Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16¿20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
This book constitutes the refereed proceedings of the IFIP WG 8.2 and WG 9.4 Joint Working Conference on After Latour: Globalisation, Inequity and Climate Change, IFIPJWC 2023, held in Hyderabad, India, during December 7¿8, 2023.The 15 full papers presented together with 13 short papers were carefully reviewed and selected from 60 submissions. They are organized in topical sections as follows: climate change and digital sustainability; ICT¿s and sustainable development; IS in the education sector; privacy, trust, and surveillance; theories and methods.
This book presents and develops comprehensive knowledge of vehicular channel characteristics and proper vehicular channel models. The studied topics contain the propagation characteristics of vehicular communications, such as: a time-frequency non-stationary single-input single-output (SISO) vehicle-to-vehicle (V2V) non-geometry stochastic model (NGSM); a space-time non-stationary massive multiple-input multiple-output (MIMO) V2V regular-shaped geometry-based stochastic model (RS-GBSM); and a space-time non-stationary massive MIMO V2V irregular-shaped geometry-based stochastic model (IS-GBSM). Each is introduced, with characteristics then discussed in detail. Finally, this book discusses future research directions to inspire further investigation in the field of vehicular channels from three different perspectives.
This book constitutes the refereed proceedings of the 15th International Symposium on Search-Based Software Engineering, SSBSE 2023, which took place in San Francisco, CA, USA, during December 8, 2023.The 7 full and 7 short papers included in this book were carefully reviewed and selected from 23 submissions. They focus on formulating various optimization problems in software engineering as search problems, addressing them with search techniques, intending to automate complex software engineering tasks.
Unlock the Power of Cloud Infrastructure with "IaaS Mastery" Book Bundle!Are you ready to conquer the dynamic world of cloud infrastructure? Look no further than the "IaaS Mastery: Infrastructure as a Service" book bundle, your comprehensive guide to mastering cloud technology with a focus on the industry's leading providers.Discover What's Inside:Book 1 - IaaS Fundamentals: A Beginner's Guide to Cloud Infrastructure Begin your journey with a solid foundation. Learn the essentials of cloud computing and understand the core principles of Infrastructure as a Service. Perfect for newcomers and those seeking a refresher on cloud basics.Book 2 - Mastering IaaS: Building Scalable Cloud Solutions with AWS and GCE Dive into practical applications with Amazon Web Services (AWS) and Google Cloud Engine (GCE). Gain hands-on experience in creating scalable and resilient cloud solutions using these renowned platforms.Book 3 - Advanced IaaS Architectures: Optimizing Microsoft Azure for Enterprises Elevate your expertise with a deep dive into Microsoft Azure. Explore advanced topics such as high-performance networks, scalable compute solutions, security measures, and automation tailored for enterprise workloads.Book 4 - IaaS Expertise: Harnessing the Power of IBM Cloud for Enterprise Solutions Unleash the potential of IBM Cloud as a tool for enterprise transformation. Discover infrastructure offerings, networking strategies, security features, and advanced automation capabilities. Real-world enterprise success stories provide valuable insights.Why Choose "IaaS Mastery"?· Comprehensive Coverage: From beginner to expert, this bundle covers everything you need to know about IaaS.· Hands-On Experience: Practical examples and real-world scenarios ensure you're ready to apply your knowledge.· Top Cloud Providers: Learn from the best-AWS, GCE, Microsoft Azure, and IBM Cloud.· Enterprise Focus: Equip yourself with skills tailored for the demands of large organizations.· Future-Proof Your Career: Cloud technology is the future; stay ahead of the curve with this invaluable resource.Don't miss this opportunity to become an IaaS expert. Whether you're an IT professional, aspiring cloud enthusiast, or business leader, "IaaS Mastery" empowers you with the knowledge and skills to succeed in the digital age. Purchase the bundle today and embark on your journey to mastering cloud infrastructure!
This book constitutes the refereed proceedings of the 19th International Symposium on Algorithmics of Wireless Networks, ALGOWIN 2023, held in Amsterdam, The Netherlands, during September 7¿8, 2023.The 10 full papers included in this book were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: design and analysis of algorithms, models of computation and experimental analysis.
This book constitutes the refereed proceedings of the 26th Brazilian Symposium on Formal Methods, SBMF 2023, held in Manaus, Brazil, during December 4-8, 2023.The 7 full papers and 2 short papers presented in this book were carefully reviewed and selected from 16 submissions.The papers are divided into the following topical sections: specification and modeling languages; testing; and verification and validation.
