandhavalli Muniasamy and Hamed Alqahtani9.1 Introduction 2739.2 Literature Review 2759.2.1 Customer Relationship Management 2769.2.2 Product Life Cycle (PLC) 2779.2.3 Business Process Management (BPM) 2789.2.4 Ambient Intelligence (AmI) 2799.2.5 IoT and CRM Integration 2809.2.6 IoT and BPM Integration 2809.2.7 IoT and Product Life Cycle 2829.2.8 IoT in MMgnt 2829.2.9 Impacts of AmI on Marketing Paradigms 2839.3 Research Methodology 2849.4 Discussion 2849.4.1 Research Proposition 1 2889.4.2 Research Proposition 2 2909.4.3 Research Proposition 3 2919.4.4 Research Proposition 4 2949.4.5 Research Proposition 5 2949.5 Results 2959.4 Conclusions 296References 29710 HEALTHCARE INTERNET OF THINGS: A NEW REVOLUTION 301Manpreet Kaur, M. Sugadev, Harpreet Kaur, Md Rashid Mahmood and Vikas Maheshwari10.1 Introduction 30210.2 Healthcare IoT Architecture (IoT) 30310.3 Healthcare IoT Technologies 30410.3.1 Technology for Identification 30510.3.2 Location Technology 30610.3.2.1 Mobile-Based IoT 30610.3.2.2 Wearable Devices 30810.3.2.3 Ambient-Assisted Living (AAL) 31410.3.3 Communicative Systems 31510.3.3.1 Radiofrequency Identification 31610.3.3.2 Bluetooth 31610.3.3.3 Zigbee 31710.3.3.4 Near Field Communication 31710.3.3.5 Wireless Fidelity (Wi-Fi) 31810.3.3.6 Satellite Communication 31810.4 Community-Based Healthcare Services 31910.5 Cognitive Computation 32110.6 Adverse Drug Reaction 32310.7 Blockchain 32510.8 Child Health Information 32710.9 Growth in Healthcare IoT 32810.10 Benefits of IoT in Healthcare 32810.11 Conclusion 329References 33011 DETECTION-BASED VISUAL OBJECT TRACKING BASED ON ENHANCED YOLO-LITE AND LSTM 339Aayushi Gautam and Sukhwinder Singh11.1 Introduction 34011.2 Related Work 34111.3 Proposed Approach 34311.3.1 Enhanced YOLO-Lite 34411.3.2 Long Short-Term Memory 34611.3.3 Working of Proposed Framework 34711.4 Evaluation Metrics 34911.5 Experimental Results and Discussion 35011.5.1 Implementation Details 35011.5.2 Performance on OTB-2015 35011.5.3 Performance on VOT-2016 35311.5.4 Performance on UAV-123 35411.6 Conclusion 356References 35612 INTRODUCTION TO AMI AND IOT 361Dolly Thankachan12.1 Introduction 36212.1.1 AmI and IoT Characteristics and Definition of Overlaps 36212.1.1.1 Perceptions of “AmI” and the “IoT” 36312.1.2 Prospects and Perils of AmI and the IoT 36412.1.2.1 Assistances and Claim Areas 36412.1.2.2 Intimidations and Contests Relating to AmI and the IoT 36512.2 AmI and the IoT and Environmental and Societal Sustainability: Dangers, Challenges, and Underpinnings 36612.3 Role of AmI and the IoT as New I.C.T.s to Conservational and Social Sustainability 36712.3.1 AmI and the IoT for Environmental Sustainability: Issues, Discernment, and Favoritisms in Tactical Innovation Pursuits 36812.4 The Environmental Influences of AmI and the IoT Technology 36912.4.1 Fundamental Properties 37012.4.2 Boom Properties 37012.4.3 Oblique Outcomes 37112.4.4 Straight Outcome 37212.5 Conclusion 374References 37913 DESIGN OF OPTIMUM CONSTRUCTION SITE MANAGEMENT ARCHITECTURE: A QUALITY PERSPECTIVE USING MACHINE LEARNING APPROACH 383Kundan Meshram13.1 Introduction 38413.2 Literature Review 38613.3 Proposed Construction Management Model Based on Machine Learning 39013.4 Comparative Analysis 39313.5 Conclusion 395References 396Index 399
Antipatterns in Retrospektiven
Verbessern Sie mit Retrospektiven die agilen Prozesse und die Zusammenarbeit in Teams!Bei Retrospektiven geht es darum, Teams durch die Reflexion im Rahmen eines strukturierten Meetings dabei zu unterstützen, leistungsfähiger zu werden. Retrospektiven sind für kontinuierliches Lernen und Verbesserung – gerade in Lean-, Agile- und DevOps-Kontexten – unverzichtbar. 24 Antipatterns (Antimuster) helfen dabei, die eigene Moderation zu reflektieren und neue Lösungsansätze anzuwenden.Aino Vonge Corry zeigt auf, wie festgefahrene Retrospektiven wieder in produktive Arbeitsrituale umgewandelt werden können, und geht dabei auf fehlerhafte Planung sowie strukturelle und zwischenmenschliche Probleme in den Retrospektiven ein. Sie berichtet von Fallen, in die sie getappt ist, und Fehlern, die sie in ihrer jahrelangen Erfahrung als Moderatorin von Retrospektiven gemacht hat, und stellt anschließend bewährte Lösungen vor, die für das Team und die Menschen in unterschiedlichen Kontexten bereits funktioniert haben.Mit diesen Erkenntnissen und Anleitungen können Sie Retrospektiven durchführen, die konkrete Verbesserungen und echten Mehrwert bringen – die effektiv sind und auch Spaß machen! Über den Autor:Aino Vonge Corry, PhD, ist unabhängige Beraterin, Agile Coach und Vorsitzende des Programmkomitees mehrerer IT-Konferenzen. Sie hat mehr als 15 Jahre damit verbracht, Meetings zu moderieren, Retrospektiven zu unterrichten und Softwareteams zu helfen, sich zu verbessern. „Retrospective Antipatterns“ ist ihr erstes Buch, erschien 2020 und ist ein großer Erfolg im englischsprachigen Raum.Übersetzerin:Daniela Schubert arbeitet in der IT-Beratung, als agile Führungskraft, moderiert Retrospektiven, gibt Workshops und hält Vorträge auf Konferenzen. Weitere Arbeitsschwerpunkte sind: New Work und ortsunabhängiges Arbeiten sowie DEI-Tranings (Diversity, Equity & Inclusion) für Unternehmen auf Managementebene.Zielgruppe:(Agile) CoachesScrum Master*innenModerator*innenWorkshop-Leiter*innenVerantwortliche in Projektteams
