Browse Results

Showing 51 through 75 of 82,589 results

The Afterlife of Data: What Happens to Your Information When You Die and Why You Should Care

by Carl Öhman

A short, thought-provoking book about what happens to our online identities after we die. These days, so much of our lives takes place online—but what about our afterlives? Thanks to the digital trails that we leave behind, our identities can now be reconstructed after our death. In fact, AI technology is already enabling us to “interact” with the departed. Sooner than we think, the dead will outnumber the living on Facebook. In this thought-provoking book, Carl Öhman explores the increasingly urgent question of what we should do with all this data and whether our digital afterlives are really our own—and if not, who should have the right to decide what happens to our data. The stakes could hardly be higher. In the next thirty years alone, about two billion people will die. Those of us who remain will inherit the digital remains of an entire generation of humanity—the first digital citizens. Whoever ends up controlling these archives will also effectively control future access to our collective digital past, and this power will have vast political consequences. The fate of our digital remains should be of concern to everyone—past, present, and future. Rising to these challenges, Öhman explains, will require a collective reshaping of our economic and technical systems to reflect more than just the monetary value of digital remains. As we stand before a period of deep civilizational change, The Afterlife of Data will be an essential guide to understanding why and how we as a human race must gain control of our collective digital past—before it is too late.

The Afterlife of Data: What Happens to Your Information When You Die and Why You Should Care

by Carl Öhman

A short, thought-provoking book about what happens to our online identities after we die. These days, so much of our lives takes place online—but what about our afterlives? Thanks to the digital trails that we leave behind, our identities can now be reconstructed after our death. In fact, AI technology is already enabling us to “interact” with the departed. Sooner than we think, the dead will outnumber the living on Facebook. In this thought-provoking book, Carl Öhman explores the increasingly urgent question of what we should do with all this data and whether our digital afterlives are really our own—and if not, who should have the right to decide what happens to our data. The stakes could hardly be higher. In the next thirty years alone, about two billion people will die. Those of us who remain will inherit the digital remains of an entire generation of humanity—the first digital citizens. Whoever ends up controlling these archives will also effectively control future access to our collective digital past, and this power will have vast political consequences. The fate of our digital remains should be of concern to everyone—past, present, and future. Rising to these challenges, Öhman explains, will require a collective reshaping of our economic and technical systems to reflect more than just the monetary value of digital remains. As we stand before a period of deep civilizational change, The Afterlife of Data will be an essential guide to understanding why and how we as a human race must gain control of our collective digital past—before it is too late.

Fog Computing for Intelligent Cloud IoT Systems (Advances in Learning Analytics for Intelligent Cloud-IoT Systems)

by Chandan Banerjee Anupam Rajdeep Chakraborty Ahmed A. Elngar

FOG COMPUTING FOR INTELLIGENT CLOUD IOT SYSTEMS This book is a comprehensive guide on fog computing and how it facilitates computing, storage, and networking services Fog computing is a decentralized computing structure that connects data, devices, and the cloud. It is an extension of cloud computing and is an essential concept in IoT (Internet of Things), as it reduces the burden of processing in cloud computing. It brings intelligence and processing closer to where the data is created and transmitted to other sources. Fog computing has many benefits, such as reduced latency in processing data, better response time that helps the user’s experience, and security and privacy compliance that assures protecting the vital data in the cloud. It also reduces the cost of bandwidth, because the processing is achieved in the cloud, which reduces network bandwidth usage and increases efficiency as user devices share data in the local processing infrastructure rather than the cloud service. Fog computing has various applications across industries, such as agriculture and farming, the healthcare industry, smart cities, education, and entertainment. For example, in the agriculture industry, a very prominent example is the SWAMP project, which stands for Smart Water Management Platform. With fog computing’s help, SWAMP develops a precision-based smart irrigation system concept used in agriculture, minimizing water wastage. This book is divided into three sections. The first section studies fog computing and machine learning, covering fog computing architecture, application perspective, computational offloading in mobile cloud computing, intelligent Cloud-IoT systems, machine learning fundamentals, and data visualization. The second section focuses on applications and analytics, spanning various applications of fog computing, such as in healthcare, Industry 4.0, cancer cell detection systems, smart farming, and precision farming. This section also covers analytics in fog computing using big data and patient monitoring systems, and the emergence of fog computing concerning applications and potentialities in traditional and digital educational systems. Security aspects in fog computing through blockchain and IoT, and fine-grained access through attribute-based encryption for fog computing are also covered. Audience The book will be read by researchers and engineers in computer science, information technology, electronics, and communication specializing in machine learning, deep learning, the cyber world, IoT, and security systems.