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Networks are pervasive. Very large scale integrated (VLSI) systems are no different, consisting of dozens of interconnected subsystems, hundreds of modules, and many billions of transistors and wires. Graph theory is crucial for managing and analyzing these systems. In this book, VLSI system design is discussed from the perspective of graph theory. Starting from theoretical foundations, the authors uncover the link connecting pure mathematics with practical product development. This book not only provides a review of established graph theoretic practices, but also discusses the latest advancements in graph theory driving modern VLSI technologies, covering a wide range of design issues such as synchronization, power network models and analysis, and interconnect routing and synthesis.Provides a practical introduction to graph theory in the context of VLSI systems engineering;Reviews comprehensively graph theoretic methods and algorithms commonly used during VLSI product development process;Includes a review of novel graph theoretic methods and algorithms for VLSI system design.
This LNCS volume constitutes the proceedings of 12th International Conference, GALA 2023, in Dublin, Ireland, held during November/December 2023. The 36 full papers and 13 short papers were carefully reviewed and selected from 88 submissions. The papers contained in this book have been organized into six categories, reflecting the variety of theoretical approaches and application domains of research into serious games: 1. The Serious Games and Game Design2. User experience, User Evaluation and User Analysis in Serious Games3. Serious Games for Instruction4. Serious Games for Health, Wellbeing and Social Change5. Evaluating and Assessing Serious Games Elements6. Posters
This book constitutes the refereed proceedings of the 8th International Conference on Engineering of Computer-Based Systems, ECBS 2023, which was held in Västerås, Sweden, in October 2023. The 11 full papers included in this book were carefully reviewed and selected from 26 submissions and present software, hardware, and communication perspectives of systems engineering through its many facets. The special theme of this year is ¿Engineering for Responsible AI¿.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
This book constitutes the proceedings of the 17th Chinese Conference, CCBR 2023, held in Xuzhou, China, during December 1¿3, 2023.The 41 full papers included in this volume were carefully reviewed and selected from 79 submissions. The volume is divided in topical sections named: Fingerprint, Palmprint and Vein Recognition; Face Detection, Recognition and Tracking; Affective Computing and Human-Computer Interface; Trustworthy, Privacy and Personal Data Security; Medical and Other Applications.
This book constitutes revised selected papers from the 11th International Workshop on Engineering Multi-Agent Systems, EMAS 2023, which was held in London, UK, during May 29¿30, 2023.The 11 full papers and 7 short papers included in this volume were carefully reviewed and selected from a total of 25 submissions. They were organized in topical sections as follows: agent-oriented software engineering; agents and microservices; strategy, reasoning, and planning; engineering domains and applications; agents in hypermedia environments; frameworks, tooling, and devops.
This book constitutes the refereed proceedings of the 20th International Conference on Virtual Reality and Mixed Reality, EuroXR 2023, held in Rotterdam, the Netherlands, during November 29-December 1, 2023.The 14 full papers presented together with 2 short papers were carefully reviewed and selected from 42 submissions.The papers are grouped into the following topics: Interaction in Virtual Reality; Designing XR Experiences; and Human Factors in VR: Performance, Acceptance, and Design.
A subtle change that leads to disastrous consequences-hardware Trojans undoubtedly pose one of the greatest security threats to the modern age. How to protect hardware against these malicious modifications? One potential solution hides within logic locking; a prominent hardware obfuscation technique. In this book, we take a step-by-step approach to understanding logic locking, from its fundamental mechanics, over the implementation in software, down to an in-depth analysis of security properties in the age of machine learning. This book can be used as a reference for beginners and experts alike who wish to dive into the world of logic locking, thereby having a holistic view of the entire infrastructure required to design, evaluate, and deploy modern locking policies.
This book provides readers with the current state-of-the-art research and technology on quantum computing. The authors provide design paradigms of quantum computing. Topics covered include multi-programming mechanisms on near-term quantum computing, Lagrange interpolation approach for the general parameter-shift rule, architecture-aware decomposition of quantum circuits, software for massively parallel quantum computing, machine learning in quantum annealing processors, quantum annealing for real-world machine learning applications, queuing theory models for (Fault-Tolerant) quantum circuits, machine learning for quantum circuit reliability assessment, and side-channel leakage in Suzuki stack circuits.
When everyday life becomes a state of emergency, how can yesterday's words suffice?'We were so happy and didn't know it...'A thirty-three-year-old writer lives in a quiet European suburb with his wife and his dog. His parents have bought an apartment nearby. On weekends they go out for brunch, cook and see friends. Life is good; it is normal. Then the invaders come.The Language of War is about what happens when your world changes overnight. When you wake up to the sound of helicopters and the smell of gunpowder. When your home is hit by shells or broken into by gunmen, and you spend another night in a basement-turned-bomb shelter. When, even though you've never held a weapon before, you realise the only choice is to fight back. It is about things one can never forget, or forgive.Bringing together Oleksandr Mykhed's vivid day-by-day chronicles of the invasion of Ukraine with a chorus of other voices - his family, friends in exile, those who have fought and have witnessed unimaginable atrocities - this book is both a record, and a reckoning. Haunting and timeless, it asks how it is possible to find the words to describe a new reality; how you can still make sense of the world when the only language you can speak is the language of war.