Finding Ghosts in Your Data
Discover key information buried in the noise of data by learning a variety of anomaly detection techniques and using the Python programming language to build a robust service for anomaly detection against a variety of data types. The book starts with an overview of what anomalies and outliers are and uses the Gestalt school of psychology to explain just why it is that humans are naturally great at detecting anomalies. From there, you will move into technical definitions of anomalies, moving beyond "I know it when I see it" to defining things in a way that computers can understand.The core of the book involves building a robust, deployable anomaly detection service in Python. You will start with a simple anomaly detection service, which will expand over the course of the book to include a variety of valuable anomaly detection techniques, covering descriptive statistics, clustering, and time series scenarios. Finally, you will compare your anomaly detection service head-to-head with a publicly available cloud offering and see how they perform.The anomaly detection techniques and examples in this book combine psychology, statistics, mathematics, and Python programming in a way that is easily accessible to software developers. They give you an understanding of what anomalies are and why you are naturally a gifted anomaly detector. Then, they help you to translate your human techniques into algorithms that can be used to program computers to automate the process. You’ll develop your own anomaly detection service, extend it using a variety of techniques such as including clustering techniques for multivariate analysis and time series techniques for observing data over time, and compare your service head-on against a commercial service.WHAT YOU WILL LEARN* Understand the intuition behind anomalies* Convert your intuition into technical descriptions of anomalous data* Detect anomalies using statistical tools, such as distributions, variance and standard deviation, robust statistics, and interquartile range* Apply state-of-the-art anomaly detection techniques in the realms of clustering and time series analysis* Work with common Python packages for outlier detection and time series analysis, such as scikit-learn, PyOD, and tslearn* Develop a project from the ground up which finds anomalies in data, starting with simple arrays of numeric data and expanding to include multivariate inputs and even time series dataWHO THIS BOOK IS FORFor software developers with at least some familiarity with the Python programming language, and who would like to understand the science and some of the statistics behind anomaly detection techniques. Readers are not required to have any formal knowledge of statistics as the book introduces relevant concepts along the way.KEVIN FEASEL is a Microsoft Data Platform MVP and CTO at Faregame Inc, where he specializes in data analytics with T-SQL and R, forcing Spark clusters to do his bidding, fighting with Kafka, and pulling rabbits out of hats on demand. He is the lead contributor to Curated SQL, president of the Triangle Area SQL Server Users Group, and author of PolyBase Revealed. A resident of Durham, North Carolina, he can be found cycling the trails along the triangle whenever the weather is nice enough.PART I. WHAT IS AN ANOMALY?Chapter 1. The Importance of Anomalies and Anomaly DetectionChapter 2. Humans are Pattern MatchersChapter 3. Formalizing Anomaly DetectionPART II. BUILDING AN ANOMALY DETECTORChapter 4. Laying out the FrameworkChapter 5. Building a Test SuiteChapter 6. Implementing the First MethodsChapter 7. Extending the EnsembleChapter 8. Visualize the ResultsPART III. MULTIVARIATE ANOMALY DETECTIONChapter 9. Clustering and AnomaliesChapter 10. Connectivity-Based Outlier Factor (COF)Chapter 11. Local Correlation Integral (LOCI)Chapter 12. Copula-Based Outlier Detection (COPOD)PART IV. TIME SERIES ANOMALY DETECTIONChapter 13. Time and AnomaliesChapter 14. Change Point DetectionChapter 15. An Introduction to Multi-Series Anomaly DetectionChapter 16. Standard Deviation of Differences (DIFFSTD)Chapter 17. Symbolic Aggregate Approximation (SAX)PART V. STACKING UP TO THE COMPETITIONChapter 18. Configuring Azure Cognitive Services Anomaly DetectorChapter 19. Performing a Bake-OffAppendix: Bibliography
SQL Server 2022 Query Performance Tuning
