Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Salt Open

Salt Open

There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions.You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons.By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic.WHAT YOU'LL LEARN* Install Salt Services on Ubuntu and CentOS based systems* Work with remote execution modules* Format YAML files correctly* Provide defined configuration using state files* Use Salt-Proxy to configure network devices* Automate the configuration of Linux servers and networking devices* Add value for both the server and network automation teamWHO THIS BOOK IS FORSystem administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.Andrew is a well known Linux consultant and trainer, his YouTube Channel has over 65K subscribers and more than 1000 videos. Working mainly online now Andrew has authored courses on both Pluralsight and Udemy and regularly teaches classes online to a worldwide audience. Andrew is familiar with Linux and UNIX and has worked with them for over 20 years. Scripting and automation is one of his passions as he is inherently lazy and will always seek the most effective way of getting the job done. The Urban Penguin, his alter-ego, is a UK based company where his work is created from and currently employs 5 people.Chapter 1: Understanding Salt and Configuration AutomationCHAPTER GOAL: LEARN ABOUT SALT OPEN AND ITS' COMMERCIAL SIBLING, SALTCONFIG, FROM VMWARENO OF PAGES 8SUB - TOPICS-Salt Open and the SaltProjectSaltConfig and VMwareSpeed, the Salt advantageSpeed, the Salt advantageChapter 2: Installing SaltCHAPTER GOAL: IN THIS CHAPTER WE WILL OUTLINE THE LABS SYSTEMS USED THROUGHOUT THE BOOK AND OPTIONAL NETWORKING EQUIPMENT BEFORE MOVING ONTO INSTALLING THE SALT-MASTER SALT-MINIONS AND PROVIDING BASIC TESTSNO OF PAGES: 12SUB - TOPICS1. Identity Lab setup2. Install latest version of Salt Master and Minions3. Configuring Master and Minions4. Configuring Times Services5. Signing Keys6. Implementing basic tests7. Implement firewalling on the Salt MasterChapter 3: Installing Additional MinionsCHAPTER GOAL: WE HAVE JUST ONE SERVER AND A MINION ON THE SAME SERVER. WE WILL NOW EXPAND THIS TO INCLUDE ADDITIONAL LINUX DISTRIBUTION AND LEARN MORE ABOUT SALT AUTHENTICATIONNO OF PAGES : 8SUB - TOPICS:1. Authenticating with Minion public keys and key management2. Automating key signing3. Locating the Salt Master4. Automating the Minion IDChapter 4: Targeting MinionsCHAPTER GOAL: LEARN HOW WE CAN TARGET TASKS TO THE REQUIRED MINIONS IN SALT OPENNO OF PAGES: 12SUB - TOPICS:1. Salt Targeting2. Understanding grains and using them as targets3. Targeting using regular expressions and IP notation4. Creating Node groups and using them as targetsChapter 5: Working with Remote Execution Modules in Salt OpenCHAPTER GOAL: AT THE HEART OF SALT WE HAVE REMOTE EXECUTION MODULES AND WE STALE A LOOK AT THE CONSTRUCTION IN PYTHON AND HOW WE USE THEM AND FIND THEIR DOCUMENTATIONNO OF PAGES: 15Sub topics1. Using Modules and Functions2. Listing the salt module indices3. Using salt and salt-call to execute modules4. Locate command line help5. The big three: packages, services, and filesChapter 6: Writing YAMLCHAPTER GOAL: LEARN TO WRITE AND UNDERSTAND YAML FILES. CONFIGURE YOUR COMMAND LINE EDITOR FOR YAMLNO OF PAGES: 8SUB - TOPICS:1. YAML Ain't Markup Language2. Using Online Parser to process YAML3. Configuring the nano editor4. Configuring the vim editor for YAML and SLS filesChapter 7: Writing Salt State FilesChapter Goal: Create repeatable configurations using SLS filesNO OF PAGES: 15SUB - TOPICS:1. State vs Flow2. Jinja and YAML Parsing3. Creating Jinja2 templates4. Installing packages with Salt states5. Managing services with state files6. Delivering files with salt states7. Syntax checking state filesChapter 8: Building an effective state treeCHAPTER GOAL: THE TOP.SLS FILE CAN BE REFERENCED AS THE INVERTED ROOT OF THE STATE TREE TO INCLUDE THE REQUIRED STATES FOR DIFFERENT SYSTEMSNO OF PAGES: 8SUB - TOPICS:1. Creating the top file2. Understanding state.sl, state.apply and state.highstate3. Targeting in the top fileChapter 9: Creating Reusable State FilesCHAPTER GOAL: LEARN TO IMPLEMENT STATES THAT FIT A VARIETY OF SYSTEMSNO OF PAGES: 15SUB - TOPICS:1. Using variables and Jinja2. Using grains3. Configuring Salt Pillar4. Using logic to remove reliance on external data5. Speeding the process with map files6. Accessing templated dataChapter 10: Implementing Reactors and BeaconsCHAPTER GOAL: THE SALT MASTER MAINTAIN THE HIGH-SPEED MESSAGE BUS. EVENTS ARE WRITTEN TO THIS BUST AND WE CAN VIEW THE EVENTS TO HELP UNDERSTAND AND DEBUG THE SALT SYSTEM. WORKING WITH EVENTS WE CAN CONFIGURE THE MASTER TO REACT TO EVENTS USING REACTORS. THIS CAN MOVE CONFIGURATION MANAGEMENT INTO THE REALMS OF ORCHESTRATION. TAKING THIS FURTHER WE CAN CONFIGURE BEACONS ON MINIONS TO SEND EVENTS TO THE BUS WHEN TRIGGERED BY THRESHOLDS ON THE MANAGED DEVICENO OF PAGES: 18SUB - TOPICS:1. Reading and Identify events on the event bus2. Configuring reactors on the Salt Master3. Configuring Beacons on MinionsChapter 11: Using Salt-SSHCHAPTER GOAL: WHERE A LONG RUNNING MINION SERVICE IS NOT DESIRABLE WE CAN USE SALT-SSH TO DEPLOY CONFIGURATIONNO OF PAGES: 8SUB - TOPICS:1. Salt-SSH2. Deploy key based ssh authentication3. Using Salt-SSHChapter 12: Deploy Virtual Machines Using Salt-CloudChapter Goal: Using salt-cloud the single utility can be used to manage your virtual machine deployment irrespective of the cloud system usedNO OF PAGES: 10SUB - TOPICS:1. Managing VMs with salt-cloud2. Using salt-cloud with AWS3. Configuring providers and profiles4. Using map files5. Managing systemsChapter 13: Scaling Configuration Management Using Salt-SyndicCHAPTER GOAL: IMPLEMENTING SALT-SYNDIC YOU ADD ADDITIONAL MASTERS TO THE SYSTEM THAT REPORT BACK TO THE MASTER OR MASTERS. THIS CAN LOAD BALANCE YOUR MINIONS OR ACT TO TRAVERSE A NETWORK LINKNO OF PAGES: 6SUB - TOPICS:1. Installing Salt Syndic2. Configuring Syndic on minion3. Configuring Minions to use SyndicChapter 14: Automating Network Infrastructure with Salt ProxyChapter Goal: Salt Proxy is used to connect to devices that don’t maintain a long running Minion such as network devicesNO OF PAGES: 15SUB - TOPICS:1. Configuring Pillar Data for Proxy2. Installing NAPALM modules3. Configuring Proxy Systems4. Enabling SSH on Cisco IOS5. Configuring NTP services on Cisco Devices6. Backing up Configuration on Cisco and Aruba systems7. Restoring configurations8. Using salt-sproxy as a Proxy Minion alternative

Regulärer Preis: 56,99 €
Produktbild für Data Science

Data Science

Die Methoden der Datenanalyse gewinnen mit der exponentiell wachsenden Rechnerleistung und dem Aufschwung des Machine Learnings bzw. der Künstlichen Intelligenz immer mehr an Bedeutung. Das vorliegende Lehrbuch bietet einen anwendungsorientierten Einstieg in die für die modernen Verfahren der Datenanalyse („Data Science“) notwendigen Grundlagen.Das Buch behandelt im ersten Teil die deskriptive Statistik, mit der die Datenanalyse beginnen sollte. Im zweiten Teil wird die Wahrscheinlichkeitsrechnung behandelt, die als Grundlage für die weiteren Kapitel benötigt wird. Teil drei behandelt die klassischen Themen der induktiven Statistik. Danach werden im vierten Teil verschiedene weiterführende Methoden der Datenanalyse behandelt. Neben klassischen Methoden wie Faktoren- oder Clusteranalyse werden hier beispielsweise auch die Einsatzmöglichkeiten von Neuronalen Netzen gezeigt.Das Buch setzt keine besonderen mathematischen Kenntnisse voraus. Die Methoden sind in klarer, verständlicher Sprache beschrieben und durch zahlreiche praxisrelevante Beispiele illustriert. Praxisnahe Übungsaufgaben vertiefen das Verständnis. Herleitungen werden nur insoweit ausgeführt, wie sie zum Verständnis beitragen. Ziel des Buches ist es, eine verständliche, anschauliche Einführung in die oft als schwierig empfundene Statistik zu geben, ohne auf eine exakte Darstellung zu verzichten. Dr. Sandro Scheid und Prof. Dr. Stefanie Vogl sind beide an der Hochschule für angewandte Wissenschaften München an der Fakultät für Betriebswirtschaft tätig.

Regulärer Preis: 29,99 €
Produktbild für Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories

Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories

In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories. A new concept for elliptic curve cryptography is presented, which uses an arithmetic over Gaussian integers. Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. Ordinary modular arithmetic over Gaussian integers is computational expensive. To reduce the complexity, a new arithmetic based on the Montgomery reduction is presented. For the elliptic curve point multiplication, this arithmetic over Gaussian integers improves the computational efficiency, the resistance against side channel attacks, and reduces the memory requirements. Furthermore, an efficient variant of the Lempel-Ziv-Welch (LZW) algorithm for universal lossless data compression is investigated. Instead of one LZW dictionary, this algorithm applies several dictionaries to speed up the encoding process. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.MALEK SAFIEH is a research scientist in the field of cryptography and data compression.1 Introduction.- 2 Elliptic curve cryptography.- 3 Elliptic curve cryptography over Gaussian integers.- 4 Montgomery arithmetic over Gaussian integers.- 5 Architecture of the ECC coprocessor for Gaussian integers.- 6 Compact architecture of the ECC coprocessor for binary extension fields.- 7 The parallel dictionary LZW algorithm for flash memory controllers.- 8 Conclusion.

Regulärer Preis: 53,49 €
Produktbild für 1x1 des Lizenzmanagements

1x1 des Lizenzmanagements

- Das Standardwerk von einem erfahrenen Insider zum Thema IT- und Software Asset Management- Relevante und aktuelle Aspekte des heutigen Verwaltens von Softwarelizenzbedarfen in On-Premises und Cloud-Umgebungen- Erfahren Sie, warum SAM in der Enterprise-Architektur eine wichtige Funktion erfüllt und welche neuen Aufgaben der operative SAM-Betrieb hat.- Neu in der 4. Auflage: Transformation des Lizenzmanagements in der IT, Guideline zur Erfassung von Lizenznachweisen und Softwareverträgen, Monitoring und Management der Cyberrisiken von Software Assets, Umsetzung und Einhaltung der DSGVO im Umgang mit personenbezogenen Daten- Auf der Autorenwebsite apogiz.com: weitere Informationen zu SAM-Wissen und -Technologien, weiterführenden Seminaren und Workshops.- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesUnter dem Leitsatz »Lizenzmanagement im Wandel der Technologietransformation« wurde die 4. Auflage ausführlich überarbeitet und aktualisiert. Die Transparenz der IT-Assets, ist ein wesentlicher Bestandteil für die Sicherstellung eines wirtschaftlichen und risikoarmen IT-Betriebs in Hybrid-Umgebungen. Die verstärkte Migration der lokalen IT in die Cloud erhöht die Komplexität im Verwalten von Softwarelizenzbedarfen.Zudem sind Cyberrisiken der Software Assets sowie DSGVO-Schwachstellen im IT-Betrieb risikoarm zu managen. Dadurch unterliegt das heutige SAM enormen Veränderungen. Der neue Fokus auf einen lizenzkonformen und wirtschaftlich optimierten SAM-Betrieb bewegt sich weg vom »Zählen, Messen, Wiegen« hin zu Abonnement und Verbrauchsabrechnungsmodellen. Die neuen Herausforderungen, lokale IT-Assets mit Cloud-Services im Hybrid-Modus zu verwalten und zu steuern, bedingen verstärkt ein Nutzungsmanagement statt eines Lizenzmanagements.Althergebrachte Lizenzmodelle werden immer mehr durch Sourcing- und Servicemodelle ersetzt, die eine Berücksichtigung vielfältiger Parameter im SAM-Betrieb erfordern.AUS DEM INHALT //Grundlagen des Lizenzmanagements/Der SAM-Lifecycle-Prozess als Steuerungsinstrument/Die technische und kaufmännische Bestandsaufnahme durchführen/Die Lizenznachweise erfassen: Best-Practice-Vorgehensweise/Das SAM-Projekt planen und umsetzen/Ein SAM-Tool evaluieren, implementieren, betreiben/Die SAM-Daten: Berichte erstellen und monitoren/ Die SAM-Daten: Cyberrisiken monitoren sowie DSGVO und PII-Daten managen/Die SAM-Transformationen in Server- und Cloud-Umgebungen/Der operative SAM-Betrieb: die wichtigsten Aspekte/Das Software-Audit: mögliche Risiken erkennen und managen Der SAM-Experte Torsten Groll hat über 35 Jahre Erfahrung in der IT mit Schwerpunkten im Lizenz- sowie IT- und Software Asset Management, dem Erstellen und Umsetzen von SAM-Strategien und -Prozessen und deren Verzahnung im Business Process Management von Unternehmen.Seine umfangreichen Erfahrungen gibt er auf Veranstaltungen, Kongressen, in Seminaren, Webinarenund in zahlreichen Fachartikeln weiter.

