Browse Results

Showing 24,476 through 24,500 of 54,260 results

Smart Structures in Energy Infrastructure: Proceedings of ICRTE 2021, Volume 2 (Studies in Infrastructure and Control)

by Anita Khosla Monika Aggarwal

This book gathers selected high-quality research papers presented at International Conference on Renewable Technologies in Engineering (ICRTE 2021) organized by Manav Rachna International Institute of Research & Studies, Faridabad, Haryana, India, during 15–16 April 2021. The book includes conference papers on the theme “Computational Techniques for Renewable Energy Optimization”, which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of renewable energy integration, planning, control and optimization. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends and concerns as well as practical challenges encountered and solutions adopted in the fields of smart structures in energy infrastructure.

Optimization Techniques in Engineering: Advances and Applications (Sustainable Computing and Optimization)

by Anita Khosla Prasenjit Chatterjee Ikbal Ali Dheeraj Joshi

OPTIMIZATION TECHNIQUES IN ENGINEERING The book describes the basic components of an optimization problem along with the formulation of design problems as mathematical programming problems using an objective function that expresses the main aim of the model, and how it is to be either minimized or maximized; subsequently, the concept of optimization and its relevance towards an optimal solution in engineering applications, is explained. This book aims to present some of the recent developments in the area of optimization theory, methods, and applications in engineering. It focuses on the metaphor of the inspired system and how to configure and apply the various algorithms. The book comprises 30 chapters and is organized into two parts: Part I — Soft Computing and Evolutionary-Based Optimization; and Part II — Decision Science and Simulation-Based Optimization, which contains application-based chapters. Readers and users will find in the book: An overview and brief background of optimization methods which are used very popularly in almost all applications of science, engineering, technology, and mathematics; An in-depth treatment of contributions to optimal learning and optimizing engineering systems; Maps out the relations between optimization and other mathematical topics and disciplines; A problem-solving approach and a large number of illustrative examples, leading to a step-by-step formulation and solving of optimization problems. Audience Researchers, industry professionals, academicians, and doctoral scholars in major domains of engineering, production, thermal, electrical, industrial, materials, design, computer engineering, and natural sciences. The book is also suitable for researchers and postgraduate students in mathematics, applied mathematics, and industrial mathematics.

Renewable Energy Optimization, Planning and Control: Proceedings of ICRTE 2022 (Studies in Infrastructure and Control)

by Anita Khosla Mohan Kolhe

This book gathers selected high-quality research papers presented at International Conference on Renewable Technologies in Engineering (ICRTE 2022) organized by Manav Rachna International Institute of Research & Studies, Faridabad, Haryana, India, during October 7–8, 2022. The book includes conference papers on the theme ‘Computational Techniques for Renewable Energy Optimization,’ which aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of renewable energy integration, planning, control, and optimization. It also provides a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of renewable energy and resources.

Predictive and Preventive Measures for Covid-19 Pandemic (Algorithms for Intelligent Systems)

by Praveen Kumar Khosla Mamta Mittal Dolly Sharma Lalit Mohan Goyal

This book explores the inputs with regard to individuals and companies who have developed technologies and innovative solutions, bioinformatics, datasets, apps for diagnosis, etc., that can be leveraged for strengthening the fight against coronavirus. It focuses on technology solutions to stop Covid-19 outbreak and mitigate the risk. The book contains innovative ideas from active researchers who are presently working to find solutions, and they give insights to other researchers to explore the innovative methods and predictive modeling techniques. The novel applications and techniques of established technologies like artificial intelligence (AI), Internet of things (IoT), big data, computer vision and machine learning are discussed to fight the spread of this disease, Covid-19. This pandemic has triggered an unprecedented demand for digital health technology solutions and unleashing information technology to win over this pandemic.

Cloud Computing: 11th EAI International Conference, CloudComp 2021, Virtual Event, December 9–10, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #430)

by Mohammad R. Khosravi Qiang He Haipeng Dai

This book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing, CloudComp 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 17 full papers were carefully reviewed and selected from 40 submissions and detail cloud computing technologies for efficient and intelligent computing in secure and smart environments with distributed devices. The theme of CloudComp 2021 was “Cloud Computing for Secure and Smart Applications”. The book is organized in three general areas of data analytics for cloud systems with distributed applications, cloud architecture and challenges in real-world use, and security in cloud/edge platforms.