Troubleshoot slow-performing queries and make them run faster. Database administrators and SQL developers are constantly under pressure to provide more speed. This new edition has been redesigned and rewritten from scratch based on the last 15 years of learning, knowledge, and experience accumulated by the author. The book Includes expanded information on using extended events, automatic execution plan correction, and other advanced features now available in SQL Server. These modern features are covered while still providing the necessary fundamentals to better understand how statistics and indexes affect query performance.The book gives you knowledge and tools to help you identify poorly performing queries and understand the possible causes of that poor performance. The book also provides mechanisms for resolving the issues identified, whether on-premises, in containers, or on cloud platform providers. You’ll learn about key fundamentals, such as statistics, data distribution, cardinality, and parameter sniffing. You’ll learn to analyze and design your indexes and your queries using best practices that ward off performance problems before they occur. You’ll also learn to use important modern features, such as Query Store to manage and control execution plans, the automated performance tuning feature set, and memory-optimized OLTP tables and procedures. You will be able to troubleshoot in a systematic way. Query tuning doesn’t have to be difficult. This book helps you to make it much easier.WHAT YOU WILL LEARN* Use Query Store to understand and easily change query performance* Recognize and eliminate bottlenecks leading to slow performance* Tune queries whether on-premises, in containers, or on cloud platform providers* Implement best practices in T-SQL to minimize performance risk* Design in the performance that you need through careful query and index design* Understand how built-in, automatic tuning can assist your performance enhancement efforts* Protect query performance during upgrades to the newer versions of SQL ServerWHO THIS BOOK IS FORDevelopers and database administrators with responsibility for query performance in SQL Server environments, and anyone responsible for writing or creating T-SQL queries and in need of insight into bottlenecks (including how to identify them, understand them, and eliminate them)GRANT FRITCHEY is a Microsoft Data Platform MVP and AWS Community Builder. He has more than 30 years of experience in IT technical support, development, and database administration. He currently works as Product Advocate at Red Gate Software. Grant writes articles for publication at SQL Server Central and Simple-Talk. He has published books, including SQL Server Execution Plans and SQL Server 2017 Query Performance Tuning (Apress). He has written chapters for Beginning SQL Server 2012 Administration (Apress), SQL Server Team-based Development, SQL Server MVP Deep Dives Volume 2, Pro SQL Server 2012 Practices (Apress), Expert Performance Indexing in SQL Server (Apress), and Query Store for SQL Server 2019 (Apress). Grant presents live sessions, virtual sessions, and recorded content online and in-person, all around the world.1. Query Performance Tuning2. Execution Plan Generation and the Query Optimizer3. Methods for Capturing Query Performance Metrics4. Analyzing Query Behavior Using Execution Plans5. Statistics, Data Distribution and Cardinality6. Using Query Store for Query Performance and Execution Plans7. Execution Plan Cache Behavior8. Query Recompilation9. Index Architecture10. Index Behaviors11. Key Lookups and Solutions12. Dealing with Index Fragmentation13. Parameter Sensitive Queries: Causes and Solutions14. Query Design Analysis15. Reduce Query Resource Use16. Blocking and Blocked Processes17. Causes and Solutions for Deadlocks18. Row-By-Row Processing from Cursors and Other Causes19. Memory-Optimized OLTP Tables and Procedures20. Graph Databases21. Intelligent Query Processing22. Automated Tuning in Azure and SQL Server23. A Query Tuning Methodology
Introducing RavenDB
Simplify your first steps with the RavenDB NoSQL Document Database. This book takes a task-oriented approach by showing common problems, potential solutions, brief explanations of how those solutions work, and the mechanisms used. Based on real-world examples, the recipes in this book will show you how to solve common problems with Raven Query Language and will highlight reasons why RavenDB is a great choice for fast prototyping solutions that can sustain increasing amounts of data as your application grows.Introducing RavenDB includes code and query examples that address real-life challenges you’ll encounter when using RavenDB, helping you learn the basics of the Raven Query Language more quickly and efficiently. In many cases, you’ll be able to copy and paste the examples into your own code, making only minor modifications to suit your application. RavenDB supports many advanced features, such full-text search, graph queries, and timeseries; recipes in the latter portion of the book will help you understand those advanced features and how they might be applied to your own code and applications.After reading this book, you will be able to employ RavenDB’s powerful features in your own projects.WHAT YOU WILL LEARN* Set up and start working with RavenDB* Model your objects for persistence in a NoSQL document database* Write basic and advanced queries