Simulation Techniques of Digital Twin in Real-Time Applications: Design Modeling and Implementation

by Abhineet Anand Anita Sardana Abhishek Kumar Srikanta Kumar Mohapatra Shikha Gupta

SIMULATION TECHNIQUES OF DIGITAL TWIN IN REAL-TIME APPLICATIONS The book gives a complete overview of implementing digital twin technology in real-time scenarios while emphasizing how this technology can be embedded with running technologies to solve all other issues. Divided into two parts with Part 1 focusing on simulated techniques in digital twin technology and Part 2 on real-time applications of digital twin technology, the book collects a significant number of important research articles from domain-specific experts. The book sheds light on the various techniques of digital twin technology that are implemented in various application areas. It emphasizes error findings and respective solutions before the actual event happens. Most of the features in the book are on the implementation of strategies in real-time applications. Various real-life experiences are taken to show the proper implementation of simulation technologies. The book shows how engineers of any technology can input their research ideas to convert to real scenarios by using replicas. Hence, the book has a collection of research articles from various engineers with expertise in different technologies from many regions of the world. It shows how to implement the embedded real-time data into technologies. Specifically, the chapters relate to the auto landing and cruising features in aerial vehicles, automated coal mining simulation strategy, the enhancement of workshop equipment, and implementation in power energy management for urban railways. This book also describes the coherent mechanism of digital twin technologies with deep neural networks and artificial intelligence. Audience Researchers, engineers, and students in computer science, software engineering and industrial engineering, will find this book to be very useful.

Artificial Intelligence for Risk Mitigation in the Financial Industry

by Ambrish Kumar Mishra Shweta Anand Narayan C. Debnath Archana Patel

Artificial Intelligence for Risk Mitigation in the Financial Industry This book extensively explores the implementation of AI in the risk mitigation process and provides information for auditing, banking, and financial sectors on how to reduce risk and enhance effective reliability. The applications of the financial industry incorporate vast volumes of structured and unstructured data to gain insight into the financial and non-financial performance of companies. As a result of exponentially increasing data, auditors and management professionals need to enhance processing capabilities while maintaining the effectiveness and reliability of the risk mitigation process. The risk mitigation and audit procedures are processes involving the progression of activities to “transform inputs into output.” As AI systems continue to grow mainstream, it is difficult to imagine an aspect of risk mitigation in the financial industry that will not require AI-related assurance or AI-assisted advisory services. AI can be used as a strong tool in many ways, like the prevention of fraud, money laundering, and cybercrime, detection of risks and probability of NPAs at early stages, sound lending, etc. Audience This is an introductory book that provides insights into the advantages of risk mitigation by the adoption of AI in the financial industry. The subject is not only restricted to individuals like researchers, auditors, and management professionals, but also includes decision-making authorities like the government. This book is a valuable guide to the utilization of AI for risk mitigation and will serve as an important standalone reference for years to come.