To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently. The book addresses a range of technical issues in cooperative resource allocation and information sharing for the future 6G heterogenous networks, from the terrestrial ultra-dense networks and space-based networks to the integrated satellite-terrestrial networks, as well as introducing the effects of cooperative behavior among mobile users on increasing capacity, trustworthiness and privacy. For the cooperative transmission in heterogeneous networks, the authors commence with the traffic offloading problems in terrestrial ultra-dense networks, and the cognitive and cooperative mechanisms in heterogeneous space-based networks, the stability analysis of which is also provided. Moreover, for the cooperative transmission in integrated satellite-terrestrial networks, the authors present a pair of dynamic and adaptive resource allocation strategies for traffic offloading, cooperative beamforming and traffic prediction based cooperative transmission. Later, the authors discuss the cooperative computation and caching resource allocation in heterogeneous networks, with the highlight of providing our current studies on the game theory, auction theory and deep reinforcement learning based approaches. Meanwhile, the authors introduce the cooperative resource and information sharing among users, in which capacity oriented-, trustworthiness oriented-, and privacy oriented cooperative mechanisms are investigated. Finally, the conclusion is drawn.
Understand essential IoT concepts to build smart IoT projects at reduced costs using the Arduino IoT Cloud platform, Arduino, ESP32 series boards, Amazon Alexa Voice Assistant, and MQT-135 with this practical guideKey FeaturesLearn about the Arduino IoT Cloud from scratch with hands-on projectsGain a solid understanding of IoT application development from basics to advanced featuresExplore the Arduino IoT Cloud's capabilities for commercial IoT solutions in depthPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Arduino IoT Cloud offers a variety of features for building modern IoT solutions while reducing time and costs for prototyping and deployment. This book is a step-by-step guide, helping you master the powerful Arduino IoT Cloud ecosystem. This book begins by introducing you to the IoT landscape including its architecture, communication technologies, and protocols and then to the capabilities of the Arduino IoT Cloud platform and the Cloud Editor. With practical projects, such as monitoring air quality, building a portable asset tracker, and creating a remote alarm system using the LoRaWAN specification, you'll learn how to implement real-world IoT applications. Next, you'll explore communication between IoT devices and cloud platforms as well as the implementation of the Arduino IoT Cloud SDK and JavaScript for advanced customization. You'll also find out how to program IoT nodes, analyze the surrounding environment data, and visualize it on dashboards. Additionally, you'll get to grips with advanced features such as task scheduling, synchronization, remote over-the-air updates for IoT nodes, and scripting with CCLI, through hands-on examples.By the end of this book, you'll have learned how to work with the Arduino IoT Cloud platform and related hardware devices and will be able to develop industry-specific and cost-effective IoT solutions, such as smart homes and smart agriculture.What you will learnGain a solid understanding of IoT fundamentals and conceptsBuild creative IoT projects using Arduino MKR boards, Pulse sensors, and moreMaster various communication technologies, including LoRaWAN and 3G/4GHarness data exchange between IoT devices and cloud platforms using Zapier or IFTTTExplore advanced features like scheduling, over-the-air updates, and scriptingUnderstand easy-to-sync properties across multiple devices with no-codeDevelop voice-assisted home automation and heart rate tracking applicationsWho this book is forThis book is for aspiring IoT developers and seasoned professionals eager to harness the potential of Arduino and cloud integration as well as technology enthusiasts, students, and hobbyists interested in experimenting with IoT technologies. Prior knowledge of basic electronics and embedded systems, cloud computing, Arduino, and programming languages like C and JavaScript is needed.Table of ContentsIntroduction to IoT and ArduinoFirst Look at the Arduino IoT CloudInsights into the Arduino IoT Cloud Platform and the Cloud EditorProject #1 - A Smarter Setup for Sensing the EnvironmentProject #2 - Creating a Portable Thing Tracker Using MKR GSM 1400Project #3 - A Remote Asset Tracking Application with LoRaWANEnabling Communication between Different DevicesWorking with the Arduino IoT Cloud SDK and JavaScriptProject #4 - Collecting Data from the Soil and Environment for Smart FarmingProject #5 - Making Your Home Smarter by Voice Assistant(N.B. Please use the Look Inside option to see further chapters)
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.