in the Raven Query Language * Index your data using map/reduce techniques * Implement techniques leading to highly performant systems * Efficiently aggregate data and query on those aggregations WHO THIS BOOK IS FORDevelopers accustomed to relational databases who are about to enter a world of NoSQL databases. The book is also for experienced programmers who have used other non-relational databases and want to learn RavenDB. It will also prove useful for developers who want to move away from using Object-Relational Modeling frameworks and start working with a persistence solution that can store object graphs directly. DEJAN MILIČIĆ is a consultant with more than 20 years’ experience as a professional software developer. His experience includes designing, writing, and maintaining applications, focusing on software architecture and backend development. He advocates domain-driven Design, behavior-driven development, functional programming, and API-first development.Miličić’s passion for RavenDB goes back to 2015, when he started using this NoSQL database for small hobby projects and quickly realized it is applicable to a wide range of applications. He specializes in RavenDB because it is well suited for fast prototyping and development of everything from line-of-business applications to large enterprise distributed systems. 1. Getting Started with RavenDB2. Document Modeling3. Querying4. Indexes5. Map Indexes6. MapReduce Indexes7. Full-Text Search
Convergence of Deep Learning in Cyber-IoT Systems and Security
CONVERGENCE OF DEEP LEARNING IN CYBER-IOT SYSTEMS AND SECURITYIN-DEPTH ANALYSIS OF DEEP LEARNING-BASED CYBER-IOT SYSTEMS AND SECURITY WHICH WILL BE THE INDUSTRY LEADER FOR THE NEXT TEN YEARS. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through deep learning techniques and analytics with the study of all these systems. This book provides innovative solutions and implementation of deep learning-based models in cyber-IoT systems, as well as the exposed security issues in these systems. The 20 chapters are organized into four parts. Part I gives the various approaches that have evolved from machine learning to deep learning. Part II presents many innovative solutions, algorithms, models, and implementations based on deep learning. Part III covers security and safety aspects with deep learning. Part IV details cyber-physical systems as well as a discussion on the security and threats in cyber-physical systems with probable solutions. AUDIENCEResearchers and industry engineers in computer science, information technology, electronics and communication, cybersecurity and cryptography. RAJDEEP CHAKRABORTY, PHD, is an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. His fields of interest are mainly in cryptography and computer security. He was awarded the Adarsh Vidya Saraswati Rashtriya Puraskar, National Award of Excellence 2019 conferred by Glacier Journal Research Foundation, ANUPAM GHOSH, PHD, is a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. He has published more than 80 international papers in reputed international journals and conferences. His fields of interest are mainly in AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, and data mining. JYOTSNA KUMAR MANDAL, PHD, has more than 30 years of industry and academic experience. His fields of interest are coding theory, data and network security, remote sensing & GIS-based applications, data compression error corrections, information security, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing/security, unify computing, chaos theory, and applications. S. BALAMURUGAN, PHD, is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents. Preface xviiPART I: VARIOUS APPROACHES FROM MACHINE LEARNING TO DEEP LEARNING 11 WEB-ASSISTED NONINVASIVE DETECTION OF ORAL SUBMUCOUS FIBROSIS USING IOHT 3Animesh Upadhyaya, Vertika Rai, Debdutta Pal, Surajit Bose and Somnath Ghosh1.1 Introduction 31.2 Literature Survey 61.2.1 Oral Cancer 61.3 Primary Concepts 71.3.1 Transmission Efficiency 71.4 Propose Model 91.4.1 Platform Configuration 91.4.2 Harvard Architectural Microcontroller Base Wireless Communication Board 101.4.2.1 NodeMCU ESP8266 Microcontroller 101.4.2.2 Gas Sensor 121.4.3 Experimental Setup 131.4.4 Process to Connect to Sever and Analyzing Data on Cloud 141.5 Comparative Study 161.6 Conclusion 17References 172 PERFORMANCE EVALUATION OF MACHINE LEARNING AND DEEP LEARNING TECHNIQUES: A COMPARATIVE ANALYSIS FOR HOUSE PRICE PREDICTION 21Sajeev Ram Arumugam, Sheela Gowr, Abimala, Balakrishna and Oswalt Manoj2.1 Introduction 222.2 Related Research 232.2.1 Literature Review on Comparing the Performance of the ML/DL Algorithms 232.2.2 Literature Review on House Price Prediction 252.3 Research Methodology 262.3.1 Data Collection 272.3.2 Data Visualization 272.3.3 Data Preparation 282.3.4 Regression Models 292.3.4.1 Simple Linear Regression 292.3.4.2 Random Forest Regression 302.3.4.3 Ada Boosting Regression 312.3.4.4 Gradient Boosting Regression 322.3.4.5 Support Vector Regression 332.3.4.6 