Frontiers in Fake Media Generation and Detection (Studies in Autonomic, Data-driven and Industrial Computing)

by Mahdi Khosravy Isao Echizen Noboru Babaguchi

The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network benefited by an iron dome in front of media clones’ attacks. The book focusses on (1) applications of deep generative models in the generation of fake multimedia, and (2) cyber-defensive and detective techniques in front of cyberattacks. The book is composed of three parts: (i) introduction, (ii) fake media generation, and (iii) fake media detection.

Frontiers in Nature-Inspired Industrial Optimization (Springer Tracts in Nature-Inspired Computing)

by Mahdi Khosravy Neeraj Gupta Nilesh Patel

The book provides a collection of recent applications of nature inspired optimization in industrial fields. Different optimization techniques have been deployed, and different problems have been effectively analyzed. The valuable contributions from researchers focus on three ultimate goals (i) improving the accuracy of these techniques, (ii) achieving higher speed and lower computational complexity, and (iii) working on their proposed applications. The book is helpful for active researchers and practitioners in the field.

Frontiers in Genetics Algorithm Theory and Applications (Springer Tracts in Nature-Inspired Computing)

by Mahdi Khosravy Neeraj Gupta Olaf Witkowski

This book reviews recent advances in theory and applications of genetic algorithm (GA). The book is composed of five parts; Part 1 of the book involves the chapters about the advances in GA theory. Part 2 concerns applications in health, society, and economy. Part 3 has an inclusive focus on application in power systems, and Part 4 concerns the applications of GA in electrical vehicle industries. Finally, Part 5 includes applications in signal and image processing.

Concurrent Patterns and Best Practices: Build scalable apps with patterns in multithreading, synchronization, and functional programming

by Atul S. Khot

A definitive guide to mastering and implementing concurrency patterns in your applicationsKey FeaturesBuild scalable apps with patterns in multithreading, synchronization, and functional programmingExplore the parallel programming and multithreading techniques to make the code run fasterEfficiently use the techniques outlined to build reliable applicationsBook DescriptionSelecting the correct concurrency architecture has a significant impact on the design and performance of your applications. This book explains how to leverage the different characteristics of parallel architecture to make your code faster and more efficient. To start with, you'll understand the basic concurrency concepts and explore patterns around explicit locking, lock free programming, futures & actors. Then, you'll get insights into different concurrency models and parallel algorithms and put them to practice in different scenarios to realize your application's true potential. We'll take you through multithreading design patterns, such as master, slave, leader, follower, map-reduce, and monitor, also helping you to learn hands-on coding using these patterns. Once you've grasped all of this, you'll move on to solving problems using synchronizer patterns. You'll discover the rationale for these patterns in distributed & parallel applications, followed by studying how future composition, immutability and the monadic flow help create more robust code. Toward the end of the book, you'll learn about the actor paradigm and actor patterns - the message passing concurrency paradigm.What you will learnExplore parallel architecture Get acquainted with concurrency models Internalize design themes by implementing multithreading patterns Get insights into concurrent design patterns Discover design principles behind many java threading abstractions Work with functional concurrency patternsWho this book is forThis is a must-have guide for developers who want to learn patterns to build scalable and high-performing apps. It’s assumed that you already have a decent level of programming knowledge.

Scala Functional Programming Patterns

by Atul S. Khot

Grok and perform effective functional programming in Scala About This Book * Understand functional programming patterns by comparing them with the traditional object-oriented design patterns * Write robust, safer, and better code using the declarative programming paradigm * An illustrative guide for programmers to create functional programming patterns with Scala Who This Book Is For If you have done Java programming before and have a basic knowledge of Scala and its syntax, then this book is an ideal choice to help you to understand the context, the traditional design pattern applicable, and the Scala way. Having previous knowledge of design patterns will help, though it is not strictly necessary. What You Will Learn * Get to know about functional programming and the value Scala's FP idioms bring to the table * Solve day-to-day programming problems using functional programming idioms * Cut down the boiler-plate and express patterns simply and elegantly using Scala's concise syntax * Tame system complexity by reducing the moving parts * Write easier to reason about concurrent code using the actor paradigm and the Akka library * Apply recursive thinking and understand how to create solutions without mutation * Reuse existing code to compose new behavior * Combine the object-oriented and functional programming approaches for effective programming using Scala In Detail Scala is used to construct elegant class hierarchies for maximum code reuse and extensibility and to implement their behavior using higher-order functions. Its functional programming (FP) features are a boon to help you design "easy to reason about" systems to control the growing software complexities. Knowing how and where to apply the many Scala techniques is challenging. Looking at Scala best practices in the context of what you already know helps you grasp these concepts quickly, and helps you see where and why to use them. This book begins with the rationale behind patterns to help you understand where and why each pattern is applied. You will discover what tail recursion brings to your table and will get an understanding of how to create solutions without mutations. We then explain the concept of memorization and infinite sequences for on-demand computation. Further, the book takes you through Scala's stackable traits and dependency injection, a popular technique to produce loosely-coupled software systems. You will also explore how to currying favors to your code and how to simplify it by de-construction via pattern matching. We also show you how to do pipeline transformations using higher order functions such as the pipes and filters pattern. Then we guide you through the increasing importance of concurrent programming and the pitfalls of traditional code concurrency. Lastly, the book takes a paradigm shift to show you the different techniques that functional programming brings to your plate. This book is an invaluable source to help you understand and perform functional programming and solve common programming problems using Scala's programming patterns. Style and approach This is a hands-on guide to Scala's game-changing features for programming. It is filled with many code examples and figures that illustrate various Scala idioms and best practices.