Regulärer Preis: 79,99 €
Produktbild für Mein SMART Board

Mein SMART Board

Sie suchen nach Ideen, Tipps & Tricks und Notebook-Software für das Arbeiten mit SMART Board? Dann lesen Sie sich schlau mit Mein SMART Board. Das Buch begleitet Sie in den folgenden Unterrichtsphasen:Vorbereiten und Material erstellenAktivieren und motivierenInformationen sammeln und Strukturen erarbeitenKompetenzen üben und anwendenIdeen entwickeln und gestaltenFeedback geben und Ergebnisse sichernDas Buch enthält über 40 Unterrichtsmethoden mit Erläuterungen zur didaktischen Zielsetzung und möglichen Stolpersteinen sowie über 200 Unterrichtsideen zur erfolgreichen Einbindung des SMART Boards in den Unterricht. In einem gesonderten Kapitel geht es um das Thema Distanz-Lernen und die Produktion von Online-Videos am SMART Board.Aus dem Inhalt:SchnelleinstiegSMART Notebook zum NachschlagenKreativität und gestalterisches ArbeitenVorbereiten und Material erstellenAktivieren und MotivierenInformationen sammeln und Strukturen erarbeitenÜben und AnwendenIdeen entwickeln und gestalten/Online-Videos zum Vor- und NachbereitenLeseprobe (PDF-Link)

Regulärer Preis: 29,99 €
Produktbild für The Definitive Guide to Azure Data Engineering

The Definitive Guide to Azure Data Engineering

Build efficient and scalable batch and real-time data ingestion pipelines, DevOps continuous integration and deployment pipelines, and advanced analytics solutions on the Azure Data Platform. This book teaches you to design and implement robust data engineering solutions using Data Factory, Databricks, Synapse Analytics, Snowflake, Azure SQL database, Stream Analytics, Cosmos database, and Data Lake Storage Gen2. You will learn how to engineer your use of these Azure Data Platform components for optimal performance and scalability. You will also learn to design self-service capabilities to maintain and drive the pipelines and your workloads.The approach in this book is to guide you through a hands-on, scenario-based learning process that will empower you to promote digital innovation best practices while you work through your organization’s projects, challenges, and needs. The clear examples enable you to use this book as a reference and guide for building data engineering solutions in Azure. After reading this book, you will have a far stronger skill set and confidence level in getting hands on with the Azure Data Platform.WHAT YOU WILL LEARN* Build dynamic, parameterized ELT data ingestion orchestration pipelines in Azure Data Factory* Create data ingestion pipelines that integrate control tables for self-service ELT* Implement a reusable logging framework that can be applied to multiple pipelines* Integrate Azure Data Factory pipelines with a variety of Azure data sources and tools* Transform data with Mapping Data Flows in Azure Data Factory* Apply Azure DevOps continuous integration and deployment practices to your Azure Data Factory pipelines and development SQL databases* Design and implement real-time streaming and advanced analytics solutions using Databricks, Stream Analytics, and Synapse Analytics* Get started with a variety of Azure data services through hands-on examplesWHO THIS BOOK IS FORData engineers and data architects who are interested in learning architectural and engineering best practices around ELT and ETL on the Azure Data Platform, those who are creating complex Azure data engineering projects and are searching for patterns of success, and aspiring cloud and data professionals involved in data engineering, data governance, continuous integration and deployment of DevOps practices, and advanced analytics who want a full understanding of the many different tools and technologies that Azure Data Platform providesRON L’ESTEVE is a professional author residing in Chicago, IL, USA. His passion for Azure Data Engineering stems from his deep experience with implementing, leading, and delivering Azure Data projects for numerous clients. He is a trusted architectural leader and digital innovation strategist, responsible for scaling key data architectures, defining the road map and strategy for the future of data and business intelligence (BI) needs, and challenging customers to grow by thoroughly understanding the fluid business opportunities and enabling change by translating them into high quality and sustainable technical solutions that solve the most complex business challenges and promote digital innovation and transformation. Ron has been an advocate for data excellence across industries and consulting practices, while empowering self-service data, BI, and AI through his contributions to the Microsoft technical community. IntroductionPART I. GETTING STARTED1. The Tools and Pre-Requisites2. Data Factory vs SSIS vs Databricks3. Design a Data Lake Storage Gen2 AccountPART II. AZURE DATA FACTORY FOR ELT4. Dynamically Load SQL Database to Data Lake Storage Gen 25. Use COPY INTO to Load Synapse Analytics Dedicated SQL Pool6. Load Data Lake Storage Gen2 Files into Synapse Analytics Dedicated SQL Pool7. Create and Load Synapse Analytics Dedicated SQL Pool Tables Dynamically8. Build Custom Logs in SQL Database for Pipeline Activity Metrics9. Capture Pipeline Error Logs in SQL Database10. Dynamically Load Snowflake Data Warehouse11. Mapping Data Flows for Data Warehouse ETL12. Aggregate and Transform Big Data Using Mapping Data Flows13. Incrementally Upsert Data14. Loading Excel Sheets into Azure SQL Database Tables15. Delta LakePART III. REAL-TIME ANALYTICS IN AZURE16. Stream Analytics Anomaly Detection17. Real-time IoT Analytics Using Apache Spark18. Azure Synapse Link for Cosmos DBPART IV. DEVOPS FOR CONTINUOUS INTEGRATION AND DEPLOYMENT19. Deploy Data Factory Changes20. Deploy SQL DatabasePART V. ADVANCED ANALYTICS21. Graph Analytics Using Apache Spark’s GraphFrame API22. Synapse Analytics Workspaces23. Machine Learning in DatabricksPART VI. DATA GOVERNANCE24. Purview for Data Governance

Regulärer Preis: 62,99 €
Produktbild für Biomedical Data Mining for Information Retrieval

