Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the revised selected papers of the First International Conference, ICSD 2023, virtually held in Delhi, India, during July 15¿16, 2023.The book comprises 31 full papers that were selected from a total of 129 submissions. It provides insights into the latest research and advancements in sustainable development through the integration of machine learning, artificial intelligence, and IoT technologies. It serves as a valuable resource for researchers, practitioners, and policymakers working in the field of sustainable development.
This book gives an overview of existing models that cover the whole lifecycle of an IoT application, ranging from its design, implementation, deployment, operation, and monitoring to its final termination and retirement. Models provide abstraction and can help IoT application developers into creating more robust, secure, and reliable applications. Furthermore, adaptation of applications can be eased by using these models, leading to an increased dynamic of the developed IoT applications.In the book, research of the last years in the area of model based approaches to the Internet of Things is described and these approaches are incorporated into the lifecycle of IoT applications.Finally, use cases from different domains are introduced that show how these models could be applied in real-world applications.
This edited book presents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Winter) which was held on January 28-30, at Ho Chi Minh City, Vietnam. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way and research results about all aspects (theory, applications, and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 18 of most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
This book constitutes the proceedings of the 24th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2023, held in Évora, Portugal, during November 22¿24, 2023.The 45 full papers and 4 short papers presented in this book were carefully reviewed and selected from 77 submissions. IDEAL 2023 is focusing on big data challenges, machine learning, deep learning, data mining, information retrieval and management, bio-/neuro-informatics, bio-inspired models, agents and hybrid intelligent systems, and real-world applications of intelligence techniques and AI.The papers are organized in the following topical sections: main track; special session on federated learning and (pre) aggregation in machine learning; special session on intelligent techniques for real-world applications of renewable energy and green transport; and special session on data selection in machine learning.
This volume LNCS 14300 constitutes the refereed proceedings of the 18th International Conference, IFM 2023, in November 2023, held in Leiden, The Netherlands. The 16 full papers presented together with 2 short papers were carefully reviewed and selected from 51 submissions. The conference focuses on all aspects of the design of integrated techniques, including language design, verification and validation, automated tool support, and the use of such techniques in software engineering practice.
Created to elevate expertise in testing, verification, and validation with industry-specific terminology, readers are empowered to navigate the complex world of quality assurance. From foundational concepts to advanced principles, each entry provides clarity and depth, ensuring the reader becomes well-versed in the language of precision.This dictionary is an indispensable companion for both professionals and students seeking to unravel the nuances of testing methodologies, verification techniques, and validation processes. Readers will be equipped with the tools to communicate effectively, make informed decisions, and excel in projects. In addition, references to SAE Standards are included to direct the read to additional information beyond a practical definition.
Developers and admins, it's time to simplify your workday. With this practical guide, use scripting to solve tedious IT problems with less effort and less code! Learn about popular scripting languages: Bash, PowerShell, and Python. Master important techniques such as working with Linux, cmdlets, regular expressions, JSON, SSH, Git, and more. Use scripts to automate different scenarios, from backups and image processing to virtual machine management. Discover what's possible with only 10 lines of code! In this book, you'll learn about: a. Scripting Languages Beginners, get the crash course you need in Bash (and its alternative, Zsh), PowerShell, and Python syntax to perform scripting tasks. b. Scripting Techniques Learn to write successful scripts by following expert guidance and practical examples. Use commands for processing text files, functions for handling JSON and XML files, cron for automating script execution, SSH for running code, and more. c. Scripting Examples See scripting in action! Walk through concrete applications of scripting: data backup, image processing, web scraping, REST APIs, database maintenance, cloud scenarios, and virtual machine administration. Highlights include: 1) Bash and Zsh 2) Linux toolbox 3) PowerShell and CmdLets 4) Python and pip 5) JSON, XML, and INI 6) SSH, VS Code, and Git 7) Automation with cron 8) Backup automation 9) Image processing 10) Web scraping 11) Cloud scripting 12) Virtual machines
Modellierung ist die Vorstufe zur Softwareentwicklung. Modelle werden vor allem in den frühen Phasen des Entwicklungsprozesses, aber auch in späteren erstellt. Aus den Modellen wird die Gesamtstruktur eines Informationssystems (IS) abgeleitet. Das Buch stellt die verschiedenen Modellarten im Zusammenhang vor und zeigt an zahlreichen Beispielen, wie man praktisch modelliert. Behandelt werden Modelle von Geschäftsprozessen, Daten, Funktionen und darüber hinaus von Organisationen, IT-Infrastrukturen und IS-Landschaften. Für jeden Bereich gibt es unterschiedliche Modellierungsansätze, z.B. Business Process Model and Notation (BPMN) und Ereignisgesteuerte Prozessketten für Geschäftsprozesse, Entity-Relationship-Modelle für Daten und Funktionshierarchiediagramme für Funktionen. Außerdem stellt die Unified Modeling Language (UML) eine breite Palette von Modelltypen zur Verfügung. In dem Buch werden für die betriebliche Praxis wichtigsten Modelle und Diagramme erläutert und die Querbeziehungen aufgezeigt. Da man Diagramme i.d.R. mit Hilfe von Softwarewerkzeugen erzeugt, werden auch typische Modellierungswerkzeuge behandelt. Das Buch richtet sich an Einsteiger, sowohl an Studierende (z.B. Wirtschaftsinformatik, Informatik, Betriebswirtschaftslehre) als auch Praktiker/innen, die in Bereichen wie Requirements Engineering, Systemanalyse oder Anwendungsentwicklung tätig werden wollen.