Models for Tropical Climate Dynamics: Waves, Clouds, and Precipitation (Mathematics of Planet Earth #3)

by Boualem Khouider

This book is a survey of the research work done by the author over the last 15 years, in collaboration with various eminent mathematicians and climate scientists on the subject of tropical convection and convectively coupled waves. In the areas of climate modelling and climate change science, tropical dynamics and tropical rainfall are among the biggest uncertainties of future projections. This not only puts at risk billions of human beings who populate the tropical continents but it is also of central importance for climate predictions on the global scale. This book aims to introduce the non-expert readers in mathematics and theoretical physics to this fascinating topic in order to attract interest into this difficult and exciting research area. The general thyme revolves around the use of new deterministic and stochastic multi-cloud models for tropical convection and convectively coupled waves. It draws modelling ideas from various areas of mathematics and physics and used in conjunction with state-of-the-art satellite and in-situ observations and detailed numerical simulations. After a review of preliminary material on tropical dynamics and moist thermodynamics, including recent discoveries based on satellite observations as well as Markov chains, the book immerses the reader into the area of models for convection and tropical waves. It begins with basic concepts of linear stability analysis and ends with the use of these models to improve the state-of-the-art global climate models. The book also contains a fair amount of exercises that makes it suitable as a textbook complement on the subject.

Iris Biometric Model for Secured Network Access

by Franjieh El Khoury

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgen

Advances in Artificial Intelligence: 29th Canadian Conference on Artificial Intelligence, Canadian AI 2016, Victoria, BC, Canada, May 31 - June 3, 2016. Proceedings (Lecture Notes in Computer Science #9673)

by Richard Khoury Christopher Drummond

This book constitutes the refereed proceedings of the 29th Canadian Conference on Artificial Intelligence, Canadian AI 2016, held in Victoria, BC, Canada, in May/June 2016. The 12 full papers and 27 short papers presented were carefully reviewed and selected from 97 submissions. The focus of the conference was on the following subjects: actions and behaviours, audio and visual recognition, natural language processing, reasoning and learning, streams and distributed computing.

Technology-Driven Business Innovation: Unleashing the Digital Advantage, Volume 1 (Studies in Systems, Decision and Control #223)

by Rim El Khoury

This book aims to provide a comprehensive understanding of the interplay between technology and business and its implications for future growth and innovation. In today's rapidly changing world, technology plays a crucial role in shaping the business landscape. Advancements in artificial intelligence, blockchain, data analytics, and automation have revolutionized how organizations operate, compete, and achieve success. Understanding the profound impact of technology on business is vital for entrepreneurs, managers, policymakers, and academics alike. This book aims to explore the connection between technology and business, highlighting its importance in driving transformative changes across various industries. We welcome scholars, researchers, and practitioners to share their expertise and insights in this exciting endeavor.This book captures the essence of exploring the dynamic relationship between technology and business, emphasizing the potential for innovation and growth. It conveys the idea of embracing the transformative power of technology within the business realm and the opportunities it presents for unleashing new ideas and strategies.By delving into various aspects such as emerging technologies, business strategies, innovation, and ethical considerations, it aims to provide a comprehensive understanding of the symbiotic relationship between technology and business. It offers insights into the integration of technology into decision-making processes, the transformative impact on different industries, and strategies for leveraging technology to drive organizational growth and sustainability.Furthermore, the book highlights real-world case studies, explores emerging trends, and discusses the ethical and social implications of technology adoption in the business context. It serves as a valuable resource for entrepreneurs, managers, policymakers, academics, and anyone interested in understanding and harnessing the potential of technology for business success. This book aims to be a valuable resource for individuals interested in the transformative power of technology in the business realm. By compiling a collection of insightful chapters, it offers readers a diverse range of perspectives, frameworks, and case studies that shed light on the complexities and opportunities associated with technology-driven business environments.