Artificial Neural Network 342.3.4.7 Multioutput Regression 362.3.4.8 Regression Using Tensorflow—Keras 372.3.5 Classification Models 392.3.5.1 Logistic Regression Classifier 392.3.5.2 Decision Tree Classifier 392.3.5.3 Random Forest Classifier 412.3.5.4 Naïve Bayes Classifier 412.3.5.5 K-Nearest Neighbors Classifier 422.3.5.6 Support Vector Machine Classifier (SVM) 432.3.5.7 Feed Forward Neural Network 432.3.5.8 Recurrent Neural Networks 442.3.5.9 LSTM Recurrent Neural Networks 442.3.6 Performance Metrics for Regression Models 452.3.7 Performance Metrics for Classification Models 462.4 Experimentation 472.5 Results and Discussion 482.6 Suggestions 602.7 Conclusion 60References 623 CYBER PHYSICAL SYSTEMS, MACHINE LEARNING & DEEP LEARNING— EMERGENCE AS AN ACADEMIC PROGRAM AND FIELD FOR DEVELOPING DIGITAL SOCIETY 67P. K. Paul3.1 Introduction 683.2 Objective of the Work 693.3 Methods 693.4 Cyber Physical Systems: Overview with Emerging Academic Potentiality 703.5 ml and dl Basics with Educational Potentialities 723.5.1 Machine Learning (ML) 723.5.2 Deep Learning 733.6 Manpower and Developing Scenario in Machine Learning and Deep Learning 743.7 dl & ml in Indian Context 793.8 Conclusion 81References 824 DETECTION OF FAKE NEWS AND RUMORS IN THE SOCIAL MEDIA USING MACHINE LEARNING TECHNIQUES WITH SEMANTIC ATTRIBUTES 85Diganta Saha, Arijit Das, Tanmay Chandra Nath, Soumyadip Saha and Ratul Das4.1 Introduction 864.2 Literature Survey 874.3 Proposed Work 884.3.1 Algorithm 894.3.2 Flowchart 904.3.3 Explanation of Approach 914.4 Results and Analysis 924.4.1 Datasets 924.4.2 Evaluation 934.4.2.1 Result of 1st Dataset 934.4.2.2 Result of 2nd Dataset 944.4.2.3 Result of 3rd Dataset 944.4.3 Relative Comparison of Performance 954.5 Conclusion 95References 96PART II: INNOVATIVE SOLUTIONS BASED ON DEEP LEARNING 995 ONLINE ASSESSMENT SYSTEM USING NATURAL LANGUAGE PROCESSING TECHNIQUES 101S. Suriya, K. Nagalakshmi and Nivetha S.5.1 Introduction 1025.2 Literature Survey 1035.3 Existing Algorithms 1085.4 Proposed System Design 1115.5 System Implementation 1155.6 Conclusion 120References 1216 ON A REFERENCE ARCHITECTURE TO BUILD DEEP-Q LEARNING-BASED INTELLIGENT IOT EDGE SOLUTIONS 123Amit Chakraborty, Ankit Kumar Shaw and Sucharita Samanta6.1 Introduction 1246.1.1 A Brief Primer on Machine Learning 1246.1.1.1 Types of Machine Learning 1246.2 Dynamic Programming 1286.3 Deep Q-Learning 1296.4 IoT 1306.4.1 Azure 1306.4.1.1 IoT on Azure 1306.5 Conclusion 1446.6 Future Work 144References 1457 FUZZY LOGIC-BASED AIR CONDITIONER SYSTEM 147Suparna Biswas, Sayan Roy Chaudhuri, Ayusha Biswas and Arpan Bhawal7.1 Introduction 1477.2 Fuzzy Logic-Based Control System 1497.3 Proposed System 1497.3.1 Fuzzy Variables 1497.3.2 Fuzzy Base Class 1547.3.3 Fuzzy Rule Base 1557.3.4 Fuzzy Rule Viewer 1567.4 Simulated Result 1577.5 Conclusion and Future Work 163References 1638 AN EFFICIENT MASKED-FACE RECOGNITION TECHNIQUE TO COMBAT WITH COVID- 19 165Suparna Biswas8.1 Introduction 1658.2 Related Works 1678.2.1 Review of Face Recognition for Unmasked Faces 1678.2.2 Review of Face Recognition for Masked Faces 1688.3 Mathematical Preliminaries 1698.3.1 Digital Curvelet Transform (DCT) 1698.3.2 Compressive Sensing–Based Classification 1708.4 Proposed Method 1718.5 Experimental Results 1738.5.1 Database 1738.5.2 Result 1758.6 Conclusion 179References 1799 DEEP LEARNING: AN APPROACH TO ENCOUNTER PANDEMIC EFFECT OF NOVEL CORONA VIRUS (COVID-19) 183Santanu Koley, Pinaki Pratim Acharjya, Rajesh Mukherjee, Soumitra Roy and Somdeep Das9.1 Introduction 1849.2 Interpretation With Medical Imaging 1859.3 Corona Virus Variants Tracing 1889.4 Spreading Capability and Destructiveness of Virus 1919.5 Deduction of Biological Protein Structure 1929.6 Pandemic Model Structuring and Recommended Drugs 1929.7 Selection of Medicine 1959.8 Result Analysis 1979.9 Conclusion 201References 20210 QUESTION ANSWERING SYSTEM USING DEEP LEARNING IN THE LOW RESOURCE LANGUAGE BENGALI 207Arijit Das and Diganta Saha10.1 Introduction 20810.2 Related Work 21010.3 Problem Statement 21510.4 Proposed Approach 21510.5 Algorithm 21610.6 Results and Discussion 21910.6.1 Result Summary for TDIL Dataset 21910.6.2 Result Summary for SQuAD Dataset 21910.6.3 Examples of Retrieved Answers 22010.6.4 Calculation of TP, TN, FP, FN, Accuracy, Precision, Recall, and F1 score 22110.6.5 Comparison of Result with other Methods and Dataset 22210.7 Analysis of Error 22310.8 Few Close Observations 22310.9 Applications 22410.10 Scope for Improvements 22410.11 Conclusions 224Acknowledgments 225References 225PART III: SECURITY AND SAFETY ASPECTS WITH DEEP LEARNING 23111 SECURE ACCESS TO SMART HOMES USING BIOMETRIC AUTHENTICATION WITH RFID READER FOR IOT SYSTEMS 233K.S. Niraja and Sabbineni Srinivasa Rao11.1 Introduction 23411.2 Related Work 23511.3 Framework for Smart Home Use Case With Biometric 23611.3.1 RFID-Based Authentication and Its Drawbacks 23611.4 Control Scheme for Secure Access (CSFSC) 23711.4.1 Problem Definition 23711.4.2 Biometric-Based RFID Reader Proposed Scheme 