Biomedical Data Mining for Information Retrieval

BIOMEDICAL DATA MINING FOR INFORMATION RETRIEVALTHIS BOOK NOT ONLY EMPHASIZES TRADITIONAL COMPUTATIONAL TECHNIQUES, BUT DISCUSSES DATA MINING, BIOMEDICAL IMAGE PROCESSING, INFORMATION RETRIEVAL WITH BROAD COVERAGE OF BASIC SCIENTIFIC APPLICATIONS.Biomedical Data Mining for Information Retrieval comprehensively covers the topic of mining biomedical text, images and visual features towards information retrieval. Biomedical and health informatics is an emerging field of research at the intersection of information science, computer science, and healthcare and brings tremendous opportunities and challenges due to easily available and abundant biomedical data for further analysis. The aim of healthcare informatics is to ensure the high-quality, efficient healthcare, better treatment and quality of life by analyzing biomedical and healthcare data including patient’s data, electronic health records (EHRs) and lifestyle. Previously, it was a common requirement to have a domain expert to develop a model for biomedical or healthcare; however, recent advancements in representation learning algorithms allows us to automatically to develop the model. Biomedical image mining, a novel research area, due to the vast amount of available biomedical images, increasingly generates and stores digitally. These images are mainly in the form of computed tomography (CT), X-ray, nuclear medicine imaging (PET, SPECT), magnetic resonance imaging (MRI) and ultrasound. Patients’ biomedical images can be digitized using data mining techniques and may help in answering several important and critical questions relating to healthcare. Image mining in medicine can help to uncover new relationships between data and reveal new useful information that can be helpful for doctors in treating their patients. AUDIENCEResearchers in various fields including computer science, medical informatics, healthcare IOT, artificial intelligence, machine learning, image processing, clinical big data analytics. SUJATA DASH received her PhD in Computational Modeling from Berhampur University, Orissa, India in 1995. She is an associate professor in P.G. Department of Computer Science & Application, North Orissa University, at Baripada, India. She has published more than 80 technical papers in international journals, conferences, book chapters and has authored 5 books. SUBHENDU KUMAR Pani received his PhD from Utkal University Odisha, India in 2013. He is working as Professor in the Krupajal Computer Academy, BPUT, Odisha, India. S. BALAMURUGAN is the Director-Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. His PhD is in Infomation Technology and he has published 45 books, 200+ international journals/conferences and 35 patents. AJITH ABRAHAM received PhD in Computer Science from Monash University, Melbourne, Australia in 2001. He is Director of Machine Intelligence Research Labs (MIR Labs) which has members from 100+ countries. Ajith’s research experience includes over 30 years in the industry and academia. He has authored / co-authored over 1300+ publications (with colleagues from nearly 40 countries) and has an h-index of 86+. Preface xv1 MORTALITY PREDICTION OF ICU PATIENTS USING MACHINE LEARNING TECHNIQUES 1Babita Majhi, Aarti Kashyap and Ritanjali Majhi1.1 Introduction 21.2 Review of Literature 31.3 Materials and Methods 81.3.1 Dataset 81.3.2 Data Pre-Processing 81.3.3 Normalization 81.3.4 Mortality Prediction 101.3.5 Model Description and Development 111.4 Result and Discussion 151.5 Conclusion 161.6 Future Work 16References 172 ARTIFICIAL INTELLIGENCE IN BIOINFORMATICS 21V. Samuel Raj, Anjali Priyadarshini, Manoj Kumar Yadav, Ramendra Pati Pandey, Archana Gupta and Arpana Vibhuti2.1 Introduction 212.2 Recent Trends in the Field of AI in Bioinformatics 222.2.1 DNA Sequencing and Gene Prediction Using Deep Learning 242.3 Data Management and Information Extraction 262.4 Gene Expression Analysis 262.4.1 Approaches for Analysis of Gene Expression 272.4.2 Applications of Gene Expression Analysis 292.5 Role of Computation in Protein Structure Prediction 302.6 Application in Protein Folding Prediction 312.7 Role of Artificial Intelligence in Computer-Aided Drug Design 382.8 Conclusions 42References 433 PREDICTIVE ANALYSIS IN HEALTHCARE USING FEATURE SELECTION 53Aneri Acharya, Jitali Patel and Jigna Patel3.1 Introduction 543.1.1 Overview and Statistics About the Disease 543.1.1.1 Diabetes 543.1.1.2 Hepatitis 553.1.2 Overview of the Experiment Carried Out 563.2 Literature Review 583.2.1 Summary 583.2.2 Comparison of Papers for Diabetes and Hepatitis Dataset 613.3 Dataset Description 703.3.1 Diabetes Dataset 703.3.2 Hepatitis Dataset 713.4 Feature Selection 733.4.1 Importance of Feature Selection 743.4.2 Difference Between Feature Selection, Feature Extraction and Dimensionality Reduction 743.4.3 Why Traditional Feature Selection Techniques Still Holds True? 753.4.4 Advantages and Disadvantages of Feature Selection Technique 763.4.4.1 Advantages 763.4.4.2 Disadvantage 763.5 Feature Selection Methods 763.5.1 Filter Method 763.5.1.1 Basic Filter Methods 773.5.1.2 Correlation Filter Methods 773.5.1.3 Statistical & Ranking Filter Methods 783.5.1.4 Advantages and Disadvantages of Filter Method 803.5.2 Wrapper Method 803.5.2.1 Advantages and Disadvantages of Wrapper Method 823.5.2.2 Difference Between Filter Method and Wrapper Method 823.6 Methodology 843.6.1 Steps Performed 843.6.2 Flowchart 843.7 Experimental Results and Analysis 853.7.1 Task 1—Application of Four Machine Learning Models 853.7.2 Task 2—Applying Ensemble Learning Algorithms 863.7.3 Task 3—Applying Feature Selection Techniques 873.7.4 Task 4—Appling Data Balancing Technique 943.8 Conclusion 96References 994 HEALTHCARE 4.0: AN INSIGHT OF ARCHITECTURE, SECURITY REQUIREMENTS, PILLARS AND APPLICATIONS 103Deepanshu Bajaj, Bharat Bhushan and Divya Yadav4.1 Introduction 1044.2 Basic Architecture and Components of e-Health Architecture 1054.2.1 Front End Layer 1064.2.2 Communication Layer 1074.2.3 Back End Layer 1074.3 Security Requirements in Healthcare 4.0 1084.3.1 Mutual-Authentications 1094.3.2 Anonymity 1104.3.3 Un-Traceability 1114.3.4 Perfect—Forward—Secrecy 1114.3.5 Attack Resistance 1114.3.5.1 Replay Attack 1114.3.5.2 Spoofing Attack 1124.3.5.3 Modification Attack 1124.3.5.4 MITM Attack 1124.3.5.5 Impersonation Attack 1124.4 ICT Pillar’s Associated With HC4.0 1134.4.1 IoT in Healthcare 4.0 1144.4.2 Cloud Computing (CC) in Healthcare 4.0 1154.4.3 Fog Computing (FC) in Healthcare 4.0 1164.4.4 BigData (BD) in Healthcare 4.0 1174.4.5 Machine Learning (ML) in Healthcare 4.0 1184.4.6 Blockchain (BC) in Healthcare 4.0 1204.5 Healthcare 4.0’s Applications-Scenarios 1214.5.1 Monitor-Physical and Pathological Related Signals 1214.5.2 Self-Management, and Wellbeing Monitor, and its Precaution 1244.5.3 Medication Consumption Monitoring and Smart-Pharmaceutics 1244.5.4 Personalized (or Customized) Healthcare 1254.5.5 Cloud-Related Medical Information’s Systems 1254.5.6 Rehabilitation 1264.6 Conclusion 126References 1275 IMPROVED SOCIAL MEDIA DATA MINING FOR ANALYZING MEDICAL TRENDS 131Minakshi Sharma and Sunil Sharma5.1 Introduction 1325.1.1 Data Mining 1325.1.2 Major Components of Data Mining 1325.1.3 Social Media Mining 1345.1.4 Clustering in Data Mining 1345.2 Literature Survey 1365.3 Basic Data Mining Clustering Technique 1405.3.1 Classifier and Their Algorithms in Data Mining 1435.4 Research Methodology 1475.5 Results and Discussion 1515.5.1 Tool Description 1515.5.2 Implementation Results 1525.5.3 Comparison Graphs Performance Comparison 1565.6 Conclusion & Future Scope 157References 1586 BIOINFORMATICS: AN IMPORTANT TOOL IN ONCOLOGY 163Gaganpreet Kaur, Saurabh Gupta, Gagandeep Kaur, Manju Verma and Pawandeep Kaur6.1 Introduction 1646.2 Cancer—A Brief Introduction 1656.2.1 Types of Cancer 1666.2.2 Development of Cancer 1666.2.3 Properties of Cancer Cells 1666.2.4 Causes of Cancer 1686.3 Bioinformatics—A Brief Introduction 1696.4 Bioinformatics—A Boon for Cancer Research 1706.5 Applications of Bioinformatics Approaches in Cancer 1746.5.1 Biomarkers: A Paramount Tool for Cancer Research 1756.5.2 Comparative Genomic Hybridization for Cancer Research 1776.5.3 Next-Generation Sequencing 1786.5.4 miRNA 1796.5.5 Microarray Technology 1816.5.6 Proteomics-Based Bioinformatics Techniques 1856.5.7 Expressed Sequence Tags (EST) and Serial Analysis of Gene Expression (SAGE) 1876.6 Bioinformatics: A New Hope for Cancer Therapeutics 1886.7 Conclusion 191References 1927 BIOMEDICAL BIG DATA ANALYTICS USING IOT IN HEALTH INFORMATICS 197Pawan Singh Gangwar and Yasha Hasija7.1 Introduction 1987.2 Biomedical Big Data 2007.2.1 Big EHR Data 2017.2.2 Medical Imaging Data 2017.2.3 Clinical Text Mining Data 2017.2.4 Big OMICs Data 2027.3 Healthcare Internet of Things (IoT) 2027.3.1 IoT Architecture 2027.3.2 IoT Data Source 2047.3.2.1 IoT Hardware 2047.3.2.2 IoT Middleware 2057.3.2.3 IoT Presentation 2057.3.2.4 IoT Software 2057.3.2.5 IoT Protocols 2067.4 Studies Related to Big Data Analytics in Healthcare IoT 2067.5 Challenges for Medical IoT & Big Data in Healthcare 2097.6 Conclusion 210References 2108 STATISTICAL IMAGE ANALYSIS OF DRYING BOVINE SERUM ALBUMIN DROPLETS IN PHOSPHATE BUFFERED SALINE 213Anusuya Pal, Amalesh Gope and Germano S. Iannacchione8.1 Introduction 2148.2 Experimental Methods 2168.3 Results 2178.3.1 Temporal Study of the Drying Droplets 2178.3.2 FOS Characterization of the Drying Evolution 2198.3.3 GLCM Characterization of the Drying Evolution 2208.4 Discussions 2248.4.1 Qualitative Analysis of the Drying Droplets and the Dried Films 2248.4.2 Quantitative Analysis of the Drying Droplets and the Dried Films 2278.5 Conclusions 231Acknowledgments 232References 2329 INTRODUCTION TO DEEP LEARNING IN HEALTH INFORMATICS 237Monika Jyotiyana and Nishtha Kesswani9.1 Introduction 2379.1.1 Machine Learning v/s Deep Learning 2409.1.2 Neural Networks and Deep Learning 2419.1.3 Deep Learning Architecture 2429.1.3.1 Deep Neural Networks 2439.1.3.2 Convolutional Neural Networks 2439.1.3.3 Deep Belief Networks 2449.1.3.4 Recurrent Neural Networks 2449.1.3.5 Deep Auto-Encoder 2459.1.4 Applications 2469.2 Deep Learning in Health Informatics 2469.2.1 Medical Imaging 2469.2.1.1 CNN v/s Medical Imaging 2479.2.1.2 Tissue Classification 2479.2.1.3 Cell Clustering 2479.2.1.4 Tumor Detection 2479.2.1.5 Brain Tissue Classification 2489.2.1.6 Organ Segmentation 2489.2.1.7 Alzheimer’s and Other NDD Diagnosis 2489.3 Medical Informatics 2499.3.1 Data Mining 2499.3.2 Prediction of Disease 2499.3.3 Human Behavior Monitoring 2509.4 Bioinformatics 2509.4.1 Cancer Diagnosis 2509.4.2 Gene Variants 2519.4.3 Gene Classification or Gene Selection 2519.4.4 Compound–Protein Interaction 2519.4.5 DNA–RNA Sequences 2529.4.6 Drug Designing 2529.5 Pervasive Sensing 2529.5.1 Human Activity Monitoring 2539.5.2 Anomaly Detection 2539.5.3 Biological Parameter Monitoring 2539.5.4 Hand Gesture Recognition 2539.5.5 Sign Language Recognition 2549.5.6 Food Intake 2549.5.7 Energy Expenditure 2549.5.8 Obstacle Detection 2549.6 Public Health 2559.6.1 Lifestyle Diseases 2559.6.2 Predicting Demographic Information 2569.6.3 Air Pollutant Prediction 2569.6.4 Infectious Disease Epidemics 2579.7 Deep Learning Limitations and Challenges in Health Informatics 257References 25810 DATA MINING TECHNIQUES AND ALGORITHMS IN PSYCHIATRIC HEALTH: A SYSTEMATIC REVIEW 263Shikha Gupta, Nitish Mehndiratta, Swarnim Sinha, Sangana Chaturvedi and Mehak Singla10.1 Introduction 26310.2 Techniques and Algorithms Applied 26510.3 Analysis of Major Health Disorders Through Different Techniques 26710.3.1 Alzheimer 26710.3.2 Dementia 26810.3.3 Depression 27410.3.4 Schizophrenia and Bipolar Disorders 28110.4 Conclusion 285References 28611 DEEP LEARNING APPLICATIONS IN MEDICAL IMAGE ANALYSIS 293Ananya Singha, Rini Smita Thakur and Tushar Patel11.1 Introduction 29411.1.1 Medical Imaging 29511.1.2 Artificial Intelligence and Deep Learning 29611.1.3 Processing in Medical Images 30011.2 Deep Learning Models and its Classification 30311.2.1 Supervised Learning 30311.2.1.1 RNN (Recurrent Neural Network) 30311.2.2 Unsupervised Learning 30411.2.2.1 Stacked Auto Encoder (SAE) 30411.2.2.2 Deep Belief Network (DBN) 30611.2.2.3 Deep Boltzmann Machine (DBM) 30711.2.2.4 Generative Adversarial Network (GAN) 30811.3 Convolutional Neural Networks (CNN)—A Popular Supervised Deep Model 30911.3.1 Architecture of CNN 31011.3.2 Learning of CNNs 31311.3.3 Medical Image Denoising using CNNs 31411.3.4 Medical Image Classification Using CNN 31611.4 Deep Learning Advancements—A Biological Overview 31711.4.1 Sub-Cellular Level 31711.4.2 Cellular Level 31911.4.3 Tissue Level 32311.4.4 Organ Level 32611.4.4.1 The Brain and Neural System 32611.4.4.2 Sensory Organs—The Eye and Ear 32911.4.4.3 Thoracic Cavity 33011.4.4.4 Abdomen and Gastrointestinal (GI) Track 33111.4.4.5 Other Miscellaneous Applications 33211.5 Conclusion and Discussion 335References 33612 ROLE OF MEDICAL IMAGE ANALYSIS IN ONCOLOGY 351Gaganpreet Kaur, Hardik Garg, Kumari Heena, Lakhvir Singh, Navroz Kaur, Shubham Kumar and Shadab Alam12.1 Introduction 35212.2 Cancer 35312.2.1 Types of Cancer 35412.2.2 Causes of Cancer 35512.2.3 Stages of Cancer 35512.2.4 Prognosis 35612.3 Medical Imaging 35712.3.1 Anatomical Imaging 35712.3.2 Functional Imaging 35812.3.3 Molecular Imaging 35812.4 Diagnostic Approaches for Cancer 35812.4.1 Conventional Approaches 35812.4.1.1 Laboratory Diagnostic Techniques 35912.4.1.2 Tumor Biopsies 35912.4.1.3 Endoscopic Exams 36012.4.2 Modern Approaches 36112.4.2.1 Image Processing 36112.4.2.2 Implications of Advanced Techniques 36212.4.2.3 Imaging Techniques 36312.5 Conclusion 375References 37613 A COMPARATIVE ANALYSIS OF CLASSIFIERS USING PARTICLE SWARM OPTIMIZATION-BASED FEATURE SELECTION 383Chandra Sekhar Biswal, Subhendu Kumar Pani and Sujata Dash13.1 Introduction 38413.2 Feature Selection for Classification 38513.2.1 An Overview: Data Mining 38513.2.2 Classification Prediction 38713.2.3 Dimensionality Reduction 38713.2.4 Techniques of Feature Selection 38813.2.5 Feature Selection: A Survey 39213.2.6 Summary 39413.3 Use of WEKA Tool 39513.3.1 WEKA Tool 39513.3.2 Classifier Selection 39513.3.3 Feature Selection Algorithms in WEKA 39513.3.4 Performance Measure 39613.3.5 Dataset Description 39813.3.6 Experiment Design 39813.3.7 Results Analysis 39913.3.8 Summary 40113.4 Conclusion and Future Work 40113.4.1 Summary of the Work 40113.4.2 Research Challenges 40213.4.3 Future Work 404References 404Index 409

Regulärer Preis: 207,99 €
Produktbild für The Trouble With Sharing

The Trouble With Sharing

PEER-TO-PEER EXCHANGE IS A TYPE OF SHARING THAT INVOLVES THE TRANSFER OF VALUED RESOURCES, SUCH AS GOODS AND SERVICES, AMONG MEMBERS OF A LOCAL COMMUNITY AND/OR BETWEEN PARTIES WHO HAVE NOT MET BEFORE THE EXCHANGE ENCOUNTER. It involves online systems that allow strangers to exchange in ways that were previously confined to the realm of kinship and friendship. Through the examples in this book, we encounter attempts to foster the sharing of goods and services in local communities and consider the intricacies of sharing homes temporarily with strangers (also referred to as hospitality exchange or network hospitality). Some of the exchange arrangements discussed involve money while others explicitly ban participants from using it. All rely on digital technologies, but the trickiest challenges have more to do with social interaction than technical features. This book explores what makes peer-to-peer exchange challenging, with an emphasis on reciprocity, closeness, and participation: How should we reciprocate? How might we manage interactions with those we encounter to attain some closeness but not too much? What keeps people from getting involved or draws them into exchange activities that they would rather avoid?This book adds to the growing body of research on exchange platforms and the sharing economy. It provides empirical examples and conceptual grounding for thinking about interpersonal challenges in peer-to-peer exchange and the efforts that are required for exchange arrangements to flourish. It offers inspiration for how we might think and design differently to better understand and support the efforts of those involved in peer-to-peer exchange. While the issues cannot be simply “solved” by technology, it matters which digital tools an exchange arrangement relies on, and even seemingly small design decisions can have a significant impact on what it is like to participate in exchange processes. The technologies that support exchange arrangements—often platforms of some sort—can be driven by differing sets of values and commitments. This book invites students and scholars in the Human–Computer Interaction community, and beyond, to envision and design alternative exchange arrangements and future economies.* Preface* Acknowledgments* Introduction* Situating the Sharing Economy* What Do We Talk About When We Talk About the Sharing Economy?* Reciprocity and Indebtedness* Closeness and Intimacy* Participation and Inclusion* Future Direction* Epilogue* References* Author Biography

Regulärer Preis: 42,99 €
Produktbild für Spektrum Kompakt- Algorithmen im Alltag

Spektrum Kompakt- Algorithmen im Alltag

Algorithmen, die unser Leben beeinfussen, sind längst keine Zukunftsmusik mehr, sondern stecken überall tief in unserem Alltag. Sie unterstützen Ärztinnen und Ärzte bei der Diagnose, lassen die Vergangenheit bunt werden und Personen in Kinoflmen auftauchen, die gar nicht am Dreh waren. Im Hochleistungssport verraten sie, ob und warum sich Athleten und Athletinnen verletzen könnten und leiten uns mehr oder weniger offen durch digitale Welten - was entsprechende Sorgen vor unbewusster Manipulation weckt. Ein Kompakt rund um programmierte Helfer im Hintergrund.