How the Metaverse Will Reshape Business and Sustainability (Contributions to Environmental Sciences & Innovative Business Technology)

by Rim El Khoury Bahaaeddin Alareeni

Sustainability is part of every aspect of our life, with climate concerns shaping the future. Thus, it is important to understand how metaverse will affect sustainability, as it is opening both challenges and opportunities for environmental sustainability. On the one side, replacing real-world interactions with 3D virtual and exchanging physical goods with digital ones are significantly less resource-intensive and more carbon-efficient. Therefore, this holds the promise of reducing the environmental pollution. On the other side, metaverse increases e-waste and energy consumption. Given this controversial impact, it is crucial for businesses and researchers to understand how to ensure that the metaverse develops sustainably. This book is popping out several questions: Do businesses understand the metaverse concept and perceive the benefits and advantages of implementing such technologies? How will the metaverse change business? Will metaverse change our working place and skills needed? How can companies get ahead of the change and mold it to their advantage? Will businesses use metaverse? Can metaverse create a more sustainable word? How can we make the metaverse better than what we have now? Is it going to affect environmental sustainability? Will it cause more severe climate problems, or would it be the solution? How can metaverse impact the achievements of SDGs?

Intelligent Systems, Business, and Innovation Research (Studies in Systems, Decision and Control #489)

by Rim El Khoury Nohade Nasrallah

Intelligent systems research is a multidisciplinary field that focuses on the development of systems that can perceive, reason, and act autonomously. This can include areas such as machine learning, artificial intelligence, natural language processing, and robotics. The goal of intelligent systems research is to develop systems that can understand, learn from, and adapt to their environment, to perform tasks that would typically require human intelligence.Business and innovation research is an interdisciplinary field that examines how organizations can create, develop, and implement new ideas, products, and services. This can include areas such as organizational behaviour, strategic management, and marketing. The goal of business and innovation research is to understand how organizations can foster an environment that encourages creativity and innovation, and how they can develop and implement new ideas in a way that leads to success.Intelligent Systems, Business and Innovation Research is a research area that brings together these two fields to study the use of intelligent systems and technologies in the business context to drive innovation, improve operational efficiency and effectiveness of the organization. The book aims to understand how intelligent systems can be used in business applications, how to design and implement them, how to manage the associated challenges, and how to leverage them to foster innovation, create new business models, and gain competitive advantage. It offers guidance on how to navigate potential conflicts and challenges that may arise during multidisciplinary research in areas such as Industry 4.0, Internet of Things, modern machine learning, software agent applications, and data science. The book focuses on the various fields in which intelligent systems play a critical role in enabling the development of advanced technologies that can perform tasks that would typically require human intelligence. For example, in smart/control systems, intelligent algorithms can be used to optimize the performance of machines and devices, while in cyber security, they can be used to protect networks and data from cyber-attacks. In bioinformatics, intelligent systems can be used to analyse large amounts of biological data, while in virtual reality and robotics, they can be used to create realistic and responsive simulations and automatons. Additionally, the book also highlights the rapidly advancing theoretical foundations of fuzzy sets, mathematical logic, and non-classical logic. These are important theoretical frameworks for the development of intelligent systems, as they provide the foundation for the representation and manipulation of uncertainty, complexity, and imprecision. These theoretical foundations are essential in the development of intelligent systems that can make decisions and perform tasks in uncertain, complex, and dynamic environments.

