|
|
Books > Computing & IT
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
FLINS, an acronym originally for Fuzzy Logic and Intelligent
Technologies in Nuclear Science, was inaugurated by Prof. Da Ruan
of the Belgian Nuclear Research Center (SCK*CEN) in 1994 with the
purpose of providing PhD and Postdoc researchers with a platform to
present their research ideas in fuzzy logic and artificial
intelligence. For more than 28 years, FLINS has been expanded to
include research in both theoretical and practical development of
computational intelligent systems.With this successful conference
series: FLINS1994 and FLINS1996 in Mol, FLINS1998 in Antwerp,
FLINS2000 in Bruges, FLINS2002 in Gent, FLINS2004 in Blankenberge,
FLINS2006 in Genova, FLINS2008 in Marid, FLINS2010 in Chengdu,
FLINS2012 in Istanbul, FLINS2014 in Juan Pesoa, FLINS2016 in
Roubaix, FLINS2018 in Belfast and FLINS2020 in Cologne, FLINS2022
was organized by Nankai University, and co-organized by Southwest
Jiaotong University, University of Technology Sydney and Ecole
Nationale Superieure des Arts et Industries Textiles of University
of Lille. This unique international research collaboration has
provided researchers with a platform to share and exchange ideas on
state-of-art development in machine learning, multi agent and cyber
physical systems.Following the wishes of Prof. Da Ruan, FLINS2022
offered an international platform that brought together
mathematicians, computer scientists, and engineers who are actively
involved in machine learning, intelligent systems, data analysis,
knowledge engineering and their applications, to share their latest
innovations and developments, exchange notes on the
state-of-the-art research ideas, especially in the areas of
industrial microgrids, intelligent wearable systems, sustainable
development, logistics, supply chain and production optimization,
evaluation systems and performance analysis, as well as risk and
security management, that have now become part and parcel of Fuzzy
Logic and Intelligent Technologies in Nuclear Science.This
FLINS2022 Proceedings has selected 78 conference papers that cover
the following seven areas of interests:
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
Machine Learning in Bioinformatics of Protein Sequences guides
readers around the rapidly advancing world of cutting-edge machine
learning applications in the protein bioinformatics field. Edited
by bioinformatics expert, Dr Lukasz Kurgan, and with contributions
by a dozen of accomplished researchers, this book provides a
holistic view of the structural bioinformatics by covering a broad
spectrum of algorithms, databases and software resources for the
efficient and accurate prediction and characterization of
functional and structural aspects of proteins. It spotlights key
advances which include deep neural networks, natural language
processing-based sequence embedding and covers a wide range of
predictions which comprise of tertiary structure, secondary
structure, residue contacts, intrinsic disorder, protein, peptide
and nucleic acids-binding sites, hotspots, post-translational
modification sites, and protein function. This volume is loaded
with practical information that identifies and describes leading
predictive tools, useful databases, webservers, and modern software
platforms for the development of novel predictive tools.
Relational databases have been predominant for many years and are
used throughout various industries. The current system faces
challenges related to size and variety of data thus the NoSQL
databases emerged. By joining these two database models, there is
room for crucial developments in the field of computer science.
Bridging Relational and NoSQL Databases is an innovative source of
academic content on the convergence process between databases and
describes key features of the next database generation. Featuring
coverage on a wide variety of topics and perspectives such as BASE
approach, CAP theorem, and hybrid and native solutions, this
publication is ideally designed for professionals and researchers
interested in the features and collaboration of relational and
NoSQL databases.
ICT Sustainability is about how to assess, and reduce, the carbon
footprint and materials used with computers and telecommunications.
These are the notes for an award winning on-line graduate course on
strategies for reducing the environmental impact of computers and
how to use the Internet to make business more energy efficient.
These notes have been used for courses by the Australian Computer
Society, Australian National University and Athabasca University
(Canada). The book includes an extensive bibliography. Free open
access course-ware is available on-line to accompany this text.