Last-mile delivery in cities, where the main problems are the traffic situation and ensuring access to customers' homes while maintaining their privacy, poses a substantial logistical challenge. This book explores how the service area of mobility, especially last-mile delivery, can be improved and smartified. It demonstrates how a design science method and a transdisciplinary approach have been used to create a traffic area analysis tool that can accommodate the uncertainty and incompleteness of geospatial data; a linguistic traffic merging tool; and a customer classifier. In terms of developing the optimization artifacts, the socio-economic and logistical aspects of cities were considered and fuzzy logic and nature-inspired swarm intelligence (fuzzy ant colony optimization) were applied as basic principles. Pursuing a transdisciplinary approach, the book offers both practical know-how from the industry and theoretical findings, making it a valuable asset for researchers and practitioners in the fields of mobility and logistics.
Erfahren Sie mit diesem Buch alles über die angewandte NetzwerktechnikIm privaten Bereich spielt Netzwerktechnik eine eher untergeordnete Rolle. Dabei sorgt sie erst dafür, dass die Kommunikation via Internet funktioniert. Der industrielle Sektor hat die Vorteile des Datenaustauschs mit Hilfe von Netzwerken allmählich erkannt. Doch erst im Rahmen der ¿Industrie 4.0¿ wird laut Valentin Plenk die Datenübertragung in Echtzeit mehr Bedeutung gewinnen. Mit Blick auf diese Entwicklung stellt er in seinem Buch im Sinne der angewandten Netzwerktechnik speziell die höheren Schichten der Netzwerktechnik in den Fokus. Dieses kompakte Lehrbuch zeigt Ihnen anhand von konkreten, in Java ausprogrammierten Beispielen, wie Informationen zwischen Systemen über ein Netzwerk ausgetauscht werden können. Pro Kapitel behandelt dieses Netzwerktechnik-Buch ein bestimmtes Thema. Nach der Einführung in die Grundlagen der Kommunikation geht derAutor zunächst auf Java-Streams, Zeichencodierung sowie die Netzwerkanalyse mit Wireshark ein. Anschließend schenkt Plenk speziell folgenden Datenaustauschformaten sowie Protokollen besonderes Augenmerk:¿ JSON¿ HTML¿ HTTP¿ OPC UA¿ TCP/IP¿ UDP/IPKonkrete Beispiele und Übungen geben Ihnen PraxiseinblickeAuf diese Weise deckt dieses Buch über die angewandte Netzwerktechnik den gesamten Bereich technischer Kommunikation ab, von den Netzwerkprotokollen bis hin zum Versenden von Netzwerktelegrammen. Durch diese breite Themenauswahl bekommen Sie als Leser ein tieferes Verständnis für die typischen Problemstellungen in der Anwendung der Netzwerktechnik. Sie erfahren mehr über die Darstellung von Daten in einem bestimmten Dateiformat und wie Sie Daten mittels Standardprotokollen austauschen können. Zudem lernen Sie, wie Sie eigene, einfache Protokolle auf der Basis von TCP/IP erstellen können. Schwerpunkt des Buches bildet dabei immer die Anwendung von Netzwerken.Mit Hilfe zahlreicher Übungsaufgaben (inklusive Lösungsvorschlägen) sowie Anwendungsbeispielen können Sie Ihren persönlichen Kenntnisstand überprüfen und das Gelernte vertiefen. So sind Sie ideal auf die Praxis vorbereitet. Die zweite Auflage des Buchs ¿Angewandte Netzwerktechnik kompakt¿ wurde um den Themenbereich Webservices ergänzt. Im Abschnitt zu UDP/IP finden Sie jetzt außerdem hilfreiche Codebeispiele für Broadcast und Multicast.