23811.4.3 Reader-Based Procedures 24011.4.4 Backend Server-Side Procedures 24011.4.5 Reader Side Final Compute and Check Operations 24011.5 Results Observed Based on Various Features With Proposed and Existing Methods 24211.6 Conclusions and Future Work 245References 24612 MQTT-BASED IMPLEMENTATION OF HOME AUTOMATION SYSTEM PROTOTYPE WITH INTEGRATED CYBER-IOT INFRASTRUCTURE AND DEEP LEARNING–BASED SECURITY ISSUES 249Arnab Chakraborty12.1 Introduction 25012.2 Architecture of Implemented Home Automation 25212.3 Challenges in Home Automation 25312.3.1 Distributed Denial of Service and Attack 25412.3.2 Deep Learning–Based Solution Aspects 25412.4 Implementation 25512.4.1 Relay 25612.4.2 DHT 11 25712.5 Results and Discussions 26212.6 Conclusion 265References 26613 MALWARE DETECTION IN DEEP LEARNING 269Sharmila Gaikwad and Jignesh Patil13.1 Introduction to Malware 27013.1.1 Computer Security 27013.1.2 What Is Malware? 27113.2 Machine Learning and Deep Learning for Malware Detection 27413.2.1 Introduction to Machine Learning 27413.2.2 Introduction to Deep Learning 27613.2.3 Detection Techniques Using Deep Learning 27913.3 Case Study on Malware Detection 28013.3.1 Impact of Malware on Systems 28013.3.2 Effect of Malware in a Pandemic Situation 28113.4 Conclusion 283References 28314 PATRON FOR WOMEN: AN APPLICATION FOR WOMENS SAFETY 285Riya Sil, Snatam Kamila, Ayan Mondal, Sufal Paul, Santanu Sinha and Bishes Saha14.1 Introduction 28614.2 Background Study 28614.3 Related Research 28714.3.1 A Mobile-Based Women Safety Application (I safe App) 28714.3.2 Lifecraft: An Android-Based Application System for Women Safety 28814.3.3 Abhaya: An Android App for the Safety of Women 28814.3.4 Sakhi—The Saviour: An Android Application to Help Women in Times of Social Insecurity 28914.4 Proposed Methodology 28914.4.1 Motivation and Objective 29014.4.2 Proposed System 29014.4.3 System Flowchart 29114.4.4 Use-Case Model 29114.4.5 Novelty of the Work 29414.4.6 Comparison with Existing System 29414.5 Results and Analysis 29414.6 Conclusion and Future Work 298References 29915 CONCEPTS AND TECHNIQUES IN DEEP LEARNING APPLICATIONS IN THE FIELD OF IOT SYSTEMS AND SECURITY 303Santanu Koley and Pinaki Pratim Acharjya15.1 Introduction 30415.2 Concepts of Deep Learning 30715.3 Techniques of Deep Learning 30815.3.1 Classic Neural Networks 30915.3.1.1 Linear Function 30915.3.1.2 Nonlinear Function 30915.3.1.3 Sigmoid Curve 31015.3.1.4 Rectified Linear Unit 31015.3.2 Convolution Neural Networks 31015.3.2.1 Convolution 31115.3.2.2 Max-Pooling 31115.3.2.3 Flattening 31115.3.2.4 Full Connection 31115.3.3 Recurrent Neural Networks 31215.3.3.1 LSTMs 31215.3.3.2 Gated RNNs 31215.3.4 Generative Adversarial Networks 31315.3.5 Self-Organizing Maps 31415.3.6 Boltzmann Machines 31515.3.7 Deep Reinforcement Learning 31515.3.8 Auto Encoders 31615.3.8.1 Sparse 31715.3.8.2 Denoising 31715.3.8.3 Contractive 31715.3.8.4 Stacked 31715.3.9 Back Propagation 31715.3.10 Gradient Descent 31815.4 Deep Learning Applications 31915.4.1 Automatic Speech Recognition (ASR) 31915.4.2 Image Recognition 32015.4.3 Natural Language Processing 32015.4.4 Drug Discovery and Toxicology 32115.4.5 Customer Relationship Management 32215.4.6 Recommendation Systems 32315.4.7 Bioinformatics 32415.5 Concepts of IoT Systems 32515.6 Techniques of IoT Systems 32615.6.1 Architecture 32615.6.2 Programming Model 32715.6.3 Scheduling Policy 32915.6.4 Memory Footprint 32915.6.5 Networking 33215.6.6 Portability 33215.6.7 Energy Efficiency 33315.7 IoT Systems Applications 33315.7.1 Smart Home 33415.7.2 Wearables 33515.7.3 Connected Cars 33515.7.4 Industrial Internet 33615.7.5 Smart Cities 33715.7.6 IoT in Agriculture 33715.7.7 Smart Retail 33815.7.8 Energy Engagement 33915.7.9 IoT in Healthcare 34015.7.10 IoT in Poultry and Farming 34015.8 Deep Learning Applications in the Field of IoT Systems 34115.8.1 Organization of DL Applications for IoT in Healthcare 34215.8.2 DeepSense as a Solution for Diverse IoT Applications 34315.8.3 Deep IoT as a Solution for Energy Efficiency 34615.9 Conclusion 346References 34716 EFFICIENT DETECTION OF BIOWEAPONS FOR AGRICULTURAL SECTOR USING NARROWBAND TRANSMITTER AND COMPOSITE SENSING ARCHITECTURE 349Arghyadeep Nag, Labani Roy, Shruti, Soumen Santra and Arpan Deyasi16.1 Introduction 35016.2 Literature Review 35316.3 Properties of Insects 35516.4 Working Methodology 35716.4.1 Sensing 35716.4.1.1 Specific Characterization of a Particular Species 35716.4.2 Alternative Way to Find Those Previously Sensing Parameters 35716.4.3 Remedy to Overcome These Difficulties 35816.4.4 Take Necessary Preventive Actions 35816.5 Proposed Algorithm 35916.6 Block Diagram and Used Sensors 36016.6.1 Arduino Uno 36116.6.2 Infrared Motion Sensor 36216.6.3 Thermographic Camera 36216.6.4 Relay Module 36216.7 Result Analysis 36216.8 Conclusion 363References 36317 A DEEP LEARNING–BASED MALWARE AND INTRUSION DETECTION FRAMEWORK 367Pavitra Kadiyala and Kakelli Anil Kumar17.1 Introduction 36717.2 Literature Survey 36817.3 Overview of the Proposed Work 