Regulärer Preis: 4,99 €
Produktbild für Designing and Building Enterprise Knowledge Graphs

Designing and Building Enterprise Knowledge Graphs

This book is a guide to designing and building knowledge graphs from enterprise relational databases in practice. It presents a principled framework centered on mapping patterns to connect relational databases with knowledge graphs, the roles within an organization responsible for the knowledge graph, and the process that combines data and people. The content of this book is applicable to knowledge graphs being built either with property graph or RDF graph technologies. Knowledge graphs are fulfilling the vision of creating intelligent systems that integrate knowledge and data at large scale. Tech giants have adopted knowledge graphs for the foundation of next-generation enterprise data and metadata management, search, recommendation, analytics, intelligent agents, and more. We are now observing an increasing number of enterprises that seek to adopt knowledge graphs to develop a competitive edge. In order for enterprises to design and build knowledge graphs, they need to understand the critical data stored in relational databases. How can enterprises successfully adopt knowledge graphs to integrate data and knowledge, without boiling the ocean? This book provides the answers. * Preface * Foreword by an Anonymous CDO * Foreword by Tom Plasterer * Acknowledgments * Disclaimer * Introduction * Designing Enterprise Knowledge Graphs * Mapping Design Patterns * Building Enterprise Knowledge Graphs * What's Next? * Conclusions * Bibliography * Authors' Biographies

Regulärer Preis: 46,99 €
Produktbild für CASP+ CompTIA Advanced Security Practitioner Practice Tests

CASP+ CompTIA Advanced Security Practitioner Practice Tests

PREPARE FOR SUCCESS ON THE CHALLENGING CASP+ CAS-004 EXAMIn the newly updated Second Edition of CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004, accomplished cybersecurity expert Nadean Tanner delivers an extensive collection of CASP+ preparation materials, including hundreds of domain-by-domain test questions and two additional practice exams.Prepare for the new CAS-004 exam, as well as a new career in advanced cybersecurity, with Sybex’s proven approach to certification success. You’ll get ready for the exam, to impress your next interviewer, and excel at your first cybersecurity job.This book includes:* Comprehensive coverage of all exam CAS-004 objective domains, including security architecture, operations, engineering, cryptography, and governance, risk, and compliance * In-depth preparation for test success with 1000 practice exam questions * Access to the Sybex interactive learning environment and online test bank Perfect for anyone studying for the CASP+ Exam CAS-004, CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam CAS-004 is also an ideal resource for anyone with IT security experience who seeks to brush up on their skillset or seek a valuable new CASP+ certification.NADEAN H. TANNER, CASP+, CISSP, MCSA, ITILV3, has worked in technology for more than 20 years, learning about every aspect of the field as a marketer, trainer, web developer, and hardware technician. She has served as an IT director and technology instructor at the postgraduate level, and has been a cybersecurity trainer and consultant for Fortune 500 companies as well as for the U.S. Department of Defense.Introduction xixChapter 1 Security Architecture 1Chapter 2 Security Operations 61Chapter 3 Security Engineering and Cryptography 123Chapter 4 Governance, Risk, and Compliance 175Chapter 5 Practice Test 1 207Chapter 6 Practice Test 2 227Appendix Answers to Review Questions 247Chapter 1: Security Architecture 248Chapter 2: Security Operations 278Chapter 3: Security Engineering and Cryptography 308Chapter 4: Governance, Risk, and Compliance 333Chapter 5: Practice Test 1 346Chapter 6: Practice Test 2 353Index 363

Regulärer Preis: 27,99 €
Produktbild für Unmanned Aerial Vehicles for Internet of Things (IoT)

Unmanned Aerial Vehicles for Internet of Things (IoT)

UNMANNED AERIAL VEHICLES FOR INTERNET OF THINGSTHIS COMPREHENSIVE BOOK DEEPLY DISCUSSES THE THEORETICAL AND TECHNICAL ISSUES OF UNMANNED AERIAL VEHICLES FOR DEPLOYMENT BY INDUSTRIES AND CIVIL AUTHORITIES IN INTERNET OF THINGS (IOT) SYSTEMS. Unmanned aerial vehicles (UAVs) has become one of the rapidly growing areas of technology, with widespread applications covering various domains. UAVs play a very important role in delivering Internet of Things (IoT) services in small and low-power devices such as sensors, cameras, GPS receivers, etc. These devices are energy-constrained and are unable to communicate over long distances. The UAVs work dynamically for IoT applications in which they collect data and transmit it to other devices that are out of communication range. Furthermore, the benefits of the UAV include deployment at remote locations, the ability to carry flexible payloads, reprogrammability during tasks, and the ability to sense for anything from anywhere. Using IoT technologies, a UAV may be observed as a terminal device connected with the ubiquitous network, where many other UAVs are communicating, navigating, controlling, and surveilling in real time and beyond line-of-sight. The aim of the 15 chapters in this book help to realize the full potential of UAVs for the IoT by addressing its numerous concepts, issues and challenges, and develops conceptual and technological solutions for handling them. Applications include such fields as disaster management, structural inspection, goods delivery, transportation, localization, mapping, pollution and radiation monitoring, search and rescue, farming, etc. In addition, the book covers:* Efficient energy management systems in UAV-based IoT networks* IoE enabled UAVs* Mind-controlled UAV using Brain-Computer Interface (BCI)* The importance of AI in realizing autonomous and intelligent flying IoT* Blockchain-based solutions for various security issues in UAV-enabled IoT* The challenges and threats of UAVs such as hijacking, privacy, cyber-security, and physical safety.AUDIENCE: Researchers in computer science, Internet of Things (IoT), electronics engineering, as well as industries that use and deploy drones and other unmanned aerial vehicles. VANDANA MOHINDRU PhD is an assistant professor in the Department of Computer Science and Engineering, Chandigarh Group of Colleges, Mohali, Punjab, India. Her research interests are in the areas of Internet of Things, wireless sensor networks, security, blockchain and cryptography, unmanned aerial vehicles. She has published more than 20 technical research papers in leading journals and conferences.YASHWANT SINGH PhD is an associate professor & Head in the Department of Computer Science & Information Technology at the Central University of Jammu. His research interests lie in the area of Internet of Things, wireless sensor networks, unmanned aerial vehicles, cybersecurity. He has published more than 70 research articles in the international journals and conferences. RAVINDARA BHATT PhD is an assistant professor at Jaypee University of Information Technology, Solan, H.P., India. He has over 20 years of experience in academics and industry in India. He has published more than 30 research papers in leading journals and conferences. His areas of research include sensor networks, deployment modeling, communication, and energy-efficient algorithms, security and unmanned aerial vehicles. ANUJ KUMAR GUPTA PhD is professor & Head in CSE at Chandigarh Group of Colleges, Mohali, Punjab, India. He has published 100+ research papers in reputed journals. Preface xvii1 UNMANNED AERIAL VEHICLE (UAV): A COMPREHENSIVE SURVEY 1Rohit Chaurasia and Vandana Mohindru1.1 Introduction 21.2 Related Work 21.3 UAV Technology 31.3.1 UAV Platforms 31.3.1.1 Fixed-Wing Drones 31.3.1.2 Multi-Rotor Drones 41.3.1.3 Single-Rotor Drones 51.3.1.4 Fixed-Wing Hybrid VTOL 61.3.2 Categories of the Military Drones 61.3.3 How Drones Work 81.3.3.1 Firmware—Platform Construction and Design 91.3.4 Comparison of Various Technologies 101.3.4.1 Drone Types & Sizes 101.3.4.2 Radar Positioning and Return to Home 101.3.4.3 GNSS on Ground Control Station 111.3.4.4 Collision Avoidance Technology and Obstacle Detection 111.3.4.5 Gyroscopic Stabilization, Flight Controllers and IMU 121.3.4.6 UAV Drone Propulsion System 121.3.4.7 Flight Parameters Through Telemetry 131.3.4.8 Drone Security & Hacking 131.3.4.9 3D Maps and Models With Drone Sensors 131.3.5 UAV Communication Network 151.3.5.1 Classification on the Basis of Spectrum Perspective 151.3.5.2 Various Types of Radio communication Links 161.3.5.3 VLOS (Visual Line-of-Sight) and BLOS (Beyond Line-of-Sight) Communication in Unmanned Aircraft System 181.3.5.4 Frequency Bands for the Operation of UAS 191.3.5.5 Cellular Technology for UAS Operation 191.4 Application of UAV 211.4.1 In Military 211.4.2 In Geomorphological Mapping and Other Similar Sectors 221.4.3 In Agriculture 221.5 UAV Challenges 231.6 Conclusion and Future Scope 24References 242 UNMANNED AERIAL VEHICLES: STATE-OF-THE-ART, CHALLENGES AND FUTURE SCOPE 29Jolly Parikh and Anuradha Basu2.1 Introduction 302.2 Technical Challenges 302.2.1 Variations in Channel Characteristics 322.2.2 UAV-Assisted Cellular Network Planning and Provisioning 332.2.3 Millimeter Wave Cellular Connected UAVs 342.2.4 Deployment of UAV 352.2.5 Trajectory Optimization 362.2.6 On-Board Energy 372.3 Conclusion 37References 373 BATTERY AND ENERGY MANAGEMENT IN UAV-BASED NETWORKS 43Santosh Kumar, Amol Vasudeva and Manu Sood3.1 Introduction 433.2 The Need for Energy Management in UAV-Based Communication Networks 453.2.1 Unpredictable Trajectories of UAVs in Cellular UAV Networks 463.2.2 Non-Homogeneous Power Consumption 473.2.3 High Bandwidth Requirement/Low Spectrum Availability/Spectrum Scarcity 473.2.4 Short-Range Line-of-Sight Communication 483.2.5 Time Constraint (Time-Limited Spectrum Access) 483.2.6 Energy Constraint 493.2.7 The Joint Design for the Sensor Nodes’ Wake-Up Schedule and the UAV’s Trajectory (Data Collection) 493.3 Efficient Battery and Energy Management Proposed Techniques in Literature 503.3.1 Cognitive Radio (CR)-Based UAV Communication to Solve Spectrum Congestion 513.3.2 Compressed Sensing 523.3.3 Power Allocation and Position Optimization 533.3.4 Non-Orthogonal Multiple Access (NOMA) 533.3.5 Wireless Charging/Power Transfer (WPT) 543.3.6 UAV