This book constitutes the proceedings of the 22st International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2021, which took place in July 2022 in Samos, Greece. The 11 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 45 submissions. The conference covers a wide range of embedded systems design aspects, including machine learning accelerators, and power management and programmable dataflow systems.
This volume includes six lectures given at the ICTAC (International Colloquium on Theoretical Aspects of Computing) School on Formal Methods for an Informal World, held on September 1-7, 2021, originally scheduled to take place in Astana but held in virtual mode due to the pandemic.The school addressed the use of formal methods at various levels of rigour in different application domains: human-computer interaction, cognitive science, business process management, robotics, and healthcare. The emphasis of the school was on practical applications in which formal methods provide unambiguous descriptions of the real world that facilitate understanding and formal and informal analysis. The target audience consists of graduate students, young researchers and industrial practitioners, from both computer science and other fields that make use of computational methods.
This book constitutes the refereed proceedings of the XXIInd International Conference on AIxIA 2023 ¿ Advances in Artificial Intelligence, AIxIA 2023, held in Rome, Italy, during November 6¿10, 2023.The 33 full papers included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: Argumentation and Logic Programming, Natural Language Processing, Machine Learning, Hybrid AI and Applications of AI.
This book constitutes the refereed proceedings of the 21st International Conference on Software Engineering and Formal Methods, SEFM 2023, held in Eindhoven, The Netherlands, during November 6-10, 2023.The 18 regular papers presented in this book, together with 1 invited paper and 1 tool paper, were carefully reviewed and selected from 41 submissions. The SEFM conference series aims to bring together researchers and practitioners from academia, industry and government, to advance the state of the art in formal methods, to facilitate their uptake in the software industry, and to encourage their integration within practical software engineering methods and tools.
Die Digitalisierung der meisten Branchen spiegelt sich in einem wachsenden Anteil der Software an der Gesamtwertschöpfung wider. Unternehmen eröffnen sich dadurch neue Möglichkeiten für technologische Innovationen. Gleichzeitig stehen sie aber vor der ständigen Herausforderung, diese Innovationen in Produkte zu überführen, die für den Kunden wertstiftend sind. Dieser Problemstellung widmeten sich bereits eine Reihe an Methoden zur Produkt- und Geschäftsmodellinnovation, die Überführung der hier gewonnenen Erkenntnisse in die konkrete Produktgestaltung bleibt jedoch eine Herausforderung.Genau hier setzt diese Arbeit an, indem sie die methodische Vorgehensweise ¿Value Proposition Deployment¿ vorschlägt, mit der Unternehmen auf Basis technologischer Innovationen neue Wertversprechen entwickeln können. Hierzu verbindet das Value Proposition Deployment Erkenntnisse des Innovationsmanagements mit Methoden der konstruktiven Qualitätssicherung und stellt somit eine Brücke zwischen Innovations- und Qualitätsmanagement dar. Die auf Basis von 15 praxisrelevanten Gestaltungsanforderungen entwickelte Methode wird detailliert erläutert und anhand praxisnaher Fallbeispiele beschrieben.
This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
This book provides a new model to explore discoverability and enhance the meaning of information. The authors have coined the term epidata, which includes items and circumstances that impact the expression of the data in a document, but are not part of the ordinary process of retrieval systems. Epidata affords pathways and points to details that cast light on proximities that might otherwise go unknown. In addition, epidata are clues to mis-and dis-information discernment. There are many ways to find needed information; however, finding the most useable information is not an easy task. The book explores the uses of proximity and the concept of epidata that increases the probability of finding functional information. The authors sketch a constellation of proximities, present examples of attempts to accomplish proximity, and provoke a discussion of the role of proximity in the field. In addition, the authors suggest that proximity is a thread between retrieval constructs based on known topics, predictable relations, and types of information seeking that lie outside constructs such as browsing, stumbling, encountering, detective work, art making, and translation.