Machine Learning for Cyber Physical System: Advances and Challenges (Intelligent Systems Reference Library #60)

by Janmenjoy Nayak Bighnaraj Naik Vimal S. Margarita Favorskaya

This book provides a comprehensive platform for learning the state-of-the-art machine learning algorithms for solving several cybersecurity issues. It is helpful in guiding for the implementation of smart machine learning solutions to detect various cybersecurity problems and make the users to understand in combating malware, detect spam, and fight financial fraud to mitigate cybercrimes. With an effective analysis of cyber-physical data, it consists of the solution for many real-life problems such as anomaly detection, IoT-based framework for security and control, manufacturing control system, fault detection, smart cities, risk assessment of cyber-physical systems, medical diagnosis, smart grid systems, biometric-based physical and cybersecurity systems using advance machine learning approach. Filling an important gap between machine learning and cybersecurity communities, it discusses topics covering a wide range of modern and practical advance machine learning techniques, frameworks, and development tools to enable readers to engage with the cutting-edge research across various aspects of cybersecurity.

Exploring Operations Research with R (Chapman & Hall/CRC Series in Operations Research)

by Jim Duggan

Exploring Operations Research with R shows how the R programming language can be a valuable tool – and way of thinking – which can be successfully applied to the field of operations research (OR). This approach is centred on the idea of the future OR professional as someone who can combine knowledge of key OR techniques (e.g., simulation, linear programming, data science, and network science) with an understanding of R, including tools for data representation, manipulation, and analysis. The core aim of the book is to provide a self-contained introduction to R (both Base R and the tidyverse) and show how this knowledge can be applied to a range of OR challenges in the domains of public health, infectious disease, and energy generation, and thus provide a platform to develop actionable insights to support decision making.Features Can serve as a primary textbook for a comprehensive course in R, with applications in OR Suitable for post-graduate students in OR and data science, with a focus on the computational perspective of OR The text will also be of interest to professional OR practitioners as part of their continuing professional development Linked to a Github repository including code, solutions, data sets, and other ancillary material

Exploring Operations Research with R (Chapman & Hall/CRC Series in Operations Research)

by Jim Duggan

Exploring Operations Research with R shows how the R programming language can be a valuable tool – and way of thinking – which can be successfully applied to the field of operations research (OR). This approach is centred on the idea of the future OR professional as someone who can combine knowledge of key OR techniques (e.g., simulation, linear programming, data science, and network science) with an understanding of R, including tools for data representation, manipulation, and analysis. The core aim of the book is to provide a self-contained introduction to R (both Base R and the tidyverse) and show how this knowledge can be applied to a range of OR challenges in the domains of public health, infectious disease, and energy generation, and thus provide a platform to develop actionable insights to support decision making.Features Can serve as a primary textbook for a comprehensive course in R, with applications in OR Suitable for post-graduate students in OR and data science, with a focus on the computational perspective of OR The text will also be of interest to professional OR practitioners as part of their continuing professional development Linked to a Github repository including code, solutions, data sets, and other ancillary material

IT Infrastructure: Security and Resilience Solutions

by Ralf Süß Yannik Süß

Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components of modern IT infrastructure—compute, storage, backup, and beyond. As technology continues to surge forward, cyber threats evolve in tandem, prompting a dire need for reinforced data center security and resilience.This book provides readers with a holistic, layered understanding of IT operations in our interconnected age. You will dive deep into the heart of technological advancements, appreciating the symbiotic relationship between evolving hardware capabilities and the progressive nature of cloud services. You will understand the intricacies of data center design, management, and the strategic role they play amid the growing reliance on both private and public clouds. Asindustries pivot towards a more digital-first approach, this book serves as a guiding star, illuminating the pathways, challenges, and opportunities of the vast IT infrastructure landscape.What You Will LearnTrace the rich history and evolution of data centers over the last 60 yearsGet comprehensive insights into cloud services architecture, from IaaS to SaaSGain in-depth knowledge of data center facilities, infrastructure, and securityKnow best practices in storage provisioning, administration, and cost managementDevelop strategies and tools for ensuring data center security and resilienceUnderstand the multi-faceted world of IT support service in modern digital environmentsWho This Book Is ForIT professionals: from system administrators and network architects to IT managers and data center overseers, plus students and tech enthusiasts seeking deep insights into IT infrastructure