37117.3.1 Problem Description 37117.3.2 The Working Models 37117.3.3 About the Dataset 37117.3.4 About the Algorithms 37317.4 Implementation 37417.4.1 Libraries 37417.4.2 Algorithm 37617.5 Results 37617.5.1 Neural Network Models 37717.5.2 Accuracy 37717.5.3 Web Frameworks 37717.6 Conclusion and Future Work 379References 38018 PHISHING URL DETECTION BASED ON DEEP LEARNING TECHNIQUES 381S. Carolin Jeeva and W. Regis Anne18.1 Introduction 38218.1.1 Phishing Life Cycle 38218.1.1.1 Planning 38318.1.1.2 Collection 38418.1.1.3 Fraud 38418.2 Literature Survey 38518.3 Feature Generation 38818.4 Convolutional Neural Network for Classification of Phishing vs Legitimate URLs 38818.5 Results and Discussion 39118.6 Conclusion 394References 394Web Citation 396PART IV: CYBER PHYSICAL SYSTEMS 39719 CYBER PHYSICAL SYSTEM—THE GEN Z 399Jayanta Aich and Mst Rumana Sultana19.1 Introduction 39919.2 Architecture and Design 40019.2.1 Cyber Family 40119.2.2 Physical Family 40119.2.3 Cyber-Physical Interface Family 40219.3 Distribution and Reliability Management in CPS 40319.3.1 CPS Components 40319.3.2 CPS Models 40419.4 Security Issues in CPS 40519.4.1 Cyber Threats 40519.4.2 Physical Threats 40719.5 Role of Machine Learning in the Field of CPS 40819.6 Application 41119.7 Conclusion 411References 41120 AN OVERVIEW OF CYBER PHYSICAL SYSTEM (CPS) SECURITY, THREATS, AND SOLUTIONS 415Krishna Keerthi Chennam, Fahmina Taranum and Maniza Hijab20.1 Introduction 41620.1.1 Motivation of Work 41720.1.2 Organization of Sections 41720.2 Characteristics of CPS 41820.3 Types of CPS Security 41920.4 Cyber Physical System Security Mechanism—Main Aspects 42120.4.1 CPS Security Threats 42320.4.2 Information Layer 42320.4.3 Perceptual Layer 42420.4.4 Application Threats 42420.4.5 Infrastructure 42520.5 Issues and How to Overcome Them 42620.6 Discussion and Solutions 42720.7 Conclusion 431References 431Index 435
Netzbasierte Ansätze zur natürlichsprachlichen Informationsverarbeitung
Für Leser, die bereits die Grundlagen der Wissensverarbeitung und Computernetzwerke beherrschen, gibt das Buch einen Überblick über innovative Verfahren, die die automatisierte Suche, Recherche, Klassifikation und Verwaltung von Texten im Kontext dezentraler Systeme und vor allem im WWW erlauben.Besondere Aufmerksamkeit wird dabei auf eine personalisierte Verarbeitung gerichtet, die auch zeitliche Aspekte, wie z. B. das digitale Vergessen, einbeziehen.An vielen Stellen werden auf interessante und neuartige Art und Weise Analogien aus anderen Wissensgebieten, so z. B. zur Verarbeitung von Informationen und zum Lernen im menschlichen Gehirn sowie der Natur schlechthin genutzt.PROF. DR. HERWIG UNGER, DR. MARIO KUBEK UND DR. PANCHALEE SUKJIT kommen aus unterschiedlichen Wissensgebieten der Informatik, die seit 2008 die gemeinsame Vision vereint, die meist textbasierten Ressourcen des WWW besser nutzbar zu machen. Von ihnen sind eine Vielzahl von Fachbeiträgen zum Thema auf wissenschaftlichen Tagungen, in Journalen bzw. Fachbüchern erschienen. Wissensverarbeitung im menschlichen Gehirn - Lernen - Netzwerke für die Textanalyse - Digitale Updates und digitales Vergessen - Exploration von Netzwerkstrukturen - Konzepte des Text Minings in dezentralen Systemen - Informationsmanagement im Web
Beginning MATLAB and Simulink
Employ essential tools and functions of the MATLAB and Simulink packages, which are explained and demonstrated via interactive examples and case studies. This revised edition covers features from the latest MATLAB 2022b release, as well as other features that have been released since the first edition published.This book contains dozens of simulation models and solved problems via m-files/scripts and Simulink models which will help you to learn programming and modelling essentials. You’ll become efficient with many of the built-in tools and functions of MATLAB/Simulink while solving engineering and scientific computing problems.Beginning MATLAB and Simulink, Second Edition explains various practical issues of programming and modelling in parallel by comparing MATLAB and Simulink. After studying and using this book, you'll be proficient at using MATLAB and Simulink and applying the source code and models from the book's examples as templates for your own projects in data science or engineering.WHAT YOU WILL LEARN* Master the programming and modelling essentials of MATLAB and Simulink* Carry out data visualization with MATLAB* Build a GUI and develop App with MATLAB* Work with integration and numerical root finding methods* Apply MATLAB to differential equations-based models and simulations* Use MATLAB and Simulink for data science projectsWHO THIS BOOK IS FOREngineers, programmers, data scientists, and students majoring in engineering and scientific computing who are new to MATLAB and Simulink.SULAYMON L. ESHKABILOV, PhD is an assistant professor in the Department of Agricultural and Biosystems Engineering at North Dakota State University. He obtained a Master of Engineering degree from Tashkent Automobile Road Institute, a