Trajectory Design Using a Reinforcement Learning Framework in a Decentralized Manner 553.3.7 Efficient Deployment and Movement of UAVs 553.3.8 3D Position Optimization Mixed With Resource Allocation to Overcome Spectrum Scarcity and Limited Energy Constraint 563.3.9 UAV-Enabled WSN: Energy-Efficient Data Collection 573.3.10 Trust Management 573.3.11 Self-Organization-Based Clustering 583.3.12 Bandwidth/Spectrum-Sharing Between UAVs 593.3.13 Using Millimeter Wave With SWIPT 593.3.14 Energy Harvesting 603.4 Conclusion 61References 674 ENERGY EFFICIENT COMMUNICATION METHODS FOR UNMANNED ARIEL VEHICLES (UAVS): LAST FIVE YEARS’ STUDY 73Nagesh Kumar4.1 Introduction 734.1.1 Introduction to UAV 744.1.2 Communication in UAV 754.2 Literature Survey Process 774.2.1 Research Questions 774.2.2 Information Source 774.3 Routing in UAV 784.3.1 Communication Methods in UAV 784.3.1.1 Single-Hop Communication 794.3.1.2 Multi-Hop Communication 804.4 Challenges and Issues 824.4.1 Energy Consumption 824.4.2 Mobility of Devices 824.4.3 Density of UAVs 824.4.4 Changes in Topology 854.4.5 Propagation Models 854.4.6 Security in Routing 854.5 Conclusion 85References 865 A REVIEW ON CHALLENGES AND THREATS TO UNMANNED AERIAL VEHICLES (UAVS) 89Shaik Johny Basha and Jagan Mohan Reddy Danda5.1 Introduction 895.2 Applications of UAVs and Their Market Opportunity 905.2.1 Applications 905.2.2 Market Opportunity 925.3 Attacks and Solutions to Unmanned Aerial Vehicles (UAVs) 925.3.1 Confidentiality Attacks 935.3.2 Integrity Attacks 955.3.3 Availability Attacks 965.3.4 Authenticity Attacks 975.4 Research Challenges 995.4.1 Security Concerns 995.4.2 Safety Concerns 995.4.3 Privacy Concerns 1005.4.4 Scalability Issues 1005.4.5 Limited Resources 1005.5 Conclusion 101References 1016 INTERNET OF THINGS AND UAV: AN INTEROPERABILITY PERSPECTIVE 105Bharti Rana and Yashwant Singh6.1 Introduction 1066.2 Background 1086.2.1 Issues, Controversies, and Problems 1096.3 Internet of Things (IoT) and UAV 1106.4 Applications of UAV-Enabled IoT 1136.5 Research Issues in UAV-Enabled IoT 1146.6 High-Level UAV-Based IoT Architecture 1176.6.1 UAV Overview 1176.6.2 Enabling IoT Scalability 1196.6.3 Enabling IoT Intelligence 1206.6.4 Enabling Diverse IoT Applications 1216.7 Interoperability Issues in UAV-Based IoT 1216.8 Conclusion 123References 1247 PRACTICES OF UNMANNED AERIAL VEHICLE (UAV) FOR SECURITY INTELLIGENCE 129Swarnjeet Kaur, Kulwant Singh and Amanpreet Singh7.1 Introduction 1307.2 Military 1327.3 Attack 1337.4 Journalism 1347.5 Search and Rescue 1367.6 Disaster Relief 1387.7 Conclusion 139References 1398 BLOCKCHAIN-BASED SOLUTIONS FOR VARIOUS SECURITY ISSUES IN UAV-ENABLED IOT 143Madhuri S. Wakode and Rajesh B. Ingle8.1 Introduction 1448.1.1 Organization of the Work 1458.2 Introduction to UAV and IoT 1458.2.1 UAV 1458.2.2 IoT 1468.2.3 UAV-Enabled IoT 1478.2.4 Blockchain 1508.3 Security and Privacy Issues in UAV-Enabled IoT 1518.4 Blockchain-Based Solutions to Various Security Issues 1538.5 Research Directions 1548.6 Conclusion 1548.7 Future Work 155References 1559 EFFICIENT ENERGY MANAGEMENT SYSTEMS IN UAV-BASED IOT NETWORKS 159V. Mounika Reddy, Neelima K. and G. Naresh9.1 Introduction 1609.2 Energy Harvesting Methods 1619.2.1 Basic Energy Harvesting Mechanisms 1629.2.2 Markov Decision Process-Based Energy Harvesting Mechanisms 1639.2.3 mm Wave Energy Harvesting Mechanism 1649.2.4 Full Duplex Wireless Energy Harvesting Mechanism 1659.3 Energy Recharge Methods 1659.4 Efficient Energy Utilization Methods 1669.4.1 GLRM Method 1669.4.2 DRL Mechanism 1679.4.3 Onboard Double Q-Learning Mechanism 1689.4.4 Collision-Free Scheduling Mechanism 1689.5 Conclusion 170References 17010 A SURVEY ON IOE-ENABLED UNMANNED AERIAL VEHICLES 173K. Siddharthraju, R. Dhivyadevi, M. Supriya, B. Jaishankar and Shanmugaraja T.10.1 Introduction 17410.2 Overview of Internet of Everything 17610.2.1 Emergence of IoE 17610.2.2 Expectation of IoE 17710.2.2.1 Scalability 17710.2.2.2 Intelligence 17810.2.2.3 Diversity 17810.2.3 Possible Technologies 17910.2.3.1 Enabling Scalability 17910.2.3.2 Enabling Intelligence 18010.2.3.3 Enabling Diversity 18010.2.4 Challenges of IoE 18110.2.4.1 Coverage Constraint 18110.2.4.2 Battery Constraint 18110.2.4.3 Computing Constraint 18110.2.4.4 Security Constraint 18210.3 Overview of Unmanned Aerial Vehicle (UAV) 18210.3.1 Unmanned Aircraft System (UAS) 18310.3.2 UAV Communication Networks 18310.3.2.1 Ad Hoc Multi-UAV Networks 18310.3.2.2 UAV-Aided Communication Networks 18410.4 UAV and IoE Integration 18410.4.1 Possibilities to Carry UAVs 18410.4.1.1 Widespread Connectivity 18510.4.1.2 Environmentally Aware 18510.4.1.3 Peer-Maintenance of Communications 18510.4.1.4 Detector Control and Reusing 18510.4.2 UAV-Enabled IoE 18610.4.3 Vehicle Detection Enabled IoE Optimization 18610.4.3.1 Weak-Connected Locations 18610.4.3.2 Regions with Low Network Support 18610.5 Open Research Issues 18710.6 Discussion 18710.6.1 Resource Allocation 18710.6.2 Universal Standard Design 18810.6.3 Security Mechanism 18810.7 Conclusion 189References 18911 ROLE OF AI AND BIG DATA ANALYTICS IN UAV-ENABLED IOT APPLICATIONS FOR SMART CITIES 193Madhuri S. Wakode11.1 Introduction 19411.1.1 Related Work 19511.1.2 Contributions 19511.1.3 Organization of the Work 19511.2 Overview of UAV-Enabled IoT Systems 19611.2.1 UAV-Enabled IoT Systems for Smart Cities 19711.3 Overview of Big Data Analytics 19711.4 Big Data Analytics Requirements in UAV-Enabled IoT Systems 19811.4.1 Big Data Analytics in UAV-Enabled IoT Applications 19911.4.2 Big Data Analytics for Governance of UAV-Enabled IoT Systems 20111.5 Challenges 20211.6 Conclusion 20211.7 Future Work 203References 20312 DESIGN AND DEVELOPMENT OF MODULAR AND MULTIFUNCTIONAL UAV WITH AMPHIBIOUS LANDING, PROCESSING AND SURROUND SENSE MODULE 207Lakshit Kohli, Manglesh Saurabh, Ishaan Bhatia, Nidhi Sindhwani and Manjula Vijh12.1 Introduction 20812.2 Existing System 20812.3 Proposed System 21012.4 IoT Sensors and Architecture 21212.4.1 Sensors and Theory 21212.4.2 Architectures Available 21312.4.2.1 3-Layer IoT Architecture 21312.4.2.2 5-Layer IoT Architecture 21412.4.2.3 Architecture & Supporting Modules 21512.4.2.4 Integration Approach 21512.4.2.5 System of Modules 21612.5 Advantages of the Proposed System 21712.6 Design 21812.6.1 System Design 21912.6.2 Auto-Leveling 21912.6.3 Amphibious Landing Module 22112.6.4 Processing Module 22312.6.5 Surround Sense Module 22312.7 Results 22412.8 Conclusion 22712.9 Future Scope 228References 22813 MIND CONTROLLED UNMANNED AERIAL VEHICLE (UAV) USING BRAIN–COMPUTER INTERFACE (BCI) 231Prasath M.S., Naveen R. and Sivaraj G.13.1 Introduction 23213.1.1 Classification of UAVs 23213.1.2 Drone Controlling 23213.2 Mind-Controlled UAV With BCI Technology 23313.3 Layout and Architecture of BCI Technology 23413.4 Hardware Components 23513.4.1 Neurosky Mindwave Headset 23513.4.2 Microcontroller Board—Arduino 23613.4.3 A Computer 23713.4.4 Drone for Quadcopter 23813.5 Software Components 23913.5.1 Processing P3 Software 23913.5.2 Arduino IDE Software 24013.5.3 ThinkGear Connector 24013.6 Hardware and Software Integration 24113.7 Conclusion 243References 24414 PRECISION AGRICULTURE WITH TECHNOLOGIES FOR SMART FARMING TOWARDS AGRICULTURE 5.0 247Dhirendra Siddharth, Dilip Kumar Saini and Ajay Kumar14.1 Introduction 24714.2 Drone Technology as an Instrument for Increasing Farm Productivity 24814.3 Mapping and Tracking of Rice Farm Areas With Information and Communication Technology (ICT) and Remote Sensing Technology 24914.3.1 Methodology and Development of ICT 25014.4 Strong Intelligence From UAV to the Agricultural Sector 25214.4.1 Latest Agricultural Drone History 25214.4.2 The Challenges 25414.4.3 SAP’s Next Wave of Drone Technologies 25414.4.4 SAP Connected Agriculture 25614.4.5 Cases of Real-World Use 25714.4.5.1 Crop Surveying 25714.4.5.2 Capture the Plantation 25814.4.5.3 Image Processing 25814.4.5.4 Working to Create GeoTiles and an Image Pyramid 25914.5 Drones-Based Sensor Platforms 26014.5.1 Context and Challenges 26014.5.2 Stakeholder and End Consumer Benefits 26114.5.3 The Technology 26214.5.3.1 Provisions of the Unmanned Aerial Vehicles 26214.6 Jobs of Space Technology in Crop Insurance 26314.7 The Institutionalization of Drone Imaging Technologies in Agriculture for Disaster Managing Risk 26714.7.1 A Modern Working 26714.7.2 Discovering Drone Mapping Technology 26814.7.3 From Lowland to Uplands, Drone Mapping Technology 26914.7.4 Institutionalization of Drone Monitoring Systems and Farming Capability 26914.8 Usage of Internet of Things in Agriculture and Use of Unmanned Aerial Vehicles 27014.8.1 System and Application Based on UAV-WSN 27014.8.2 Using a Complex Comprehensive System 27114.8.3 Benefits Assessment of Conventional System and the UAV-Based System 27114.8.3.1 Merit 27214.8.3.2 Saving Expenses 27214.8.3.3 Traditional Agriculture 27314.8.3.4 UAV-WSN System-Based Agriculture 27314.9 Conclusion 273References 27315 IOT-BASED UAV PLATFORM REVOLUTIONIZED IN SMART HEALTHCARE 277Umesh Kumar Gera, Dilip Kumar Saini, Preeti Singh and Dhirendra Siddharth15.1 Introduction 27815.2 IoT-Based UAV Platform for Emergency Services 27915.3 Healthcare Internet of Things: Technologies, Advantages 28115.3.1 Advantage 28115.3.1.1 Concurrent Surveillance and Tracking 28115.3.1.2 From End-To-End Networking and Availability 28215.3.1.3 Information and Review Assortment 28215.3.1.4 Warnings and Recording 28215.3.1.5 Wellbeing Remote Assistance 28315.3.1.6 Research 28315.3.2 Complications 28315.3.2.1 Privacy and Data Security 28315.3.2.2 Integration: Various Protocols and Services 28415.3.2.3 Overload and Accuracy of Data 28415.3.2.4 Expenditure 28415.4 Healthcare’s IoT Applications: Surgical and Medical Applications of Drones 28515.4.1 Hearables 28515.4.2 Ingestible Sensors 28515.4.3 Moodables 28515.4.4 Technology of Computer Vision 28615.4.5 Charting for Healthcare 28615.5 Drones That Will Revolutionize Healthcare 28615.5.1 Integrated Enhancement in Efficiency 28615.5.2 Offering Personalized Healthcare 28715.5.3 The Big Data Manipulation 28715.5.4 Safety and Privacy Optimization 28715.5.5 Enabling M2M Communication 28815.6 Healthcare Revolutionizing Drones 28815.6.1 Google Drones 28815.6.2 Healthcare Integrated Rescue Operations (HiRO) 28915.6.3 EHang 28915.6.4 TU Delft 28915.6.5 Project Wing 28915.6.6 Flirtey 28915.6.7 Seattle’s VillageReach 29015.6.8 ZipLine 29015.7 Conclusion 290References 290Index 295