Decision and Game Theory for Security

by Mhr Khouzani Emmanouil Panaousis George Theodorakopoulos

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

by Hussam Khrais

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming languageKey FeaturesComprehensive information on building a web application penetration testing framework using PythonMaster web application penetration testing using the multi-paradigm programming language PythonDetect vulnerabilities in a system or application by writing your own Python scriptsBook DescriptionPython is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script.This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest to you. This book will teach you how to code a reverse shell and build an anonymous shell. You will also learn how to hack passwords and perform a privilege escalation on Windows with practical examples. You will set up your own virtual hacking environment in VirtualBox, which will help you run multiple operating systems for your testing environment.By the end of this book, you will have learned how to code your own scripts and mastered ethical hacking from scratch.What you will learnCode your own reverse shell (TCP and HTTP)Create your own anonymous shell by interacting with Twitter, Google Forms, and SourceForgeReplicate Metasploit features and build an advanced shellHack passwords using multiple techniques (API hooking, keyloggers, and clipboard hijacking)Exfiltrate data from your targetAdd encryption (AES, RSA, and XOR) to your shell to learn how cryptography is being abused by malwareDiscover privilege escalation on Windows with practical examplesCountermeasures against most attacksWho this book is forThis book is for ethical hackers; penetration testers; students preparing for OSCP, OSCE, GPEN, GXPN, and CEH; information security professionals; cybersecurity consultants; system and network security administrators; and programmers who are keen on learning all about penetration testing.

HBase in Action

by Amandeep Khurana Nick Dimiduk

SummaryHBase in Action has all the knowledge you need to design, build, and run applications using HBase. First, it introduces you to the fundamentals of distributed systems and large scale data handling. Then, you'll explore real-world applications and code samples with just enough theory to understand the practical techniques. You'll see how to build applications with HBase and take advantage of the MapReduce processing framework. And along the way you'll learn patterns and best practices.About the TechnologyHBase is a NoSQL storage system designed for fast, random access to large volumes of data. It runs on commodity hardware and scales smoothly from modest datasets to billions of rows and millions of columns.About this BookHBase in Action is an experience-driven guide that shows you how to design, build, and run applications using HBase. First, it introduces you to the fundamentals of handling big data. Then, you'll explore HBase with the help of real applications and code samples and with just enough theory to back up the practical techniques. You'll take advantage of the MapReduce processing framework and benefit from seeing HBase best practices in action. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideWhen and how to use HBasePractical examplesDesign patterns for scalable data systemsDeployment, integration, and designWritten for developers and architects familiar with data storage and processing. No prior knowledge of HBase, Hadoop, or MapReduce is required.Table of ContentsPART 1 HBASE FUNDAMENTALSIntroducing HBaseGetting startedDistributed HBase, HDFS, and MapReducePART 2 ADVANCED CONCEPTSHBase table designExtending HBase with coprocessorsAlternative HBase clientsPART 3 EXAMPLE APPLICATIONSHBase by example: OpenTSDBScaling GIS on HBasePART 4 OPERATIONALIZING HBASEDeploying HBaseOperations

Security Analytics: A Data Centric Approach to Information Security (Chapman & Hall/CRC Cyber-Physical Systems)

by Mehak Khurana Shilpa Mahajan

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Information Technology in Bio- and Medical Informatics

by Sami Khuri Andreas Holzinger Miroslav Bursa M. Elena Renda

This book constitutes the refereed proceedings of the 6th International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2015, held in Valencia, Spain, in September 2015, in conjunction with DEXA 2015. The 9 revised long papers presented together with 1 poster paper were carefully reviewed and selected from 15 submissions. The papers address the following two topics: medical terminology and clinical processes and machine learning in biomedicine.

Kubernetes Application Developer: Develop Microservices and Design a Software Solution on the Cloud

by Prateek Khushalani

Write efficient, smart, and optimized code for containerized applications on public and private clouds at a generic level. This book shows you how to set up microservices that are robust, scalable, and capable of running on GKE (Google Kubernetes Service), AKS (Azure Kubernetes Service), ECS (Elastic Container Service), or even on a vanilla K8S cluster. The book covers the nuts and bolts of container orchestration engines (COEs) and explains how to install and configure them. It also covers creation and deployment of a sample application on COEs. You will learn how to integrate different applications such as OAuth and how to test them and secure them using Istio Citadel. You also will be taught how to create HPA rules for microservices and scale only those microservices that require it, making your stack intelligent. In the concluding chapter, the book explains how to build a SaaS solution from scratch, running on the cloud with automated deployments accessed publicly via a secured ingress K8S controller.By the end of the book, you will have a good understanding of developing microservices and how to design and create a software solution on the cloud.What You Will LearnBuild software on Kubernetes in the most optimized wayInteract with Kubernetes using client SDKs in Python, Go, nodejs, etc.Create a testing and deployment CI/CD system for software stacksSecure your application using Istio, without writing codeAccess microservices using ingress controllers and scale them using HPA rulesWho This Book Is For Software and system engineers and developers