Digital Marketing Technologies

by Hashem Aghazadeh Mozhde Khoshnevis

This book argues that digital marketing should benefit from emerging technologies to result in sustainable competitive values for businesses in both the digital and physical worlds. It not only explores digital marketing fundamentals, analysis, strategy, practices, and implementation but also explains the applications and relationships of marketing technologies (martechs) with digital marketing; as well as offers several real cases of practicing marketing technologies. It carefully describes how modern businesses offer their value propositions both digitally and physically applying emerging technologies specifically marketing technologies (martechs) and how consumers are using these new technologies particularly artificial intelligence (ChatGPT/ OpenAI). It investigates why consumers are so intrigued and interested in digital relationships, interaction, and shopping experiences. It critically examines and argues that digital marketing has become popular among businesses as they areattempting to serve their customers better by taking advantage of using digital marketing technologies (marketchs).

Middle Tech: Software Work and the Culture of Good Enough (Princeton Studies in Culture and Technology #36)

by Paula Bialski

Why software isn&’t perfect, as seen through the stories of software developers at a run-of-the-mill tech companyContrary to much of the popular discourse, not all technology is seamless and awesome; some of it is simply &“good enough.&” In Middle Tech, Paula Bialski offers an ethnographic study of software developers at a non-flashy, non-start-up corporate tech company. Their stories reveal why software isn&’t perfect and how developers communicate, care, and compromise to make software work—or at least work until the next update. Exploring the culture of good enoughness at a technology firm she calls &“MiddleTech,&” Bialski shows how doing good-enough work is a collectively negotiated resistance to the organizational ideology found in corporate software settings.The truth, Bialski reminds us, is that technology breaks due to human-related issues: staff cutbacks cause media platforms to crash, in-car GPS systems cause catastrophic incidents, and chatbots can be weird. Developers must often labor to patch and repair legacy systems rather than dream up killer apps. Bialski presents a less sensationalist, more empirical portrait of technology work than the frequently told Silicon Valley narratives of disruption and innovation. She finds that software engineers at MiddleTech regard technology as an ephemeral object that only needs to be good enough to function until its next iteration. As a result, they don&’t feel much pressure to make it perfect. Through the deeply personal stories of people and their practices at MiddleTech, Bialski traces the ways that workers create and sustain a complex culture of good enoughness.

Middle Tech: Software Work and the Culture of Good Enough (Princeton Studies in Culture and Technology #36)

by Paula Bialski

Why software isn&’t perfect, as seen through the stories of software developers at a run-of-the-mill tech companyContrary to much of the popular discourse, not all technology is seamless and awesome; some of it is simply &“good enough.&” In Middle Tech, Paula Bialski offers an ethnographic study of software developers at a non-flashy, non-start-up corporate tech company. Their stories reveal why software isn&’t perfect and how developers communicate, care, and compromise to make software work—or at least work until the next update. Exploring the culture of good enoughness at a technology firm she calls &“MiddleTech,&” Bialski shows how doing good-enough work is a collectively negotiated resistance to the organizational ideology found in corporate software settings.The truth, Bialski reminds us, is that technology breaks due to human-related issues: staff cutbacks cause media platforms to crash, in-car GPS systems cause catastrophic incidents, and chatbots can be weird. Developers must often labor to patch and repair legacy systems rather than dream up killer apps. Bialski presents a less sensationalist, more empirical portrait of technology work than the frequently told Silicon Valley narratives of disruption and innovation. She finds that software engineers at MiddleTech regard technology as an ephemeral object that only needs to be good enough to function until its next iteration. As a result, they don&’t feel much pressure to make it perfect. Through the deeply personal stories of people and their practices at MiddleTech, Bialski traces the ways that workers create and sustain a complex culture of good enoughness.