Regulärer Preis: 184,99 €
Produktbild für Security Issues and Privacy Concerns in Industry 4.0 Applications

Security Issues and Privacy Concerns in Industry 4.0 Applications

SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONSWRITTEN AND EDITED BY A TEAM OF INTERNATIONAL EXPERTS, THIS IS THE MOST COMPREHENSIVE AND UP-TO-DATE COVERAGE OF THE SECURITY AND PRIVACY ISSUES SURROUNDING INDUSTRY 4.0 APPLICATIONS, A MUST-HAVE FOR ANY LIBRARY.The scope of Security Issues and Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trends and the need for technological change in Industry 4.0. Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT-based health care management systems, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed. Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library. SHIBIN DAVID is an assistant professor in the Department of Computer Science and Engineering at Karunya Institute of Technology and Sciences, India. His research interest includes cryptography, network security and mobile computing. He has an industry certification from Oracle, several awards, and a number of publications to his credit.R. S. ANAND is a researcher in the field of mechanical engineering at the Karunya Institute of Technology and Sciences, India, after being an assistant professor at the Narayana Guru College of Engineering from 2014 to 2016. He has numerous papers and presentations to his credit. V. JEYAKRISHNAN, PhD, is an assistant professor at Saintgits College of Engineering, Kottayam, India. His research area includes wireless networks, cloud computing and its applications. He has a number of publications in his research area. M. NIRANJANAMURTHY, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He received his doctorate in computer science from JJTU, Rajasthan. He has over ten years of teaching experience and two years of industry experience as a software engineer. He has published four books, 70 papers, and has filed for 17 Patents with three so far granted. He is a reviewer for 22 international academic journals and has twice won Best Research Journal Reviewer award. He has numerous other awards and in is active in research associations. Preface xiii1 INDUSTRY 4.0: SMART WATER MANAGEMENT SYSTEM USING IOT 1S. Saravanan, N. Renugadevi, C.M. Naga Sudha and Parul Tripathi1.1 Introduction 21.1.1 Industry 4.0 21.1.2 IoT 21.1.3 Smart City 31.1.4 Smart Water Management 31.2 Preliminaries 41.2.1 Internet World to Intelligent World 41.2.2 Architecture of IoT System 41.2.3 Architecture of Smart City 61.3 Literature Review on SWMS 71.3.1 Water Quality Parameters Related to SWMS 81.3.2 SWMS in Agriculture 81.3.3 SWMS Using Smart Grids 91.3.4 Machine Learning Models in SWMS 101.3.5 IoT-Based SWMS 111.4 Conclusion 11References 122 FOURTH INDUSTRIAL REVOLUTION APPLICATION: NETWORK FORENSICS CLOUD SECURITY ISSUES 15Abdullah Ayub Khan, Asif Ali Laghari, Shafique Awan and Awais Khan Jumani2.1 Introduction 162.1.1 Network Forensics 162.1.2 The Fourth Industrial Revolution 172.1.2.1 Machine-to-Machine (M2M) Communication 182.1.3 Cloud Computing 182.1.3.1 Infrastructure-as-a-Service (IaaS) 192.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution 192.2 Generic Model Architecture 202.3 Model Implementation 242.3.1 OpenNebula (Hypervisor) Implementation Platform 242.3.2 NetworkMiner Analysis Tool 252.3.3 Performance Matrix Evaluation & Result Discussion 272.4 Cloud Security Impact on M2M Communication 282.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0) 292.5 Conclusion 30References 313 REGIONAL LANGUAGE RECOGNITION SYSTEM FOR INDUSTRY 4.0 35Bharathi V, N. Renugadevi, J. Padmapriya and M. Vijayprakash3.1 Introduction 363.2 Automatic Speech Recognition System 393.2.1 Preprocessing 413.2.2 Feature Extraction 423.2.2.1 Linear Predictive Coding (LPC) 423.2.2.2 Linear Predictive Cepstral Coefficient (LPCC) 443.2.2.3 Perceptual Linear Predictive (PLP) 443.2.2.4 Power Spectral Analysis 443.2.2.5 Mel Frequency Cepstral Coefficients 453.2.2.6 Wavelet Transform 463.2.3 Implementation of Deep Learning Technique 463.2.3.1 Recurrent Neural Network 473.2.3.2 Long Short-Term Memory Network 473.2.3.3 Hidden Markov Models (HMM) 473.2.3.4 Hidden Markov Models - Long Short-Term Memory Network (HMM-LSTM) 483.2.3.5 Evaluation Metrics 493.3 Literature Survey on Existing TSRS 493.4 Conclusion 52References 524 APPROXIMATION ALGORITHM AND LINEAR CONGRUENCE: AN APPROACH FOR OPTIMIZING THE SECURITY OF IOT-BASED HEALTHCARE MANAGEMENT SYSTEM 55Anirban Bhowmik and Sunil Karforma4.1 Introduction 564.1.1 IoT in Medical Devices 564.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System 574.1.3 Cryptography and Secret Keys 584.1.4 RSA 584.1.5 Approximation Algorithm and Subset Sum Problem 584.1.6 Significance of Use of Subset Sum Problem in Our Scheme 594.1.7 Linear Congruence 604.1.8 Linear and Non-Linear Functions 614.1.9 Pell’s Equation 614.2 Literature Survey 624.3 Problem Domain 634.4 Solution Domain and Objectives 644.5 Proposed Work 654.5.1 Methodology 654.5.2 Session Key Generation 654.5.3 Intermediate Key Generation 674.5.4 Encryption Process 694.5.5 Generation of Authentication Code and Transmission File 704.5.6 Decryption Phase 714.6 Results and Discussion 714.6.1 Statistical Analysis 724.6.2 Randomness Analysis of Key 734.6.3 Key Sensitivity Analysis 754.6.4 Security Analysis 764.6.4.1 Key Space Analysis 764.6.4.2 Brute-Force Attack 774.6.4.3 Dictionary Attack 774.6.4.4 Impersonation Attack 784.6.4.5 Replay Attack 784.6.4.6 Tampering Attack 784.6.5 Comparative Analysis 794.6.5.1 Comparative Analysis Related to IoT Attacks 794.6.6 Significance of Authentication in Our Proposed Scheme 854.7 Conclusion 85References 865 A HYBRID METHOD FOR FAKE PROFILE DETECTION IN SOCIAL NETWORK USING ARTIFICIAL INTELLIGENCE 89Ajesh F, Aswathy S U, Felix M Philip and Jeyakrishnan V5.1 Introduction 905.2 Literature Survey 915.3 Methodology 945.3.1 Datasets 945.3.2 Detection of Fake Account 945.3.3 Suggested Framework 955.3.3.1 Pre-Processing 975.3.3.2 Principal Component Analysis (PCA) 985.3.3.3 Learning Algorithms 995.3.3.4 Feature or Attribute Selection 1025.4 Result Analysis 1035.4.1 Cross-Validation 1035.4.2 Analysis of Metrics 1045.4.3 Performance Evaluation of Proposed Model 1055.4.4 Performance Analysis of Classifiers 1055.5 Conclusion 109References 1096 PACKET DROP DETECTION IN AGRICULTURAL-BASED INTERNET OF THINGS PLATFORM 113Sebastian Terence and Geethanjali Purushothaman6.1 Introduction 1136.2 Problem Statement and Related Work 1146.3 Implementation of Packet Dropping Detection in IoT Platform 1156.4 Performance Analysis 1206.5 Conclusion 129References 1297 SMART DRONE WITH OPEN CV TO CLEAN THE RAILWAY TRACK 131Sujaritha M and Sujatha R7.1 Introduction 1327.2 Related Work 1327.3 Problem Definition 1347.4 The Proposed System 1347.4.1 Drones with Human Intervention 1347.4.2 Drones without Human Intervention 1357.4.3 Working Model 1377.5 Experimental Results 1377.6 Conclusion 139References 1398 BLOCKCHAIN AND BIG DATA: SUPPORTIVE AID FOR DAILY LIFE 141Awais Khan Jumani, Asif Ali Laghari and Abdullah Ayub Khan8.1 Introduction 1428.1.1 Steps of Blockchain Technology Works 1448.1.2 Blockchain Private 1448.1.3 Blockchain Security 1458.2 Blockchain vs. Bitcoin 1458.2.1 Blockchain Applications 1468.2.2 Next Level of Blockchain 1468.2.3 Blockchain Architecture’s Basic Components 1498.2.4 Blockchain Architecture 1508.2.5 Blockchain Characteristics 1508.3 Blockchain Components 1518.3.1 Cryptography 1528.3.2 Distributed Ledger 1538.3.3 Smart Contracts 1538.3.4 Consensus Mechanism 1548.3.4.1 Proof of Work (PoW) 1558.3.4.2 Proof of Stake (PoS) 1558.4 Categories of Blockchain 1558.4.1 Public Blockchain 1568.4.2 Private Blockchain 1568.4.3 Consortium Blockchain 1568.4.4 Hybrid Blockchain 1568.5 Blockchain Applications 1588.5.1 Financial Application 1588.5.1.1 Bitcoin 1588.5.1.2 Ripple 1588.5.2 Non-Financial Applications 1598.5.2.1 Ethereum 1598.5.2.2 Hyperledger 1598.6 Blockchain in Different Sectors 1608.7 Blockchain Implementation Challenges 1608.8 Revolutionized Challenges in Industries 1638.9 Conclusion 170References 1729 A NOVEL FRAMEWORK TO DETECT EFFECTIVE PREDICTION USING MACHINE LEARNING 179Shenbaga Priya, Revadi, Sebastian Terence and Jude Immaculate9.1 Introduction 1809.2 ML-Based Prediction 1809.3 Prediction in Agriculture 1829.4 Prediction in Healthcare 1839.5 Prediction in Economics 1849.6 Prediction in Mammals 1859.7 Prediction in Weather 1869.8 Discussion 1869.9 Proposed Framework 1879.9.1 Problem Analysis 1879.9.2 Preprocessing 1889.9.3 Algorithm Selection 1889.9.4 Training the Machine 1889.9.5 Model Evaluation and Prediction 1889.9.6 Expert Suggestion 1889.9.7 Parameter Tuning 1899.10 Implementation 1899.10.1 Farmers and Sellers 1899.10.2 Products 1899.10.3 Price Prediction 1909.11 Conclusion 192References 19210 DOG BREED CLASSIFICATION USING CNN 195Sandra Varghese and Remya S10.1 Introduction 19510.2 Related Work 19610.3 Methodology 19810.4 Results and Discussions 20110.4.1 Training 20110.4.2 Testing 20110.5 Conclusions 203References 20311 METHODOLOGY FOR LOAD BALANCING IN MULTI-AGENT SYSTEM USING SPE APPROACH 207S. Ajitha11.1 Introduction 20711.2 Methodology for Load Balancing 20811.3 Results and Discussion 21311.3.1 Proposed Algorithm in JADE Tool 21311.3.1.1 Sensitivity Analysis 21811.3.2 Proposed Algorithm in NetLogo 21811.4 Algorithms Used 21911.5 Results and Discussion 21911.6 Summary 226References 22612 THE IMPACT OF CYBER CULTURE ON NEW MEDIA CONSUMERS 229Durmuş KoÇak12.1 Introduction 22912.2 The Rise of the Term of Cyber Culture 23112.2.1 Cyber Culture in the 21st Century 23112.2.1.1 Socio-Economic Results of Cyber Culture 23212.2.1.2 Psychological Outcomes of Cyber Culture 23312.2.1.3 Political Outcomes of Cyber Culture 23412.3 The Birth and Outcome of New Media Applications 23412.3.1 New Media Environments 23612.3.1.1 Social Sharing Networks 23712.3.1.2 Network Logs (Blog, Weblog) 24012.3.1.3 Computer Games 24012.3.1.4 Digital News Sites and Mobile Media 24012.3.1.5 Multimedia Media 24112.3.1.6 What Affects the New Media Consumers’ Tendencies? 24212.4 Result 244References 245Index 251

Regulärer Preis: 164,99 €
Produktbild für Datenschutz für Softwareentwicklung und IT

Datenschutz für Softwareentwicklung und IT

Dieses Buch beschreibt das Thema Datenschutz aus der Sicht von Softwareentwicklung und IT. Die Verantwortlichen in diesen Bereichen gestalten die praktische Umsetzung des Datenschutzes zu erheblichen Teilen mit, benötigen dafür aber entsprechende Kenntnisse über die rechtlichen Rahmenbedingungen und Möglichkeiten zu deren Umsetzung. Der Fokus dieses Buchs liegt daher auf den Aspekten des Datenschutzes, die durch Softwareentwicklung stark beeinflusst werden, wie z.B. Privacy by Design, Privacy by Default, Datenminimierung, Umsetzung von Auskunftsrechten sowie Datenlöschung. RALF KNEUPER ist Professor für Wirtschaftsinformatik und Informatik an der IUBH Internationale Hochschule im Bereich Fernstudium. Daneben arbeitet er als Berater für Softwarequalitätsmanagement und Prozessverbesserung sowie als externer Datenschutzbeauftragter bei mehreren IT-Unternehmen.Einführung - Allgemeine Grundlagen des Datenschutzes nach DSGVO - Grundsätze des Datenschutzes und deren Umsetzung - Rechte der Betroffenen und deren Umsetzung - Austausch von Daten zwischen Beteiligten - Technische und organisatorische Gestaltung des Datenschutzes - Grundbegriffe der IT-Sicherheit - Datenschutz innerhalb einer IT-Organisation

Regulärer Preis: 46,99 €
Produktbild für Sketchnotes in der IT

Sketchnotes in der IT

Abstrakte Themen mit Leichtigkeit visualisieren. Die praktische Einführung mit Tipps, Tricks und Symbolen.Im IT-Berufsalltag sammeln sich unzählige Notizen – zu Vorträgen, Meetings, Aufzeichnungen zu komplexen Aufgaben … Häufig sind sie hässlich, lang, unleserlich – und landen schnell im Altpapier. Sketchnotes dagegen sehen nicht nur schick aus, sie helfen auch dabei, sich an die wichtigsten Dinge zu erinnern, und erfreuen Kolleginnen und Kollegen.Dieses Buch gibt eine praktische Einführung in die Welt der Sketchnotes. Schon auf den ersten Seiten erstellst du deine erste Sketchnote – unabhängig von Vorwissen oder Talent. Nach einem Grundlagenkapitel, das Hilfen für den Einstieg bietet, zeigt die Softwareentwicklerin Lisa-Maria Moritz, in welchen Bereichen deines Arbeitsalltags in der IT du Sketchnotes einsetzen kannst. Um dabei die passende Visualisierung zu finden, hat sie eine umfangreiche Bibliothek mit zahlreichen Symbolideen zu abstrakten Begriffen der IT zusammengestellt, deren Erstellung sie in Schritt-für-Schritt-Anleitungen zeigt.