Machine Learning in Clinical Neuroimaging and Radiogenomics in Neuro-oncology: Third International Workshop, MLCN 2020, and Second International Workshop, RNO-AI 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 4–8, 2020, Proceedings (Lecture Notes in Computer Science #12449)

by Seyed Mostafa Kia Hassan Mohy-ud-Din Ahmed Abdulkadir Cher Bass Mohamad Habes Jane Maryam Rondina Chantal Tax Hongzhi Wang Thomas Wolfers Saima Rathore Madhura Ingalhalikar

This book constitutes the refereed proceedings of the Third International Workshop on Machine Learning in Clinical Neuroimaging, MLCN 2020, and the Second International Workshop on Radiogenomics in Neuro-oncology, RNO-AI 2020, held in conjunction with MICCAI 2020, in Lima, Peru, in October 2020.*For MLCN 2020, 18 papers out of 28 submissions were accepted for publication. The accepted papers present novel contributions in both developing new machine learning methods and applications of existing methods to solve challenging problems in clinical neuroimaging. For RNO-AI 2020, all 8 submissions were accepted for publication. They focus on addressing the problems of applying machine learning to large and multi-site clinical neuroimaging datasets. The workshop aimed to bring together experts in both machine learning and clinical neuroimaging to discuss and hopefully bridge the existing challenges of applied machine learning in clinical neuroscience. *The workshops were held virtually due to the COVID-19 pandemic.

Blockchain Technology and the Law: Opportunities and Risks (Contemporary Commercial Law)

by Muharem Kianieff

Blockchain Technology and the Law: Opportunities and Risks is one of the first texts to offer a critical analysis of Blockchain and the legal and economic challenges faced by this new technology. This book will offer those who are unfamiliar with Blockchain an introduction as to how the technology works and will demonstrate how a legal framework that governs it can be used to ensure that it can be successfully deployed. Discussions included in this book: - an introduction to smart contracts, and their potential, from a commercial and consumer law perspective, to change the nature of transactions between parties; - the impact that Blockchain has already had on financial services, and the possible consumer risks and macro-economic issues that may arise in the future; - the challenges that are facing global securities regulators with the development of Initial Coin Offerings and the ongoing risks that they pose to the investing public; - the risk of significant privacy breaches due to the online public nature of Blockchain; and - the future of Blockchain technology. Of interest to academics, policy-makers, technology developers and legal practitioners, this book will provide a thorough examination of Blockchain technology in relation to the law from a comparative perspective with a focus on the United Kingdom, Canada and the United States.

Modern Music-Inspired Optimization Algorithms for Electric Power Systems: Modeling, Analysis and Practice (Power Systems)

by Mohammad Kiani-Moghaddam Mojtaba Shivaie Philip D. Weinsier

In today’s world, with an increase in the breadth and scope of real-world engineering optimization problems as well as with the advent of big data, improving the performance and efficiency of algorithms for solving such problems has become an indispensable need for specialists and researchers. In contrast to conventional books in the field that employ traditional single-stage computational, single-dimensional, and single-homogeneous optimization algorithms, this book addresses multiple newfound architectures for meta-heuristic music-inspired optimization algorithms. These proposed algorithms, with multi-stage computational, multi-dimensional, and multi-inhomogeneous structures, bring about a new direction in the architecture of meta-heuristic algorithms for solving complicated, real-world, large-scale, non-convex, non-smooth engineering optimization problems having a non-linear, mixed-integer nature with big data. The architectures of these new algorithms may also be appropriate for finding an optimal solution or a Pareto-optimal solution set with higher accuracy and speed in comparison to other optimization algorithms, when feasible regions of the solution space and/or dimensions of the optimization problem increase. This book, unlike conventional books on power systems problems that only consider simple and impractical models, deals with complicated, techno-economic, real-world, large-scale models of power systems operation and planning. Innovative applicable ideas in these models make this book a precious resource for specialists and researchers with a background in power systems operation and planning.Provides an understanding of the optimization problems and algorithms, particularly meta-heuristic optimization algorithms, found in fields such as engineering, economics, management, and operations research;Enhances existing architectures and develops innovative architectures for meta-heuristic music-inspired optimization algorithms in order to deal with complicated, real-world, large-scale, non-convex, non-smooth engineering optimization problems having a non-linear, mixed-integer nature with big data;Addresses innovative multi-level, techno-economic, real-world, large-scale, computational-logical frameworks for power systems operation and planning, and illustrates practical training on implementation of the frameworks using the meta-heuristic music-inspired optimization algorithms.

Refine Search

Showing 24,476 through 24,500 of 54,260 results