CAMBRIDGE NATIONAL LEVEL 1 / 2 Creative iMedia Revision Guide and Workbook: (pdf)

by Jennie Eyres

This combined revision guide and workbook has been developed from extensive research with teachers. It covers the externally assessed unit of the qualification and helps students to prepare and practise for the exam. Divided into three distinct and easy-to-follow sections: Preparing for the exam; Revision pages; and Workbook practice pages, the revision guide section provides an easily accessible summary of content, while practice questions in the workbook section enable students to apply their knowledge and understanding. It provides clear and concise summaries of key learning points, with a strong visual presentation, to help focus students’ attention. Write-in activities support consolidation of learning and encourage active revision. Confidence-building activities help students to unlock the language of assessment and achieve their potential. Comes with full digital support to help students check knowledge and understanding, and to learn what to expect from different types of exam questions.

Essentials of Computer Architecture

by Douglas Comer

This easy-to-read textbook provides an introduction to computer architecture, focusing on the essential aspects of hardware that programmers need to know. Written from a programmer’s point of view, Essentials of Computer Architecture, Third Edition, covers the three key aspects of architecture: processors, physical and virtual memories, and input-output (I/O) systems.This third edition is updated in view of advances in the field. Most students only have experience with high-level programming languages, and almost no experience tinkering with electronics and hardware. As such, this text is revised to follow a top-down approach, moving from discussions on how a compiler transforms a source program into binary code and data, to explanations of how a computer represents data and code in binary.Additional chapters cover parallelism and data pipelining, assessing the performance of computer systems, and the important topic of power and energy consumption. Exclusive to this third edition, a new chapter explains multicore processors and how coherence hardware provides a consistent view of the values in memory even though each core has its own cache.Suitable for a one-semester undergraduate course, this clear, concise, and easy-to-read textbook offers an ideal introduction to computer architecture for students studying computer programming.

Essentials of Computer Architecture

by Douglas Comer

This easy-to-read textbook provides an introduction to computer architecture, focusing on the essential aspects of hardware that programmers need to know. Written from a programmer’s point of view, Essentials of Computer Architecture, Third Edition, covers the three key aspects of architecture: processors, physical and virtual memories, and input-output (I/O) systems.This third edition is updated in view of advances in the field. Most students only have experience with high-level programming languages, and almost no experience tinkering with electronics and hardware. As such, this text is revised to follow a top-down approach, moving from discussions on how a compiler transforms a source program into binary code and data, to explanations of how a computer represents data and code in binary.Additional chapters cover parallelism and data pipelining, assessing the performance of computer systems, and the important topic of power and energy consumption. Exclusive to this third edition, a new chapter explains multicore processors and how coherence hardware provides a consistent view of the values in memory even though each core has its own cache.Suitable for a one-semester undergraduate course, this clear, concise, and easy-to-read textbook offers an ideal introduction to computer architecture for students studying computer programming.

Theory and Applications of Models of Computation: 18th Annual Conference, TAMC 2024, Hong Kong, China, May 13–15, 2024, Proceedings (Lecture Notes in Computer Science #14637)

by Xujin Chen Bo Li

This book constitutes the proceedings of the 18th Annual Conference on Theory and Applications of Models of Computation, TAMC 2024, which was held in Hong Kong, China, during May 13–15, 2024. The 30 full papers presented in this book were carefully reviewed and selected from 69 submissions. The main themes of the selected papers are computability, complexity, algorithms, information theory, as well as their integration with machine learning theory and the foundations of artificial intelligence.