Regulärer Preis: 22,90 €
Produktbild für Essential Java for AP CompSci

Essential Java for AP CompSci

Gain the essential skills for computer science using one of today's most popular programming languages, Java. This book will prepare you for AP CompSci Complete, but you don’t need to be sitting that class to benefit. Computer science has become a basic life skill that everyone is going to need to learn. Whether you are going into a career or side hustle in business, technology, creativity, architecture, or almost any other field, you will find coding and computer science play a role.So when we learn programming we are going to focus on three things: what is the process; what is the syntax; and what is the flow. The process is represented as a flowchart. We will learn how to make these to help you plan out what you are going to do before you write a line of code. At first, the flowcharts will be pretty simple, but then they will get more complex. The syntax is the code: this is what you write that translates the process you create in a flowchart to the instructions that the computer can understand. Finally, there is the flow. This is where you trace through the code and see how the data and information it stores along the way changes. You can see how the operation of the program cascades from line to line. You will be building charts that will capture the programming flow so you can better understand how the computer processes code to make your next program easier to conceive and code.Along the way to aid in the learning of the essential Java skills, there will be three kinds of project types throughout this book: business software projects for applications where you work for a company and need to complete an internal project for a team such as the sales, marketing, or data science teams; social good projects where you are working for non-profits or for agencies that are trying to research and provide solutions to economic, environmental, medical, or humanitarian projects; and game development projects for games based on player input, random chance, or other mechanics for the use of entertainment.What is unique about computer science is how it has become a skill, and not just a career. While there are jobs and titles of “computer scientist”, the skill of computer science, and specifically programming, are almost everywhere. After reading and using this book, you'll have the essential skills to think like a computer scientist, even if you are not. As a result you’ll be of greater value to your clients, your company, and yourself.WHAT YOU WILL LEARNDiscover the primary building blocks of programming using the Java programming language * See terminology and best practices of software development* Work with object-oriented programming concepts* Use common-language definitions and examples to help drive understanding and comprehension of computer science fundamentalsWHO THIS BOOK IS FORThose who want to learn programming and want to think like a computer scientist. Ideal for anyone taking AP CompSci Complete.Doug Winnie is director of learning experience at H&R Block, responsible for learning and development platforms supporting associates across the organization. Previously, Doug was principal program manager at Microsoft and LinkedIn leading the LinkedIn Learning instructor community, curriculum strategy for technology learning content, and as a member the Windows Insider team supporting educational and career growth for millions of Windows Insiders worldwide.Throughout his career and consulting with companies such as Adobe, PG&E, Safeway, HP, and the US Army, Doug has worked to help developers and designers through education, product management, and interactive development. Doug was honored with two Webby award nominations with projects for Industrial Light and Magic and has written multiple publications to teach beginners how to code. He is also an AP Computer Science teacher, teaching the next generation of developers. Doug lives in the Kansas City metro area and Palm Springs, California.1. WELCOME TO COMPUTER SCIENCE2. SPRINT 01: INTRODUCTION3. SPRINT 02: SETTING UP THE JAVA JDK AND INTELLIJ4. SPRINT 03: SETTING UP GITHUBa. QUIZ 01b. QUIZ 025. SPRINT 04: PROGRAMMING LANGUAGES6. SPRINT 05: HISTORY AND USES OF JAVA7. SPRINT 06: HOW JAVA WORKSa. QUIZ 038. SPRINT 07: FLOWCHARTINGa. ASSIGNMENT 01: PBJ’Db. QUIZ 049. SPRINT 08: HELLO, WORLDa. QUIZ 0510. SPRINT 09: SIMPLE JAVA PROGRAM STRUCTURE11. SPRINT 10: TEXT LITERALS AND OUTPUTa. ASSIGNMENT 02: EE’D12. SPRINT 11: VALUE LITERALS13. SPRINT 12: OUTPUT FORMATTING14. SPRINT 13: COMMENTS AND WHITESPACE15. SPRINT 14: ABSTRACTION OF NUMBERS16. SPRINT 15: BINARYa. QUIZ 0617. SPRINT 16: UNICODE18. SPRINT 17: VARIABLES19. SPRINT 18: MATH. UGH.a. QUIZ 07b. ASSIGNMENT 03: SILO’D20. SPRINT 19: MATH FUNCTIONS21. SPRINT 20: MANAGING TYPEa. ASSIGNMENT 04: SPACE’Db. QUIZ 08c. QUIZ 09d. QUIZ 10e. QUIZ 1122. SPRINT 21: RANDOM NUMBERS23. SPRINT 22: CAPTURE INPUT24. SPRINT 23: CREATING TRACE TABLES25. SPRINT 24: FUNCTIONSa. ASSIGNMENT 05: ORC’D26. SPRINT 25: NESTED FUNCTIONS27. SPRINT 26: FUNCTIONS AND VALUESa. QUIZ 1228. SPRINT 27: FUNCTIONS AND SCOPEa. QUIZ 13b. QUIZ 14c. QUIZ 15d. ASSIGNMENT 06: ULTIMA’De. ASSIGNMENT 07: CYCLONE’D29. SPRINT 28: BOOLEAN VALUES AND EQUALITYa. QUIZ 16b. ASSIGNMENT 08: SPRINT’Dc. USER STORY: 52-PICKUP30. SPRINT 29: SIMPLE CONDITIONAL STATEMENTSa. USER STORY: YAHTZEEb. USER STORY: YAHTZEE TESTINGc. QUIZ 17d. QUIZ 18e. QUIZ 1931. SPRINT 30: MATCHING CONDITIONS WITH THE SWITCH STATEMENT32. SPRINT 31: THE TERNARY OPERATOR33. SPRINT 32: THE STACK AND THE HEAP34. SPRINT 33: TESTING EQUALITY WITH STRINGSa. ASSIGNMENT 09: ESCAPE’Db. USER STORY: ESCAPE’D WHITE BOX35. SPRINT 34: DEALING WITH ERRORS36. SPRINT 35: DOCUMENTING WITH JAVADOC37. SPRINT 36: FORMATTED STRINGS38. SPRINT 37: THE WHILE LOOPa. QUIZ 20b. QUIZ 21c. QUIZ 2239. SPRINT 38: AUTOMATIC PROGRAM LOOPS40. SPRINT 39: THE DO/WHILE LOOPa. ASSIGNMENT 10: SEQUENCE’Db. USER STORY: DICEYc. USER STORY SOLUTION: DICEYd. USER STORY: CONVERTERe. USER STORY SOLUTION: CONVERTER41. SPRINT 40: PROBABILITY42. SPRINT 41: SIMPLIFIED ASSIGNMENT OPERATORS43. SPRINT 42: THE FOR LOOPa. QUIZ 23b. ASSIGNMENT 11: ODDS’D44. SPRINT 43: NESTING LOOPSa. USER STORY: MAP BUILDER45. SPRINT 44: STRINGS AS COLLECTIONSa. ASSIGNMENT 12: PALINDROME’Db. QUIZ 2446. SPRINT 45: MAKE COLLECTIONS USING ARRAYSa. QUIZ 2547. SPRINT 46: CREATING ARRAYS FROM STRINGSa. ASSIGNMENT 13: ELECTION’Db. QUIZ 2648. SPRINT 47: MULTIDIMENSIONAL ARRAYS49. SPRINT 48: LOOPING THROUGH MULTIDIMENSIONAL ARRAYSa. QUIZ 27b. QUIZ 2850. SPRINT 49: BEYOND ARRAYS WITH ARRAYLISTS51. SPRINT 50: INTRODUCING GENERICS52. SPRINT 51: LOOPING WITH ARRAYLISTSa. ASSIGNMENT 14: LIST’D53. SPRINT 52: USING FOR…EACH LOOPSa. ASSIGNMENT 15: NUMBER’Db. QUIZ 29c. QUIZ 3054. SPRINT 53: THE ROLE-PLAYING GAME CHARACTERa. ASSIGNMENT 16: ROLL’D55. SPRINT 54: POLYMORPHISMa. ASSIGNMENT 17: EXTEN’D56. SPRINT 55: MAKE ALL THE THINGS…CLASSES57. SPRINT 56: CLASS, EXTEND THYSELF!a. QUIZ 3158. SPRINT 57: I DON'T COLLECT THOSE; TOO ABSTRACT.59. SPRINT 58: ACCESS DENIED: PROTECTED AND PRIVATEa. QUIZ 32b. QUIZ 3360. SPRINT 59: INTERFACING WITH INTERFACESa. QUIZ 34b. QUIZ 35c. QUIZ 36d. QUIZ 37e. ASSIGNMENT 18: STARSHIP’D61. SPRINT 60: ALL I'M GETTING IS STATIC62. SPRINT 61: AN ALL-STAR CAST, FEATURING NULL63. ANSWER KEY

Regulärer Preis: 66,99 €
Produktbild für Digitale Transformation, Arbeit und Gesundheit

Digitale Transformation, Arbeit und Gesundheit

Die digitale Transformation verändert die Arbeitswelt. Wie wird die Digitalisierung gesundheitsgerecht in kleinen und mittleren Unternehmen umgesetzt? Der aktuelle Wissensstand wird zusammengefasst, mit detaillierten Einblicken in die Praxis und Werkzeugen zur Bewältigung betrieblicher Digitalisierungsprojekte.THOMAS ENGEL, Leiter ZeTT – Zentrum Digitale Transformation Thüringen, Friedrich-Schiller-Universität Jena, forscht zum Wandel von Arbeit und Beschäftigung in der Digitalisierung.CHRISTIAN ERFURTH, Professor für Informatik, Ernst-Abbe-Hochschule Jena, beschäftigt sich mit den technologischen und organisatorischen Gestaltungsmöglichkeiten der digitalen Arbeitswelt.STEPHANIE DRÖSSLER arbeitet am Institut und Poliklinik für Arbeits- und Sozialmedizin der Medizinischen Fakultät der TU Dresden zu gesundheitlichen Belastungen und Prävention im digitalen Wandel.SANDRA LEMANSKI arbeitet am Lehrstuhl Gesundheit und Prävention der Universität Greifswald zu Stress im Arbeitskontext und den Gestaltungsmöglichkeiten von Arbeit in der und durch die digitale Transformation.

Regulärer Preis: 46,99 €
Produktbild für SQL Server on Kubernetes

SQL Server on Kubernetes

Build a modern data platform by deploying SQL Server in Kubernetes. Modern application deployment needs to be fast and consistent to keep up with business objectives and Kubernetes is quickly becoming the standard for deploying container-based applications, fast. This book introduces Kubernetes and its core concepts. Then it shows you how to build and interact with a Kubernetes cluster. Next, it goes deep into deploying and operationalizing SQL Server in Kubernetes, both on premises and in cloud environments such as the Azure Cloud.You will begin with container-based application fundamentals and then go into an architectural overview of a Kubernetes container and how it manages application state. Then you will learn the hands-on skill of building a production-ready cluster. With your cluster up and running, you will learn how to interact with your cluster and perform common administrative tasks. Once you can admin the cluster, you will learn how to deploy applications and SQL Server in Kubernetes. You will learn about high-availability options, and about using Azure Arc-enabled Data Services. By the end of this book, you will know how to set up a Kubernetes cluster, manage a cluster, deploy applications and databases, and keep everything up and running.WHAT YOU WILL LEARN* Understand Kubernetes architecture and cluster components* Deploy your applications into Kubernetes clusters* Manage your containers programmatically through API objects and controllers* Deploy and operationalize SQL Server in Kubernetes* Implement high-availability SQL Server scenarios on Kubernetes using Azure Arc-enabled Data Services* Make use of Kubernetes deployments for Big Data ClustersWHO THIS BOOK IS FORDBAs and IT architects who are ready to begin planning their next-generation data platform and want to understand what it takes to run SQL Server in a container in Kubernetes. SQL Server on Kubernetes is an excellent choice for those who want to understand the big picture of why Kubernetes is the next-generation deployment method for SQL Server but also want to understand the internals, or the how, of deploying SQL Server in Kubernetes. When finished with this book, you will have the vision and skills to successfully architect, build and maintain a modern data platform deploying SQL Server on Kubernetes.ANTHONY E. NOCENTINO is the Founder and President of Centino Systems as well as a Pluralsight author, a Microsoft Data Platform MVP, and an industry-recognized Kubernetes, SQL Server, and Linux expert. In his consulting practice, Anthony designs solutions, deploys the technology, and provides expertise on system performance, architecture, and security. He has bachelor's and master's degrees in computer science, with research publications in machine virtualization, high performance/low latency data access algorithms, and spatial database systems.BEN WEISSMAN is the owner and founder of Solisyon, a consulting firm based in Germany and focused on business intelligence (BI), business analytics, and data warehousing. He is a Microsoft Data Platform MVP, the first German BimlHero, and has been working with SQL Server since SQL Server 6.5. Ben is also an MCSE, Charter Member of the Microsoft Professional Program for Big Data, Artificial Intelligence and Data Science, and he is a Certified Data Vault Data Modeler. If he is not currently working with data, he is probably travelling to explore the world. You can find him online at @bweissman on Twitter.PART I. CONTAINER AND KUBERNETES FOUNDATIONS1. Getting Started2. Container Fundamentals3. Kubernetes ArchitecturePART II. KUBERNETES IN PRACTICE4. Installing Kubernetes5. Interacting with your Kubernetes Cluster6. Storing Persistent Data in KubernetesPART III. SQL SERVER IN KUBERNETES7. Deploying SQL Server in Kubernetes8. Monitoring SQL Server in Kubernetes9. Azure Arc-enabled Data Services and High Availability for SQL Server in Kubernetes10. Big Data Clusters

Regulärer Preis: 62,99 €
Produktbild für Towards Sustainable Artificial Intelligence

Towards Sustainable Artificial Intelligence

So far, little effort has been devoted to developing practical approaches on how to develop and deploy AI systems that meet certain standards and principles. This is despite the importance of principles such as privacy, fairness, and social equality taking centre stage in discussions around AI. However, for an organization, failing to meet those standards can give rise to significant lost opportunities. It may further lead to an organization’s demise, as the example of Cambridge Analytica demonstrates. It is, however, possible to pursue a practical approach for the design, development, and deployment of sustainable AI systems that incorporates both business and human values and principles.This book discusses the concept of sustainability in the context of artificial intelligence. In order to help businesses achieve this objective, the author introduces the sustainable artificial intelligence framework (SAIF), designed as a reference guide in the development and deployment of AI systems.The SAIF developed in the book is designed to help decision makers such as policy makers, boards, C-suites, managers, and data scientists create AI systems that meet ethical principles. By focusing on four pillars related to the socio-economic and political impact of AI, the SAIF creates an environment through which an organization learns to understand its risk and exposure to any undesired consequences of AI, and the impact of AI on its ability to create value in the short, medium, and long term.WHAT YOU WILL LEARN* See the relevance of ethics to the practice of data science and AI* Examine the elements that enable AI within an organization* Discover the challenges of developing AI systems that meet certain human or specific standards* Explore the challenges of AI governance* Absorb the key factors to consider when evaluating AI systemsWHO THIS BOOK IS FORDecision makers such as government officials, members of the C-suite and other business managers, and data scientists as well as any technology expert aspiring to a data-related leadership role.GHISLAIN TSAFACK is Head of Data Science at Elemental Concept 2016 LTD (EC), where he leads the organization’s AI strategy. As part of this, he leads the company’s work in leveraging the latest advances in AI to help clients create value from their data and auditing AI systems developed by third parties on behalf of potential investors.Ghislain’s work in the healthcare industry at EC involves supporting the development of data related healthcare products for his clients. This made him appreciate the challenges and the complexity of developing AI systems that people trust to make the right decision for them and stimulated him to write this book.Before joining EC Ghislain held positions as data scientist in the telecommunications and energy sectors. Prior to this, Ghislain worked as an academic at the French National Institute for Research and Automation (INRIA) and the University of Lyon 1. His work primarily focused on analyzing the behaviors of high performance systems to improve their energy efficiency and gave him the opportunity to co-author several scientific books presenting methodologies for improving the energy efficiency for large scale computing infrastructures. He holds a PhD in computer science from Ecole Normale Supérieure of Lyon, France.● Chapter 1: AI in our Society● Chapter goal: Reviews the place of AI within our society, discuss the various challenges that it AI faces, and introduces the foundational concepts of our sustainable AI framework○ 1.1 The Need for Artificial Intelligence○ 1.2 Challenges of Artificial Intelligence○ 1.3 Sustainable Artificial Intelligence● Chapter 2 Ethics of the Data Science Practice● Chapter goal: Reviews the human factor pillar of artificial intelligence, the relevance of ethics in AI and the source of ethical hazards in AI○ 2.1 Introduction○ 2.2 Ethics and their relevance to AI○ 2.3 Ethical nature of AI inferencing capability○ 2.4 Data – The business asset○ 2.5 AI regulatory outlook○ 2.6 Conclusion● Chapter 3 Overview of the Sustainable Artificial Intelligence Framework (SAIF)● Chapter goal: Summarises the SAIF framework for the development and deployment of AI applications● Chapter 4 Intra-organizational understanding of AI: Towards Transparency● Chapter goal: Discusses the need for understanding AI at the organization’s level and introduces concepts of AI governance○ 4.1 Introduction○ 4.2 Data Science Development Process○ 4.3 AI development process Controls○ 4.4 Governance■ 4.4.1 Expectations from AI governance■ 4.4.2 People and Values■ 4.4.3 Assessment of AI governance arrangements○ 4.5 Conclusion● Chapter 5 AI Performance Measurement: Think business values and objectives● Chapter goal: Summarises performance metrics for evaluating AI systems and introduces a framework to account for the human factor of AI○ 5.1 Introduction○ 5.2 AI performance metrics overview■ 5.2.1 Supervised problems■ 5.2.2 Unsupervised problems○ 5.3 Beyond traditional AI performance metrics■ 5.3.1 Soft performance metrics■ 5.3.2 From AI performance metrics to business objectives○ 5.4 Conclusion● Chapter 6 SAIF in Action● Chapter goal: This chapter illustrates how SAIF would work in practice through use cases● Chapter 7 Alternatives avenues for regulating AI systems● Chapter goal: Draws from experiences in academic, Telecom/Utility, and healthcare sectors to explore and examine the need for industry specific regulations.● Chapter 8 AI decision-making – from expectations to reality: The use case of healthcare● Chapter goal: Explores the use of artificial intelligence in the healthcare, its practical limitations an implications● Chapter 9 Conclusions and discussion● Chapter goal: Presents concluding remarks and discuss current lack of standards○ 9.1 Conclusions○ 9.2 Need for standards and definitions