There is a tremendous need for computer scientists, data
scientists, and software developers to learn how to develop
Socratic problem-solving applications. While the amount of data and
information processing has been accelerating, our ability to learn
and problem-solve with that data has fallen behind. Meanwhile,
problems have become too complex to solve in the workplace without
a concerted effort to follow a problem-solving process. This
problem-solving process must be able to deal with big and disparate
data. Furthermore, it must solve problems that do not have a "rule"
to apply in solving them. Moreover, it must deal with ambiguity and
help humans use informed judgment to build on previous steps and
create new understanding. Computer-based Socratic problem-solving
systems answer this need for a problem-solving process using big
and disparate data. Furthermore, computer scientists, data
scientists, and software developers need the knowledge to develop
these systems. Socrates Digital (TM) for Learning and Problem
Solving presents the rationale for developing a Socratic
problem-solving application. It describes how a computer-based
Socratic problem-solving system called Socrates DigitalTM can keep
problem-solvers on track, document the outcome of a problem-solving
session, and share those results with problem-solvers and larger
audiences. In addition, Socrates DigitalTM assists problem-solvers
to combine evidence about their quality of reasoning for individual
problem-solving steps and their overall confidence in the solution.
Socrates DigitalTM also captures, manages, and distributes this
knowledge across organizations to improve problem-solving. This
book also presents how to build a Socrates DigitalTM system by
detailing the four phases of design and development: Understand,
Explore, Materialize, and Realize. The details include flow charts
and pseudo-code for readers to implement Socrates DigitalTM in a
general-purpose programming language. The completion of the design
and development process results in a Socrates DigitalTM system that
leverages artificial intelligence services from providers that
include Apple, Microsoft, Google, IBM, and Amazon. In addition, an
appendix provides a demonstration of a no-code implementation of
Socrates DigitalTM in Microsoft Power Virtual Agent.
As digital technology continues to revolutionize the world,
businesses are also evolving by adopting digital technologies such
as artificial intelligence, digital marketing, and analytical
methods into their daily practices. Due to this growing adoption,
further study on the potential solutions modern technology provides
to businesses is required to successfully apply it across
industries. AI-Driven Intelligent Models for Business Excellence
explores various artificial intelligence models and methods for
business applications and considers algorithmic approaches for
business excellence across numerous fields and applications.
Covering topics such as business analysis, deep learning, machine
learning, and analytical methods, this reference work is ideal for
managers, business owners, computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
This book presents the state-of-the-art, current challenges, and
future perspectives for the field of many-criteria optimization and
decision analysis. The field recognizes that real-life problems
often involve trying to balance a multiplicity of considerations
simultaneously – such as performance, cost, risk, sustainability,
and quality. The field develops theory, methods and tools that can
support decision makers in finding appropriate solutions when faced
with many (typically more than three) such criteria at the same
time. The book consists of two parts: key research topics,
and emerging topics. Part I begins with a general introduction to
many-criteria optimization, perspectives from research leaders in
real-world problems, and a contemporary survey of the attributes of
problems of this kind. This part continues with chapters on
fundamental aspects of many-criteria optimization, namely on order
relations, quality measures, benchmarking, visualization, and
theoretical considerations. Part II offers more specialized
chapters on correlated objectives, heterogeneous objectives,
Bayesian optimization, and game theory. Written by leading experts
across the field of many-criteria optimization, this book will be
an essential resource for researchers in the fields of evolutionary
computing, operations research, multiobjective optimization, and
decision science.
The considerable growth of RFID is currently accompanied by the
development of numerous identification technologies that complement
those already available while seeking to answer new problems.
Chipless RFID is one example. The goal is to both significantly
reduce the price of the tag and increase the amount of information
it contains, in order to compete with the barcode while retaining
the benefits of a flexible reading approach based on radio
communication. To solve the problem of the number of bits, this
book describes the possibility of coding the information at the
level of the overall shape of the RCS of the tag, which would
facilitate reaching very large quantities. The design of the tags
then returns to the resolution of the inverse problem of the
electromagnetic signature. The proposed design methodology
regularizes the problem by decomposing the signature on a basis of
elementary patterns whose signature is chosen in advance.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
A Guide To SQL
Philip Pratt, Hassan Afyouni, …
Paperback
R1,256
R1,167
Discovery Miles 11 670
|