Python for Data Science

by A. Lakshmi Muddana Sandhya Vinayakam

The book is designed to serve as a textbook for courses offered to undergraduate and graduate students enrolled in data science. This book aims to help the readers understand the basic and advanced concepts for developing simple programs and the fundamentals required for building machine learning models. The book covers basic concepts like data types, operators, and statements that enable the reader to solve simple problems. As functions are the core of any programming, a detailed illustration of defining & invoking functions and recursive functions is covered. Built-in data structures of Python, such as strings, lists, tuples, sets, and dictionary structures, are discussed in detail with examples and exercise problems. Files are an integrated part of programming when dealing with large data. File handling operations are illustrated with examples and a case study at the end of the chapter. Widely used Python packages for data science, such as Pandas, Data Visualization libraries, and regular expressions, are discussed with examples and case studies at the end of the chapters. The book also contains a chapter on SQLite3, a small relational database management system of Python, to understand how to create and manage databases. As AI applications are becoming popular for developing intelligent solutions to various problems, the book includes chapters on Machine Learning and Deep Learning. They cover the basic concepts, example applications, and case studies using popular frameworks such as SKLearn and Keras on public datasets

Handbook of Digital 3D Reconstruction of Historical Architecture (Synthesis Lectures on Engineers, Technology, & Society #28)

by Sander Münster Fabrizio Ivan Apollonio Ina Bluemel Federico Fallavollita Riccardo Foschi Marc Grellert Marinos Ioannides Peter Heinrich Jahn Richard Kurdiovsky Piotr Kuroczyński Jan-Eric Lutteroth Heike Messemer Georg Schelbert

This open access book is a handbook for students, experts and interested parties who want to learn more about digital 3D reconstruction of historical architecture. The book provides answers to the core questions of the subject: What is a digital 3D model or a digital 3D reconstruction? How are they created and what are they used for? Practical instructions, condensed knowledge, explanations of technical terms and references to example projects, literature and further references provide information of varying density and thus enable an individual introduction to the subject.The book combines extensive knowledge on the topic of "digital 3D reconstruction of historical architecture" and provides practical instructions for independent implementation. Up to now, there has been no cross-disciplinary vocabulary for technical terms in this field, so this publication makes a start.The book is aimed at students, experts in the field and the interested public and offers various possibilities for the different target groups to delve deeply into the subject.The book was created within the research network "Digital 3D Reconstruction as Tools for Research in Architectural History," which was funded by the German Research Foundation (DFG) from 2018 to 2023. The authors combined their expertise in the fields of art and architectural history, architecture, university teaching and media informatics.

Applying Drones to Current Societal and Industrial Challenges (Management and Industrial Engineering)

by Diego Carou Antonio Sartal J. Paulo Davim

This book explores drone applications and the cutting-edge technologies that drive their functionality. From transforming everyday challenges like traffic congestion to enhancing efficiency in fields such as search and rescue operations, protection of critical infrastructure, and medicine, the book explores how drones serve as powerful allies to address diverse human needs. The chapters not only showcase the applications of drone technology but also shed light on how these vehicles can revolutionize commonplace tasks, such as delivering packages with unprecedented efficiency. The book also explores technological intricacies, regulatory considerations, and the evolving demands of today's consumers. By providing a holistic view, it equips readers with a deep understanding of the multifaceted landscape surrounding drone technology.

Cellular Automata Technology: Third Asian Symposium, ASCAT 2024, Durgapur, India, February 29–March 2, 2024, Revised Selected Papers (Communications in Computer and Information Science #2021)

by Mamata Dalui Sukanta Das Enrico Formenti

This book constitutes the refereed conference proceedings of the Third Asian Symposium on Cellular Automata Technology, ASCAT 2024, held in Durgapur, India, during February 29 - March 2, 2024.The 15 full papers presented in this book were carefully reviewed and selected from 33 submissions. The symposium aims to explore the latest advancements, methodologies, and interdisciplinary connections that showcase the versatility and potential impact of cellular automata in contemporary research.