Master of Sciences from Rochester Institute of Technology, NY, and a PhD from the Cybernetics Institute of Academy Sciences of Uzbekistan in 1994, 2001 and 2005, respectively. He was an associate professor at Tashkent Automobile Road Institute from December 2006 through January 2017. He held visiting professor and researcher positions at Ohio and North Dakota State Universities, for 2010/2011 and Johannes Kepler University, from January through September 2017. He teaches a number of courses, including “Instrumentation and Measurement,” “System Modelling with MATLAB,” “Machine Design Analysis,” “Agricultural Power,” and “Advanced MATLAB/Simulink Modelling” for undergraduate and graduate students.His research interests are image processing, machine learning applications, mechanical vibrations, micro-electro-mechanical systems, mechatronic system design, and simulation of system dynamics. He has developed simulation and data analysis models for various image data, additive manufacturing process optimization, vibrating systems, autonomous vechicle control, and studies of mechanical properties of bones. He is an author of four books devoted to MATLAB/Simulink applications for Mechanical Engineering students and Numerical Analysis. He has worked as an external academic expert for the European Commission to assess academic projects from 2009 through 2022.1. Introduction to MATLAB.-2. Programming Essentials.-3. Graphical User Interface Model Development.-4. MEX files, C/C++ and Standalone Applications.-5. Simulink Modeling Essentials.-6. Plots.-7. Matrix Algebra.-8. Ordinary Differential Equations.
Convergence: Artificial Intelligence and Quantum Computing
PREPARE FOR THE COMING CONVERGENCE OF AI AND QUANTUM COMPUTINGA collection of essays from 20 renowned, international authors working in industry, academia, and government, Convergence: Artificial Intelligence and Quantum Computing explains the impending convergence of artificial intelligence and quantum computing. A diversity of viewpoints is presented, each offering their view of this coming watershed event. In the book, you’ll discover that we’re on the cusp of seeing the stuff of science fiction become reality, with huge implications for ripping up the existing social fabric, global economy, and current geopolitical order. Along with an incisive foreword by Hugo- and Nebula-award winning author David Brin, you’ll also find:* Explorations of the increasing pace of technological development* Explanations of why seemingly unusual and surprising breakthroughs might be just around the corner* Maps to navigate the potential minefields that await us as AI and quantum computing come togetherA fascinating and thought-provoking compilation of insights from some of the leading technological voices in the world, Convergence convincingly argues that we should prepare for a world in which very little will remain the same and shows us how to get ready. GREG VIGGIANO, PHD, is an Adjunct Professor in the Department of Physics at George Mason University. His research interests include new technology applications and their macro social effects. He earned his doctorate in Mass Communication from Florida State University and is also the pro bono Executive Director for the Museum of Science Fiction in Washington, D.C. Preface xiForeword xixPART I POLICY AND REGULATORY IMPACTS 1Chapter 1 Quantum Inflection Points 3Jim GableChapter 2 Quantum Delegation 11Mandy Sweeney and Chris GauthierChapter 3 The Problem of Machine Actorhood 23Patrick Thaddeus JacksonChapter 4 Data Privacy, Security, and Ethical Governance Under Quantum AI 37Sarah PearceChapter 5 The Challenge of Quantum Noise 45Philip JohnsonChapter 6 A New Kind of Knowledge Discovery 53Ramin Ayanzadeh and Milton HalemPART II ECONOMIC IMPACTS 61Chapter 7 Quantum Tuesday: How the U.S. Economy Will Fall, and How to Stop It 63Alexander W. ButlerChapter 8 Quantum-AI Space Communications 83Mason PeckChapter 9 Quantum Planet Hacking 93Philip L. FranaChapter 10 Ethics and Quantum AI for Future Public Transit Systems 111Benjamin CrawfordChapter 11 The Road to a Better Future 119Denise Ruffner and André M. KönigPART III SOCIAL IMPACTS 127Chapter 12 The Best Numbers Are in Sight. But Understanding? 129Roald Hoffmann and Jean-Paul MalrieuChapter 13 The Advancement of Intelligence or the End of It? 143Kate JefferyChapter 14 Quantum of Wisdom 157Colin Allen and Brett KarlanChapter 15 Human Imagination and HAL 167Erik ViirreChapter 16 A Critical Crossroad 175Joseph N. PeltonChapter 17 Empathetic AI and Personalization Algorithms 183Philippe Beaudoin and Alexander W. ButlerChapter 18 Should We Let the Machine Decide What Is Meaningful? 193J. M. TaylorChapter 19 The Ascent of Quantum Intelligence in Steiner’s Age of the Consciousness Soul 205Stephen R. WaiteChapter 20 Quantum Computing’s Beautiful Accidents 213Christopher SavoieAppendix A What Is Quantum Computing? 221Philip L. FranaAppendix B What Is Artificial Intelligence? 239Philip L. FranaGlossary 247References 251Index 259About the Editor 271