This book constitutes the proceedings of the 6th International Conference on Applied Informatics, ICAI 2023, which took place in Guayaquil, Ecuador, in October 2023.The 30 papers presented in this volume were carefully reviewed and selected from 132 submissions. The contributions are divided into the following thematic blocks: Artificial Intelligence; Data Analysis; Decision Systems; Enterprise Information Systems Applications; Geoinformatics; Health Care Information Systems; Interdisciplinary Information Studies; Learning Management Systems; Virtual and Augmented Reality.
This book constitutes the refereed proceedings of the 9th International Conference on Technologies and Innovation, CITI 2023, held in Guayaquil, Ecuador, during November 13¿16, 2023. The 20 full papers included in this book were carefully reviewed and selected from 51 submissions. They were organized in topical sections as follows: Machine Learning; Natural Language Processing and Semantic Web; Computer vision; and Knowledge-based systems.
Leverage the benefits of quantum computing by identifying business use cases and understanding how to design and develop quantum products and services. This book will guide you to effectively productize quantum computing, including best practices, recommendations, and proven methods to help you navigate the challenges and risks of this emerging technology.The book starts with a thorough introduction to quantum computing, followed by its various algorithms and applications. You will then learn how to build a strong foundation in classical computing, seek practical experience, and stay up-to-date with the latest developments in the field. Moving forward, you will gain an understanding of how to conduct market research to identify business opportunities for quantum computing products and services. The authors then guide you through the process of developing a quantum roadmap and integrating quantum computing into an existing system. This is concluded by a demonstration of howto manage quantum computing projects and how to address their risks and challenges. After reading this book, you will understand quantum computing and how it can be applied to real-world business problems.What You Will LearnIdentify business use cases for quantum computing and understand the potential benefits and risks of quantum applicationsDesign and develop quantum products and services by identifying quantum algorithms, programming in quantum languages, and leveraging quantum simulators and hardwareIntegrate quantum computing into existing systemsIntegrate quantum algorithms with classical algorithmsWho This Book Is ForProduct managers, developers, and entrepreneurs who wish to use the potential of quantum computing for their businesses.
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27¿28, 2023.Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was ¿Humans in security protocols ¿ are we learning from mistakes?¿The topics covered are securing the human endpoint and proving humans correct.
This book celebrates the 10-year anniversary of Software Center (a collaboration between 18 European companies and five Swedish universities) by presenting some of the most impactful and relevant journal or conference papers that researchers in the center have published over the last decade.The book is organized around the five themes around which research in Software Center is organized, i.e. Continuous Delivery, Continuous Architecture, Metrics, Customer Data and Ecosystems Driven Development, and AI Engineering. The focus of the Continuous Delivery theme is to help companies to continuously build high quality products with the right degree of automation. The Continuous Architecture theme addresses challenges that arise when balancing the need for architectural quality and more agile ways of working with shorter development cycles. The Metrics theme studies and provides insight to understand, monitor and improve software processes, products and organizations. The fourth theme, Customer Data and Ecosystem Driven Development, helps companies make sense of the vast amounts of data that are continuously collected from products in the field. Eventually, the theme of AI Engineering addresses the challenge that many companies struggle with in terms of deploying machine- and deep-learning models in industrial contexts with production quality. Each theme has its own part in the book and each part has an introduction chapter and then a carefully selected reprint of the most important papers from that theme.This book mainly aims at researchers and advanced professionals in the areas of software engineering who would like to get an overview about the achievement made in various topics relevant for industrial large-scale software development and management - and to see how research benefits from a close cooperation between industry and academia.
This book discusses an integration of machine learning with metaheuristic techniques that provide more robust and efficient ways to address traditional optimization problems. Modern metaheuristic techniques, along with their main characteristics and recent applications in artificial intelligence, software engineering, data mining, planning and scheduling, logistics and supply chains, are discussed in this book and help global leaders in fast decision making by providing quality solutions to important problems in business, engineering, economics and science. Novel ways are also discovered to attack unsolved problems in software testing and machine learning. The discussion on foundations of optimization and algorithms leads beginners to apply current approaches to optimization problems. The discussed metaheuristic algorithms include genetic algorithms, simulated annealing, ant algorithms, bee algorithms and particle swarm optimization. New developments on metaheuristics attract researchers and practitioners to apply hybrid metaheuristics in real scenarios.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.