Mathematical Logic: On Numbers, Sets, Structures, and Symmetry (Springer Graduate Texts in Philosophy #4)

by Roman Kossak

This textbook is a second edition of the successful, Mathematical Logic: On Numbers, Sets, Structures, and Symmetry. It retains the original two parts found in the first edition, while presenting new material in the form of an added third part to the textbook. The textbook offers a slow introduction to mathematical logic, and several basic concepts of model theory, such as first-order definability, types, symmetries, and elementary extensions. Part I, Logic Sets, and Numbers, shows how mathematical logic is used to develop the number structures of classical mathematics. All necessary concepts are introduced exactly as they would be in a course in mathematical logic; but are accompanied by more extensive introductory remarks and examples to motivate formal developments. The second part, Relations, Structures, Geometry, introduces several basic concepts of model theory, such as first-order definability, types, symmetries, and elementary extensions, and shows how they are usedto study and classify mathematical structures. The added Part III to the book is closer to what one finds in standard introductory mathematical textbooks. Definitions, theorems, and proofs that are introduced are still preceded by remarks that motivate the material, but the exposition is more formal, and includes more advanced topics. The focus is on the notion of countable categoricity, which analyzed in detail using examples from the first two parts of the book. This textbook is suitable for graduate students in mathematical logic and set theory and will also be of interest to mathematicians who know the technical aspects of the subject, but are not familiar with its history and philosophical background.

Fundamentals of Information Systems Interoperability: Data, Services, and Processes

by Stefanie Rinderle-Ma Jürgen Mangler Daniel Ritter

This book presents fundamental concepts and technologies to tackle interoperability between information systems. It details interoperability at the data, service, and process level, and combines theoretical foundations with hands-on presentation of technologies to enable the development of sound and practical integration. Chapter 1 details general interoperability challenges and describes the structure of the book. To start with, Chapter 2 presents technologies for the exchange of data between two selected and highly relevant data formats, i.e., relational databases and XML. Next, Chapter 3 explains concepts for schema matching and mapping and data integration as well as the technological basis for implementing them based on query and transformation languages like XPath and XSLT. Chapter 4 then turns to service interoperability and explains two related technologies – REST and GraphQL – in detail. In Chapter 5, fundamentals for designing process orchestrations at the conceptual level are presented, focusing on how to model process orchestrations and how to verify their correctness and soundness, and showing BPMN as the de facto modeling standard. Chapter 6 then details the concepts and languages for the implementation of process orchestrations, including the presentation of execution languages for process orchestrations that are equipped with a formal semantics, e.g., Workflow Nets, the Refined Process Structure Tree, and CPEE Trees. Subsequently, Chapter 7 focuses on the growing number of distributed, loosely coupled, and often non-interoperable applications through the concepts of enterprise application integration and explains these by an implementation in CPN Tools and by two case studies. Eventually, Chapter 8 is lifting the orchestration and integration concepts and technologies to the choreography level by dealing with the interoperability between different process orchestrations. Chapter 9 concludes the book by featuring success factors for interoperability projects. It also provides a range of open research directions for interoperability such as compliance, sensor fusion, and blockchain technologies. The book is mainly intended as a textbook to be used for developing and teaching courses on interoperability and integration. To this end, it is accompanied by a Web site with additional teaching materials. It also spans a bridge from researchers to graduate students and practitioners by providing a deep understanding on practical interoperability challenges and solutions. The focus here is put on de facto standards and open-source systems and tools to enable interoperability solutions at low cost.