Regulärer Preis: 56,99 €
Produktbild für Real-Time Twilio and Flybase

Real-Time Twilio and Flybase

Use Flybase and Twilio with Node.js to build real-time solutions and understand how real-time web technologies work. Written by the founder of Flybase, this book offers you practical solutions for communicating effectively with users on the modern web.Flybase.io is a web platform, used to store and retrieve data in real-time, as well as to send and receive real-time events such as triggers for incoming calls, incoming messages, agents logging off, etc.You will learn to send daily SMS messages, build an SMS call center to provide support to users, and build a call center to handle incoming and outgoing phone calls from the browser. You'll also build a group calling system to let groups send messages to each other: handy for managing events.Real-Time Twilio brings to light using the winning combination of Flybase and Twilio with Node.js for anyone with basic web development skills.WHAT YOU'LL LEARN* Develop web apps with Flybase and Twilio* Build a live blogging tool and a group chat app* Create a click-to-call call center and a Salesforce-powered call center* Send daily SMS reminders* Develop a real-time call tracking dashboardWHO THIS BOOK IS FORThose who want to learn to use Twilio and who wants to learn real-time development.ROGER STRINGER is the founder of Flybase, a real-time application platform that makes it easy for developers to design, build, and scale real-time web and mobile apps in minutes instead of days using client-side code. You can find him on Twitter @freekrai.1. Introducing Real-Time Apps2. Build a real-time SMS call center3. Build a Live Blogging tool4. Build a Real-time Group Chat App5. Creating a Click to Call Call Center6. Building A Salesforce Powered Call Center7. Sending Daily SMS Reminders8. Building a real-time Call Tracking Dashboard

Regulärer Preis: 46,99 €
Produktbild für Quantum Machine Learning: An Applied Approach

Quantum Machine Learning: An Applied Approach

Know how to adapt quantum computing and machine learning algorithms. This book takes you on a journey into hands-on quantum machine learning (QML) through various options available in industry and research.The first three chapters offer insights into the combination of the science of quantum mechanics and the techniques of machine learning, where concepts of classical information technology meet the power of physics. Subsequent chapters follow a systematic deep dive into various quantum machine learning algorithms, quantum optimization, applications of advanced QML algorithms (quantum k-means, quantum k-medians, quantum neural networks, etc.), qubit state preparation for specific QML algorithms, inference, polynomial Hamiltonian simulation, and more, finishing with advanced and up-to-date research areas such as quantum walks, QML via Tensor Networks, and QBoost.Hands-on exercises from open source libraries regularly used today in industry and research are included, such as Qiskit, Rigetti's Forest, D-Wave's dOcean, Google's Cirq and brand new TensorFlow Quantum, and Xanadu's PennyLane, accompanied by guided implementation instructions. Wherever applicable, the book also shares various options of accessing quantum computing and machine learning ecosystems as may be relevant to specific algorithms.The book offers a hands-on approach to the field of QML using updated libraries and algorithms in this emerging field. You will benefit from the concrete examples and understanding of tools and concepts for building intelligent systems boosted by the quantum computing ecosystem. This work leverages the author’s active research in the field and is accompanied by a constantly updated website for the book which provides all of the code examples.WHAT YOU WILL LEARN* Understand and explore quantum computing and quantum machine learning, and their application in science and industry* Explore various data training models utilizing quantum machine learning algorithms and Python libraries* Get hands-on and familiar with applied quantum computing, including freely available cloud-based access* Be familiar with techniques for training and scaling quantum neural networks* Gain insight into the application of practical code examples without needing to acquire excessive machine learning theory or take a quantum mechanics deep diveWHO THIS BOOK IS FORData scientists, machine learning professionals, and researchersSANTANU GANGULY has been working in the fields of quantum technologies, cloud computing, data networking, and security (on research, design, and delivery) for over 21 years. He works in Switzerland and the United Kingdom (UK) for various Silicon Valley vendors and ISPs. He has two postgraduate degrees (one in mathematics and another in observational astrophysics), and research experience and publications in nanoscale photonics and laser spectroscopy. He is currently leading global projects out of the UK related to quantum communication and machine learning, among other technologies.Chapter 1: IntroductionCHAPTER GOAL: Introduction to book and topics to be coveredNO OF PAGES 12SUB -TOPICS1. Rise of The Quantum Computers2. Learning from data: AI, ML and Deep Learning3. Way forward4. Bird’s Eye view of Quantum Machine Learning Algorithms5. Organisation of the book6. Software and Languages (Linux and Python libraries)Chapter 2: Quantum Computing & Information1. CHAPTER GOAL: A comprehensive understanding of key concepts related to Quantum information science and cloud based free access options for quantum computation quantum domain with examplesNO OF PAGES: 65SUB - TOPICS:2. Basics of Quantum Computing: Qubits, Bloch sphere and gates3. Quantum Circuits4. Quantum Parallelism5. Quantum Computing by Annealing6. Quantum Computing with Superconducting qubits7. Other flavours of Quantum Computing8. Algorithms: Grover, Deutsch, Deutsch-Josza9. Optimisation theory10. Hands-on exercisesChapter 3: Quantum Information EncodingChapter Goal:To understand how to encode data in quantum machine learning space with examplesNO OF PAGES: 30SUB - TOPICS:26. Initiation and selection of data27. Basis encoding28. Superposition of inputs29. Sampling Theory30. Hamiltonian31. Amplitude Encoding32. Other Encoding techniques33. Hands-on exercisesChapter 4: QML AlgorithmsCHAPTER GOAL: Understanding hardware driven algorithmic computations for quantum machine learningNo of pages: 35SUB - TOPICS:34. Hardware Interface (Quantum Processors)35. Quantum K-Means and K-Medians36. Quantum Clustering37. Quantum Classifiers (e.g., nearest neighbours)38. Support Vector Machine (SVM) in quantum space39. Hands-on exercisesChapter 5: InferenceCHAPTER GOAL: Models and methods used in Quantum Machine LearningNO OF PAGES: 35SUB - TOPICS:40. Principal Component Analysis41. Feature Maps42. Linear Models43. Probabilistic Models44. Hands-on ExercisesChapter 6: Training the DataCHAPTER GOAL: Training models and techniques of Quantum Machine LearningNO OF PAGES: 105SUB - TOPICS:45. Unsupervised and supervised learning46. Matrix inversion47. Amplitude amplification for QML48. Quantum optimization49. Travelling Salesman Problem50. Variational Algorithms51. QAOA52. Maxcut Problem53. VQE (Virtual Quantum Eigensolver)54. Varitaional Classification algorithms55. Hands-on ExercisesChapter 7: Quantum Learning ModelsCHAPTER GOAL: Learning models and techniques of Quantum Machine LearningNo of pages: 75SUB - TOPICS:56. Optimal state for learning57. Channel State duality58. Tomography59. Quantum Neural Networks60. Quantum Walk61. Tensor Network applications62. Hands-on ExercisesChapter 8: Future of QML in Research and IndustryCHAPTER GOAL: Forward looking prospects of Quantum Machine Learning in industry, enterprises and opportunitiesNO OF PAGES: 15SUB - TOPICS:1. Speed up that Big Data2. Effect of Error Correction3. Machine learning marries Quantum Computing4. QBoost5. Quantum Walk6. Mapping to hardware7. Hands-on ExercisesReferences Index

Regulärer Preis: 66,99 €
Produktbild für Software Testing Foundations

Software Testing Foundations

FUNDAMENTAL KNOWLEDGE AND BASIC EXPERIENCE – BROUGHT THROUGH PRACTICAL EXAMPLES * Thoroughly revised and updated 5th edition, following upon the success of four previous editions * Updated according to the most recent ISTQB® Syllabus for the Certified Tester Foundations Level (2018) * Authors are among the founders of the Certified Tester Syllabus Professional testing of software is an essential task that requires a profound knowledge of testing techniques. The International Software Testing Qualifications Board (ISTQB®) has developed a universally accepted, international qualification scheme aimed at software and system testing professionals, and has created the Syllabi and Tests for the Certified Tester. Today about 673,000 people have taken the ISTQB® certification exams. The authors of Software Testing Foundations, 5th Edition, are among the creators of the Certified Tester Syllabus and are currently active in the ISTQB®. This thoroughly revised and updated fifth edition covers the Foundation Level (entry level) and teaches the most important methods of software testing. It is designed for self-study and provides the information necessary to pass the Certified Tester-Foundations Level exam, version 2018, as defined by the ISTQB®. Topics covered: - Fundamentals of Testing - Testing and the Software Lifecycle - Static and Dynamic Testing Techniques - Test Management - Test Tools

Regulärer Preis: 39,90 €
Produktbild für Data Analytics for Organisational Development

Data Analytics for Organisational Development

A PRACTICAL GUIDE FOR ANYONE WHO ASPIRES TO BECOME DATA ANALYTICS–SAVVYData analytics has become central to the operation of most businesses, making it an increasingly necessary skill for every manager and for all functions across an organisation. Data Analytics for Organisational Development: Unleashing the Potential of Your Data introduces a methodical process for gathering, screening, transforming, and analysing the correct datasets to ensure that they are reliable tools for business decision-making. Written by a Six Sigma Master Black Belt and a Lean Six Sigma Black Belt, this accessible guide explains and illustrates the application of data analytics for organizational development and design, with particular focus on Customer and Strategy Analytics, Operations Analytics and Workforce Analytics.Designed as both a handbook and workbook, Data Analytics for Organisational Development presents the application of data analytics for organizational design and development using case studies and practical examples. It aims to help build a bridge between data scientists, who have less exposure to actual business issues, and the "non-data scientists." With this guide, anyone can learn to perform data analytics tasks from translating a business question into a data science hypothesis to understanding the data science results and making the appropriate decisions. From data acquisition, cleaning, and transformation to analysis and decision making, this book covers it all. It also helps you avoid the pitfalls of unsound decision making, no matter where in the value chain you work.* Follow the “Five Steps of a Data Analytics Case” to arrive at the correct business decision based on sound data analysis* Become more proficient in effectively communicating and working with the data experts, even if you have no background in data science* Learn from cases and practical examples that demonstrate a systematic method for gathering and processing data accurately* Work through end-of-chapter exercises to review key concepts and apply methods using sample data setsData Analytics for Organisational Development includes downloadable tools for learning enrichment, including spreadsheets, Power BI slides, datasets, R analysis steps and more. Regardless of your level in your organisation, this book will help you become savvy with data analytics, one of today’s top business tools.UWE H. KAUFMANN, PHD, is the founder of the Centre for Organisational Effectiveness, a business advisory firm based in Singapore. He is Adjunct Senior Fellow at the Singapore University of Technology and Design and Affiliate Faculty at Singapore Management University Academy.AMY B.C. TAN is Director and Partner at the Centre for Organisational Effectiveness and Affiliate Faculty at Singapore Management University Academy. She has over 20 years of experience in strategic HR management, organisational development, succession planning, performance management, and leadership development.ForewordPrefaceIntroduction: Why Data Analytics is ImportantChapter 1: Introduction to Data Analytics and Data ScienceChapter 2: Customer Domain – Customer AnalyticsChapter 3: Process Domain – Operations AnalyticsChapter 4: Workforce Domain – Workforce AnalyticsChapter 5: Implementing Data Analytics for Organisational DevelopmentMaterials for DownloadIndex

Regulärer Preis: 31,99 €
Produktbild für External Labeling

External Labeling

THIS BOOK FOCUSES ON TECHNIQUES FOR AUTOMATING THE PROCEDURE OF CREATING EXTERNAL LABELINGS, ALSO KNOWN AS CALLOUT LABELINGS. In this labeling type, the features within an illustration are connected by thin leader lines (called leaders) with their labels, which are placed in the empty space surrounding the image.In general, textual labels describing graphical features in maps, technical illustrations (such as assembly instructions or cutaway illustrations), or anatomy drawings are an important aspect of visualization that convey information on the objects of the visualization and help the reader understand what is being displayed.Most labeling techniques can be classified into two main categories depending on the "distance" of the labels to their associated features. Internal labels are placed inside or in the direct neighborhood of features, while external labels, which form the topic of this book, are placed in the margins outside the illustration, where they do not occlude the illustration itself. Both approaches form well-studied topics in diverse areas of computer science with several important milestones.The goal of this book is twofold. The first is to serve as an entry point for the interested reader who wants to get familiar with the basic concepts of external labeling, as it introduces a unified and extensible taxonomy of labeling models suitable for a wide range of applications. The second is to serve as a point of reference for more experienced people in the field, as it brings forth a comprehensive overview of a wide range of approaches to produce external labelings that are efficient either in terms of different algorithmic optimization criteria or in terms of their usability in specific application domains. The book mostly concentrates on algorithmic aspects of external labeling, but it also presents various visual aspects that affect the aesthetic quality and usability of external labeling.* Bibliography* Preface* Acknowledgments* Figure Credits* Introduction* A Unified Taxonomy* Visual Aspects of External Labeling* Labeling Techniques* External Labelings with Straight-Line Leaders* External Labelings with Polyline Leaders* Conclusions and Outlook* Bibliography* Authors' Biographies* Index

Regulärer Preis: 43,99 €