Numerische Analyse von gewöhnlichen und retardierten Differentialgleichungen

by Taketomo Mitsui Guang-Da Hu

Dieses Buch dient als prägnantes Lehrbuch für Studenten in einem fortgeschrittenen Undergraduate- oder First-Year-Graduate-Kurs in verschiedenen Disziplinen wie angewandte Mathematik, Steuerung und Ingenieurwesen, die den modernen Standard der numerischen Methoden von gewöhnlichen und verzögerten Differentialgleichungen verstehen wollen. Experten in denselben Bereichen können sich auch über die jüngsten Entwicklungen in der numerischen Analyse solcher Differentialsysteme informieren. Gewöhnliche Differentialgleichungen (ODEs) sind ein starkes mathematisches Werkzeug, um eine Vielzahl von Phänomenen in Wissenschaft und Technik auszudrücken. Neben ihrer eigenen Bedeutung ist eine der mächtigen Richtungen, in die sich ODEs ausdehnen, die Einbeziehung einer unbekannten Funktion mit verzögertem Argument. Dies wird als verzögerte Differentialgleichungen (Delay differential equations, DDEs) bezeichnet, die häufig in der mathematischen Modellierung vonBiologie, Demographie, Epidemiologie und Kontrolltheorie vorkommen. In einigen Fällen kann die Lösung einer Differentialgleichung durch algebraische Kombinationen bekannter mathematischer Funktionen erhalten werden. In vielen praktischen Fällen ist eine solche Lösung jedoch recht schwierig oder nicht verfügbar, und es sind numerische Näherungen erforderlich. Die moderne Entwicklung von Computern beschleunigt die Situation und eröffnet darüber hinaus mehr Möglichkeiten der numerischen Mittel. Die Kenntnis und das Fachwissen über die numerische Lösung von Differentialgleichungen wird nun in weiten Bereichen der Wissenschaft und des Ingenieurwesens vorausgesetzt.Man könnte meinen, dass ein gut organisiertes Softwarepaket wie MATLAB in etwa die gleiche Lösung bietet. In gewisser Weise stimmt das auch, aber man muss bedenken, dass der blinde Einsatz von Softwarepaketen den Benutzer in die Irre führt. Das Wesentliche der numerischen Lösung von Differentialgleichungen muss noch gelernt werden. Das vorliegende Buch soll das Wesentliche der numerischen Lösungen von gewöhnlichen Differentialgleichungen sowie von Verzögerungsdifferentialgleichungen vermitteln. Die Autoren haben insbesondere festgestellt, dass es noch wenige prägnante Lehrbücher über Verzögerungsdifferentialgleichungen gibt, und haben sich dann daran gemacht, die Lücke durch möglichst transparente Beschreibungen zu schließen. Die wichtigsten Algorithmen zur numerischen Lösung sind in diesem Buch klar beschrieben. Auch die Stabilität von Lösungen von ODEs und DDEs ist von entscheidender Bedeutung. Das Buch führt in die asymptotische Stabilität von analytischen und numerischen Lösungen ein und bietet einen praktischen Weg zur Analyse ihrer Stabilität unter Verwendung einer Theorie komplexer Funktionen.

Intelligent Systems and Applications: Proceedings of the 2023 Intelligent Systems Conference (IntelliSys) Volume 2 (Lecture Notes in Networks and Systems #823)

by Kohei Arai

The book is a unique collection of studies involving intelligent systems and applications of artificial intelligence in the real world to provide solutions to most vexing problems. IntelliSys received an overwhelming 605 papers which were put under strict double-blind peer-review for their novelty, originality and exhaustive research. Finally, 227 papers were sieved and chosen to be published in the proceedings.This book is a valuable collection of all the latest research in the field of artificial intelligence and smart systems. It provides a ready-made resource to all the readers keen on gaining information regarding the latest trends in intelligent systems. It also renders a sneak peek into the future world governed by artificial intelligence.

Living with the Algorithm: AI Governance and Policy for the Future

by Tim Clement-Jones

An authoritative guide to what is needed for AI governance and regulation from expert authors internationally involved in the practical world of AI. This book tackles the question of why AI is a distinct challenge from other technologies and how we should seek to implement innovation-friendly approaches to regulation. It sets out many of the risks to be considered, why regulation is needed, and the form this should take to promote international convergence on AI governance and the responsible deployment of AI. This is a highly readable prescription for AI governance and regulation designed to encourage the technological goals of humanity whilst ensuring that potential risks are mitigated or prevented and, most importantly, that AI remains our servant and does not become our master.

Refine Search

Showing 51 through 75 of 82,589 results